期刊文献+
共找到754篇文章
< 1 2 38 >
每页显示 20 50 100
Formal Verification of the Merchant Registration Phase of the SET Protocol 被引量:1
1
作者 Xiao-Qi Ma Xiao-Chun Cheng 《International Journal of Automation and computing》 EI 2005年第2期155-162,共8页
This paper describes the formal verification of the Merchant Registration phase of the Secure Electronic Transactions (SET) protocol, a realistic electronic transaction security protocol which is used to protect the s... This paper describes the formal verification of the Merchant Registration phase of the Secure Electronic Transactions (SET) protocol, a realistic electronic transaction security protocol which is used to protect the secrecy of online purchases. A number of concepts, notations, functions, predicates, assumptions and rules are introduced. We describe the knowledge of all legal participants, and a malicious spy, to assess the security of the sub-protocol. Avoiding search in a large state space, the method converges very quickly. We implemented our method in the Isabelle/Isar automated reasoning environment, therefore the whole verification process can be executed mechanically and efficiently. Keywords Formal verification - electronic transaction protocol - knowledge-based system This work was supported by EC, EPSRC, the National Natural Science Foundation of China (No.60496320, 60496321), and Hong Kong K C Wang Education Foundation.Xiao-Qi Ma graduated from Nanjing University of Science and Technology, China, in 1997. He received his Master’s degree from the Institute of Software, Chinese Academy of Sciences in 2003. He is currently a PhD student at the University of Reading. His research interests include computer network security, knowledge-based systems, and operating systems.Xiao-Chun Cheng obtained his PhD in 1996. He has worked as a lecturer at the University of Reading since 2000. He is a vip professor at North East Normal University and Beijing Normal University. His research interests include theoretical and applied aspects in decision support systems, knowledge-based systems and intelligent systems. 展开更多
关键词 formal verification electronic transaction protocol knowledge-based system
在线阅读 下载PDF
Formal Verification of TASM Models by Translating into UPPAAL 被引量:1
2
作者 胡凯 张腾 +3 位作者 杨志斌 顾斌 蒋树 姜泮昌 《Journal of Donghua University(English Edition)》 EI CAS 2012年第1期51-54,共4页
Timed abstract state machine(TASM) is a formal specification language used to specify and simulate the behavior of real-time systems. Formal verification of TASM model can be fulfilled through model checking activitie... Timed abstract state machine(TASM) is a formal specification language used to specify and simulate the behavior of real-time systems. Formal verification of TASM model can be fulfilled through model checking activities by translating into UPPAAL. Firstly, the translational semantics from TASM to UPPAAL is presented through atlas transformation language(ATL). Secondly, the implementation of the proposed model transformation tool TASM2UPPAAL is provided. Finally, a case study is given to illustrate the automatic transformation from TASM model to UPPAAL model. 展开更多
关键词 timed abstract state machine(TASM) formal verification model transformation atlas transformation language(ATL) UPPAAL
在线阅读 下载PDF
Formal Verification under Unknown Constraints 被引量:1
3
作者 LI Guang-hui LI Xiao-wei 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期43-46,共4页
We present a formal method of verifying designs with unknown constraints(e.g.,black boxes)using Boolean satisfiability(SAT).This method is based on a new encoding scheme of unknown constraints,and solves the correspon... We present a formal method of verifying designs with unknown constraints(e.g.,black boxes)using Boolean satisfiability(SAT).This method is based on a new encoding scheme of unknown constraints,and solves the corresponding conjunctive normal form(CNF)formulas.Furthermore,this method can avoid the potential memory explosion,which the binary decision diagram(BDD)based techniques maybe suffer from,thus it has the capacity of verifying large designs.Experimental results demonstrate the efficiency and feasibility of the proposed method. 展开更多
关键词 formal verification unknown constraints black box Boolean satisfiability Boolean comparison
在线阅读 下载PDF
Formal Verification of Secrecy in Group Key Protocols Using Event-B
4
作者 Amjad Gawanmeh Sofiène Tahar Leila Jemni Ben Ayed 《International Journal of Communications, Network and System Sciences》 2012年第3期165-177,共13页
Group key security protocols play an important role in today’s communication systems. Their verification, however, remains a great challenge because of the dynamic characteristics of group key construction and distri... Group key security protocols play an important role in today’s communication systems. Their verification, however, remains a great challenge because of the dynamic characteristics of group key construction and distribution protocols. Security properties that are well defined in normal two-party protocols have different meanings and different interpretations in group key distribution protocols, specifically, secrecy properties, such as group secrecy, forward secrecy, backward secrecy, and key independence. In this paper, we present a method to verify forward secrecy properties for group-oriented protocols. The method is based on a correct semantical link between group key protocols and event-B models and also uses the refinement process in the B method to model and verify group and forward secrecy. We use an event-B first-order theorem proving system to provide invariant checking for these secrecy properties. We illustrate our approach on the Tree based Group Diffie-Hellman protocol as case study. 展开更多
关键词 GROUP KEY Protocols formal verification FORWARD SECRECY SECRECY EVENT-B
在线阅读 下载PDF
A Formal Method for Service Choreography Verification Based on Description Logic
5
作者 Tingting Zhang Yushi Lan +2 位作者 Minggang Yu Changyou Zheng Kun Liu 《Computers, Materials & Continua》 SCIE EI 2020年第2期893-904,共12页
Web Services Choreography Description Language lacks a formal system to accurately express the semantics of service behaviors and verify the correctness of a service choreography model.This paper presents a new approa... Web Services Choreography Description Language lacks a formal system to accurately express the semantics of service behaviors and verify the correctness of a service choreography model.This paper presents a new approach of choreography model verification based on Description Logic.A meta model of service choreography is built to provide a conceptual framework to capture the formal syntax and semantics of service choreography.Based on the framework,a set of rules and constraints are defined in Description Logic for choreography model verification.To automate model verification,the UML-based service choreography model will be transformed,by the given algorithms,into the DL-based ontology,and thus the model properties can be verified by reasoning through the ontology with the help of a popular DL reasoned.A case study is given to demonstrate applicability of the method.Furthermore,the work will be compared with other related research. 展开更多
关键词 Service choreography WS-CDL meta-concept model description logic formal verification
在线阅读 下载PDF
Formal Verification Platform as a Service:WebAssembly Vulnerability Detection Application
6
作者 LiangJun Deng Hang Lei +6 位作者 Zheng Yang WeiZhong Qian XiaoYu Li Hao Wu Sihao Deng RuChao Sha WeiDong Deng 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期2155-2170,共16页
In order to realize a general-purpose automatic formal verification platform based on WebAssembly technology as a web service(FVPS),which aims to provide an automated report of vulnerability detections,this work build... In order to realize a general-purpose automatic formal verification platform based on WebAssembly technology as a web service(FVPS),which aims to provide an automated report of vulnerability detections,this work builds a Hyperledger Fabric blockchain runtime model.It proposes an optimized methodology of the functional equivalent translation from source program languages to formal languages.This methodology utilizes an external application programming interface(API)table to replace the source codes in compilation,thereby pruning the part of housekeeping codes to ease code inflation.Code inflation is a significant metric in formal language translation.Namely,minor code inflation enhances verification scale and performance efficiency.It determines the efficiency of formal verification,involving launching,running,and memory usage.For instance,path explosion increases exponentially,resulting in out-of-memory.The experimental results conclude that program languages like golang severely impact code inflation.FVPS reduces the wasm code size by over 90%,achieving two orders of optimization magnitude,from 2000 kilobyte(KB)to 90 KB.That means we can cope with golang applications up to 20 times larger than the original in scale.This work eliminates the gap between Hyperledger Fabric smart contracts and WebAssembly.Our approach is pragmatic,adaptable,extendable,and flexible.Nowadays,FVPS is successfully applied in a Railway-Port-Aviation blockchain transportation system. 展开更多
关键词 WebAssembly formal verification blockchain smart contract
在线阅读 下载PDF
Formal Verification of Robertson-Type Uncertainty Relation
7
作者 Takaaki Masuhara Toru Kuriyama +1 位作者 Masakazu Yoshida Jun Cheng 《Journal of Quantum Information Science》 2015年第2期58-70,共13页
Formal verification using interactive theorem provers have been noticed as a method of verification of proofs that are too big for humans to check the validity of them. The purpose of this work is to verify the validi... Formal verification using interactive theorem provers have been noticed as a method of verification of proofs that are too big for humans to check the validity of them. The purpose of this work is to verify the validity of Robertson-type uncertainty relation toward verifying unconditional security of quantum key distributions. We verify the validity of the relation by using proof assistant Coq and it is turned out that the theorem regarding the relation formally holds. The source code for Coq which represents the validity of the theorem is printed in Appendix. 展开更多
关键词 formal verification PROOF ASSISTANT COQ UNCERTAINTY RELATION
在线阅读 下载PDF
Distributed Information Flow Verification for Secure Service Composition in Smart Sensor Network 被引量:3
8
作者 XI Ning SUN Cong +2 位作者 MA Jianfeng CHEN Xiaofeng SHEN Yulong 《China Communications》 SCIE CSCD 2016年第4期119-130,共12页
Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, dif... Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, different sensor nodes can cooperate and compose with each other to complete more complicated tasks for user. However, because of the regional characteristic of sensor nodes, merging data with different sensitivities become a primary requirement to the composite services, and information flow security should be intensively considered during service composition. In order to mitigate the great cost caused by the complexity of modeling and the heavy load of single-node verification to the energy-limited sensor node, in this paper, we propose a new distributed verification framework to enforce information flow security on composite services of smart sensor network. We analyze the information flows in composite services and specify security constraints for each service participant. Then we propose an algorithm over the distributed verification framework involving each sensor node to participate in the composite service verification based on the security constraints. The experimental results indicate that our approach can reduce the cost of verification and provide a better load balance. 展开更多
关键词 information flow security service composition formal verification smart sensor network
在线阅读 下载PDF
A Comparative Analysis of Tools for Verification of Security Protocols 被引量:2
9
作者 Nitish Dalal Jenny Shah +1 位作者 Khushboo Hisaria Devesh Jinwala 《International Journal of Communications, Network and System Sciences》 2010年第10期779-787,共9页
The area of formal verification of protocols has gained substantial importance in the recent years. The research results and subsequent applications have amply demonstrated that the formal verification tools have inde... The area of formal verification of protocols has gained substantial importance in the recent years. The research results and subsequent applications have amply demonstrated that the formal verification tools have indeed helped correct the protocols even after being standardized. However, the standard protocol verification tools and techniques do not verify the security properties of a cryptographic protocol. This has resulted in the emergence of the security protocol verifiers to fill the need. In this paper, taking the two popular security verification tools namely Scyther and ProVerif as the basis, we identify a few security protocols and implement them in both Scyther and ProVerif, to aptly evaluate the tools, in terms of the security properties of the selected protocols. In the process, we not only characteristically present a comparative evaluation of the two tools, but also reveal interesting security properties of the protocols selected, showing their strengths and weaknesses. To the best of our knowledge, this is a unique attempt to juxtapose and evaluate the two verification tools using the selected security protocols. 展开更多
关键词 formal verification SECURITY Protocols ATTACKS
暂未订购
Semantic Consistency and Correctness Verification of Digital Traffic Rules 被引量:1
10
作者 Lei Wan Changjun Wang +3 位作者 Daxin Luo Hang Liu Sha Ma Weichao Hu 《Engineering》 SCIE EI CAS CSCD 2024年第2期47-62,共16页
The consensus of the automotive industry and traffic management authorities is that autonomous vehicles must follow the same traffic laws as human drivers.Using formal or digital methods,natural language traffic rules... The consensus of the automotive industry and traffic management authorities is that autonomous vehicles must follow the same traffic laws as human drivers.Using formal or digital methods,natural language traffic rules can be translated into machine language and used by autonomous vehicles.In this paper,a translation flow is designed.Beyond the translation,a deeper examination is required,because the semantics of natural languages are rich and complex,and frequently contain hidden assumptions.The issue of how to ensure that digital rules are accurate and consistent with the original intent of the traffic rules they represent is both significant and unresolved.In response,we propose a method of formal verification that combines equivalence verification with model checking.Reasonable and reassuring digital traffic rules can be obtained by utilizing the proposed traffic rule digitization flow and verification method.In addition,we offer a number of simulation applications that employ digital traffic rules to assess vehicle violations.The experimental findings indicate that our digital rules utilizing metric temporal logic(MTL)can be easily incorporated into simulation platforms and autonomous driving systems(ADS). 展开更多
关键词 Autonomous driving Traffic rules DIGITIZATION formalIZATION verification
在线阅读 下载PDF
Refinement modeling and verification of secure operating systems for communication in digital twins
11
作者 Zhenjiang Qian Gaofei Sun +1 位作者 Xiaoshuang Xing Gaurav Dhiman 《Digital Communications and Networks》 SCIE CSCD 2024年第2期304-314,共11页
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the d... In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the digital twin communication system implementation is completely correct.Formal verification is currently recognized as a method to ensure the correctness of software system for communication in digital twins because it uses rigorous mathematical methods to verify the correctness of systems for communication in digital twins and can effectively help system designers determine whether the system is designed and implemented correctly.In this paper,we use the interactive theorem proving tool Isabelle/HOL to construct the formal model of the X86 architecture,and to model the related assembly instructions.The verification result shows that the system states obtained after the operations of relevant assembly instructions is consistent with the expected states,indicating that the system meets the design expectations. 展开更多
关键词 Theorem proving Isabelle/HOL formal verification System modeling Correctness verification
在线阅读 下载PDF
SUMMARIZATION OF BOOLEAN SATISFIABILITY VERIFICATION
12
作者 Qian Junyan Wu Juan +1 位作者 Zhao Lingzhong Guo Yunchuan 《Journal of Electronics(China)》 2014年第3期232-245,共14页
As a complementary technology to Binary Decision Diagram-based(BDD-based) symbolic model checking, the verification techniques on Boolean satisfiability problem have gained an increasing wide of applications over the ... As a complementary technology to Binary Decision Diagram-based(BDD-based) symbolic model checking, the verification techniques on Boolean satisfiability problem have gained an increasing wide of applications over the last few decades, which brings a dramatic improvement for automatic verification. In this paper, we firstly introduce the theory about the Boolean satisfiability verification, including the description on the problem of Boolean satisfiability verification, Davis-Putnam-Logemann-Loveland(DPLL) based complete verification algorithm, and all kinds of solvers generated and the logic languages used by those solvers. Moreover, we formulate a large number optimizations of technique revolutions based on Boolean SATisfiability(SAT) and Satisfiability Modulo Theories(SMT) solving in detail, including incomplete methods such as bounded model checking, and other methods for concurrent programs model checking. Finally, we point out the major challenge pervasively in industrial practice and prospect directions for future research in the field of formal verification. 展开更多
关键词 Boolean SATisfiability(SAT) Satisfiability Modulo Theories(SMT) Model checking formal verification
在线阅读 下载PDF
Modeling and Verification of Aircraft Takeoff Through Novel Quantum Nets
13
作者 Maryam Jamal Nazir Ahmad Zafar +3 位作者 Atta-ur-Rahman Dhiaa Musleh Mohammed A.Gollapalli Sghaier Chabani 《Computers, Materials & Continua》 SCIE EI 2022年第8期3331-3348,共18页
The formal modeling and verification of aircraft takeoff is a challenge because it is a complex safety-critical operation.The task of aircraft takeoff is distributed amongst various computer-based controllers,however,... The formal modeling and verification of aircraft takeoff is a challenge because it is a complex safety-critical operation.The task of aircraft takeoff is distributed amongst various computer-based controllers,however,with the growing malicious threats a secure communication between aircraft and controllers becomes highly important.This research serves as a starting point for integration of BB84 quantum protocol with petri nets for secure modeling and verification of takeoff procedure.The integrated model combines the BB84 quantum cryptographic protocol with powerful verification tool support offered by petri nets.To model certain important properties of BB84,a new variant of petri nets coined as Quantum Nets are proposed by defining their mathematical foundations and overall system dynamics,furthermore,some important system properties are also abstractly defined.The proposed QuantumNets are then applied for modeling of aircraft takeoff process by defining three quantum nets:namely aircraft,runway controller and gate controller.For authentication between quantum nets,the use of external places and transitions is demonstrated to describe the encryptiondecryption process of qubits stream.Finally,the developed takeoff quantum network is verified through simulation offered by colored petri-net(CPN)Tools.Moreover,reachability tree(RT)analysis is also performed to have greater confidence in feasibility and correctness of the proposed aircraft takeoff model through the Quantum Nets. 展开更多
关键词 Aircraft takeoff BB84 quantum cryptography PETRI-NETS quantum nets formal modeling and verification
在线阅读 下载PDF
Semantic Knowledge Based Reinforcement Learning Formalism for Smart Learning Environments
14
作者 Taimoor Hassan Ibrar Hussain +3 位作者 Hafiz Mahfooz Ul Haque Hamid Turab Mirza Muhammad Nadeem Ali Byung-Seo Kim 《Computers, Materials & Continua》 2025年第10期2071-2094,共24页
Smart learning environments have been considered as vital sources and essential needs in modern digital education systems.With the rapid proliferation of smart and assistive technologies,smart learning processes have ... Smart learning environments have been considered as vital sources and essential needs in modern digital education systems.With the rapid proliferation of smart and assistive technologies,smart learning processes have become quite convenient,comfortable,and financially affordable.This shift has led to the emergence of pervasive computing environments,where user’s intelligent behavior is supported by smart gadgets;however,it is becoming more challenging due to inconsistent behavior of Artificial intelligence(AI)assistive technologies in terms of networking issues,slow user responses to technologies and limited computational resources.This paper presents a context-aware predictive reasoning based formalism for smart learning environments that facilitates students in managing their academic as well as extra-curricular activities autonomously with limited human intervention.This system consists of a three-tier architecture including the acquisition of the contextualized information from the environment autonomously,modeling the system using Web Ontology Rule Language(OWL 2 RL)and Semantic Web Rule Language(SWRL),and perform reasoning to infer the desired goals whenever and wherever needed.For contextual reasoning,we develop a non-monotonic reasoning based formalism to reason with contextual information using rule-based reasoning.The focus is on distributed problem solving,where context-aware agents exchange information using rule-based reasoning and specify constraints to accomplish desired goals.To formally model-check and simulate the system behavior,we model the case study of a smart learning environment in the UPPAAL model checker and verify the desired properties in the model,such as safety,liveness and robust properties to reflect the overall correctness behavior of the system with achieving the minimum analysis time of 0.002 s and 34,712 KB memory utilization. 展开更多
关键词 CONTEXT-AWARENESS reinforcement learning multi-agent systems non-monotonic reasoning formal verification
在线阅读 下载PDF
RISC-V SBI固件安全启动过程的形式化验证
15
作者 杨叶倩 戴鸿君 《计算机研究与发展》 北大核心 2026年第3期768-781,共14页
RISC-V SBI(supervisor binary interface)标准定义了RISC-V架构硬件与操作系统的接口规范。相比x86和ARM固件,SBI固件更合规、可靠;但现有版本仍存在启动正确性未验证、PMP(physical memory protection)物理地址访问等安全漏洞。为此,... RISC-V SBI(supervisor binary interface)标准定义了RISC-V架构硬件与操作系统的接口规范。相比x86和ARM固件,SBI固件更合规、可靠;但现有版本仍存在启动正确性未验证、PMP(physical memory protection)物理地址访问等安全漏洞。为此,提出了定理证明驱动的闭环形式化验证框架,开发经形式验证的SBI固件——SeSBI,并结合Dafny与Isabelle/HOL,以分层策略实现对启动过程的形式验证。为提高验证效率,提出RISC-V硬件模拟策略,统一建模固件与硬件的交互,从而显著降低验证开销。最终成功验证了SeSBI固件启动过程的功能正确性。结果表明,SeSBI以更简洁的代码实现SBI标准启动过程接口,并具备高度可靠性,为RISC-V生态系统提供了经形式验证的可信SBI固件实现。未来工作将扩展验证范围至更多高级属性,并优化验证工具以提升效率。 展开更多
关键词 RISC-V SBI固件 形式化验证 定理证明 功能正确性
在线阅读 下载PDF
面向资源共享的可实现低熵率生物特征双因子身份认证方案研究
16
作者 李硕 张敏 +1 位作者 李忠瑞 陈泉 《西南民族大学学报(自然科学版)》 2026年第1期90-100,共11页
随着资源共享的需求性不断增高,传统的单因子或对生物特征熵率要求高的双因子身份认证方案在安全性与适用性方面面临极大挑战.提出一种适用于资源共享场景的生物特征低熵率双因子身份认证方案,降低了对生物特征熵率的依赖,有效提升了认... 随着资源共享的需求性不断增高,传统的单因子或对生物特征熵率要求高的双因子身份认证方案在安全性与适用性方面面临极大挑战.提出一种适用于资源共享场景的生物特征低熵率双因子身份认证方案,降低了对生物特征熵率的依赖,有效提升了认证安全性与系统可用性.通过BAN逻辑与ProVerif工具的验证,该方案在会话密钥保密性、防重放攻击等方面均具有较强保障.同时,基于Ganache环境的仿真实验表明本方案具有较低的计算与通信开销,具备良好的实用性. 展开更多
关键词 资源共享 双因子身份认证 低熵率 区块链 Proverif形式化验证
在线阅读 下载PDF
操作系统形式规约与验证综述
17
作者 王梓 王洪强 +1 位作者 杨晓艺 兰雨晴 《计算机工程》 北大核心 2026年第2期24-45,共22页
操作系统(OS)作为信息时代关键基础设施,广泛应用于军事、工业、医疗等核心领域。其可靠性与安全性直接决定关键领域运行稳定,漏洞易致系统崩溃、数据泄露等严重后果,因此构建系统化安全保障体系具有重要理论与工程价值。以“形式规约-... 操作系统(OS)作为信息时代关键基础设施,广泛应用于军事、工业、医疗等核心领域。其可靠性与安全性直接决定关键领域运行稳定,漏洞易致系统崩溃、数据泄露等严重后果,因此构建系统化安全保障体系具有重要理论与工程价值。以“形式规约-形式验证-工程落地”为框架,梳理近十年该领域研究成果,剖析技术路径与实践应用。在形式规约层面,明确基于迁移系统等数学结构描述系统功能的模型规约与基于线性时序逻辑(LTL)定义安全、活性需求的性质规约的差异,从功能正确性和安全属性两个方面进行阐述,其中,功能正确性涵盖任务管理调度、内存分配回收、异常中断处理、任务间通信与文件系统读写一致性,安全属性聚焦访问控制的BLP模型与BIBA模型、分离内核多域隔离、信息流无干扰与无泄漏理论。在形式验证层面,阐述依托霍尔逻辑验证程序一致性的推理证明、基于LTL与计算树逻辑(CTL)验证时序属性的模型检测、属性验证标准化流程3类核心方法,并以首个通过机器证明实现功能正确与信息流无干扰的seL4微内核为案例,揭示理论到工程的转化路径。在工程应用上,总结汽车领域控制器局域网(CAN)总线通信验证、智能手机Android系统组件间通信鲁棒性检测的成果。本文的系统性梳理旨在为相关领域的研究奠定基础,为大语言模型提供数据集支持,并为最终的技术工程落地提供参考。 展开更多
关键词 操作系统 形式化方法 形式规约 形式验证 系统安全
在线阅读 下载PDF
进路联锁系统安全需求推导与形式化验证方法
18
作者 张世旭 陈祖希 +2 位作者 梅萌 潘亮 汪小勇 《华侨大学学报(自然科学版)》 2026年第2期136-145,共10页
基于轨道交通联锁系统日益增长的智能化需求与安全性验证挑战,提出一种结合系统理论过程分析(STPA)与Kind2模型检查的安全性分析框架。首先,通过STPA系统性提取安全需求;随后,将需求转化为形式化不变量,并利用Kind2进行模型检查。结果表... 基于轨道交通联锁系统日益增长的智能化需求与安全性验证挑战,提出一种结合系统理论过程分析(STPA)与Kind2模型检查的安全性分析框架。首先,通过STPA系统性提取安全需求;随后,将需求转化为形式化不变量,并利用Kind2进行模型检查。结果表明:在模拟站场数据集上,所有17条安全需求不变量在k=2展开的深度内判定为Valid,无反例轨迹生成;STPA与形式化模型检查的安全验证方法不仅能发现传统分析易忽视的复杂交互风险,还能通过形式化验证提供更高的安全保障,提升系统在智能化场景下的可复用性与鲁棒性。 展开更多
关键词 轨道交通联锁系统 系统理论过程分析(STPA) 人工智能 Kind2模型检查 形式化方法
在线阅读 下载PDF
协同形式验证环境Co-Formal的建立与应用
19
作者 王彬 林争辉 《上海交通大学学报》 EI CAS CSCD 北大核心 2003年第z1期143-146,151,共5页
形式验证存在状态爆炸的问题,特别是软硬件的协同验证难以解决.为此研究了片上系统的协同形式验证问题,给出了一种高效的协同形式验证环境Co-Formal,用于从行为级到具体实现级的软硬件协同形式验证.以一个实际的硬件系统验证了该环境的... 形式验证存在状态爆炸的问题,特别是软硬件的协同验证难以解决.为此研究了片上系统的协同形式验证问题,给出了一种高效的协同形式验证环境Co-Formal,用于从行为级到具体实现级的软硬件协同形式验证.以一个实际的硬件系统验证了该环境的可用性. 展开更多
关键词 协同形式验证环境 模型检查 片上系统
在线阅读 下载PDF
Verify UML Statecharts with SMV 被引量:1
20
作者 Chen Hai yan 1, Dong Wei 1, Wang Ji 1,2 , Chen Huo wang 1 1 Department of Computer Science, National University of Defense Technology, Changsha 410073, China 2 State Key Laboratory for Software Engineering, Wuhan University, Wuhan 430072, C 《Wuhan University Journal of Natural Sciences》 CAS 2001年第Z1期183-190,共8页
Formal verification has been widely needed in the development of safety critical systems. In order to introduce the design verification activity in UML developing process, we have developed a verifier of UML Statechar... Formal verification has been widely needed in the development of safety critical systems. In order to introduce the design verification activity in UML developing process, we have developed a verifier of UML Statecharts by using the model checker SMV. The approach is to transform a system model in UML Statecharts to one in SMV input language via an intermediate language and then to verify the system properties specified in CTL by invoking SMV. The current experiences, including the formal verification of a simplified directory based cache coherence protocol in UML Statecharts, show that automatic verification can be integrated as a new step of the software process nicely. 展开更多
关键词 formal verification UML statecharts EHA SMV
在线阅读 下载PDF
上一页 1 2 38 下一页 到第
使用帮助 返回顶部