Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice: 8th International Symposium, ISoLA 2018, Limassol, Cyprus, November 5-9, 2018, Proceedings, Part IV

This paper introduces the RV-TOP track at ISoLA’18. The purpose of the track is to bring together experts on runtime verification and industry practitioners domains to (i) disseminate advanced research topics (ii) disseminate current industrial challenges and (iii) get RV more attractive to industry and usable in additional application domains. The track consists of eight contributed papers presented during three sessions.

[1]  Cliff B. Jones,et al.  Specifications are not (necessarily) executable , 1989 .

[2]  Moni Naor,et al.  Timed Commitments , 2000, CRYPTO.

[3]  David R. Cok,et al.  SPEEDY: An Eclipse-based IDE for invariant inference , 2014, F-IDE.

[4]  Massimo Bartoletti,et al.  Financial Cryptography and Data Security , 2017, Lecture Notes in Computer Science.

[5]  Reinhard Wilhelm,et al.  Timing Validation of Automotive Software , 2008, ISoLA.

[6]  Gang Wang,et al.  Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications , 2017, AsiaCCS.

[7]  Bernhard Beckert,et al.  A Dynamic Logic for Deductive Verication of Concurrent Java Programs With Condition Variables , 2007 .

[8]  Christof Schulte,et al.  Logistik: Wege zur Optimierung der Supply Chain , 2016 .

[9]  C. Cordell Green,et al.  What Is Program Synthesis? , 1985, J. Autom. Reason..

[10]  Iddo Bentov,et al.  How to Use Bitcoin to Design Fair Protocols , 2014, CRYPTO.

[11]  Tom Butler,et al.  A Solution for the Problems of Translation and Transparency in Smart Contracts , 2017 .

[12]  Vahid Garousi,et al.  Worlds Apart: Industrial and Academic Focus Areas in Software Testing , 2017, IEEE Software.

[13]  Simon L. Peyton Jones,et al.  The Implementation of Functional Programming Languages , 1987 .

[14]  Gordon J. Pace,et al.  Comprehensive Monitor-Oriented Compensation Programming , 2014, FESCA.

[15]  Nikolai Kosmatov,et al.  Time to Clean Your Test Objectives , 2018, 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE).

[16]  Massimo Bartoletti Smart Contracts Contracts , 2020, Frontiers in Blockchain.

[17]  Werner Esswein,et al.  BPMN4CP: Design and implementation of a BPMN extension for clinical pathways , 2014, 2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM).

[18]  Kathleen M. Eisenhardt,et al.  Theory Building From Cases: Opportunities And Challenges , 2007 .

[19]  Karl Huppler,et al.  The Art of Building a Good Benchmark , 2009, TPCTC.

[20]  Brian Randell,et al.  Reliability Issues in Computing System Design , 1978, CSUR.

[21]  Bor-Yuh Evan Chang,et al.  Boogie: A Modular Reusable Verifier for Object-Oriented Programs , 2005, FMCO.

[22]  Daniel Kroening,et al.  Model checking concurrent linux device drivers , 2007, ASE.

[23]  Armin Biere,et al.  Symbolic Model Checking without BDDs , 1999, TACAS.

[24]  Iddo Bentov,et al.  How to Use Bitcoin to Play Decentralized Poker , 2015, CCS.

[25]  Kim G. Larsen,et al.  A Tutorial on Uppaal , 2004, SFM.

[26]  Clément Hurlin Specifying and checking protocols of multithreaded classes , 2009, SAC '09.

[27]  Jörg Brauer,et al.  Model-Based Testing for Avionics Systems , 2018, FM.

[28]  Yoichi Hirai,et al.  Defining the Ethereum Virtual Machine for Interactive Theorem Provers , 2017, Financial Cryptography Workshops.

[29]  Yang Liu,et al.  A formal model for the SPARCv8 ISA and a proof of non-interference for the LEON3 processor , 2016, Arch. Formal Proofs.

[30]  Leonardo Mariani,et al.  Runtime Failure Prevention and Reaction , 2018, Lectures on Runtime Verification.

[31]  Gordon J. Pace,et al.  Considering Academia-Industry Projects Meta-characteristics in Runtime Verification Design , 2018, ISoLA.

[32]  Klaus Havelund,et al.  Rule-based runtime verification revisited , 2015, International Journal on Software Tools for Technology Transfer.

[33]  Luca Benini,et al.  Combining Simulation and Formal Methods for System-Level Performance Analysis , 2006, Proceedings of the Design Automation & Test in Europe Conference.

[34]  Bertrand Meyer,et al.  Applying 'design by contract' , 1992, Computer.

[35]  Christian Lidström Verification of Functional Requirements of Embedded Automotive C Code , 2016 .

[36]  Serdar Tasiran,et al.  Practical Methods for Reasoning About Java 8's Functional Programming Features , 2018, VSTTE.

[37]  Oliver Zendel,et al.  Analyzing Computer Vision Data — The Good, the Bad and the Ugly , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[38]  Carola Wolf,et al.  Strategic Planning Research: Toward a Theory-Driven Agenda , 2017 .

[39]  Roger Villemaire,et al.  Runtime Enforcement of Web Service Message Contracts with Data , 2012, IEEE Transactions on Services Computing.

[40]  Morten Bisgaard,et al.  Battery-aware scheduling in low orbit: the GomX–3 case , 2018, Formal Aspects of Computing.

[41]  Sukrit Kalra,et al.  ZEUS: Analyzing Safety of Smart Contracts , 2018, NDSS.

[42]  Alberto Griggio,et al.  The MathSAT5 SMT Solver , 2013, TACAS.

[43]  Michael Hamburg,et al.  Spectre Attacks: Exploiting Speculative Execution , 2018, 2019 IEEE Symposium on Security and Privacy (SP).

[44]  E. M. Novikov Evolution of the Linux kernel , 2017 .

[45]  François Bobot,et al.  Why3: Shepherd Your Herd of Provers , 2011 .

[46]  Akash Lal,et al.  Powering the static driver verifier using corral , 2014, SIGSOFT FSE.

[47]  Hardi Hungar,et al.  Model Generation by Moderated Regular Extrapolation , 2002, FASE.

[48]  Gábor Bergmann,et al.  Towards Reliable Benchmarks of Timed Automata , 2018 .

[49]  Rod M. Burstall,et al.  Program Proving as Hand Simulation with a Little Induction , 1974, IFIP Congress.

[50]  David Schwartz,et al.  The Ripple Protocol Consensus Algorithm , 2014 .

[51]  Antonio Iera,et al.  The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.

[52]  L. Goodman Tezos : A Self-Amending Crypto-Ledger Position Paper , 2014 .

[53]  Karama Kanoun,et al.  Dependability benchmarking for computer systems , 2008 .

[54]  Anand Kumar,et al.  Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach , 2015, WISE.

[55]  Massimo Bartoletti,et al.  A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.

[56]  Iddo Bentov,et al.  How to Use Bitcoin to Incentivize Correct Computations , 2014, CCS.

[57]  Gunter Saake,et al.  Feature-Oriented Software Product Lines , 2013, Springer Berlin Heidelberg.

[58]  Christian Colombo,et al.  Organising LTL monitors over distributed systems with a global clock , 2016, Formal Methods Syst. Des..

[59]  Emin Gün Sirer,et al.  Short Paper: Service-Oriented Sharding for Blockchains , 2017, Financial Cryptography.

[60]  Eric Koskinen,et al.  Automatic Generation of Precise and Useful Commutativity Conditions (Extended Version) , 2018, TACAS.

[61]  Peter Dadam,et al.  Adaptive process management with ADEPT2 , 2005, 21st International Conference on Data Engineering (ICDE'05).

[62]  Oleg Sokolsky,et al.  SMEDL: Combining Synchronous and Asynchronous Monitoring , 2016, RV.

[63]  Burak Turhan,et al.  Sharing Data and Models in Software Engineering , 2014 .

[64]  Gordon J. Pace,et al.  Safer asynchronous runtime monitoring using compensations , 2012, Formal Methods Syst. Des..

[65]  Grigore Rosu,et al.  JavaMOP: Efficient parametric runtime monitoring framework , 2012, 2012 34th International Conference on Software Engineering (ICSE).

[66]  Sebastian Fischmeister,et al.  Runtime verification with minimal intrusion through parallelism , 2015, Formal Methods Syst. Des..

[67]  Karsten Rexroth,et al.  SIAS – Konzeption eines planungsunterstützenden Werkzeuges für die Zielplanung , 2012 .

[68]  Jan Peleska,et al.  Complete model-based equivalence class testing for nondeterministic systems , 2016, Formal Aspects of Computing.

[69]  Felix Klaedtke,et al.  Monitoring Metric First-Order Temporal Properties , 2015, J. ACM.

[70]  Michael D. Ernst,et al.  An overview of JML tools and applications , 2003, International Journal on Software Tools for Technology Transfer.

[71]  Grigore Rosu,et al.  Semantics-based program verifiers for all languages , 2016, OOPSLA.

[72]  Walter Binder,et al.  Flexible and Extensible Runtime Verification for Java (Extended Version) , 2015, Int. J. Softw. Eng. Knowl. Eng..

[73]  Bernhard Steffen,et al.  Archimedean Points: The Essence for Mastering Change , 2016, LNCS Trans. Found. Mastering Chang..

[74]  Sagar Chaki,et al.  Automatic Abstraction in SMT-Based Unbounded Software Model Checking , 2013, CAV.

[75]  Clark W. Barrett,et al.  The SMT-LIB Standard Version 2.0 , 2010 .

[76]  Yliès Falcone,et al.  What can you verify and enforce at runtime? , 2012, International Journal on Software Tools for Technology Transfer.

[77]  Alberto Trombetta,et al.  BPMN: An introduction to the standard , 2012, Comput. Stand. Interfaces.

[78]  Gary T. Leavens,et al.  Behavioral interface specification languages , 2012, CSUR.

[79]  Yu Guo,et al.  Deep Specifications and Certified Abstraction Layers , 2015, POPL.

[80]  Rainer Böhme,et al.  In Code We Trust? - Measuring the Control Flow Immutability of All Smart Contracts Deployed on Ethereum , 2017, DPM/CBT@ESORICS.

[81]  Sriram Sankaranarayanan,et al.  S-TaLiRo: A Tool for Temporal Logic Falsification for Hybrid Systems , 2011, TACAS.

[82]  Bernhard Beckert,et al.  Lessons Learned From Microkernel Verification -- Specification is the New Bottleneck , 2012, SSV.

[83]  Manfred Reichert,et al.  The ADEPT project: a decade of research and development for robust and flexible process support , 2009, Computer Science - Research and Development.

[84]  Marlon Dumas,et al.  Business process variability modeling : A survey , 2017 .

[85]  Samir Chatterjee,et al.  A Design Science Research Methodology for Information Systems Research , 2008 .

[86]  Rajeev Alur,et al.  Syntax-guided synthesis , 2013, 2013 Formal Methods in Computer-Aided Design.

[87]  Sungwon Kang,et al.  A survey on software product line testing , 2012, SPLC '12.

[88]  Martin Glinz,et al.  Statecharts For Requirements Specification - As Simple As Possible, As Rich As Needed , 2002 .

[89]  Jozef Hooman,et al.  Refactoring of Legacy Software Using Model Learning and Equivalence Checking: An Industrial Experience Report , 2016, IFM.

[90]  Tsun S. Chow,et al.  Testing Software Design Modeled by Finite-State Machines , 1978, IEEE Transactions on Software Engineering.

[91]  Karsten Rexroth,et al.  Methodology of target and requirements management for complex systems concerning the application field of an energy-efficient city , 2009 .

[92]  Koushik Sen,et al.  Efficient decentralized monitoring of safety in distributed systems , 2004, Proceedings. 26th International Conference on Software Engineering.

[93]  K. Mani Chandy,et al.  How processes learn , 1985, PODC '85.

[94]  Manfred Reichert,et al.  Capturing variability in business process models: the Provop approach , 2010, J. Softw. Maintenance Res. Pract..

[95]  Sam Toueg,et al.  Unreliable failure detectors for reliable distributed systems , 1996, JACM.

[96]  Bernhard Beckert,et al.  Deductive Software Verification – The KeY Book , 2016, Lecture Notes in Computer Science.

[97]  Gary T. Leavens,et al.  Modular invariants for layered object structures , 2006, Sci. Comput. Program..

[98]  Jan Recker,et al.  How Much Language Is Enough? Theoretical and Practical Use of the Business Process Modeling Notation , 2008, CAiSE.

[99]  Bernd Finkbeiner,et al.  LOLA: runtime monitoring of synchronous systems , 2005, 12th International Symposium on Temporal Representation and Reasoning (TIME'05).

[100]  Stéphane Lescuyer ProvenCore: Towards a Verified Isolation Micro-Kernel , 2015, MILS@HiPEAC.

[101]  Pedro Peris-López,et al.  Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks , 2014, Sensors.

[102]  John Barnes,et al.  Spark: The Proven Approach to High Integrity Software , 2012 .

[103]  Atif Mashkoor The Hemodialysis Machine Case Study , 2016, ABZ.

[104]  Kim G. Larsen,et al.  Statistical Model Checking for Networks of Priced Timed Automata , 2011, FORMATS.

[105]  John C. Mankins,et al.  Technology Readiness Levels-A White Paper , 1995 .

[106]  Mohammad Reza Mousavi,et al.  Towards Model-Based Testing of Electronic Funds Transfer Systems , 2011, FSEN.

[107]  Elaine Shi,et al.  Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[108]  Prateek Saxena,et al.  Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..

[109]  Haiyang Sun,et al.  ADRENALIN-RV: Android Runtime Verification Using Load-Time Weaving , 2017, 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST).

[110]  Mark S. Miller,et al.  The digital path: smart contracts and the Third World , 2013 .

[111]  Niklaus Wirth,et al.  Program development by stepwise refinement , 1971, CACM.

[112]  Angelos D. Keromytis,et al.  Dynamic Trust Management , 2009, Computer.

[113]  Jonathan P. Bowen,et al.  The use of industrial-strength formal methods , 1997, Proceedings Twenty-First Annual International Computer Software and Applications Conference (COMPSAC'97).

[114]  Ezio Bartocci,et al.  Monitoring mobile and spatially distributed cyber-physical systems , 2017, MEMOCODE.

[115]  James Coplien,et al.  Symmetry Breaking in Software Patterns , 2000, GCSE.

[116]  Tevfik Bultan,et al.  Eliminating navigation errors in web applications via model checking and runtime enforcement of navigation state machines , 2010, ASE '10.

[117]  Wolfram Schulte,et al.  VCC: Contract-based modular verification of concurrent C , 2009, 2009 31st International Conference on Software Engineering - Companion Volume.

[118]  Bernd Finkbeiner,et al.  Runtime Verification for HyperLTL , 2016, RV.

[119]  Borzoo Bonakdarpour,et al.  Runtime Verification of k-Safety Hyperproperties in HyperLTL , 2016, 2016 IEEE 29th Computer Security Foundations Symposium (CSF).

[120]  Petar Tsankov,et al.  Securify: Practical Security Analysis of Smart Contracts , 2018, CCS.

[121]  Simon L. Peyton Jones,et al.  Composing contracts: an adventure in financial engineering (functional pearl) , 2000, ICFP '00.

[122]  Carlos Garcia - Santos carlos. garcia - santos Industry 4 . 0-The Capgemini Consulting View Sharpening the Picture beyond the Hype , .

[123]  Vaughan R. Pratt Anatomy of the Pentium Bug , 1995, TAPSOFT.

[124]  George S. Avrunin,et al.  Patterns in property specifications for finite-state verification , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).

[125]  Grigore Rosu,et al.  An overview of the K semantic framework , 2010, J. Log. Algebraic Methods Program..

[126]  Nishant Rodrigues,et al.  KEVM: A Complete Semantics of the Ethereum Virtual Machine , 2017 .

[127]  Douglas R. Smith,et al.  Planware-domain-specific synthesis of high-performance schedulers , 1998, Proceedings 13th IEEE International Conference on Automated Software Engineering (Cat. No.98EX239).

[128]  Jakob Rehof,et al.  A Methodology for Combinatory Process Synthesis: Process Variability in Clinical Pathways , 2018, ISoLA.

[129]  Tore Dybå,et al.  Evidence-based software engineering , 2004, Proceedings. 26th International Conference on Software Engineering.

[130]  Claude Michel Exact Projection Functions for Floating Point Number Constraints , 2002, ISAIM.

[131]  Richard Jüllig,et al.  Specware: Formal Support for Composing Software , 1995, MPC.

[132]  Michael Huth,et al.  Centrally Governed Blockchains: Optimizing Security, Cost, and Availability , 2017, Models, Algorithms, Logics and Tools.

[133]  Michael Felderer,et al.  Estimating the Cost and Benefit of Model-Based Testing: A Decision Support Procedure for the Application of Model-Based Testing in Industry , 2015, 2015 41st Euromicro Conference on Software Engineering and Advanced Applications.

[134]  Guilherme Horta Travassos,et al.  A Picture from the Model-Based Testing Area: Concepts, Techniques, and Challenges , 2010, Adv. Comput..

[135]  Elaine Shi,et al.  Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab , 2016, Financial Cryptography Workshops.

[136]  Dirk van Dalen,et al.  Logic and structure , 1980 .

[137]  Kim G. Larsen,et al.  Testing real-time embedded software using UPPAAL-TRON: an industrial case study , 2005, EMSOFT.

[138]  Massimo Bartoletti,et al.  Constant-Deposit Multiparty Lotteries on Bitcoin , 2017, Financial Cryptography Workshops.

[139]  Koen Claessen,et al.  QuickCheck: a lightweight tool for random testing of Haskell programs , 2000, ICFP.

[140]  В. С. Мутилин,et al.  Архитектура Linux Driver Verification , 2011 .

[141]  Nikolai Kosmatov,et al.  Efficient Leveraging of Symbolic Execution to Advanced Coverage Criteria , 2014, 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation.

[142]  Matthias Radestock,et al.  A Reflective Higher-order Calculus , 2005, FInCo@ETAPS.

[143]  Dogan Ulus,et al.  First-order temporal logic monitoring with BDDs , 2017, Formal Methods in System Design.

[144]  Ruth Sara Aguilar-Savén,et al.  Business process modelling: Review and framework , 2004 .

[145]  Gernot Heiser,et al.  Comprehensive formal verification of an OS microkernel , 2014, TOCS.

[146]  Viktor Schuppan,et al.  Linear Encodings of Bounded LTL Model Checking , 2006, Log. Methods Comput. Sci..

[147]  Richard Baskerville,et al.  Generalizing Generalizability in Information Systems Research , 2003, Inf. Syst. Res..

[148]  Kim G. Larsen,et al.  Formal Verification of a Power Controller Using the Real-Time Model Checker UPPAAL , 1999, ARTS.

[149]  Karl Meinke,et al.  Learning-Based Testing for Safety Critical Automotive Applications , 2017, IMBSA.

[150]  Bernhard Steffen,et al.  Automata Learning with Automated Alphabet Abstraction Refinement , 2011, VMCAI.

[151]  Christian Nielsen,et al.  Value Proposition Design: How to create products and services customers want , 2015 .

[152]  Glenford J. Myers,et al.  Art of Software Testing , 1979 .

[153]  Guido Governatori,et al.  Evaluation of Logic-Based Smart Contracts for Blockchain Systems , 2016, RuleML.

[154]  Masami Hagiya,et al.  AN INTUITIONISTIC EPISTEMIC LOGIC FOR ASYNCHRONOUS , 2010 .

[155]  Ankur Taly,et al.  Privacy, Discovery, and Authentication for the Internet of Things , 2016, ESORICS.

[156]  David L. Kaplan How to fix peer review , 2005 .

[157]  Massimo Bartoletti,et al.  SoK: unraveling Bitcoin smart contracts , 2018, IACR Cryptol. ePrint Arch..

[158]  Gordon J. Pace,et al.  Distributed system contract monitoring , 2011, J. Log. Algebraic Methods Program..

[159]  Kim G. Larsen,et al.  Time-Optimal Test Cases for Real-Time Systems , 2003, FORMATS.

[160]  Kim G. Larsen,et al.  Timed Control with Observation Based and Stuttering Invariant Strategies , 2007, ATVA.

[161]  Nikolaj Bjørner,et al.  Z3: An Efficient SMT Solver , 2008, TACAS.

[162]  Gordon J. Pace,et al.  Runtime Verification using VALOUR , 2017, RV-CuBES.

[163]  Nikolai Kosmatov,et al.  An All-in-One Toolkit for Automated White-Box Testing , 2014, TAP@STAF.

[164]  Hana Chockler,et al.  HiFrog: SMT-based Function Summarization for Software Verification , 2017, TACAS.

[165]  Jay Ligatti,et al.  Modeling runtime enforcement with mandatory results automata , 2014, International Journal of Information Security.

[166]  John Mylopoulos,et al.  On the Frame Problem in Procedure Specifications , 1995, IEEE Trans. Software Eng..

[167]  Nikolai Kosmatov,et al.  Automating structural testing of C programs: Experience with PathCrawler , 2009, 2009 ICSE Workshop on Automation of Software Test.

[168]  Isil Dillig,et al.  Maximal specification synthesis , 2016, POPL.

[169]  Philippe Herrmann,et al.  Structural Testing of Executables , 2008, 2008 1st International Conference on Software Testing, Verification, and Validation.

[170]  Christopher D. Clack,et al.  Smart Contract Templates: essential requirements and design options , 2016, ArXiv.

[171]  Xavier Leroy,et al.  Formal certification of a compiler back-end or: programming a compiler with a proof assistant , 2006, POPL '06.

[172]  Kim G. Larsen,et al.  UPPAAL-Tiga: Time for Playing Games! , 2007, CAV.

[173]  Bart Jacobs,et al.  Java Program Verification Challenges , 2002, FMCO.

[174]  Ezio Bartocci,et al.  First International Competition on Software for Runtime Verification , 2014, RV.

[175]  Bruno Marre,et al.  Improving the Floating Point Addition and Subtraction Constraints , 2010, CP.

[176]  Somesh Jha,et al.  Smart Contracts and Opportunities for Formal Methods , 2018, ISoLA.

[177]  D. T. Lee,et al.  Securing web application code by static analysis and runtime protection , 2004, WWW '04.

[178]  Yu Lei,et al.  Introduction to Combinatorial Testing , 2013 .

[179]  Conal Elliott Compiling to categories , 2017, Proc. ACM Program. Lang..

[180]  Marco Vieira,et al.  The OLAP and data warehousing approaches for analysis and sharing of results from dependability evaluation experiments , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..

[181]  Volker G. Hildebrand Individualisierung als strategische Option der Marktbearbeitung , 1997 .

[182]  Prateek Saxena,et al.  Finding The Greedy, Prodigal, and Suicidal Contracts at Scale , 2018, ACSAC.

[183]  John M. Bryson,et al.  Strategic Planning in the Military , 2000 .

[184]  Kim G. Larsen,et al.  T-UPPAAL: online model-based testing of real-time systems , 2004, Proceedings. 19th International Conference on Automated Software Engineering, 2004..

[185]  Wolfgang Ahrendt,et al.  A system for compositional verification of asynchronous objects , 2012, Sci. Comput. Program..

[186]  Arun Sharma,et al.  Are pricing policies an impediment to the success of customer solutions , 2011 .

[187]  Akihito Iwai,et al.  RV-Android: Efficient Parametric Android Runtime Verification, a Brief Tutorial , 2015, RV.

[188]  Kim G. Larsen,et al.  Formal Analysis and Testing of Real-Time Automotive Systems Using UPPAAL Tools , 2015, FMICS.

[189]  Gordon J. Pace,et al.  LARVA --- Safer Monitoring of Real-Time Java Programs (Tool Paper) , 2009, 2009 Seventh IEEE International Conference on Software Engineering and Formal Methods.

[190]  Jorge A. Navas,et al.  The SeaHorn Verification Framework , 2015, CAV.

[191]  Surajit Chaudhuri,et al.  An overview of data warehousing and OLAP technology , 1997, SGMD.

[192]  Jan-Christoph Küster,et al.  From Propositional to First-Order Monitoring , 2013, RV.

[193]  Arnaud Gotlieb,et al.  INKA: TEN YEARS AFTER THE FIRST IDEAS , 2006 .

[194]  Jonas Westman,et al.  Providing tool support for specifying safety-critical systems by enforcing syntactic contract conditions , 2017, Requirements Engineering.

[195]  Amr Sabry,et al.  Reasoning about programs in continuation-passing style , 1992, LFP '92.

[196]  John Eriksson Formal Requirement Models for Automotive Embedded Systems , 2016 .

[197]  DR. Gavin Wood POLKADOT: VISION FOR A HETEROGENEOUS MULTI-CHAIN FRAMEWORK , 2016 .

[198]  William A. Howard,et al.  The formulae-as-types notion of construction , 1969 .

[199]  Marco Muñiz,et al.  Uppaal Stratego for Intelligent Traffic Lights , 2017 .

[200]  Russell O'Connor,et al.  Simplicity: A New Language for Blockchains , 2017, PLAS@CCS.

[201]  Xiapu Luo,et al.  Under-optimized smart contracts devour your money , 2017, 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER).

[202]  Sylvie Boldo Deductive Formal Verification: How To Make Your Floating-Point Programs Behave , 2014 .

[203]  David E. Rydeheard,et al.  MarQ: Monitoring at Runtime with QEA , 2015, TACAS.

[204]  A. Gotlieb,et al.  Constraint solving on modular integers , 2010 .

[205]  Ian Wilson,et al.  Strategic planning isn't dead— it changed , 1994 .

[206]  Julien Schmaltz,et al.  Timed Model-Based Conformance Testing A Case Study Using Tron , 2010 .

[207]  Bernhard Steffen,et al.  LearnLib Tutorial: From Finite Automata to Register Interface Programs , 2012, ISoLA.

[208]  Steve Boßelmann,et al.  GOLD: Global Organization aLignment and Decision - Towards the Hierarchical Integration of Heterogeneous Business Models , 2018, ISoLA.

[209]  簡聰富,et al.  物件導向軟體之架構(Object-Oriented Software Construction)探討 , 1989 .

[210]  Yoichi Hirai,et al.  An Intuitionistic Epistemic Logic for Sequential Consistency on Shared Memory , 2010, LPAR.

[211]  Ilya Sergey,et al.  Scilla: a Smart Contract Intermediate-Level LAnguage , 2018, ArXiv.

[212]  Manfred Reichert,et al.  Semantically-Driven Workflow Generation Using Declarative Modeling for Processes in Software Engineering , 2011, 2011 IEEE 15th International Enterprise Distributed Object Computing Conference Workshops.

[213]  Daniel Kroening,et al.  An Interpolating Sequent Calculus for Quantifier-Free Presburger Arithmetic , 2010, Journal of Automated Reasoning.

[214]  Jörg Brauer,et al.  Efficient and Trustworthy Tool Qualification for Model-Based Testing Tools , 2012, ICTSS.

[215]  Pierre-Louis Curien,et al.  The Categorical Abstract Machine , 1987, Sci. Comput. Program..

[216]  Andrej Dudenhefner,et al.  Combinatory Logic Synthesizer , 2014, ISoLA.

[217]  Kim G. Larsen,et al.  Timed I/O automata: a complete specification theory for real-time systems , 2010, HSCC '10.

[218]  Yuguang Fang,et al.  A Privacy-Preserving Attribute-Based Authentication System for Mobile Health Networks , 2014, IEEE Transactions on Mobile Computing.

[219]  Koushik Sen,et al.  Rule-Based Runtime Verification , 2004, VMCAI.

[220]  Gordon J. Pace,et al.  Runtime Verification of Ethereum Smart Contracts , 2018, 2018 14th European Dependable Computing Conference (EDCC).

[221]  Gerald Stieglbauer,et al.  Objecting to the Revolution: Model-Based Engineering and the Industry - Root Causes Beyond Classical Research Topics , 2017, MODELSWARD.

[222]  Andrew Miller,et al.  Zero-Collateral Lotteries in Bitcoin and Ethereum , 2016, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[223]  Vahid Garousi,et al.  What industry wants from academia in software testing?: Hearing practitioners' opinions , 2017, EASE.

[224]  Tiziana Margaria,et al.  Domain-Specific Business Modeling with the Business Model Developer , 2014, ISoLA.

[225]  Jan Tretmans,et al.  On-the-fly conformance testing using SPIN , 2000, International Journal on Software Tools for Technology Transfer.

[226]  ReichertManfred,et al.  Adept _flex Supporting Dynamic Changes of Workflows Without Losing Control , 1998 .

[227]  Jan Peleska,et al.  Automated Test Case Generation with SMT-Solving and Abstract Interpretation , 2011, NASA Formal Methods.

[228]  Koushik Sen,et al.  CUTE: a concolic unit testing engine for C , 2005, ESEC/FSE-13.

[229]  Haiyang Sun,et al.  Multi-Process Runtime Verification for Android , 2017, 2017 24th Asia-Pacific Software Engineering Conference (APSEC).

[230]  Manfred Reichert,et al.  Refactoring large process model repositories , 2011, Comput. Ind..

[231]  Tiziana Margaria,et al.  Dynamic Testing Via Automata Learning , 2007, Haifa Verification Conference.

[232]  Stefania Gnesi,et al.  Model Driven Development and Code Generation: An Automotive Case Study , 2007, SDL Forum.

[233]  Nikolai Kosmatov,et al.  Program slicing enhances a verification technique combining static and dynamic analysis , 2012, SAC '12.

[234]  Judi Romijn A Timed Verification of the IEEE 1394 Leader Election Protocol , 2001, Formal Methods Syst. Des..

[235]  Jan Peleska,et al.  Complete model-based equivalence class testing , 2014, International Journal on Software Tools for Technology Transfer.

[236]  David R. Cok,et al.  OpenJML: JML for Java 7 by Extending OpenJDK , 2011, NASA Formal Methods.

[237]  Heinrich Daembkes,et al.  Automated Driving Safer and More Efficient Future Driving Foreword , 2017 .

[238]  Yliès Falcone,et al.  Runtime Verification and Enforcement for Android Applications with RV-Droid , 2012, RV.

[239]  Jan Peleska,et al.  Model-Based Testing Strategies and Their (In)dependence on Syntactic Model Representations , 2016, FMICS-AVoCS.

[240]  Paul F. Syverson,et al.  Temporarily hidden bit commitment and lottery applications , 2010, International Journal of Information Security.

[241]  Dana Angluin,et al.  Learning Regular Sets from Queries and Counterexamples , 1987, Inf. Comput..

[242]  Nikolai Kosmatov,et al.  Structural Unit Testing as a Service with PathCrawler-online.com , 2013, 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering.

[243]  Gregor Kiczales,et al.  Using aspectC to improve the modularity of path-specific customization in operating system code , 2001, ESEC/FSE-9.

[244]  Miroslav Pajic,et al.  Opportunities and Challenges in Monitoring Cyber-Physical Systems Security , 2018, ISoLA.

[245]  K. Rustan M. Leino,et al.  Specification and verification , 2011, Commun. ACM.

[246]  César Sánchez,et al.  Runtime Verification for Decentralised and Distributed Systems , 2018, Lectures on Runtime Verification.

[247]  Grigore Rosu,et al.  Java-MOP: A Monitoring Oriented Programming Environment for Java , 2005, TACAS.

[248]  David R. Cok,et al.  OpenJML: Software verification for Java 7 using JML, OpenJDK, and Eclipse , 2014, F-IDE.

[249]  Jeffrey D. Uuman Principles of database and knowledge- base systems , 1989 .

[250]  Tiziana Margaria,et al.  Simplicity as a Driver for Agile Innovation , 2010, Computer.

[251]  Ezio Bartocci,et al.  A Temporal Logic Approach to Modular Design of Synthetic Biological Circuits , 2013, CMSB.

[252]  Bryan Ford,et al.  Parsing expression grammars: a recognition-based syntactic foundation , 2004, POPL '04.

[253]  Alex Biryukov,et al.  Findel: Secure Derivative Contracts for Ethereum , 2017, Financial Cryptography Workshops.

[254]  Brian Nielsen,et al.  Test generation for time critical systems: Tool and case study , 2001, Proceedings 13th Euromicro Conference on Real-Time Systems.

[255]  Kim G. Larsen,et al.  Efficient On-the-Fly Algorithms for the Analysis of Timed Games , 2005, CONCUR.

[256]  Gary T. Leavens,et al.  Poster: An Algorithm and Tool to Infer Practical Postconditions , 2018, 2018 IEEE/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion).

[257]  Andreas Rausch,et al.  Learning Systems: Machine-Learning in Software Products and Learning-Based Analysis of Software Systems - Special Track at ISoLA 2016 , 2016, ISoLA.

[258]  Fabio Massacci,et al.  Do you really mean what you actually enforced? , 2011, International Journal of Information Security.

[259]  Natasha Sharygina,et al.  OpenSMT2: An SMT Solver for Multi-core and Cloud Computing , 2016, SAT.

[260]  Gary T. Leavens,et al.  Extensions of the theory of observational purity and a practical design for JML , 2008 .

[261]  Kim G. Larsen,et al.  On Time with Minimal Expected Cost! , 2014, ATVA.

[262]  Runtime Verification , 2010, Lecture Notes in Computer Science.

[263]  Tiziana Margaria,et al.  Synthesis-Based Loose Programming , 2010, 2010 Seventh International Conference on the Quality of Information and Communications Technology.

[264]  Theo C. Ruys,et al.  The Bounded Retransmission Protocol Must Be on Time! , 1997, TACAS.

[265]  Bernhard Steffen,et al.  DIME: A Programming-Less Modeling Environment for Web Applications , 2016, ISoLA.

[266]  Philippe Herrmann,et al.  An Alternative to SAT-Based Approaches for Bit-Vectors , 2010, TACAS.

[267]  Grigore Rosu,et al.  Towards Monitoring-Oriented Programming: A Paradigm Combining Specification and Implementation , 2003, RV@CAV.

[268]  Wolfgang Küchlin,et al.  Towards automatic software model checking of thousands of Linux modules—a case study with Avinux , 2009, Softw. Test. Verification Reliab..

[269]  Mahesh Viswanathan,et al.  Java-MaC: a Run-time Assurance Tool for Java Programs , 2001, RV@CAV.

[270]  Darren D. Cofer,et al.  Study on the Barriers to the Industrial Adoption of Formal Methods , 2013, FMICS.

[271]  Frank S. de Boer,et al.  Integrating deductive verification and symbolic execution for abstract object creation in dynamic logic , 2014, Software & Systems Modeling.

[272]  Nancy A. Lynch,et al.  Impossibility of distributed consensus with one faulty process , 1983, PODS '83.

[273]  Thomas A. Gutzwiller,et al.  Das CC RIM-Referenzmodell für den Entwurf von betrieblichen, transaktionsorientierten Informationssystemen , 1994 .

[274]  Yoonsik Cheon,et al.  Specifying and checking method call sequences of Java programs , 2006, Software Quality Journal.

[275]  Mehrdad Sabetzadeh,et al.  The Case for Context-Driven Software Engineering Research: Generalizability Is Overrated , 2017, IEEE Softw..

[276]  Nick Szabo,et al.  Formalizing and Securing Relationships on Public Networks , 1997, First Monday.

[277]  Bäckström Sophia Learning-based testing of automotive ECUs , 2016 .

[278]  Leslie Lamport,et al.  "Sometime" is sometimes "not never": on the temporal logic of programs , 1980, POPL '80.

[279]  Oliver Niese,et al.  An integrated approach to testing complex systems , 2003 .

[280]  Marcin Andrychowicz,et al.  Fair Two-Party Computations via Bitcoin Deposits , 2014, Financial Cryptography Workshops.

[281]  Ilya Sergey,et al.  A Concurrent Perspective on Smart Contracts , 2017, Financial Cryptography Workshops.

[282]  H. Hricak,et al.  Evidence-based medicine. , 1997, Singapore medical journal.

[283]  Grigore Rosu,et al.  Program Verification by Coinduction , 2018, ESOP.

[284]  David A. Naumann,et al.  Observational purity and encapsulation , 2005, Theor. Comput. Sci..

[285]  Jonathan P. Bowen,et al.  Ten Commandments of Formal Methods ...Ten Years Later , 2006, Computer.

[286]  Peter Müller,et al.  Modular Specification and Verification of Delegation with SMT Solvers , 2011 .

[287]  Gordon J. Pace,et al.  Dynamic Event-Based Runtime Monitoring of Real-Time and Contextual Properties , 2009, FMICS.

[288]  Stefan Dziembowski,et al.  Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts , 2016, ESORICS.

[289]  Fabio Massacci,et al.  Iterative enforcement by suppression: Towards practical enforcement theories , 2012, J. Comput. Secur..

[290]  Kim G. Larsen,et al.  Uppaal Stratego , 2015, TACAS.

[291]  Christian Colombo,et al.  First International Summer School on Runtime Verification - As Part of the ArVi COST Action 1402 , 2016, RV.

[292]  Jan Peleska Model-based avionic systems testing for the airbus family , 2018, 2018 IEEE 23rd European Test Symposium (ETS).

[293]  Aron Laszka,et al.  Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach , 2017, Financial Cryptography.

[294]  Ahmed E. Hassan,et al.  Think locally, act globally: Improving defect and effort prediction models , 2012, 2012 9th IEEE Working Conference on Mining Software Repositories (MSR).

[295]  Nikolai Kosmatov,et al.  Frama-C: A software analysis perspective , 2015, Formal Aspects of Computing.

[296]  Stefan Hrastinski,et al.  Socio-technical IS design science research: developing design theory for IS integration management , 2011, Inf. Syst. E Bus. Manag..

[297]  Carlo Maria Medaglia,et al.  An Overview of Privacy and Security Issues in the Internet of Things , 2010 .

[298]  Bernhard Steffen,et al.  Reusing System States by Active Learning Algorithms , 2011, EternalS@FET.

[299]  Luciano Baresi,et al.  An Introduction to Software Testing , 2006, FoVMT.

[300]  Christopher D. Clack,et al.  Smart Contract Templates: foundations, design landscape and research directions , 2016, ArXiv.

[301]  Brian Nielsen,et al.  Automated test generation from timed automata , 2001, International Journal on Software Tools for Technology Transfer.

[302]  Jan Peleska,et al.  A Real-World Benchmark Model for Testing Concurrent Real-Time Systems in the Automotive Domain , 2011, ICTSS.

[303]  Klaus-Dieter Schewe,et al.  ABZ 2014: The Landing Gear Case Study , 2014, Communications in Computer and Information Science.

[304]  Howard Barringer,et al.  Rule Systems for Run-time Monitoring: from Eagle to RuleR , 2010, J. Log. Comput..

[305]  Yves Le Traon,et al.  Sound and Quasi-Complete Detection of Infeasible Test Requirements , 2015, 2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST).

[306]  Loizos Heracleous,et al.  Strategizing through playful design , 2007 .

[307]  Jan Bosch,et al.  On the notion of variability in software product lines , 2001, Proceedings Working IEEE/IFIP Conference on Software Architecture.

[308]  Sumit Gulwani,et al.  FlashExtract: a framework for data extraction by examples , 2014, PLDI.

[309]  Martin Leucker,et al.  Monitoring modulo theories , 2016, International Journal on Software Tools for Technology Transfer.

[310]  Paul F. Syverson,et al.  Weakly secret bit commitment: applications to lotteries and fair exchange , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).

[311]  Ittai Abraham,et al.  Online detection of effectively callback free objects with applications to smart contracts , 2017, Proc. ACM Program. Lang..

[312]  David R. Cok,et al.  Improved usability and performance of SMT solvers for debugging specifications , 2010, International Journal on Software Tools for Technology Transfer.

[313]  Lin Li,et al.  Obstacles in Using Frameworks and APIs: An Exploratory Study of Programmers' Newsgroup Discussions , 2011, 2011 IEEE 19th International Conference on Program Comprehension.

[314]  Andrew Miller,et al.  Sprites: Payment Channels that Go Faster than Lightning , 2017, ArXiv.

[315]  Simon J. Thompson,et al.  Scripting smart contracts for distributed ledger technology , 2016, IACR Cryptol. ePrint Arch..

[316]  Joseph Y. Halpern,et al.  A Knowledge-Based Analysis of the Blockchain Protocol , 2017, TARK.

[317]  Kim G. Larsen,et al.  Formal modeling and analysis of an audio/video protocol: an industrial case study using UPPAAL , 1997, Proceedings Real-Time Systems Symposium.

[318]  César Viho,et al.  Formal Test Automation: The Conference Protocol with TGV/TORX , 2000, TestCom.

[319]  Frits W. Vaandrager,et al.  Model learning , 2017, Commun. ACM.

[320]  Fred Kröger,et al.  Temporal Logic of Programs , 1987, EATCS Monographs on Theoretical Computer Science.

[321]  Ezio Bartocci,et al.  First international Competition on Runtime Verification: rules, benchmarks, tools, and final results of CRV 2014 , 2017, International Journal on Software Tools for Technology Transfer.

[322]  Bertrand Meyer Design By Contract. The Eiffel Method , 1998, Proceedings. Technology of Object-Oriented Languages. TOOLS 26 (Cat. No.98EX176).

[323]  Massimo Bartoletti,et al.  A formal model of Bitcoin transactions , 2018, IACR Cryptol. ePrint Arch..

[324]  Bernhard Steffen,et al.  CINCO: a simplicity-driven approach to full generation of domain-specific graphical modeling tools , 2018, International Journal on Software Tools for Technology Transfer.

[325]  Dilian Gurov,et al.  Deductive Functional Verification of Safety-Critical Embedded C-Code: An Experience Report , 2017, FMICS-AVoCS.

[326]  M. Leucker,et al.  Model-based runtime analysis of distributed reactive systems , 2006, Australian Software Engineering Conference (ASWEC'06).

[327]  Hector Garcia-Molina,et al.  Modeling long-running activities as nested sagas , 1991 .

[328]  Jan Peleska,et al.  Experimental evaluation of a novel equivalence class partition testing strategy , 2017, Software & Systems Modeling.

[329]  Nikhil Swamy,et al.  Formal Verification of Smart Contracts: Short Paper , 2016, PLAS@CCS.

[330]  Howard Barringer,et al.  TraceContract: A Scala DSL for Trace Analysis , 2011, FM.

[331]  Augusto Sampaio,et al.  Sound conformance testing for cyber-physical systems: Theory and implementation , 2017, Sci. Comput. Program..

[332]  Insup Lee,et al.  Scalable Verification of Linear Controller Software , 2016, TACAS.

[333]  Joseph Y. Halpern,et al.  Knowledge and common knowledge in a distributed environment , 1984, JACM.

[334]  Jakob Rehof,et al.  Automatic Composition of Rough Solution Possibilities in the Target Planning of Factory Planning Projects by Means of Combinatory Logic , 2018, ISoLA.

[335]  David Lorge Parnas,et al.  Tabular Representation of Relations , 1992 .

[336]  David R. Cok,et al.  ESC/Java2: Uniting ESC/Java and JML , 2004, CASSIS.

[337]  Peter Øhrstrøm,et al.  Temporal Logic , 1994, Lecture Notes in Computer Science.

[338]  Nick Szabo,et al.  Smart Contracts: Building Blocks for Digital Markets , 2018 .

[339]  Arne Skou,et al.  Modelling and analysis of a collision avoidance protocol using Spin and Uppaal , 1996, The Spin Verification System.

[340]  Nikolai Kosmatov,et al.  How Test Generation Helps Software Specification and Deductive Verification in Frama-C , 2014, TAP@STAF.

[341]  Chris Newcombe Why Amazon Chose TLA + , 2014, ABZ.

[342]  H. Scheuerlein,et al.  New methods for clinical pathways—Business Process Modeling Notation (BPMN) and Tangible Business Process Modeling (t.BPM) , 2012, Langenbeck's Archives of Surgery.

[343]  Kim G. Larsen,et al.  Real-time specifications , 2013, International Journal on Software Tools for Technology Transfer.

[344]  Ricardo J. Dias,et al.  Verifying Concurrent Programs Using Contracts , 2017, 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST).

[345]  Claudia Reuter Modellierung und dynamische Adaption klinischer Pfade auf Basis semantischer Prozessfragmente , 2011 .

[346]  Wang Yi,et al.  Verification of an Audio Protocol with Bus Collision Using UPPAAL , 1996, CAV.

[347]  E. James,et al.  What is a clinical pathway? Development of a definition to inform the debate , 2010, BMC medicine.

[348]  Grigore Rosu,et al.  Synthesizing Monitors for Safety Properties , 2002, TACAS.

[349]  Ahmed Awad,et al.  An Iterative Approach for Business Process Template Synthesis from Compliance Rules , 2011, CAiSE.

[350]  Michael Henke,et al.  Intelligente Orchestrierung von Planungsprozessen , 2017 .

[351]  Prateek Saxena,et al.  A Secure Sharding Protocol For Open Blockchains , 2016, CCS.

[352]  Peter B. Galvin,et al.  Operating System Concepts, 4th Ed. , 1993 .

[353]  Tiziana Margaria,et al.  Library-Based Design and Consistency Checking of System-Level Industrial Test Cases , 2001, FASE.

[354]  Tiziana Margaria,et al.  Meta-Level Reuse for Mastering Domain Specialization , 2016, ISoLA.

[355]  Kim G. Larsen,et al.  ECDAR: An Environment for Compositional Design and Analysis of Real Time Systems , 2010, ATVA.

[356]  Ash Maurya,et al.  Running Lean - Iterate from Plan A to a Plan That Works, 2nd Edition , 2012, The Lean Series.

[357]  S. Rajamani,et al.  A decade of software model checking with SLAM , 2011, Commun. ACM.

[358]  Andrej Dudenhefner,et al.  Combinatory Process Synthesis , 2016, ISoLA.

[359]  Massimo Bartoletti,et al.  BitML: A Calculus for Bitcoin Smart Contracts , 2018, IACR Cryptol. ePrint Arch..

[360]  Daniel Kroening,et al.  Making Software Verification Tools Really Work , 2011, ATVA.

[361]  Jan Friso Groote,et al.  Pitfalls in Applying Model Learning to Industrial Legacy Software , 2018, ISoLA.

[362]  Aron Laszka,et al.  Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts , 2018, POST.

[363]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[364]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[365]  Shahid Ali,et al.  Applying Model Checking for Verifying the Functional Requirements of a Scania’s Vehicle Control System , 2012 .

[366]  F. Cots,et al.  Diagnosis related groups in Europe: moving towards transparency, efficiency, and quality in hospitals? , 2013, BMJ.

[367]  Thai Son Hoang,et al.  The Hybrid ERTMS/ETCS Level 3 Case Study , 2018, ABZ.

[368]  Adi Shamir,et al.  Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.

[369]  Claude Marché,et al.  The Why/Krakatoa/Caduceus Platform for Deductive Program Verification , 2007, CAV.

[370]  Grigory Fedyukovich,et al.  Symbolic Detection of Assertion Dependencies for Bounded Model Checking , 2015, FASE.

[371]  Karl Meinke,et al.  Automated black-box testing of functional correctness using function approximation , 2004, ISSTA '04.

[372]  Andrey Rybalchenko,et al.  An Epistemic Perspective on Consistency of Concurrent Computations , 2013, CONCUR.

[373]  Jeremy Clark,et al.  SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.

[374]  Karl Meinke,et al.  LBTest: A Learning-Based Testing Tool for Reactive Systems , 2013, 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation.

[375]  Marcin Andrychowicz,et al.  Secure Multiparty Computations on Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.

[376]  Brent Waters,et al.  Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption , 2015, Financial Cryptography.

[377]  Jameela Al-Jaroodi,et al.  e-Health Cloud: Opportunities and Challenges , 2012, Future Internet.

[378]  Dawson R. Engler,et al.  KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.

[379]  Paul E. Black,et al.  SATE V Ockham Sound Analysis Criteria , 2016 .

[380]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[381]  Yi Zhang,et al.  A formal verification tool for Ethereum VM bytecode , 2018, ESEC/SIGSOFT FSE.

[382]  Kim G. Larsen,et al.  Time for Statistical Model Checking of Real-Time Systems , 2011, CAV.

[383]  Peter McBurney,et al.  Validation and Verification of Smart Contracts: A Research Agenda , 2017, Computer.

[384]  Gary T. Leavens,et al.  Specification and verification challenges for sequential object-oriented programs , 2007, Formal Aspects of Computing.

[385]  Thomas J. Ostrand,et al.  \{PROMISE\} Repository of empirical software engineering data , 2007 .

[386]  Michael Backes,et al.  AppGuard - Enforcing User Requirements on Android Apps , 2013, TACAS.

[387]  E. M. Novikov Static verification of operating system monolithic kernels , 2017 .

[388]  David M. Woisetschläger,et al.  Service & solution innovation: Overview and research agenda☆ , 2011 .

[389]  Jim Woodcock,et al.  The verified software repository: a step towards the verifying compiler , 2006, Formal Aspects of Computing.

[390]  Manfred Broy,et al.  From Actions, Transactions, and Processes to Services , 2016, Petri Nets.

[391]  VytiniotisDimitrios,et al.  Simple unification-based type inference for GADTs , 2006 .

[392]  Nikolai Kosmatov,et al.  Generic and Effective Specification of Structural Test Objectives , 2016, 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST).

[393]  N. Mazzocca,et al.  Dynamic state machines for modelling railway control systems , 2017, Sci. Comput. Program..

[394]  Jacques-Henri Jourdan,et al.  Implementing and Reasoning About Hash-consed Data Structures in Coq , 2013, Journal of Automated Reasoning.

[395]  Yuanyuan Zhou,et al.  Learning from mistakes: a comprehensive study on real world concurrency bug characteristics , 2008, ASPLOS.

[396]  C. A. R. Hoare,et al.  Verified Software: Theories, Tools, Experiments Vision of a Grand Challenge Project , 2005, VSTTE.

[397]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[398]  Stephan Roser,et al.  Generation of Workflow Code from DSMs , 2007 .

[399]  Edmund M. Clarke,et al.  Using Branching Time Temporal Logic to Synthesize Synchronization Skeletons , 1982, Sci. Comput. Program..

[400]  Günther Schuh,et al.  Typenorientiertes Lösungsraum-Management in der Fabrikplanung , 2012 .

[401]  Frits W. Vaandrager,et al.  Applying Automata Learning to Embedded Control Software , 2015, ICFEM.

[402]  Jan Bosch,et al.  Data-Driven Continuous Evolution of Smart Systems , 2016, 2016 IEEE/ACM 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS).

[403]  Dirk Beyer,et al.  CPAchecker: A Tool for Configurable Software Verification , 2009, CAV.

[404]  F. Jacob,et al.  Leistungsindividualisierung und -standardisierung , 2015 .

[405]  Ondrej Lhoták,et al.  Adding trace matching with free variables to AspectJ , 2005, OOPSLA '05.

[406]  Daniel Kroening,et al.  Software Verification Using k-Induction , 2011, SAS.

[407]  Alan R. Hevner,et al.  Design Science in Information Systems Research , 2004, MIS Q..

[408]  Ezio Bartocci,et al.  Runtime Verification and Enforcement, the (Industrial) Application Perspective (Track Introduction) , 2016, ISoLA.

[409]  W. M. P. V. D. Aalsta,et al.  YAWL : yet another workflow language , 2015 .

[410]  Dirk Beyer,et al.  Reliable benchmarking: requirements and solutions , 2017, International Journal on Software Tools for Technology Transfer.

[411]  Christine Paulin-Mohring,et al.  The coq proof assistant reference manual , 2000 .

[412]  Bernhard Steffen,et al.  The TTT Algorithm: A Redundancy-Free Approach to Active Automata Learning , 2014, RV.

[413]  Sanjit A. Seshia,et al.  Combinatorial sketching for finite programs , 2006, ASPLOS XII.

[414]  Gordon J. Pace,et al.  Recovery within long-running transactions , 2013, CSUR.

[415]  Sumit Gulwani,et al.  Dimensions in program synthesis , 2010, Formal Methods in Computer Aided Design.

[416]  Akhil Kumar,et al.  Design and management of flexible process variants using templates and rules , 2012, Comput. Ind..

[417]  Grigore Rosu,et al.  An overview of the MOP runtime verification framework , 2012, International Journal on Software Tools for Technology Transfer.

[418]  Kim G. Larsen,et al.  Schedulability of Herschel revisited using statistical model checking , 2014, International Journal on Software Tools for Technology Transfer.

[419]  Insup Lee,et al.  Introduction to the special section on runtime verification , 2012, International Journal on Software Tools for Technology Transfer.

[420]  Jim Woodcock,et al.  An Electronic Purse: Specification, Refinement and Proof , 2000 .

[421]  Joeri de Ruiter,et al.  Formal Models of Bank Cards for Free , 2013, 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops.

[422]  Wil M. P. van der Aalst,et al.  Process mining: a research agenda , 2004, Comput. Ind..

[423]  Karl Crary,et al.  Peer-to-peer affine commitment using bitcoin , 2015, PLDI.

[424]  Stephen J. Garland,et al.  A Guide to LP, The Larch Prover , 1991 .

[425]  Malte Brettel,et al.  How Virtualization, Decentralization and Network Building Change the Manufacturing Landscape: An Industry 4.0 Perspective , 2014 .

[426]  Matteo Maffei,et al.  A Semantic Framework for the Security Analysis of Ethereum smart contracts , 2018, POST.

[427]  Bernd Finkbeiner,et al.  Model Checking the FlexRay Physical Layer Protocol , 2010, FMICS.

[428]  Leslie Lamport,et al.  The part-time parliament , 1998, TOCS.

[429]  Melanie Swan,et al.  Blockchain: Blueprint for a New Economy , 2015 .

[430]  Walter Binder,et al.  DiSL: a domain-specific language for bytecode instrumentation , 2012, AOSD.

[431]  Ezio Bartocci,et al.  Introduction to Runtime Verification , 2018, Lectures on Runtime Verification.

[432]  Yliès Falcone,et al.  Decentralised LTL monitoring , 2011, Formal Methods in System Design.

[433]  Clemens Faller,et al.  Industry 4.0 Learning Factory for regional SMEs , 2015 .

[434]  François Bobot,et al.  Sharpening Constraint Programming Approaches for Bit-Vector Theory , 2017, CPAIOR.

[435]  H B Curry,et al.  Functionality in Combinatory Logic. , 1934, Proceedings of the National Academy of Sciences of the United States of America.

[436]  Kyo Chul Kang,et al.  Feature-Oriented Domain Analysis (FODA) Feasibility Study , 1990 .

[437]  Alexander K. Petrenko,et al.  Configurable toolset for static verification of operating systems kernel modules , 2015, Programming and Computer Software.

[438]  Vladimir Klebanov,et al.  Verification of Software Product Lines with Delta-Oriented Slicing , 2010, FoVeOOS.

[439]  Alessandra Cavarra,et al.  Data Flow Analysis and Testing of Abstract State Machines , 2008, ABZ.

[440]  Manfred Reichert,et al.  Flexible Support of Healthcare Processes , 2017 .

[441]  Bruno Marre,et al.  Test Selection Strategies for Lustre Descriptions in GATeL , 2005, Electron. Notes Theor. Comput. Sci..

[442]  J. Michael Spivey,et al.  The Z notation - a reference manual , 1992, Prentice Hall International Series in Computer Science.

[443]  Jean Goubault-Larrecq,et al.  A Smell of Orchids , 2008, RV.

[444]  Thomas Leich,et al.  FeatureIDE: An extensible framework for feature-oriented software development , 2014, Sci. Comput. Program..

[445]  Isil Dillig,et al.  Synthesizing data structure transformations from input-output examples , 2015, PLDI.

[446]  Dániel Varró,et al.  The Train Benchmark: cross-technology performance evaluation of continuous model queries , 2017, Software & Systems Modeling.

[447]  Tiziana Margaria,et al.  Test-based model generation for legacy systems , 2003, International Test Conference, 2003. Proceedings. ITC 2003..

[448]  Christian Decker,et al.  A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels , 2015, SSS.

[449]  Arthur Charguéraud,et al.  Characteristic formulae for the verification of imperative programs , 2011, ICFP.

[450]  Jing Li,et al.  The Qualitas Corpus: A Curated Collection of Java Code for Empirical Studies , 2010, 2010 Asia Pacific Software Engineering Conference.

[451]  Jan-Christoph Küster,et al.  Monitoring Real Android Malware , 2015, RV.

[452]  Ying Wang,et al.  An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks , 2017, ISPEC.

[453]  Mark A. Hillebrand,et al.  VCC: A Practical System for Verifying Concurrent C , 2009, TPHOLs.

[454]  Norbert E. Fuchs Specifications are (preferably) executable , 1992, Softw. Eng. J..

[455]  Jakob Rehof,et al.  Bounded Combinatory Logic , 2012, CSL.

[456]  Thierry Coquand,et al.  The Calculus of Constructions , 1988, Inf. Comput..

[457]  K. Rustan M. Leino,et al.  Dafny: An Automatic Program Verifier for Functional Correctness , 2010, LPAR.

[458]  Mario M. Alvarez Formal Verification of Ethereum Smart Contracts , 2019 .

[459]  Vitalik Buterin A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .

[460]  A. Jefferson Offutt,et al.  Coverage criteria for logical expressions , 2003, 14th International Symposium on Software Reliability Engineering, 2003. ISSRE 2003..

[461]  Jan Peleska,et al.  Industrial-Strength Model-Based Testing - State of the Art and Current Challenges , 2013, MBT.

[462]  George Danezis,et al.  Centrally Banked Cryptocurrencies , 2015, NDSS.

[463]  Philip Wadler,et al.  Monads for functional programming , 1995, NATO ASI PDC.

[464]  Bernhard Beckert,et al.  How to Put Usability into Focus: Using Focus Groups to Evaluate the Usability of Interactive Theorem Provers , 2014, UITP.

[465]  Michael Felderer,et al.  A Case Study on the Efficiency of Model-Based Testing at the European Space Agency , 2015, 2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST).

[466]  Paolo Falcarin,et al.  Synthesizing Service Composition Models on the Basis of Temporal Business Rules , 2008, Journal of Computer Science and Technology.

[467]  Karl Meinke,et al.  Incremental Learning-Based Testing for Reactive Systems , 2011, TAP@TOOLS.

[468]  Tiziana Margaria,et al.  Efficient test-based model generation for legacy reactive systems , 2004, Proceedings. Ninth IEEE International High-Level Design Validation and Test Workshop (IEEE Cat. No.04EX940).

[469]  Jan Peleska,et al.  A Novel Approach to HW/SW Integration Testing of Route-Based Interlocking System Controllers , 2016, RSSRail.

[470]  Ronald M. Lee,et al.  A logic model for electronic contracting , 1988, Decis. Support Syst..

[471]  Kim G. Larsen,et al.  Testing Real-Time Systems Using UPPAAL , 2008, Formal Methods and Testing.

[472]  Dejan Nickovic,et al.  Specification-Based Monitoring of Cyber-Physical Systems: A Survey on Theory, Tools and Applications , 2018, Lectures on Runtime Verification.

[473]  Jean-Raymond Abrial,et al.  The B-book - assigning programs to meanings , 1996 .

[474]  Frank S. de Boer,et al.  OpenJDK's Java.utils.Collection.sort() Is Broken: The Good, the Bad and the Worst Case , 2015, CAV.

[475]  Pierre Fraigniaud,et al.  Challenges in Fault-Tolerant Distributed Runtime Verification , 2016, ISoLA.

[476]  Gunther Reinhart,et al.  Klassifizierung unscharfer Planungsdaten in der Fabrikplanung , 2015 .

[477]  Hai Jiang,et al.  Survey of attribute based encryption , 2014, 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).

[478]  John Krogstie,et al.  BPMN 2.0 for Modeling Business Processes , 2015, Handbook on Business Process Management.

[479]  Randal E. Bryant,et al.  Symbolic Boolean manipulation with ordered binary-decision diagrams , 1992, CSUR.

[480]  Tiziana Margaria,et al.  Automated Learning Setups in Automata Learning , 2012, ISoLA.

[481]  Thomas Rotter,et al.  Clinical pathways: effects on professional practice, patient outcomes, length of stay and hospital costs. , 2010, The Cochrane database of systematic reviews.

[482]  Stefan Mangard,et al.  ARMageddon: Cache Attacks on Mobile Devices , 2015, USENIX Security Symposium.

[483]  Dana Nau,et al.  A General Approach to Synthesize Problem-Specific Planners , 2003 .

[484]  B. Flyvbjerg Five Misunderstandings About Case-Study Research , 2006, 1304.1186.

[485]  Natasha Sharygina,et al.  Clause Sharing and Partitioning for Cloud-Based SMT Solving , 2016, ATVA.