Software analysis methods for resource-sensitive systems

Practically every modern electronic device is controlled by software. It is important to establish certain quality characteristics of this software. In his dissertation, Rody Kersten presents innovative analysis methods towards this end. These semi-automatic methods go beyond the validation of input-output behaviour and concerns mostly non-functional properties. The focus is on properties that are of specific importance for embedded systems, such as wireless sensor nodes. For instance, energy-efficiency and security are studied. Embedded systems often have only a limited amount of energy, memory and time available. Methods have been developed that can bound consumption of these resources. During an internship at the NASA Langley Research Center, Kersten developed a method that guarantees high coverage of tested code by a generated test-set. All developed automatic analysis methods are implemented in open-source tools

[1]  Sander van der Burg,et al.  A Reference Architecture for Distributed Software Deployment , 2013 .

[2]  Suzette Person,et al.  Regression Verification Using Impact Summaries , 2013, SPIN.

[3]  Benjamin C. Pierce,et al.  Types and programming languages: the next generation , 2003, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings..

[4]  Jan Reineke,et al.  Timing predictability of cache replacement policies , 2007, Real-Time Systems.

[5]  Alex Groce,et al.  Establishing flight software reliability: testing, model checking, constraint-solving, monitoring and learning , 2014, Annals of Mathematics and Artificial Intelligence.

[6]  Gavin Lowe,et al.  Towards a completeness result for model checking of security protocols , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).

[7]  Minh Tri Ngo,et al.  Qualitative and Quantitative Information Flow Analysis for Multi-threaded Programs , 2014 .

[8]  G. Reeves,et al.  The Mars Rover Spirit FLASH anomaly , 2005, 2005 IEEE Aerospace Conference.

[9]  Eric Jenn,et al.  Use of PERC Pico in the AIDA avionics platform , 2009, JTRES '09.

[10]  J Hayhurst Kelly,et al.  A Practical Tutorial on Modified Condition/Decision Coverage , 2001 .

[11]  Gerhard de Koning Gans,et al.  Outsmarting smart cards , 2013 .

[12]  Marko C. J. D. van Eekelen,et al.  Interpolation-Based Height Analysis for Improving a Recurrence Solver , 2011, FOPARA.

[13]  Bart Jacobs,et al.  Java Program Verification via a Hoare Logic with Abrupt Termination , 2000, FASE.

[14]  Klaus Havelund,et al.  Model checking JAVA programs using JAVA PathFinder , 2000, International Journal on Software Tools for Technology Transfer.

[15]  Corina S. Pasareanu,et al.  Symbolic PathFinder: symbolic execution of Java bytecode , 2010, ASE.

[16]  D. Bosnacki Enhancing state space reduction techniques for model checking , 2001 .

[17]  Elisa Costante,et al.  Privacy throughout the data cycle , 2015 .

[18]  Edmund M. Clarke,et al.  Design and Synthesis of Synchronization Skeletons Using Branching Time Temporal Logic , 2008, 25 Years of Model Checking.

[19]  Fides Aarts,et al.  Tomte : bridging the gap between active learning and real-world systems , 2014 .

[20]  van der,et al.  Domain specific languages and their type systems , 2014 .

[21]  Nikolaj Bjørner,et al.  Z3: An Efficient SMT Solver , 2008, TACAS.

[22]  Elvira Albert,et al.  COSTA: Design and Implementation of a Cost and Termination Analyzer for Java Bytecode , 2008, FMCO.

[23]  Bruno Blanchet,et al.  An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[24]  Patrice Godefroid,et al.  Automatic partial loop summarization in dynamic test generation , 2011, ISSTA '11.

[25]  Karina R. Olmos Joffré Strategies for Context Sensitive Program Transformation , 2009 .

[26]  Sarfraz Khurshid,et al.  Symbolic execution for software testing in practice: preliminary assessment , 2011, 2011 33rd International Conference on Software Engineering (ICSE).

[27]  T. V. Bui,et al.  A software architecture for body area sensor networks : flexibility and trustworthiness , 2015 .

[28]  Jan Gustafsson,et al.  Loop Bound Analysis based on a Combination of Program Slicing, Abstract Interpretation, and Invariant Analysis , 2007, WCET.

[29]  Tim K. Cocx,et al.  Algorithmic tools for data-oriented law enforcement , 2009 .

[30]  Frank S. de Boer,et al.  Combining Monitoring with Run-Time Assertion Checking , 2014, SFM.

[31]  Trajce Dimkov,et al.  Alignment of organizational security policies: Theory and Practice , 2012 .

[32]  Marko C. J. D. van Eekelen,et al.  Collected Size Semantics for Functional Programs over Lists , 2008, IFL.

[33]  Sebastian Mödersheim,et al.  The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.

[34]  Daniel Cordes,et al.  A Fast and Precise Static Loop Analysis Based on Abstract Interpretation, Program Slicing and Polytope Models , 2009, 2009 International Symposium on Code Generation and Optimization.

[35]  Marko C. J. D. van Eekelen,et al.  A Formal Verification Study on the Rotterdam Storm Surge Barrier , 2010, ICFEM.

[36]  Feng Zhao,et al.  Fine-grained energy profiling for power-aware application design , 2008, PERV.

[37]  Flemming Nielson,et al.  Principles of Program Analysis , 1999, Springer Berlin Heidelberg.

[38]  Eduardo Zambon,et al.  Abstract Graph Transformation - Theory and Practice , 2013 .

[39]  Panagiotis Manolios,et al.  Computer-Aided Reasoning: An Approach , 2011 .

[40]  M Muhammad Atif,et al.  Formal modeling and verification of distributed failure detectors , 2011 .

[41]  Bart Jacobs,et al.  AHA: Amortized Heap Space Usage Analysis , 2007, Trends in Functional Programming.

[42]  R.S.S. O'Connor,et al.  Incompleteness & completeness : formalizing logic and analysis in type theory , 2005 .

[43]  Stefan Dietzel,et al.  Resilient in-network aggregation for vehicular networks , 2015 .

[44]  Arend Rensink,et al.  Graph Transforming Java Data , 2012, FASE.

[45]  Georgeta Igna,et al.  Performance analysis of real-time task systems using timed automata , 2013 .

[46]  Gerard J. Holzmann,et al.  Model-Driven Software Verification , 2004, SPIN.

[47]  Christopher W. Brown QEPCAD B: a program for computing with semi-algebraic sets using CADs , 2003, SIGS.

[48]  van den,et al.  Composition and synchronization of real-time components upon one processor , 2013 .

[49]  Martin Hofmann,et al.  Multivariate amortized resource analysis , 2012, TOPL.

[50]  Marcel Verhoef,et al.  Modeling and validating distributed embedded real-time control systems , 2009 .

[51]  van Pja Paul Tilburg From computability to executability : a process-theoretic view on automata theory , 2011 .

[52]  Wang Yi,et al.  UPPAAL - a Tool Suite for Automatic Verification of Real-Time Systems , 1996, Hybrid Systems.

[53]  Alexander Aiken,et al.  A Data Driven Approach for Algebraic Loop Invariants , 2013, ESOP.

[54]  Pim Vullers,et al.  Efficient implementations of attribute-based credentials on smart cards , 2014 .

[55]  Christel Baier,et al.  Principles of model checking , 2008 .

[56]  Yanja Dajsuren,et al.  On the design of an architecture framework and quality evaluation for automotive software systems , 2015 .

[57]  Marko C. J. D. van Eekelen,et al.  Polynomial Size Analysis of First-Order Functions , 2007, TLCA.

[58]  Stephen McCamant,et al.  Loop-extended symbolic execution on binary programs , 2009, ISSTA.

[59]  Saeed Sedghi,et al.  Towards Provably Secure Efficiently Searchable Encryption , 2012 .

[60]  Hendrik Michaël van der Bijl,et al.  On changing models in model-based testing , 2011 .

[61]  Robert W. Floyd,et al.  Assigning Meanings to Programs , 1993 .

[62]  Lauretta O. Osho,et al.  Axiomatic Basis for Computer Programming , 2013 .

[63]  Yanjing Wang,et al.  Epistemic Modelling and Protocol Dynamics , 2010 .

[64]  N Neda Noroozi,et al.  Improving input-output conformance testing theories , 2014 .

[65]  Paulo Romero Martins Maciel,et al.  Analyzing Software Performance and Energy Consumption of Embedded Systems by Probabilistic Modeling: An Approach Based on Coloured Petri Nets , 2006, ICATPN.

[66]  Christoph Gladisch,et al.  Verification-Based Test Case Generation for Full Feasible Branch Coverage , 2008, 2008 Sixth IEEE International Conference on Software Engineering and Formal Methods.

[67]  de A. Bruin,et al.  Service-oriented discovery of knowledge : foundations, implementations and applications , 2010 .

[68]  Young-Joo Moon,et al.  Stochastic models for quality of service of component connectors , 2011 .

[69]  Matthew B. Dwyer,et al.  Differential symbolic execution , 2008, SIGSOFT '08/FSE-16.

[70]  Mjm Marcel Roeloffzen Kinetic data structures in the black-box model , 2013 .

[71]  Martin Hofmann,et al.  Amortized Resource Analysis with Polynomial Potential , 2010, ESOP.

[72]  Damiano Bolzoni,et al.  Revisiting Anomaly-based Network Intrusion Detection Systems , 2009 .

[73]  Marko C. J. D. van Eekelen,et al.  Making resource analysis practical for real-time Java , 2012, JTRES '12.

[74]  Nikolai Tillmann,et al.  Characteristic studies of loop problems for structural test generation via symbolic execution , 2013, 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE).

[75]  Eric Saxe,et al.  Power-efficient software , 2010, Commun. ACM.

[76]  Bas Basten,et al.  Ambiguity Detection for Programming Language Grammars , 2011 .

[77]  Axel Belinfante,et al.  JTorX: exploring model-based testing , 2014 .

[78]  Martin R. Neuhäußer,et al.  Model checking nondeterministic and randomly timed systems , 2010 .

[79]  M. S. Greiler,et al.  Test Suite Comprehension for Modular and Dynamic Systems , 2013 .

[80]  Monica S. Lam,et al.  Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking , 2008, USENIX Security Symposium.

[81]  Alessandro Armando,et al.  LTL Model Checking for Security Protocols , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).

[82]  Kang G. Shin,et al.  Profiling Software for Energy Consumption , 2012, 2012 IEEE International Conference on Green Computing and Communications.

[83]  Carst Tankink Documentation and formal mathematics : web technology meets theorem proving , 2013 .

[84]  Stephen A. Cook,et al.  The complexity of theorem-proving procedures , 1971, STOC.

[85]  Wouter Meulemans,et al.  Similarity measures and algorithms for cartographic schematization , 2014 .

[86]  C. J. Boogerd,et al.  Focusing Automatic Code Inspections , 2010 .

[87]  J. Kwisthout,et al.  The Computational Complexity of Probabilistic Networks , 2009 .

[88]  Arthur I. Baars,et al.  Embedded Compilers , 2009 .

[89]  Stephanie Kemper,et al.  Modelling and analysis of real-time coordination patterns , 2011 .

[90]  Adriaan Middelkoop,et al.  Inference of Program Properties with Attribute Grammars, Revisited , 2012 .

[91]  Shengchao Qin,et al.  Stack Bound Inference for Abstract Java Bytecode , 2010, 2010 4th IEEE International Symposium on Theoretical Aspects of Software Engineering.

[92]  K. Wiegmink,et al.  Using CHARTER tools to develop a safety-critical avionics application in Java , 2012, JTRES '12.

[93]  Rjm Rolf Theunissen Supervisory control in health care systems , 2015 .

[94]  Gergely Alpár,et al.  Attribute-based identity management : [bridging the cryptographic design of ABCs with the real world] , 2015 .

[95]  Peter W. O'Hearn,et al.  Local Reasoning about Programs that Alter Data Structures , 2001, CSL.

[96]  Manuel V. Hermenegildo,et al.  Energy Consumption Analysis of Programs Based on XMOS ISA-Level Models , 2013, LOPSTR.

[97]  K. Tsirogiannis,et al.  Analysis of flow and visibility on triangulated terrains , 2011 .

[98]  Lennart C. L. Kats,et al.  Building Blocks for Language Workbenches , 2011 .

[99]  Roel Verdult,et al.  The (in)security of proprietary cryptography , 2015 .

[100]  M. J. de Mol,et al.  Reasoning about functional programs : Sparkle, a proof assistant for Clean , 2009 .

[101]  van Mj Muck Weerdenburg,et al.  Efficient rewriting techniques , 2009 .

[102]  James J. Hunt,et al.  Using global data flow analysis on bytecode to aid worst case execution time analysis for real-time Java programs , 2008, JTRES '08.

[103]  Sebastiaan Gijsbert Marinus Cornelissen,et al.  Evaluating Dynamic Analysis Techniques for Program Comprehension , 2009 .

[104]  L. Lensink,et al.  Applying formal methods in software development , 2013 .

[105]  D. E. Nadales Agut,et al.  A Compositional Interchange Format for Hybrid Systems: Design and Implementation , 2012 .

[106]  Lori A. Clarke,et al.  A program testing system , 1976, ACM '76.

[107]  Frank Stajano,et al.  The Resurrecting Duckling: security issues for ubiquitous computing , 2002, S&P 2002.

[108]  Marko C. J. D. van Eekelen,et al.  Polynomial Size Analysis of First-Order Shapely Functions , 2009, Log. Methods Comput. Sci..

[109]  Steven te Brinke Developing Energy-Aware Software , 2011 .

[110]  Sumit Gulwani,et al.  SPEED: Symbolic Complexity Bound Analysis , 2009, CAV.

[111]  Dan Grossman,et al.  EnerJ: approximate data types for safe and general low-power computation , 2011, PLDI '11.

[112]  Mark Timmer,et al.  Efficient modelling, generation and analysis of Markov automata , 2013 .

[113]  Corina S. Pasareanu,et al.  Verification of Java Programs Using Symbolic Execution and Invariant Generation , 2004, SPIN.

[114]  Cor-Paul Bezemer,et al.  Performance Optimization of Multi-Tenant Software Systems , 2014 .

[115]  John C. Reynolds,et al.  Separation logic: a logic for shared mutable data structures , 2002, Proceedings 17th Annual IEEE Symposium on Logic in Computer Science.

[116]  Karl N. Levitt,et al.  SELECT—a formal system for testing and debugging programs by symbolic execution , 1975 .

[117]  Ronald Middelkoop,et al.  Capturing and exploiting abstract views of states in OO verification , 2011 .

[118]  Dina Hadžiosmanović,et al.  The process matters: cyber security in industrial control systems , 2014 .

[119]  Stjepan Picek,et al.  Applications of evolutionary computation to cryptology , 2015 .

[120]  Lionel Mamane,et al.  Interactive mathematical documents: creation and presentation , 2004 .

[121]  B. Lijnse,et al.  TOP to the rescue. Task-oriented programming for incident response applications , 2005 .

[122]  Mari Antonius Cornelis Dekker,et al.  Flexible Access Control for Dynamic Collaborative Environments , 2009 .

[123]  Mohammad Mahdi Jaghoori,et al.  Time At Your Service: Schedulability Analysis of Real-Time and Distributed Services , 2010 .

[124]  Jakob Engblom,et al.  The worst-case execution-time problem—overview of methods and survey of tools , 2008, TECS.

[125]  Dina Katabi,et al.  Secure In-Band Wireless Pairing , 2011, USENIX Security Symposium.

[126]  Olha Shkaravska,et al.  Inferring static non-monotonically sized types through testing , 2007 .

[127]  Rody Kersten,et al.  Test-based inference of polynomial loop-bound functions , 2010, PPPJ.

[128]  Aah Ammar Osaiweran Formal development of control software in the medical systems domain , 2012 .

[129]  René Mayrhofer,et al.  On the Security of Ultrasound as Out-of-band Channel , 2007, 2007 IEEE International Parallel and Distributed Processing Symposium.

[130]  Scw Bas Ploeger,et al.  Improved verification methods for concurrent systems , 2009 .

[131]  Olha Shkaravska,et al.  Size Analysis of Algebraic Data Types , 2008, TFP 2008 2008.

[132]  Marko C. J. D. van Eekelen,et al.  Higher-Order Size Checking without Subtyping , 2012, Trends in Functional Programming.

[133]  Suzette Person,et al.  A change impact analysis to characterize evolving program behaviors , 2012, 2012 28th IEEE International Conference on Software Maintenance (ICSM).

[134]  RungtaNeha,et al.  Improving Coverage of Test Cases Generated by Symbolic PathFinder for Programs with Loops , 2015 .

[135]  Hasan Sözer,et al.  Architecting Fault-Tolerant Software Systems , 2009 .

[136]  Erik D. Demaine,et al.  Energy-Efficient Algorithms , 2016, ITCS.

[137]  Margaret Martonosi,et al.  Wattch: a framework for architectural-level power analysis and optimizations , 2000, Proceedings of 27th International Symposium on Computer Architecture (IEEE Cat. No.RS00201).

[138]  Parthasarathy Ranganathan Recipe for efficiency: principles of power-aware computing , 2010, CACM.

[139]  Jja Jeroen Keiren,et al.  Advanced reduction techniques for model checking , 2013 .

[140]  C. V. Ramamoorthy,et al.  On the Automated Generation of Program Test Data , 1976, IEEE Transactions on Software Engineering.

[141]  Fabio Martinelli,et al.  Partial model checking and theorem proving for ensuring security properties , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).

[142]  Anja Guzzi,et al.  Supporting Developers' Teamwork from within the IDE , 2015 .

[143]  Pascal Sainrat,et al.  Static Loop Bound Analysis of C Programs Based on Flow Analysis and Abstract Interpretation , 2008, 2008 14th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications.

[144]  Werner Heijstek,et al.  Architecture design in global and model-centric software development , 2012 .

[145]  Joost Winter,et al.  Coalgebraic Characterizations of Automata-Theoretic Classes , 2014 .

[146]  Koushik Sen,et al.  Symbolic execution for software testing: three decades later , 2013, CACM.

[147]  J. van den Berg,et al.  Reasoning about Java programs in PVS using JML , 2009 .

[148]  Pierre Castéran,et al.  Interactive Theorem Proving and Program Development , 2004, Texts in Theoretical Computer Science An EATCS Series.

[149]  John Businge,et al.  Co-evolution of the Eclipse SDK Framework and Its Third-Party Plug-Ins , 2013, 2013 17th European Conference on Software Maintenance and Reengineering.

[150]  Natarajan Shankar,et al.  PVS: A Prototype Verification System , 1992, CADE.

[151]  René Mayrhofer,et al.  A Human-Verifiable Authentication Protocol Using Visible Laser Light , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[152]  Peter H. Schmitt,et al.  Provably correct loops bounds for realtime Java programs , 2006, JTRES '06.

[153]  Suzette Person,et al.  Computing and visualizing the impact of change with Java PathFinder extensions , 2012, SOEN.

[154]  Gustavo Rau de Almeida Callou,et al.  A Formal Model for Performance and Energy Evaluation of Embedded Systems , 2011, EURASIP J. Embed. Syst..

[155]  A. Rodriguez Yakushev,et al.  Towards Getting Generic Programming Ready for Prime Time , 2009 .

[156]  Steven te Brinke,et al.  A tool-supported approach for modular design of energy-aware software , 2014, SAC.

[157]  Steven te Brinke,et al.  A design method for modular energy-aware software , 2013, SAC '13.

[158]  R. Bakhshi Gossiping Models : Formal Analysis of Epidemic Protocols , 2011 .

[159]  Cuiting Chen,et al.  Automated Fault Localization for Service-Oriented Software Systems , 2015 .

[160]  Tim K. Cocx,et al.  Metrics and visualisation for crime analysis and genomics , 2005 .

[161]  Jeroen Bransen,et al.  On the Incremental Evaluation of Higher-Order Attribute Grammars , 2015 .

[162]  Adrian Perrig,et al.  Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup , 2007, Financial Cryptography.

[163]  René Mayrhofer,et al.  Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction , 2007, UbiComp.

[164]  Alfons Laarman,et al.  Scalable multi-core model checking , 2014 .

[165]  Roberto M. Amadio Synthesis of max-plus quasi-interpretations , 2005, Fundam. Informaticae.

[166]  Hugo Jonker,et al.  Security matters : privacy in voting and fairness in digital exchange , 2009 .

[167]  Elvira Albert,et al.  More Precise Yet Widely Applicable Cost Analysis , 2011, VMCAI.

[168]  Oscar H. Ibarra,et al.  On spiking neural P systems , 2006, Natural Computing.

[169]  Thomas Bäck,et al.  Mixed-integer evolution strategies for parameter optimization and their applications to medical image analysis , 2005 .

[170]  D. Costa Formal models for component connectors , 2010 .

[171]  H. Hansen Coalgebraic Modelling : Applications in Automata theory and Modal logic , 2009 .

[172]  N. Asokan,et al.  Secure device pairing based on a visual channel , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[173]  Stephan Merz,et al.  Model Checking , 2000 .

[174]  Rody Kersten,et al.  Soundness proof for a hoare logic for energy consumption analysis , 2013 .

[175]  Z Zvezdan Protic,et al.  Configuration management for models : generic methods for model comparison and model co-evolution , 2011 .

[176]  van Mpwj Michiel Osch Model-based testing of hybrid systems , 2007 .

[177]  Tiago Espinha,et al.  Web Service Growing Pains: Understanding Services and Their Clients , 2015 .

[178]  Robert Atkey,et al.  Amortised Resource Analysis with Separation Logic , 2010, ESOP.

[179]  S Sjoerd Cranen,et al.  Getting the point : obtaining and understanding fixpoints in model checking , 2015 .

[180]  N. Asokan,et al.  Security Associations in Personal Networks: A Comparative Analysis , 2007, ESAS.

[181]  Miguel E. Andrés,et al.  Quantitative Analysis of Information Leakage in Probabilistic and Nondeterministic Systems , 2011, ArXiv.

[182]  Zef Hemel Methods and Techniques for the Design and Implementation of Domain-Specific Languages , 2012 .

[183]  Elvira Albert,et al.  Automatic Inference of Upper Bounds for Recurrence Relations in Cost Analysis , 2008, SAS.

[184]  Tom Staijen,et al.  Graph-based Specification and Verification for Aspect-Oriented Languages , 2010 .

[185]  Anna I. Esparcia-Alc Applications of Evolutionary Computation , 2016, Lecture Notes in Computer Science.

[186]  Ricardo Peña-Marí,et al.  Certified Absence of Dangling Pointers in a Language with Explicit Deallocation , 2010, IFM.

[187]  Adrianus Johannus Paulus Jeckmans Cryptographically-Enhanced Privacy for Recommender Systems , 2014 .

[188]  Hossein Rahmani,et al.  Analysis of protein-protein interaction networks by means of annotated graph mining algorithms , 2012 .

[189]  Dhp Dirk Gerrits Pushing and pulling : computing push plans for disk-shaped robots, and dynamic labelings for moving points , 2013 .

[190]  Jan Vitek,et al.  CDx: a family of real-time Java benchmarks , 2009, JTRES '09.

[191]  Gerard J. Holzmann,et al.  The Model Checker SPIN , 1997, IEEE Trans. Software Eng..

[192]  J. van den Bos,et al.  Gathering evidence: Model-driven software engineering in automated digital forensics , 2014 .

[193]  B. J. Arnoldus,et al.  An illumination of the template enigma : software code generation with templates , 2011 .

[194]  Clark W. Barrett,et al.  The SMT-LIB Standard Version 2.0 , 2010 .

[195]  Joe F. Chicharo,et al.  Unfairness and capture behaviour in 802.11 adhoc networks , 2000, 2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications. Conference Record.

[196]  Joseph Sifakis,et al.  Specification and verification of concurrent systems in CESAR , 1982, Symposium on Programming.

[197]  Gary T. Leavens,et al.  Beyond Assertions: Advanced Specification and Verification with JML and ESC/Java2 , 2005, FMCO.

[198]  Sebastian Götz,et al.  JouleUnit: a generic framework for software energy profiling and testing , 2013 .

[199]  Sumit Gulwani,et al.  Control-flow refinement and progress invariants for bound analysis , 2009, PLDI '09.

[200]  Marko C. J. D. van Eekelen,et al.  Using Model-Checking to Reveal a Vulnerability of Tamper-Evident Pairing , 2013, NASA Formal Methods.

[201]  Ali Mesbah,et al.  Analysis and Testing of Ajax-based Single-page Web Applications , 2009 .

[202]  Sumit Gulwani,et al.  The reachability-bound problem , 2010, PLDI '10.

[203]  Martin Hofmann,et al.  Static prediction of heap space usage for first-order functional programs , 2003, POPL '03.

[204]  Anantha Chandrakasan,et al.  JouleTrack: a web based tool for software energy profiling , 2001, DAC '01.

[205]  Kab Kevin Verbeek Algorithms for cartographic visualization , 2012 .

[206]  Christian Krause,et al.  Reconfigurable Component Connectors , 2011 .

[207]  Lawrence Charles Paulson,et al.  Isabelle: A Generic Theorem Prover , 1994 .

[208]  A. J. van der Ploeg,et al.  Efficient abstractions for visualization and interaction , 2015 .

[209]  Fpm Frank Stappers Bridging formal models : an engineering perspective , 2012 .

[210]  van Mf Marcel Amstel,et al.  Assessing and improving the quality of model transformations , 2012 .

[211]  Arie van Deursen,et al.  A Systematic Survey of Program Comprehension through Dynamic Analysis , 2008, IEEE Transactions on Software Engineering.

[212]  Marcin Czenko,et al.  TuLiP : reshaping trust management , 2009 .

[213]  Somayeh Malakuti Khah Olun Abadi Event composition model: achieving naturalness in runtime enforcement , 2011 .

[214]  Farhad Arbab,et al.  Model Checking of Component Connectors , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[215]  Amir M. Ben-Amram Size-Change Termination, Monotonicity Constraints and Ranking Functions , 2009, CAV.

[216]  Jedrzej Fulara,et al.  Practically Applicable Formal Methods , 2009, SOFSEM.

[217]  Paul Ammann,et al.  Using model checking to analyze network vulnerabilities , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[218]  Yang Wang,et al.  Serial hook-ups: a comparative usability study of secure device pairing methods , 2009, SOUPS.

[219]  Nancy G. Leveson,et al.  An empirical evaluation of the MC/DC coverage criterion on the HETE-2 satellite software , 2000, 19th DASC. 19th Digital Avionics Systems Conference. Proceedings (Cat. No.00CH37126).

[220]  Jan Reineke,et al.  CAMA: A Predictable Cache-Aware Memory Allocator , 2011, 2011 23rd Euromicro Conference on Real-Time Systems.

[221]  Andreas Podelski,et al.  A Complete Method for the Synthesis of Linear Ranking Functions , 2004, VMCAI.

[222]  Xianfeng Li,et al.  Estimating the Worst-Case Energy Consumption of Embedded Software , 2006, 12th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS'06).

[223]  Ben Wegbreit,et al.  Mechanical program analysis , 1975, CACM.

[224]  Tingting Han,et al.  Diagnosis, Synthesis and Analysis of Probabilistic Models , 2009, Ausgezeichnete Informatikdissertationen.

[225]  Marko C. J. D. van Eekelen,et al.  ECAlogic: hardware-parametric energy-consumption analysis of algorithms , 2014, FOAL.

[226]  Elvira Albert,et al.  Parametric inference of memory requirements for garbage collected languages , 2010, ISMM '10.

[227]  Seyyed Hamed Hashemi,et al.  Studies on verification of wireless sensor networks and abstraction learning for system inference , 2008 .

[228]  A. W. Roscoe,et al.  Usability and security of out-of-band channels in secure device pairing protocols , 2009, SOUPS.

[229]  L. D. Moura,et al.  The YICES SMT Solver , 2006 .

[230]  Joeri de Ruiter,et al.  Lessons learned in the analysis of the EMV and TLS security protocols , 2015 .

[231]  J. K. Berendsen,et al.  Abstraction, prices and probability in model checking timed automata , 2010 .

[232]  M. D. Berg,et al.  Optimal Geometric Data Structures , 2007 .

[233]  Michiel Helvensteijn,et al.  Abstract delta modeling : software product lines and beyond , 2014 .

[234]  Marek Trtík Symbolic Execution and Program Loops , 2013 .

[235]  Wei Tu,et al.  Model checking an entire Linux distribution for security violations , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[236]  Shiao-Li Tsao,et al.  SEProf: A high-level software energy profiling tool for an embedded processor enabling power management functions , 2012, J. Syst. Softw..

[237]  A. Morali,et al.  IT architecture-based confidentiality risk assessment in networks of organizations , 2011 .

[238]  Mohammed G. Khatib MEMS-Based Storage Devices : Integration in Energy-Constrained Mobile Systems , 2009 .

[239]  Patrick Cousot,et al.  Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints , 1977, POPL.

[240]  Lacramioara Astefanoaei,et al.  An executable theory of multi-agent systems refinement , 2011 .