Runtime Verification of Operating Systems Based on Abstract Models

IF 0.7 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Programming and Computer Software Pub Date : 2023-12-01 DOI:10.1134/s0361768823070034
D. V. Efremov, V. V. Kopach, E. V. Kornykhin, V. V. Kuliamin, A. K. Petrenko, A. V. Khoroshilov, I. V. Shchepetkov
{"title":"Runtime Verification of Operating Systems Based on Abstract Models","authors":"D. V. Efremov, V. V. Kopach, E. V. Kornykhin, V. V. Kuliamin, A. K. Petrenko, A. V. Khoroshilov, I. V. Shchepetkov","doi":"10.1134/s0361768823070034","DOIUrl":null,"url":null,"abstract":"","PeriodicalId":54555,"journal":{"name":"Programming and Computer Software","volume":null,"pages":null},"PeriodicalIF":0.7000,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Programming and Computer Software","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1134/s0361768823070034","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 0

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于抽象模型的操作系统运行时验证
摘要由于现代操作系统(OS)的高度复杂性,即使在指定操作系统功能的某些单独方面(如安全功能)时,也必须使用高级语言中的复杂模型。要验证操作系统与这些模型之间的一致性,就必须在操作系统的实现元素与模型元素之间建立相当复杂的关系。在本文中,我们提出了一种建立和支持这种关系的方法,它可以有效地用于操作系统的测试和监控。这种方法已成功用于测试和监控 Linux 内核组件与 Event-B 模型之间的一致性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Programming and Computer Software
Programming and Computer Software 工程技术-计算机:软件工程
CiteScore
1.60
自引率
28.60%
发文量
35
审稿时长
>12 weeks
期刊介绍: Programming and Computer Software is a peer reviewed journal devoted to problems in all areas of computer science: operating systems, compiler technology, software engineering, artificial intelligence, etc.
期刊最新文献
Comparative Efficiency Analysis of Hashing Algorithms for Use in zk-SNARK Circuits in Distributed Ledgers Constructing the Internal Voronoi Diagram of Polygonal Figure Using the Sweepline Method RuGECToR: Rule-Based Neural Network Model for Russian Language Grammatical Error Correction Secure Messaging Application Development: Based on Post-Quantum Algorithms CSIDH, Falcon, and AES Symmetric Key Cryptosystem Analytical Review of Confidential Artificial Intelligence: Methods and Algorithms for Deployment in Cloud Computing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1