论文引用

ion The term \lambda τ1 x1, . . . , τn xn ; t denotes the n-ary logic function which maps x1, . . . , xn to t. It has the same precedence as \forall and \exists In this latter case, note that the two ...

Ina Schaefer, Peter Müller,
2018,
Springer International Publishing

and Concrete Data Types vs Object Capabilities . . . . . . . . . . . . . . . . . . 221 James Noble, Alex Potanin, Toby Murray, and Mark S. Miller A Personal History of Delta Modelling . . . . . . . . ...

Well-specified programs enable code reuse and therefore techniques that help programmers to annotate code correctly are valuable. We devised an automated analysis that detects unreachable code in the ...

C. Csallner, Y. Smaragdakis, Y. Smaragdakis et al.,
Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005.

We present an automatic error-detection approach that combines static checking and concrete test-case generation. Our approach consists of taking the abstract error conditions inferred using theorem p...

Mana Taghdiri, Tianhai Liu, Michael Nagel et al.,
2012 IEEE Fifth International Conference on Software Testing, Verification and Validation

We present a novel approach to bounded program verification that exploits recent advances of SMT solvers in modular checking of object-oriented code against its full specification. Bounded program ver...

We present Kopitiam, an Eclipse plugin for certifying full functional correctness of Java programs using higher-order separation logic. Kopitiam extends the Eclipse Java IDE with an interactive enviro...

Martin Hofmann, Hans-Wolfgang Loidl, David Aspinall et al.,
2007,
Theor. Comput. Sci.

We introduce a reasoning infrastructure for proving statements about resource consumption in a fragment of the Java Virtual Machine Language (JVML). The infrastructure is based on a small hierarchy of...

Torben Amtoft, Anindya Banerjee, A. Banerjee et al.,
2007,
FMSE '07

We formulate an intraprocedural information flow analysis algorithm for sequential, heap manipulating programs. We prove correctness of the algorithm, and argue that it can be used to verify some natu...

Joseph R. Kiniry, Alan E. Morkan, Barry Denby et al.,
2006,
SAVCBS '06

Usability is a key concern in the development of verification tools. In this paper, we present an usability extension for the verification tool ESC/Java2. This enhancement is not achieved through exte...

Traditionally, the full verification of a program's functional correctness has been obtained with pen and paper or with interactive proof assistants, whereas only reduced verification tasks, such as e...

Tomás Vojnar, Bohuslav Krena, T. Vojnar et al.,
2013,
Int. J. Gen. Syst.

This paper provides an overview of various existing approaches to automated formal analysis and verification. The most space is devoted to the approach of model checking, including its basic principle...

This paper presents a case study on the use of formal methods in specification-based, black-box testing of a smart card applet. The system under test is a simple electronic purse application running o...

Dongman Lee, Kyungmin Lee, Seunghyun Han et al.,
2006,
Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)

This paper presents XVMF, an extensible and versatile matchmaking framework, which supports various service substitution mechanisms in dynamic application adaptation for ubiquitous computing environme...

This paper gives an overview of the ongoing research project which concerns generation of dependable Java Card code. According to the automata-based programming technology, code is generated from a hi...

Marieke Huisman,
2009,
FTfJP@ECOOP

This paper discusses how a subtle interaction between the semantics of Java and the implementation of the JML runtime checker can cause the latter to fail to report errors. This problem is due to the ...

This dissertation attacks the well-known problem of path-imprecision in static program analysis. Our starting point is an existing static program analysis that over-approximates the execution paths of...

Patrice Chalin, Patrice Chalin,
2007,
Formal Aspects of Computing

The verifying compiler (VC) project proposals suggest that mainstream software developers are its targeted end-users. Like other software engineering efforts, the VC project success depends on appropr...

The use of formal methods can significantly improve software quality. However, many instructors and students consider formal methods to be too difficult, impractical, and esoteric for use in undergrad...

Savi Maharaj, Robert G. Clark, Thomas Wilson,
2007,
Software & Systems Modeling

The three main assertion-based verification approaches are: run-time assertion checking (RAC), extended static checking (ESC) and full formal verification (FFV). Each approach offers a different balan...

Gary T. Leavens, K. Rustan M. Leino, Peter Müller et al.,
2007,
Formal Aspects of Computing

The state of knowledge in how to specify sequential programs in object-oriented languages such as Java and C# and the state of the art in automated verification tools for such programs have made measu...