Formal architecture modeling of sequential non-recursive C programs

To manage the complexity of C programs, architecture models are used as high-level descriptions, allowing developers to understand, assess, and manage the C programs without having to understand th ...

[1]  Eike Thaden,et al.  A Model-Based Design Methodology with Contracts to Enhance the Development Process of Safety-Critical Systems , 2010, SEUS.

[2]  Jonas Westman,et al.  Extending Contract theory with Safety Integrity Levels , 2015, 2015 IEEE 16th International Symposium on High Assurance Systems Engineering.

[3]  Roberto Passerone,et al.  Multiple Viewpoint Contract-Based Specification and Design , 2008, FMCO.

[4]  Dilian Gurov,et al.  Compositional Algorithmic Verification of Software Product Lines , 2010, FMCO.

[5]  Thomas A. Henzinger,et al.  Software Verification with BLAST , 2003, SPIN.

[6]  Arvinder Kaur,et al.  Component Based Software Engineering , 2010 .

[7]  Mark N. Wegman,et al.  Efficiently computing static single assignment form and the control dependence graph , 1991, TOPL.

[8]  Sanford Friedenthal,et al.  A Practical Guide to SysML: The Systems Modeling Language , 2008 .

[9]  Jonas Westman,et al.  A Reference Example on the Specification of Safety Requirements using ISO 26262 , 2013, DECS@SAFECOMP.

[10]  James B. Dabney,et al.  Mastering Simulink 4 , 2001 .

[11]  Jan Bosch,et al.  Design erosion: problems and causes , 2002, J. Syst. Softw..

[12]  Martín Abadi,et al.  Composing Specifications , 1989, REX Workshop.

[13]  Jozef Hooman,et al.  The Quest Goes on: A Survey of Proofsystems for Partial Correctness of CSP , 1986, Current Trends in Concurrency.

[14]  Alex Groce,et al.  Modular verification of software components in C , 2003, 25th International Conference on Software Engineering, 2003. Proceedings..

[15]  Ivar Jacobson,et al.  The unified modeling language reference manual , 2010 .

[16]  Thomas A. Henzinger,et al.  Reactive Modules , 1999, Formal Methods Syst. Des..

[17]  Martin Törngren,et al.  Structuring Safety Requirements in ISO 26262 Using Contract Theory , 2013, SAFECOMP.

[18]  Martín Abadi,et al.  The Existence of Refinement Mappings , 1988, LICS.

[19]  Dilian Gurov,et al.  Algorithmic verification of procedural programs in the presence of code variability , 2014, Sci. Comput. Program..

[20]  Elizabeth Wolf Hierarchical models of synchronous circuits for formal verification and substitution , 1996 .

[21]  Harald C. Gall,et al.  An evaluation of reverse engineering tool capabilities , 1998, J. Softw. Maintenance Res. Pract..

[22]  Edward A. Lee Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).

[23]  Orna Grumberg,et al.  Modular Model Checking of Software , 1998, TACAS.

[24]  Ghulam Rasool,et al.  Software Architecture Recovery , 2007 .

[25]  Taghi M. Khoshgoftaar,et al.  Measuring coupling and cohesion of software modules: an information-theory approach , 2001, Proceedings Seventh International Software Metrics Symposium.

[26]  Sanjai Rayadurgam,et al.  Your "What" Is My "How": Iteration and Hierarchy in System Design , 2013, IEEE Software.

[27]  Ivar Jacobson,et al.  Unified Modeling Language Reference Manual, The (2nd Edition) , 2004 .

[28]  Jonas Westman,et al.  Contracts for Structuring and Specifying Requirements on Cyber-Physical Systems , 2015 .

[29]  Reinhard Diestel,et al.  Graph Theory , 1997 .

[30]  Vikram S. Adve,et al.  LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..

[31]  Jonas Westman,et al.  Failure Propagation Modeling Based on Contracts Theory , 2015, 2015 11th European Dependable Computing Conference (EDCC).

[32]  C. A. R. Hoare,et al.  A Theory of Communicating Sequential Processes , 1984, JACM.

[33]  Jonas Westman,et al.  Formal Architecture Modeling of Sequential C-Programs , 2015, FACS.

[34]  Thomas A. Henzinger,et al.  The Discipline of Embedded Systems Design , 2007, Computer.

[35]  Bengt Jonsson,et al.  An algebraic theory of interface automata , 2014, Theor. Comput. Sci..

[36]  Danda B. Rawat,et al.  Cyber-Physical Systems: From Theory to Practice , 2015 .

[37]  Manfred Broy,et al.  Engineering Automotive Software , 2007, Proceedings of the IEEE.

[38]  Jussi Koskinen,et al.  Analysis of Ten Reverse Engineering Tools , 2008, SCSS.

[39]  E. F. CODD,et al.  A relational model of data for large shared data banks , 1970, CACM.

[40]  Leslie Lamport,et al.  Artificial Intelligence and Language Processing ]acques Cohen Editor a Simple Approach to Specifying Concurrent Systems , 2022 .

[41]  Mattias Nyberg,et al.  Failure propagation modeling for safety analysis using causal Bayesian networks , 2013, 2013 Conference on Control and Fault-Tolerant Systems (SysTol).

[42]  David Greenaway,et al.  Automated proof-producing abstraction of C code , 2014 .

[43]  Radu Negulescu,et al.  Process Spaces , 2000, CONCUR.

[44]  S. Ramesh,et al.  Compositional Verification of Software Product Lines , 2013, IFM.

[45]  M. N. Armstrong,et al.  Evaluating architectural extractors , 1998, Proceedings Fifth Working Conference on Reverse Engineering (Cat. No.98TB100261).

[46]  Alberto L. Sangiovanni-Vincentelli,et al.  Taming Dr. Frankenstein: Contract-Based Design for Cyber-Physical Systems , 2012, Eur. J. Control.

[47]  Bernhard Rumpe,et al.  Evolving Software Architecture Descriptions of Critical Systems , 2010, Computer.

[48]  Peter H. Feiler,et al.  Model-Based Engineering with AADL , 2012 .

[49]  Mohamed Jmaiel,et al.  System of systems software architecture description using the ISO/IEC/IEEE 42010 standard , 2017, SAC.

[50]  Joseph Robert Horgan,et al.  Dynamic program slicing , 1990, PLDI '90.

[51]  Thomas L. Harman,et al.  Mastering Simulink , 2003 .

[52]  Amir Pnueli,et al.  Compositionality: The Significant Difference , 1999, Lecture Notes in Computer Science.

[53]  Brian W. Kernighan,et al.  The C Programming Language , 1978 .

[54]  Hardi Hungar,et al.  Using contract-based component specifications for virtual integration testing and architecture design , 2011, 2011 Design, Automation & Test in Europe.

[55]  Rajeev Alur,et al.  Modular refinement of hierarchic reactive machines , 2004, TOPL.

[56]  Bernhard Josko,et al.  Contract Based ISO CD 26262 Safety Analysis , 2009 .

[57]  A. Sangiovanni-Vincentelli,et al.  Frankenstein : Contract-Based Design for Cyber-Physical Systems ∗ g , 2013 .

[58]  Jonas Westman,et al.  Environment-Centric Contracts for Design of Cyber-Physical Systems , 2014, MoDELS.

[59]  Mark A. Hillebrand,et al.  VCC: A Practical System for Verifying Concurrent C , 2009, TPHOLs.

[60]  David L. Dill,et al.  Trace theory for automatic hierarchical verification of speed-independent circuits , 1989, ACM distinguished dissertations.

[61]  Qin Ma,et al.  5.1.2 Designing Embedded Systems using Heterogeneous Rich Components 1 , 2008 .

[62]  Michael Hind,et al.  Pointer analysis: haven't we solved this problem yet? , 2001, PASTE '01.