نتایج جستجو برای: formal verification

تعداد نتایج: 187295  

2005
John Harrison

This paper overviews the application of formal verification techniques to hardware in general, and to floating-point hardware in particular. A specific challenge is to connect the usual mathematical view of continuous arithmetic operations with the discrete world, in a credible and verifiable way.

2004
Kun Peng Riza Aditya Colin Boyd Ed Dawson Byoungcheon Lee

All the currently existing homomorphic e-voting schemes are based on additive homomorphism. In this paper a new e-voting scheme based on multiplicative homomorphism is proposed. In the tallying phase, a decryption is performed to recover the product of the votes, instead of the sum of them (as in the additive homomorphic e-voting schemes). Then, the product is factorized to recover the votes. T...

2000
Dieter Hutter

The use of formal methods in large complex applications implies the need for an evolutionary formal program development in which specification and verification phases are interleaved. But any change of a specification either by adding new parts or by changing erroneous parts affects existing verification work in a subtle way. In this paper we present a truth maintenance system for structured sp...

1999
V. S. Alagar D. Muthiayen F. Pompeo

Formal verification of time-dependent properties is crucial in the development of real-time reactive systems for safety-critical applications. Systems modeled in UML (Unified Modeling Language) result in graphic descriptions of the static structure and dynamic behavior of a system and its components. Generating a formal specification from the UML models supports rigorous techniques for validati...

2014
Timothy L. Hinrichs A. Prasad Sistla Lenore D. Zuck

Model checking and runtime verification are pillars of formal verification but for the most part are used independently. In this position paper we argue that the formal verification community would be well-served by developing theory, algorithms, implementations, and applications that combine model checking and runtime verification into a single, seamless technology. This technology would allow...

2003
Tom Coffey Reiner Dojen

Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle design flaws. Formal verification techniques provide rigid and thorough means to evaluate security protocols. This paper demonstrates the process of formal verification by applying a logic to a security protocol intended ...

2003
Nikola Bogunovic Igor Grudenic Edgar Pek

Design process of computing systems gradually evolved to a level that encompasses formal verification techniques. However, the integration of formal verification techniques into a methodical design procedure has many inherent miscomprehensions and problems. The paper explicates the discrepancy between the real system implementation and the abstracted model that is actually used in the formal ve...

M. Pourpouneh, R. Ramezanian

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید