Is Your Software on Dope? - Formal Analysis of Surreptitiously "enhanced" Programs

نویسندگان

  • Pedro R. D'Argenio
  • Gilles Barthe
  • Sebastian Biewer
  • Bernd Finkbeiner
  • Holger Hermanns
چکیده

Usually, it is the software manufacturer who employs verification or testing to ensure that the software embedded in a device meets its main objectives. However, these days we are confronted with the situation that economical or technological reasons might make a manufacturer become interested in the software slightly deviating from its main objective for dubious reasons. Examples include lock-in strategies and the NOx emission scandals in automotive industry. This phenomenon is what we call software doping. It is turning more widespread as software is embedded in ever more devices of daily use. The primary contribution of this article is to provide a hierarchy of simple but solid formal definitions that enable to distinguish whether a program is clean or doped. Moreover, we show that these characterisations provide an immediate framework for analysis by using already existing verification techniques. We exemplify this by applying self-composition on sequential programs and model checking of HyperLTL formulas on reactive models.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formal approach on modeling and predicting of software system security: Stochastic petri net

To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...

متن کامل

Computer viruses.

Note The lecture on computer viruses (Gresham College, London, 6pm 21 February 2002) will include discussion of real viruses, details of how they work, and discussion of how they may be tackled. These notes provide some background, history, and further information.  Computers can do anything: from running spreadsheets, word processors, power stations to music synthesisers and missile control s...

متن کامل

Amine Based CO2 Absorption in Membrane Contactor Using Polyvinyl Pyrrolidone-modified Polysulfone Flat Sheet Membrane: Experimental Study and Mass Transfer Resistance Analysis

Membrane contactor using amine based absorbents is an efficient technology for CO2 separation from gaseous mixtures. A novel porous polysulfone (PSF) flat membrane was prepared via non-solvent phase inversion method. The PSF membrane was modified by adding polyvinyl pyrrolidone (PVP) to the dope solution. The fabricated membrane was used in the serpentine flow field contactor module for CO2 abs...

متن کامل

Electronic Non Formal Education: A Case Study of Tehran Municipality

Considering the emergence of brand-new educational needs, non-formal education as a prerequisite of a knowledge-based society is increasingly going popular among nations in view of its continual nature. However, life-long learning as a key concept of the modern education system stands clearly at odds with traditional learning in every way of philosophy, objectives,...

متن کامل

Adding Change Impact Analysis to the Formal Verification of C Programs

Handling changes to programs and specifications efficiently is a particular challenge in formal software verification. Change impact analysis is an approach to this challenge where the effects of changes made to a document (such as a program or specification) are described in terms of rules on a semantic representation of the document. This allows to describe and delimit the effects of syntacti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017