Introduction to Subject Area "Verification"

نویسندگان

  • Frank Ortmeier
  • Wolfgang Reif
  • Gerhard Schellhorn
چکیده

Over the last two decades the use of software in technical applications has dramatically increased. Almost all real-world systems are now embedded systems consisting of hardware and software components. Just think of modern automobiles; every new car comes equipped with computers that have many tasks in almost all parts of the car: fuel injection rates of the engine, airbags, anti-blocking systems (ABS) for brakes or the anti-theft device are some examples. With the use of software the complexity of such systems and therefore the risks associated with failures have increased too. Failure of the ABS can result in bad injuries or even fatalities. But cars are only the tip of the iceberg. There are far more critical embedded systems in our environment like air planes, high speed railways or nuclear power plants. Such systems must not fail. To assure safety thorough analysis is required. This can be done by the integration of techniques of modern software specification with engineering techniques the topic of this volume and the DFG focus area program 1064. In this part we will cover one such technique in particular: verification. Verification allows to rigorously prove that a certain property holds for a formal system model. Application of verification on critical embedded systems is the strongest analysis techniques available to ensure safety. However the task of formally analyzing a complex embedded system requires some effort and specialized techniques. This task can be split in three parts:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Test Generation Using Symbolic Execution

This paper presents a short introduction to automatic code-driven test generation using symbolic execution. It discusses some key technical challenges, solutions and milestones, but is not an exhaustive survey of this research area. 1998 ACM Subject Classification D.2.5 Testing and Debugging, D.2.4 Software/Program Verification

متن کامل

Protocol Verification Made Simple: A Tutorial

Gouda, M.G., Protocol verification made simple: a tutorial, Computer Networks and ISDN Systems 25 (1993) 969-980. We describe how to define communication protocols, how to express protocol properties, and how to verify that the execution of a given protocol definition satisfies a given protocol property. The presentation is rarely opinionated, sometimes conversational, mostly rigorous, but alwa...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

Finding Bad States during Symbolic Supervisor Synthesis

This paper is about supervisor synthesis, a central issue in solving control problems within the Ramadge-Wonham framework for Discrete Event Systems. As most automata-based methods, this framework is subject to the state explosion problem. The impact of state explosion has been considerably reduced in the area of formal verification through the introduction of symbolic representation techniques...

متن کامل

A Computer Verification of the Kepler Conjecture

The Kepler conjecture asserts that the density of a packing of congruent balls in three dimensions is never greater than π/ √ 18. A computer assisted verification confirmed this conjecture in 1998. This article gives a historical introduction to the problem. It describes the procedure that converts this problem into an optimization problem in a finite number of variables and the strategies used...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004