Using formal methods to increase confidence in a home network system implementation: a case study

A home network system consists of multiple networked appliances, intended to provide more convenient and comfortable living for home users. Before being deployed, one has to guarantee the correctness, the safety, and the security of the system. Here, we present the approach chosen to validate the Java implementation of a home network system. We rely on the Java Modelling Language to formally specify and validate an abstraction of the system.

[1]  Mark Weiser,et al.  Some computer science issues in ubiquitous computing , 1993, CACM.

[2]  Stefan Luckner,et al.  Formal Specification of Web Service Contracts for Automated Contracting and Monitoring , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[3]  Gerardo Canfora,et al.  Testing services and service-centric systems: challenges and opportunities , 2006, IT Professional.

[4]  Priya Narasimhan,et al.  Special Issue Service-Oriented Computing , 2008 .

[5]  Tatsuhiro Tsuchiya,et al.  Describing and verifying integrated services of home network systems , 2005, 12th Asia-Pacific Software Engineering Conference (APSEC'05).

[6]  Jean-Louis Lanet,et al.  A case study in JML-based software validation , 2004 .

[7]  Jean-Louis Lanet,et al.  A case study in JML-based software validation , 2004, Proceedings. 19th International Conference on Automated Software Engineering, 2004..

[8]  Lydie du Bousquet Feature Interaction Detection Using Testing and Model-Checking Experience Report , 1999, World Congress on Formal Methods.

[9]  Friedemann Mattern,et al.  Living in a smart environment - implications for the coming ubiquitous information society , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).

[10]  David Geer Nanotechnology: the growing impact of shrinking computers , 2006, IEEE Pervasive Computing.

[11]  Gary T. Leavens,et al.  JML: notations and tools supporting detailed design in Java , 2000 .

[12]  簡聰富,et al.  物件導向軟體之架構(Object-Oriented Software Construction)探討 , 1989 .

[13]  Albert L. Baker,et al.  JML: A Notation for Detailed Design , 1999, Behavioral Specifications of Businesses and Systems.

[14]  Mike P. Papazoglou,et al.  Introduction: Service-oriented computing , 2003, CACM.

[15]  Mark Ryan,et al.  The feature construct for SMV: Semantics , 2000, FIW.

[16]  Ken-ichi Matsumoto,et al.  Characterizing Safety of Integrated Services in Home Network System , 2007, ICOST.

[17]  Bertrand Meyer,et al.  Applying 'design by contract' , 1992, Computer.

[18]  Michael D. Ernst,et al.  An overview of JML tools and applications , 2003, Electron. Notes Theor. Comput. Sci..

[19]  Murat Karaorman,et al.  jContractor: Introducing Design-by-Contract to Java Using Reflective Bytecode Instrumentation , 2005, Formal Methods Syst. Des..

[20]  Mark Lillibridge,et al.  Extended static checking for Java , 2002, PLDI '02.

[21]  Heike Wehrheim,et al.  Jass - Java with Assertions , 2001, RV@CAV.

[22]  Michael Jackson The Role of Formalism in Method , 1999, World Congress on Formal Methods.

[23]  Seng Wai Loke Service-Oriented Device Ecology Workflows , 2003, ICSOC.

[24]  Catharina Candolin,et al.  A Security Framework for Service Oriented Architectures , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[25]  MeyerBertrand,et al.  Design by Contract , 1997 .

[26]  Sophie Dupuy-Chessa,et al.  Test of the ICARE Platform Fusion Mechanism , 2005, DSV-IS.

[27]  John L. Bruno,et al.  jContractor: A Reflective Java Library to Support Design by Contract , 1999, Reflection.

[28]  Bart Jacobs,et al.  The LOOP Compiler for Java and JML , 2001, TACAS.

[29]  Shin Nakajima,et al.  Model-Checking Verification for Reliable Web Service , 2002 .

[30]  Fabio Massacci,et al.  Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code , 2007, EuroPKI.

[31]  Xiaoying Bai,et al.  Contract-Based Testing for Web Services , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[32]  Roberto Gorrieri,et al.  Towards a formal framework for choreography , 2005, 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05).

[33]  Mario Kolberg,et al.  Compatibility issues between services supporting networked appliances , 2003, IEEE Commun. Mag..

[34]  John M. Rushby Mechanized Formal Methods: Where Next? , 1999, World Congress on Formal Methods.

[35]  Schahram Dustdar,et al.  Challenges and solutions for model driven Web service composition , 2005, 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05).

[36]  Domenico Cotroneo,et al.  Improving dependability of service oriented architectures for pervasive computing , 2003, Proceedings of the Eighth International Workshop on Object-Oriented Real-Time Dependable Systems, 2003. (WORDS 2003)..

[37]  Krys J. Kochut,et al.  A CP-nets-based design and verification framework for Web services composition , 2004 .

[38]  Michael Rohs,et al.  Social, Economic, and Ethical Implications of Ambient Intelligence and Ubiquitous Computing , 2005, Ambient Intelligence.

[39]  Bernhard Beckert,et al.  Verification of Object-Oriented Software. The KeY Approach - Foreword by K. Rustan M. Leino , 2007, The KeY Approach.

[40]  Gary T. Leavens,et al.  A Simple and Practical Approach to Unit Testing: The JML and JUnit Way , 2002, ECOOP.

[41]  Lydie du Bousquet,et al.  Filtering TOBIAS Combinatorial Test Suites , 2004, FASE.

[42]  Allan Collins,et al.  Assessment and technology , 1993, CACM.

[43]  Sebastián Uchitel,et al.  Model-based verification of Web service compositions , 2003, 18th IEEE International Conference on Automated Software Engineering, 2003. Proceedings..

[44]  Sérgio Vale Aguiar Campos,et al.  Symbolic Model Checking , 1993, CAV.

[45]  Ken-ichi Matsumoto,et al.  Adapting Legacy Home Appliances to Home Network Systems UsingWeb Services , 2006, 2006 IEEE International Conference on Web Services (ICWS'06).

[46]  Bertrand Meyer,et al.  Object-Oriented Software Construction, 2nd Edition , 1997 .

[47]  Ken-ichi Matsumoto,et al.  Constructing Home Network Systems and Integrated Services Using Legacy Home Appliances and Web Services , 2008, Int. J. Web Serv. Res..

[48]  Bernhard Rumpe,et al.  Behavioral Specifications of Businesses and Systems , 1999, Behavioral Specifications of Businesses and Systems.

[49]  D.M. Cohen,et al.  The Combinatorial Design Approach to Automatic Test Generation , 1996, IEEE Softw..

[50]  Jianying Zhou,et al.  Pervasive trusted computing , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).

[51]  Jean-Louis Lanet,et al.  Java Applet Correctness: A Developer-Oriented Approach , 2003, FME.

[52]  Bernhard Beckert,et al.  The KeY tool , 2005, Software & Systems Modeling.