首页 > 最新文献

2017 International Symposium on Theoretical Aspects of Software Engineering (TASE)最新文献

英文 中文
Formal specification of security guidelines for program certification 程序认证安全指南的正式规范
Pub Date : 2017-09-13 DOI: 10.1109/TASE.2017.8285634
Zeineb Zhioua, Y. Roudier, R. Ameur-Boulifa
Secure software can be obtained out of two distinct processes: security by design, and security by certification. The former approach has been quite extensively formalized as it builds upon models, which are verified to ensure security properties are attained and from which software is then derived manually or automatically. In contrast, the latter approach has always been quite informal in both specifying security best practices and verifying that the code produced conforms to them. In this paper, we focus on the latter approach and describe how security guidelines might be captured by security experts and verified formally by developers. Our technique relies on abstracting actions in a program based on modularity, and on combining model checking together with information flow analysis. Our goal is to formalize the existing body of knowledge in security best practices using formulas in the MCL language and to conduct formal verifications of the conformance of programs with such security guidelines. We also discuss our first results in creating a methodology for the formalization of security guidelines.
安全软件可以通过两个不同的过程获得:设计安全性和认证安全性。前一种方法已经被广泛地形式化了,因为它建立在模型之上,这些模型被验证以确保获得安全属性,然后手动或自动地从中派生软件。相比之下,后一种方法在指定安全性最佳实践和验证生成的代码是否符合这些实践方面总是相当不正式。在本文中,我们将关注后一种方法,并描述安全专家如何捕获安全指导方针,以及开发人员如何正式验证安全指导方针。我们的技术依赖于基于模块化的程序中的抽象动作,并将模型检查与信息流分析相结合。我们的目标是使用MCL语言中的公式将安全最佳实践中的现有知识体系形式化,并对程序与此类安全指导方针的一致性进行形式化验证。我们还讨论了为安全指导方针的形式化创建方法的第一个结果。
{"title":"Formal specification of security guidelines for program certification","authors":"Zeineb Zhioua, Y. Roudier, R. Ameur-Boulifa","doi":"10.1109/TASE.2017.8285634","DOIUrl":"https://doi.org/10.1109/TASE.2017.8285634","url":null,"abstract":"Secure software can be obtained out of two distinct processes: security by design, and security by certification. The former approach has been quite extensively formalized as it builds upon models, which are verified to ensure security properties are attained and from which software is then derived manually or automatically. In contrast, the latter approach has always been quite informal in both specifying security best practices and verifying that the code produced conforms to them. In this paper, we focus on the latter approach and describe how security guidelines might be captured by security experts and verified formally by developers. Our technique relies on abstracting actions in a program based on modularity, and on combining model checking together with information flow analysis. Our goal is to formalize the existing body of knowledge in security best practices using formulas in the MCL language and to conduct formal verifications of the conformance of programs with such security guidelines. We also discuss our first results in creating a methodology for the formalization of security guidelines.","PeriodicalId":221968,"journal":{"name":"2017 International Symposium on Theoretical Aspects of Software Engineering (TASE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132046921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Formal verification of user-level real-time property patterns 用户级实时属性模式的正式验证
Pub Date : 2017-09-13 DOI: 10.1109/TASE.2017.8285630
Ning Ge, M. Pantel, Silvano Dal-Zilio
To ease the expression of real-time requirements, Dwyer, and then Konrad, studied a large collection of existing systems in order to identify a set of real-time property patterns covering most of the useful use cases. The goal was to provide a set of reusable patterns that system designers can instantiate to express requirements instead of using complex temporal logic formulas. A limitation of this approach is that the choice of patterns is more oriented towards expressiveness than efficiency; meaning that it does not take into account the computational complexity of checking patterns. For this purpose, we define a set of verification-dedicated, atomic property patterns for qualitative and quantitative real-time requirements. End-user requirements can then be expressed as a composition of these patterns using a predefined meta-model and a mapping library. These properties can be checked efficiently using a set of elementary observers and a model checking approach.
为了简化实时需求的表达,Dwyer和Konrad研究了大量现有系统,以确定一组涵盖大多数有用用例的实时属性模式。目标是提供一组可重用的模式,系统设计人员可以实例化这些模式来表达需求,而不是使用复杂的时序逻辑公式。这种方法的一个限制是模式的选择更倾向于表达性而不是效率;这意味着它没有考虑到检查模式的计算复杂性。为此,我们为定性和定量实时需求定义了一组专用于验证的原子属性模式。然后,终端用户需求可以使用预定义的元模型和映射库表示为这些模式的组合。可以使用一组基本观察器和模型检查方法有效地检查这些属性。
{"title":"Formal verification of user-level real-time property patterns","authors":"Ning Ge, M. Pantel, Silvano Dal-Zilio","doi":"10.1109/TASE.2017.8285630","DOIUrl":"https://doi.org/10.1109/TASE.2017.8285630","url":null,"abstract":"To ease the expression of real-time requirements, Dwyer, and then Konrad, studied a large collection of existing systems in order to identify a set of real-time property patterns covering most of the useful use cases. The goal was to provide a set of reusable patterns that system designers can instantiate to express requirements instead of using complex temporal logic formulas. A limitation of this approach is that the choice of patterns is more oriented towards expressiveness than efficiency; meaning that it does not take into account the computational complexity of checking patterns. For this purpose, we define a set of verification-dedicated, atomic property patterns for qualitative and quantitative real-time requirements. End-user requirements can then be expressed as a composition of these patterns using a predefined meta-model and a mapping library. These properties can be checked efficiently using a set of elementary observers and a model checking approach.","PeriodicalId":221968,"journal":{"name":"2017 International Symposium on Theoretical Aspects of Software Engineering (TASE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121483694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Time-sensitive information flow control in timed event-B 定时事件 B 中的时敏信息流控制
Pub Date : 2017-09-13 DOI: 10.1109/TASE.2017.8285631
C. Mu, S. Qin
Protecting confidential data in today's computing environments is an important problem. Information flow control can help to avoid information leakage and violations introduced by executing the software applications. In software development cycle, it is important to handle security related issues from the beginning specifications at the level of abstract. Mu [1] investigated the problem of preserving information flow security in the Event-B specification models. A typed Event-B model was presented to enforce information flow security and to prevent direct flows introduced by the system. However, in practice, timing behaviours of programs can also introduce a covert flow. The problem of run-time flow monitoring and controlling must also be addressed. This paper investigates information flow control in the Event-B specification language with timing constructs. We present a timed Event-B system by introducing timers and relevant time constraints into the system events. We suggest a time-sensitive flow security condition for the timed Event-B systems, and present a type system to close the covert channels of timing flows for the system by ensuring the security condition. We then investigate how to refine timed events during the stepwise refinement modelling to satisfy the security condition.
在当今的计算环境中,保护机密数据是一个重要问题。信息流控制有助于避免执行软件应用程序时出现信息泄漏和违规行为。在软件开发周期中,从一开始的抽象规范层面处理与安全相关的问题非常重要。Mu [1] 研究了在事件-B 规范模型中保护信息流安全的问题。他们提出了一种类型化的 Event-B 模型,用于执行信息流安全并防止系统引入直接信息流。然而,在实践中,程序的定时行为也可能引入隐蔽流。因此,还必须解决运行时信息流监控问题。本文研究了带有定时结构的 Event-B 规范语言中的信息流控制。通过在系统事件中引入定时器和相关时间约束,我们提出了一个定时 Event-B 系统。我们提出了定时 Event-B 系统的时间敏感流安全条件,并提出了一个类型系统,通过确保安全条件来关闭系统的定时流隐蔽通道。然后,我们研究了如何在逐步细化建模过程中细化定时事件,以满足安全条件。
{"title":"Time-sensitive information flow control in timed event-B","authors":"C. Mu, S. Qin","doi":"10.1109/TASE.2017.8285631","DOIUrl":"https://doi.org/10.1109/TASE.2017.8285631","url":null,"abstract":"Protecting confidential data in today's computing environments is an important problem. Information flow control can help to avoid information leakage and violations introduced by executing the software applications. In software development cycle, it is important to handle security related issues from the beginning specifications at the level of abstract. Mu [1] investigated the problem of preserving information flow security in the Event-B specification models. A typed Event-B model was presented to enforce information flow security and to prevent direct flows introduced by the system. However, in practice, timing behaviours of programs can also introduce a covert flow. The problem of run-time flow monitoring and controlling must also be addressed. This paper investigates information flow control in the Event-B specification language with timing constructs. We present a timed Event-B system by introducing timers and relevant time constraints into the system events. We suggest a time-sensitive flow security condition for the timed Event-B systems, and present a type system to close the covert channels of timing flows for the system by ensuring the security condition. We then investigate how to refine timed events during the stepwise refinement modelling to satisfy the security condition.","PeriodicalId":221968,"journal":{"name":"2017 International Symposium on Theoretical Aspects of Software Engineering (TASE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130773278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formal development process of safety-critical embedded human machine interface systems 安全关键型嵌入式人机界面系统的正式开发过程
Pub Date : 2017-09-13 DOI: 10.1109/TASE.2017.8285636
Ning Ge, Arnaud Dieumegard, E. Jenn, Bruno d'Ausbourg, Y. A. Ameur
This paper presents a formal development process for safety-critical embedded Human-Machine Interface (HMI) systems. This formal approach is centered on the LIDL formal language and the S3 verification toolset. It is aimed at blurring the boundaries between modeling, design, verification and implementation for the development of HMI. From textual requirements to software, the development process integrates the following formal activities: modeling the behavioral aspect of user interfaces (UIs) using LIDL; translating LIDL to Lustre, with which we combine the functional library in Lustre; translating the Lustre design models into the HLL verification models; verifying formal properties expressed in HLL against the HLL model using the S3 toolset, and diagnosing design errors with the help of counterexample scenarios and debug tools. This formal development process is illustrated on a simple use case — part of the display component of an alert management system used in a three-wheeled robot.
本文介绍了安全关键型嵌入式人机界面(HMI)系统的正式开发过程。这种形式化方法以LIDL形式化语言和S3验证工具集为中心。它旨在模糊HMI开发中建模、设计、验证和实现之间的界限。从文本需求到软件,开发过程集成了以下正式活动:使用LIDL对用户界面(ui)的行为方面进行建模;将LIDL翻译成Lustre,将Lustre中的函数库与之结合;将Lustre设计模型转化为HLL验证模型;使用S3工具集根据HLL模型验证HLL中表达的形式属性,并借助反例场景和调试工具诊断设计错误。这个正式的开发过程用一个简单的用例来说明,这个用例是用于三轮机器人的警报管理系统的显示组件的一部分。
{"title":"Formal development process of safety-critical embedded human machine interface systems","authors":"Ning Ge, Arnaud Dieumegard, E. Jenn, Bruno d'Ausbourg, Y. A. Ameur","doi":"10.1109/TASE.2017.8285636","DOIUrl":"https://doi.org/10.1109/TASE.2017.8285636","url":null,"abstract":"This paper presents a formal development process for safety-critical embedded Human-Machine Interface (HMI) systems. This formal approach is centered on the LIDL formal language and the S3 verification toolset. It is aimed at blurring the boundaries between modeling, design, verification and implementation for the development of HMI. From textual requirements to software, the development process integrates the following formal activities: modeling the behavioral aspect of user interfaces (UIs) using LIDL; translating LIDL to Lustre, with which we combine the functional library in Lustre; translating the Lustre design models into the HLL verification models; verifying formal properties expressed in HLL against the HLL model using the S3 toolset, and diagnosing design errors with the help of counterexample scenarios and debug tools. This formal development process is illustrated on a simple use case — part of the display component of an alert management system used in a three-wheeled robot.","PeriodicalId":221968,"journal":{"name":"2017 International Symposium on Theoretical Aspects of Software Engineering (TASE)","volume":"601 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132789237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Assembly program verification for multiprocessors with relaxed memory model using SMT solver 用SMT求解器验证具有宽松内存模型的多处理器汇编程序
Pub Date : 2017-09-01 DOI: 10.1109/TASE.2017.8285629
Pattaravut Maleehuan, Yuki Chiba, Toshiaki Aoki
A relaxed memory model allows reordering of memory accesses, which can violate program correctness in multiprocessors. This paper presents an approach to verifying a list of assembly programs under a relaxed memory model. Assembly programs are considered for abstractions, which capture essential information that affects the correctness. For program verification, SMT solvers are adopted for finding an execution that violates program property, which is defined by assertions. The solver takes constraints that represent the violation of assertion conditions to find a valuation which can construct an execution. An encoding method is presented for constructing the constraints of program behavior, which classifies the essential behaviors in multiprocessors and can be used by the solvers. An automated tool was developed to abstract the list of assembly programs and find an execution that violates the program assertions. Experiment results show the tool can verify assembly programs for SPARC architecture under SC, TSO, and PSO memory models.
宽松的内存模型允许内存访问的重新排序,这可能会违反多处理器中的程序正确性。本文提出了一种在松弛内存模型下验证汇编程序列表的方法。汇编程序被认为是抽象的,它捕获影响正确性的基本信息。对于程序验证,采用SMT求解器来查找违反由断言定义的程序属性的执行。求解器接受表示违反断言条件的约束,以找到可以构造执行的值。提出了一种构造程序行为约束的编码方法,该方法对多处理机的基本行为进行了分类,并可供求解者使用。开发了一种自动化工具来抽象汇编程序列表并查找违反程序断言的执行。实验结果表明,该工具可以在SC、TSO和PSO存储器模型下验证SPARC体系结构的汇编程序。
{"title":"Assembly program verification for multiprocessors with relaxed memory model using SMT solver","authors":"Pattaravut Maleehuan, Yuki Chiba, Toshiaki Aoki","doi":"10.1109/TASE.2017.8285629","DOIUrl":"https://doi.org/10.1109/TASE.2017.8285629","url":null,"abstract":"A relaxed memory model allows reordering of memory accesses, which can violate program correctness in multiprocessors. This paper presents an approach to verifying a list of assembly programs under a relaxed memory model. Assembly programs are considered for abstractions, which capture essential information that affects the correctness. For program verification, SMT solvers are adopted for finding an execution that violates program property, which is defined by assertions. The solver takes constraints that represent the violation of assertion conditions to find a valuation which can construct an execution. An encoding method is presented for constructing the constraints of program behavior, which classifies the essential behaviors in multiprocessors and can be used by the solvers. An automated tool was developed to abstract the list of assembly programs and find an execution that violates the program assertions. Experiment results show the tool can verify assembly programs for SPARC architecture under SC, TSO, and PSO memory models.","PeriodicalId":221968,"journal":{"name":"2017 International Symposium on Theoretical Aspects of Software Engineering (TASE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124044511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimizing backbone filtering 优化骨干过滤
Pub Date : 2017-09-01 DOI: 10.1109/TASE.2017.8285627
Yueling Zhang, Jianwen Li, Min Zhang, G. Pu, Fu Song
Backbone is the common part of each solution in a given propositional formula, which is a key to improving the performance of SAT solving and SAT-based applications, such as model checking and program analysis. In this paper, we propose an optimized approach that combines implication-driven (IDF), conflict-driven (CDF), and unique-driven (UDF) heuristics to improve backbone computing. IDF uses the particular binary structure of the form a ↔ b ∧ c to find more backbone literals. CDF comes from the observation that for a clause ¬a ∨ b, if a is a backbone literal, then b is also a backbone literal. Besides CDF, we are also able to detect new non-backbone literals by UDF. A literal l is not a backbone literal, if there is no clause Φ ∊ Φ that is only satisfied by l. We implemented our approach in a tool named DUCIBone with the above optimizations (IDF+CDF+UDF), and conducted experiments on formulas used in previous work and SAT competitions (2015, 2016). Results demonstrate that DUCIBone solved 4% (507 formulas) more formulas than minibones (minibones-RLD, 490 formulas) does under its best configuration. Among 486 formulas solved by all tools (DUCIBone, minibones-RLD, minibonescb100), DUCIBone reduced 7% (35131 seconds) than minibones (37454 seconds). Experiments indicate that the advantage of DUCIBone is more obvious when the formulas are harder.
主干是给定命题公式中每个解的公共部分,它是提高SAT求解和基于SAT的应用(如模型检查和程序分析)性能的关键。在本文中,我们提出了一种优化的方法,结合了隐含驱动(IDF)、冲突驱动(CDF)和唯一驱动(UDF)的启发式来改进骨干计算。IDF使用形式为a↔b∧c的特殊二进制结构来查找更多的主干字面值。CDF来自于这样的观察:对于a子句¬a∨b,如果a是主干文字,那么b也是主干文字。除了CDF,我们还可以通过UDF检测新的非骨干字面值。如果字面量l不存在仅由l满足的子句Φ Φ,那么字面量l就不是主干字面量。我们在名为DUCIBone的工具中使用上述优化(IDF+CDF+UDF)实现了我们的方法,并对先前工作和SAT竞赛(2015年,2016年)中使用的公式进行了实验。结果表明:在最佳配置下,DUCIBone比minibones (minibones- rld, 490公式)多求解4%(507个公式)。在所有工具(DUCIBone、minibones- rld、minibonescb100)求解的486个公式中,DUCIBone比minibones(37454秒)缩短了7%(35131秒)。实验表明,公式越难,DUCIBone的优势越明显。
{"title":"Optimizing backbone filtering","authors":"Yueling Zhang, Jianwen Li, Min Zhang, G. Pu, Fu Song","doi":"10.1109/TASE.2017.8285627","DOIUrl":"https://doi.org/10.1109/TASE.2017.8285627","url":null,"abstract":"Backbone is the common part of each solution in a given propositional formula, which is a key to improving the performance of SAT solving and SAT-based applications, such as model checking and program analysis. In this paper, we propose an optimized approach that combines implication-driven (IDF), conflict-driven (CDF), and unique-driven (UDF) heuristics to improve backbone computing. IDF uses the particular binary structure of the form a ↔ b ∧ c to find more backbone literals. CDF comes from the observation that for a clause ¬a ∨ b, if a is a backbone literal, then b is also a backbone literal. Besides CDF, we are also able to detect new non-backbone literals by UDF. A literal l is not a backbone literal, if there is no clause Φ ∊ Φ that is only satisfied by l. We implemented our approach in a tool named DUCIBone with the above optimizations (IDF+CDF+UDF), and conducted experiments on formulas used in previous work and SAT competitions (2015, 2016). Results demonstrate that DUCIBone solved 4% (507 formulas) more formulas than minibones (minibones-RLD, 490 formulas) does under its best configuration. Among 486 formulas solved by all tools (DUCIBone, minibones-RLD, minibonescb100), DUCIBone reduced 7% (35131 seconds) than minibones (37454 seconds). Experiments indicate that the advantage of DUCIBone is more obvious when the formulas are harder.","PeriodicalId":221968,"journal":{"name":"2017 International Symposium on Theoretical Aspects of Software Engineering (TASE)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128189564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the semantics of temporal specifications of component-behavior for dynamic architectures 动态体系结构中构件行为时态规范的语义研究
Pub Date : 2017-09-01 DOI: 10.1109/TASE.2017.8285638
Diego Marmsoler
In component-based design, temporal logic is a means to specify the temporal behavior of components. If these components are deployed to a dynamic architecture, they can be activated and deactivated over time. Thus, the traditional semantics of temporal specifications of component-behavior does no longer reflect the actual behavior of the components within such dynamic architectures. To address this problem, we provide an alternative semantics of temporal specifications of component-behavior for dynamic architectures, taking into account component activation and deactivation. We show soundness and relative completeness of our semantics w.r.t. the traditional one. The new semantics can then be used to support in the formal specification of dynamic architectures by separating the specification of component-behavior from other aspects such as component activation and architecture reconfiguration.
在基于组件的设计中,时间逻辑是指定组件的时间行为的一种方法。如果将这些组件部署到动态体系结构中,则可以随着时间的推移激活和停用它们。因此,组件行为的时间规范的传统语义不再反映这种动态体系结构中组件的实际行为。为了解决这个问题,我们为动态体系结构提供了组件行为临时规范的另一种语义,考虑到组件的激活和停用。我们证明了我们的语义相对于传统语义的完备性和完备性。通过将组件行为规范与其他方面(如组件激活和体系结构重新配置)分离,新的语义可以用于支持动态体系结构的正式规范。
{"title":"On the semantics of temporal specifications of component-behavior for dynamic architectures","authors":"Diego Marmsoler","doi":"10.1109/TASE.2017.8285638","DOIUrl":"https://doi.org/10.1109/TASE.2017.8285638","url":null,"abstract":"In component-based design, temporal logic is a means to specify the temporal behavior of components. If these components are deployed to a dynamic architecture, they can be activated and deactivated over time. Thus, the traditional semantics of temporal specifications of component-behavior does no longer reflect the actual behavior of the components within such dynamic architectures. To address this problem, we provide an alternative semantics of temporal specifications of component-behavior for dynamic architectures, taking into account component activation and deactivation. We show soundness and relative completeness of our semantics w.r.t. the traditional one. The new semantics can then be used to support in the formal specification of dynamic architectures by separating the specification of component-behavior from other aspects such as component activation and architecture reconfiguration.","PeriodicalId":221968,"journal":{"name":"2017 International Symposium on Theoretical Aspects of Software Engineering (TASE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129670343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A bounded multi-dimensional modal logic for autonomous cars based on local traffic and estimation 基于局部交通和估计的自动驾驶汽车有界多维模态逻辑
Pub Date : 2017-09-01 DOI: 10.1109/TASE.2017.8285637
Bingqing Xu, Qin Li
The decision-making module on an autonomous car is usually a periodic program. In every cycle, the program makes a decision such as acceleration, brake, initiating a lane change process or a turn process based on the current traffic information gathered from car sensors. In urban traffic with mixed type of vehicles, the real-time performance requirement is critical for the decision-making program while acquiring global knowledge of the traffic is less practical. In such an environment, communications between vehicles are unreliable and time-consuming, so it is often difficult to know the exact driving decisions of other cars in the next cycle. In order to guarantee safety, a feasible solution requires the reasonable estimation on the driving decisions of other cars in the near future. In this paper, we propose a BMML (Bounded Multi-dimensional Modal Logic) to specify the traffic situations with spatio-temproral properties taking account of the estimated evolvement on them in the near future. The logic contains a primitive spatial logic with navigation operators and estimation operators as modal operators. The satisfaction of a BMML formula depends on a snapshot of the current traffic condition and an estimation structure capturing the believed information on the driving decisions of other cars. Given a snapshot and an estimation structure, the satisfaction of a BMML formula can be determined with simple and deterministic reasoning, so it is feasible for taking a BMML formula as the guard condition of the decision-making program of an autonomous car. The usage of BMML is illustrated with a series of small examples.
自动驾驶汽车的决策模块通常是一个周期性的程序。在每个循环中,该程序根据从汽车传感器收集的当前交通信息做出加速、刹车、启动变道过程或转弯过程等决策。在混合类型车辆的城市交通中,实时性能要求是决策程序的关键,而获取交通的全局知识则不太现实。在这样的环境下,车辆之间的通信不可靠且耗时,因此通常很难知道下一个周期其他车辆的确切驾驶决策。为了保证安全,可行的解决方案需要对其他车辆在不久的将来的驾驶决策进行合理的估计。在本文中,我们提出了一种BMML (Bounded Multi-dimensional Modal Logic,有界多维模态逻辑)来描述具有时空特性的交通状况,并考虑到它们在不久的将来的估计演变。该逻辑包含一个原始空间逻辑,以导航算子和估计算子作为模态算子。BMML公式的满足取决于当前交通状况的快照和捕获关于其他车辆驾驶决策的可信信息的估计结构。在给定快照和估计结构的情况下,可以通过简单的确定性推理来确定BMML公式是否满足要求,因此将BMML公式作为自动驾驶汽车决策程序的保护条件是可行的。通过一系列小示例说明了BMML的用法。
{"title":"A bounded multi-dimensional modal logic for autonomous cars based on local traffic and estimation","authors":"Bingqing Xu, Qin Li","doi":"10.1109/TASE.2017.8285637","DOIUrl":"https://doi.org/10.1109/TASE.2017.8285637","url":null,"abstract":"The decision-making module on an autonomous car is usually a periodic program. In every cycle, the program makes a decision such as acceleration, brake, initiating a lane change process or a turn process based on the current traffic information gathered from car sensors. In urban traffic with mixed type of vehicles, the real-time performance requirement is critical for the decision-making program while acquiring global knowledge of the traffic is less practical. In such an environment, communications between vehicles are unreliable and time-consuming, so it is often difficult to know the exact driving decisions of other cars in the next cycle. In order to guarantee safety, a feasible solution requires the reasonable estimation on the driving decisions of other cars in the near future. In this paper, we propose a BMML (Bounded Multi-dimensional Modal Logic) to specify the traffic situations with spatio-temproral properties taking account of the estimated evolvement on them in the near future. The logic contains a primitive spatial logic with navigation operators and estimation operators as modal operators. The satisfaction of a BMML formula depends on a snapshot of the current traffic condition and an estimation structure capturing the believed information on the driving decisions of other cars. Given a snapshot and an estimation structure, the satisfaction of a BMML formula can be determined with simple and deterministic reasoning, so it is feasible for taking a BMML formula as the guard condition of the decision-making program of an autonomous car. The usage of BMML is illustrated with a series of small examples.","PeriodicalId":221968,"journal":{"name":"2017 International Symposium on Theoretical Aspects of Software Engineering (TASE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125572297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Two under-approximation techniques for 3-modal abstraction coverage of event systems: Joint effort? 事件系统三模态抽象覆盖的两种欠近似技术:共同努力?
Pub Date : 2017-09-01 DOI: 10.1109/TASE.2017.8285632
J. Julliand, O. Kouchnarenko, P. Masson, G. Voiron
Model-based testing of event systems can take advantage of considering abstractions rather than explicit models, for controlling their size. A test is then a connected and reachable event sequence. This paper reports on experiments made when adapting for event systems two known under-approximation techniques of predicate tri-modal (may, must+, must-) abstractions. We first instantiate all the abstract may transitions, preferably as reachable instances. Second, we complete this underapproximation with instantiations of Ball chains, i.e. sequences in the shape of must-∗may.must+∗ transitions, as such sequences are guaranteed to have connected instantiations. We present a backward symbolic instantiation algorithm for connecting these two under-approximations. We experimentally address the question of their complementarity. Surprisingly, our results show that Ball chains have not enhanced the coverage already achieved by the first step of may-transitions instantiation. However, it has enhanced the number of test steps by prolonging the already existing tests.
基于模型的事件系统测试可以利用考虑抽象而不是显式模型的优势来控制它们的大小。测试是一个连接的和可到达的事件序列。本文报道了两种已知的谓词三模态(may, must+, must-)抽象的欠近似技术在适应事件系统时所做的实验。我们首先实例化所有抽象的may转换,最好是可访问的实例。其次,我们用球链的实例来完成这个欠逼近,即must-∗may形状的序列。必须+ *转换,因为这样的序列保证具有连接的实例化。我们提出了一个反向符号实例化算法来连接这两个欠逼近。我们通过实验解决了它们的互补性问题。令人惊讶的是,我们的结果表明,球链并没有增强may-transitions实例化第一步已经实现的覆盖率。但是,它通过延长已经存在的测试,增加了测试步骤的数量。
{"title":"Two under-approximation techniques for 3-modal abstraction coverage of event systems: Joint effort?","authors":"J. Julliand, O. Kouchnarenko, P. Masson, G. Voiron","doi":"10.1109/TASE.2017.8285632","DOIUrl":"https://doi.org/10.1109/TASE.2017.8285632","url":null,"abstract":"Model-based testing of event systems can take advantage of considering abstractions rather than explicit models, for controlling their size. A test is then a connected and reachable event sequence. This paper reports on experiments made when adapting for event systems two known under-approximation techniques of predicate tri-modal (may, must+, must-) abstractions. We first instantiate all the abstract may transitions, preferably as reachable instances. Second, we complete this underapproximation with instantiations of Ball chains, i.e. sequences in the shape of must-∗may.must+∗ transitions, as such sequences are guaranteed to have connected instantiations. We present a backward symbolic instantiation algorithm for connecting these two under-approximations. We experimentally address the question of their complementarity. Surprisingly, our results show that Ball chains have not enhanced the coverage already achieved by the first step of may-transitions instantiation. However, it has enhanced the number of test steps by prolonging the already existing tests.","PeriodicalId":221968,"journal":{"name":"2017 International Symposium on Theoretical Aspects of Software Engineering (TASE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129378124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic fine-grained locking generation for shared data structures 为共享数据结构自动生成细粒度锁
Pub Date : 2017-09-01 DOI: 10.1109/TASE.2017.8285633
Haiyang Liu, Tingting Hu, Z. Qiu
Correct mutual-exclusion is one of the key challenges in concurrent programming. Although the fine-grained locking schema can be more efficient compared with the coarse-grained techniques, it is tough to use, as well as error-prone. Here we present a static approach, based on program analysis, to automatically add fine-grained locking primitives to data structures implemented as classes. For tree-like structures, the modified class definitions are guaranteed to be thread-safe. Experiments show that the approach can successfully deal with programs which are challenging to be handled manually, and it works efficiently.
正确的互斥是并发编程的关键挑战之一。尽管与粗粒度技术相比,细粒度锁定模式可能更有效,但它很难使用,而且容易出错。在这里,我们提出了一种基于程序分析的静态方法,自动将细粒度锁定原语添加到作为类实现的数据结构中。对于树状结构,修改后的类定义保证是线程安全的。实验表明,该方法能够成功地处理人工难以处理的程序,并具有较高的工作效率。
{"title":"Automatic fine-grained locking generation for shared data structures","authors":"Haiyang Liu, Tingting Hu, Z. Qiu","doi":"10.1109/TASE.2017.8285633","DOIUrl":"https://doi.org/10.1109/TASE.2017.8285633","url":null,"abstract":"Correct mutual-exclusion is one of the key challenges in concurrent programming. Although the fine-grained locking schema can be more efficient compared with the coarse-grained techniques, it is tough to use, as well as error-prone. Here we present a static approach, based on program analysis, to automatically add fine-grained locking primitives to data structures implemented as classes. For tree-like structures, the modified class definitions are guaranteed to be thread-safe. Experiments show that the approach can successfully deal with programs which are challenging to be handled manually, and it works efficiently.","PeriodicalId":221968,"journal":{"name":"2017 International Symposium on Theoretical Aspects of Software Engineering (TASE)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122658069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 International Symposium on Theoretical Aspects of Software Engineering (TASE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1