首页 > 最新文献

2015 International Conference on Embedded Software (EMSOFT)最新文献

英文 中文
Exp-HE: a family of fast exponentiation algorithms resistant to SPA, fault, and combined attacks Exp-HE:一组抗SPA、故障和组合攻击的快速幂运算算法
Pub Date : 2015-10-04 DOI: 10.1109/EMSOFT.2015.7318271
Carlos Moreno, Moaraj Hasan, S. Fischmeister
Security and privacy are growing concerns in modern embedded software, given the increasing level of connectivity as well as complexity and features in embedded devices. Use of cryptographic techniques is often a requirement on which the security of the device relies. However, important challenges arise when potential attackers have physical access to the device. Side-channel analysis, including simple power analysis (SPA), is a class of powerful non-intrusive attacks that are suitable for adversaries with physical access to the device. Countermeasures exist, but they typically involve a considerable performance penalty, and some of them in turn introduce a vulnerability to induced fault attacks. In this work, we present several new efficient cryptographic exponentiation algorithms that work by splitting the exponent in two halves for simultaneous processing while using special representations derived from signed-digit encoding that improve computational efficiency. A key detail in the design of these algorithms is that they are compatible with the idea of buffering the operations to provide resistance to SPA. Experimental results are presented, including implementations of the proposed methods with both modular integer exponentiation and elliptic curve (ECC) scalar multiplication. We also performed statistical analysis of the traces, showing that trace segments for different exponent bits are statistically indistinguishable. Our proposed techniques also exhibit better resistance against fault attacks and combined fault and side-channel attacks, compared to previous SPA-resistant techniques.
在现代嵌入式软件中,由于连接水平的提高以及嵌入式设备的复杂性和特性,安全性和隐私性日益受到关注。使用加密技术通常是设备安全性所依赖的要求。然而,当潜在的攻击者对设备进行物理访问时,就会出现重要的挑战。侧信道分析,包括简单功率分析(SPA),是一类强大的非侵入性攻击,适合具有物理访问设备的攻击者。对策是存在的,但它们通常会带来相当大的性能损失,其中一些还会导致容易受到诱导错误攻击。在这项工作中,我们提出了几种新的高效的加密幂算法,这些算法通过将指数分成两半进行同时处理,同时使用来自符号数字编码的特殊表示来提高计算效率。这些算法设计中的一个关键细节是,它们与缓冲操作以提供抗SPA的思想兼容。给出了实验结果,包括模整数幂和椭圆曲线(ECC)标量乘法的实现。我们还对跟踪进行了统计分析,表明不同指数位的跟踪段在统计上是不可区分的。与以前的抗spa技术相比,我们提出的技术还具有更好的抗故障攻击和组合故障和侧通道攻击的能力。
{"title":"Exp-HE: a family of fast exponentiation algorithms resistant to SPA, fault, and combined attacks","authors":"Carlos Moreno, Moaraj Hasan, S. Fischmeister","doi":"10.1109/EMSOFT.2015.7318271","DOIUrl":"https://doi.org/10.1109/EMSOFT.2015.7318271","url":null,"abstract":"Security and privacy are growing concerns in modern embedded software, given the increasing level of connectivity as well as complexity and features in embedded devices. Use of cryptographic techniques is often a requirement on which the security of the device relies. However, important challenges arise when potential attackers have physical access to the device. Side-channel analysis, including simple power analysis (SPA), is a class of powerful non-intrusive attacks that are suitable for adversaries with physical access to the device. Countermeasures exist, but they typically involve a considerable performance penalty, and some of them in turn introduce a vulnerability to induced fault attacks. In this work, we present several new efficient cryptographic exponentiation algorithms that work by splitting the exponent in two halves for simultaneous processing while using special representations derived from signed-digit encoding that improve computational efficiency. A key detail in the design of these algorithms is that they are compatible with the idea of buffering the operations to provide resistance to SPA. Experimental results are presented, including implementations of the proposed methods with both modular integer exponentiation and elliptic curve (ECC) scalar multiplication. We also performed statistical analysis of the traces, showing that trace segments for different exponent bits are statistically indistinguishable. Our proposed techniques also exhibit better resistance against fault attacks and combined fault and side-channel attacks, compared to previous SPA-resistant techniques.","PeriodicalId":297297,"journal":{"name":"2015 International Conference on Embedded Software (EMSOFT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116139899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Formal verification of ACAS X, an industrial airborne collision avoidance system 正式验证ACAS X,一个工业机载防撞系统
Pub Date : 2015-10-04 DOI: 10.1109/EMSOFT.2015.7318268
Jean-Baptiste Jeannin, Khalil Ghorbal, Yanni Kouskoulas, Ryan Gardner, Aurora C. Schmidt, E. Zawadzki, André Platzer
Formal verification of industrial systems is very challenging, due to reasons ranging from scalability issues to communication difficulties with engineering-focused teams. More importantly, industrial systems are rarely designed for verification, but rather for operational needs. In this paper we present an overview of our experience using hybrid systems theorem proving to formally verify ACAS X, an airborne collision avoidance system for airliners scheduled to be operational around 2020. The methods and proof techniques presented here are an overview of the work already presented in [8], while the evaluation of ACAS X has been significantly expanded and updated to the most recent version of the system, run 13. The effort presented in this paper is an integral part of the ACAS X development and was performed in tight collaboration with the ACAS X development team.
由于各种原因,从可伸缩性问题到与以工程为中心的团队的沟通困难,工业系统的正式验证非常具有挑战性。更重要的是,工业系统很少是为验证而设计的,而是为操作需要而设计的。在本文中,我们概述了我们使用混合系统定理证明来正式验证ACAS X的经验,ACAS X是一种计划在2020年左右投入使用的飞机机载防撞系统。这里展示的方法和证明技术是对[8]中已经展示的工作的概述,而ACAS X的评估已经被显著地扩展和更新到系统的最新版本,运行13。本文中介绍的工作是ACAS X开发的一个组成部分,并且是在与ACAS X开发团队的紧密协作下完成的。
{"title":"Formal verification of ACAS X, an industrial airborne collision avoidance system","authors":"Jean-Baptiste Jeannin, Khalil Ghorbal, Yanni Kouskoulas, Ryan Gardner, Aurora C. Schmidt, E. Zawadzki, André Platzer","doi":"10.1109/EMSOFT.2015.7318268","DOIUrl":"https://doi.org/10.1109/EMSOFT.2015.7318268","url":null,"abstract":"Formal verification of industrial systems is very challenging, due to reasons ranging from scalability issues to communication difficulties with engineering-focused teams. More importantly, industrial systems are rarely designed for verification, but rather for operational needs. In this paper we present an overview of our experience using hybrid systems theorem proving to formally verify ACAS X, an airborne collision avoidance system for airliners scheduled to be operational around 2020. The methods and proof techniques presented here are an overview of the work already presented in [8], while the evaluation of ACAS X has been significantly expanded and updated to the most recent version of the system, run 13. The effort presented in this paper is an integral part of the ACAS X development and was performed in tight collaboration with the ACAS X development team.","PeriodicalId":297297,"journal":{"name":"2015 International Conference on Embedded Software (EMSOFT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131551986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
A framework for mining hybrid automata from input/output traces 从输入/输出轨迹中挖掘混合自动机的框架
Pub Date : 2015-10-04 DOI: 10.1109/EMSOFT.2015.7318273
R. Medhat, S. Ramesh, Borzoo Bonakdarpour, S. Fischmeister
Automata-based models of embedded systems are useful and attractive for many reasons: they are intuitive, precise, at a high level of abstraction, tool independent and can be simulated and analyzed. They also have the advantage of facilitating readability and system comprehension in the case of large systems. This paper proposes an approach for mining automata-based models from input/output execution traces of embedded control systems. The models mined by our approach are hybrid automata models, which capture discrete as well as continuous system behavior. Specifically this paper proposes a framework for analyzing multiple input/output traces by identifying steps like segmentation, clustering, generation of event traces, and automata inference. The framework is general enough to admit multiple techniques or future enhancements of these steps. We demonstrate the power of the framework by using some specific existing methods and tools in two case studies. Our initial results are encouraging and should spur further research in the domain.
基于自动机的嵌入式系统模型是有用和有吸引力的,原因有很多:它们直观、精确、抽象程度高、独立于工具、可以模拟和分析。在大型系统的情况下,它们还具有促进可读性和系统理解的优点。本文提出了一种从嵌入式控制系统的输入/输出执行轨迹中挖掘基于自动机的模型的方法。通过我们的方法挖掘的模型是混合自动机模型,它捕获离散和连续系统行为。具体来说,本文提出了一个框架,通过识别分割、聚类、生成事件轨迹和自动推理等步骤来分析多个输入/输出轨迹。该框架足够通用,可以采用多种技术或将来对这些步骤进行增强。我们通过在两个案例研究中使用一些特定的现有方法和工具来展示该框架的强大功能。我们的初步结果是令人鼓舞的,应该会刺激该领域的进一步研究。
{"title":"A framework for mining hybrid automata from input/output traces","authors":"R. Medhat, S. Ramesh, Borzoo Bonakdarpour, S. Fischmeister","doi":"10.1109/EMSOFT.2015.7318273","DOIUrl":"https://doi.org/10.1109/EMSOFT.2015.7318273","url":null,"abstract":"Automata-based models of embedded systems are useful and attractive for many reasons: they are intuitive, precise, at a high level of abstraction, tool independent and can be simulated and analyzed. They also have the advantage of facilitating readability and system comprehension in the case of large systems. This paper proposes an approach for mining automata-based models from input/output execution traces of embedded control systems. The models mined by our approach are hybrid automata models, which capture discrete as well as continuous system behavior. Specifically this paper proposes a framework for analyzing multiple input/output traces by identifying steps like segmentation, clustering, generation of event traces, and automata inference. The framework is general enough to admit multiple techniques or future enhancements of these steps. We demonstrate the power of the framework by using some specific existing methods and tools in two case studies. Our initial results are encouraging and should spur further research in the domain.","PeriodicalId":297297,"journal":{"name":"2015 International Conference on Embedded Software (EMSOFT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125538260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Verifying network performance of cyber-physical systems with multiple runtime configurations 验证具有多个运行时配置的网络物理系统的网络性能
Pub Date : 2015-10-04 DOI: 10.1109/EMSOFT.2015.7318280
M. Manderscheid, Gereon Weiss, R. Knorr
Modern Cyber-Physical Systems (CPS) must increasingly adapt to changing contexts, like smart cars to changing driving conditions. Thus, design approaches are facing a rapidly growing number of network runtime configurations. With recent approaches this problem can be solved for design space exploration (DSE) by analyzing the network performance of single configurations which are intended to represent the entire runtime variability space. This technique can be applied for DSE since the latter only intends to find an optimized system setup. Yet it does not meet the requirements of network verification, since it does not necessarily find the worst-case for all applications. To solve this, we developed an integrated model, which allows describing runtime variability in the network performance model with a 0-1 linear-fractional program. Thus, we can cover entire runtime variability spaces without analyzing every single network runtime configuration. Although the approach utilizes heuristics, it still guarantees worst-case results. We can show that in comparison to state-of-the-art methods our approach scales for large automotive systems with multiple network configurations. Moreover, our evaluation results highlight the superior capabilities of our method with respect to accuracy and computation time.
现代网络物理系统(CPS)必须越来越适应不断变化的环境,就像智能汽车适应不断变化的驾驶条件一样。因此,设计方法面临着数量迅速增长的网络运行时配置。在设计空间探索(DSE)中,该问题可以通过分析单个配置的网络性能来解决,这些配置旨在表示整个运行时可变性空间。这种技术可以应用于DSE,因为后者只打算找到一个优化的系统设置。然而,它并不满足网络验证的要求,因为它不一定能找到所有应用程序的最坏情况。为了解决这个问题,我们开发了一个集成模型,它允许用0-1线性分数程序描述网络性能模型中的运行时可变性。因此,我们可以覆盖整个运行时可变性空间,而无需分析每个单独的网络运行时配置。虽然该方法利用了启发式,但它仍然保证了最坏情况的结果。我们可以证明,与最先进的方法相比,我们的方法适用于具有多个网络配置的大型汽车系统。此外,我们的评估结果突出了我们的方法在精度和计算时间方面的优越能力。
{"title":"Verifying network performance of cyber-physical systems with multiple runtime configurations","authors":"M. Manderscheid, Gereon Weiss, R. Knorr","doi":"10.1109/EMSOFT.2015.7318280","DOIUrl":"https://doi.org/10.1109/EMSOFT.2015.7318280","url":null,"abstract":"Modern Cyber-Physical Systems (CPS) must increasingly adapt to changing contexts, like smart cars to changing driving conditions. Thus, design approaches are facing a rapidly growing number of network runtime configurations. With recent approaches this problem can be solved for design space exploration (DSE) by analyzing the network performance of single configurations which are intended to represent the entire runtime variability space. This technique can be applied for DSE since the latter only intends to find an optimized system setup. Yet it does not meet the requirements of network verification, since it does not necessarily find the worst-case for all applications. To solve this, we developed an integrated model, which allows describing runtime variability in the network performance model with a 0-1 linear-fractional program. Thus, we can cover entire runtime variability spaces without analyzing every single network runtime configuration. Although the approach utilizes heuristics, it still guarantees worst-case results. We can show that in comparison to state-of-the-art methods our approach scales for large automotive systems with multiple network configurations. Moreover, our evaluation results highlight the superior capabilities of our method with respect to accuracy and computation time.","PeriodicalId":297297,"journal":{"name":"2015 International Conference on Embedded Software (EMSOFT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116889492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic verification of linear controller software 线性控制器软件自动验证
Pub Date : 2015-10-01 DOI: 10.1109/EMSOFT.2015.7318277
M. Pajic, Junkil Park, Insup Lee, George J. Pappas, O. Sokolsky
We consider the problem of verification of software implementations of linear time-invariant controllers. Commonly, different implementations use different representations of the controller's state, for example due to optimizations in a third-party code generator. To accommodate this variation, we exploit input-output controller specification captured by the controller's transfer function and show how to automatically verify correctness of C code controller implementations using a Frama-C/Why3/Z3 toolchain. Scalability of the approach is evaluated using randomly generated controller specifications of realistic size.
研究了线性定常控制器的软件实现验证问题。通常,不同的实现使用不同的控制器状态表示,例如由于第三方代码生成器中的优化。为了适应这种变化,我们利用控制器传递函数捕获的输入输出控制器规范,并展示如何使用Frama-C/Why3/Z3工具链自动验证C代码控制器实现的正确性。使用随机生成的实际尺寸的控制器规格来评估该方法的可扩展性。
{"title":"Automatic verification of linear controller software","authors":"M. Pajic, Junkil Park, Insup Lee, George J. Pappas, O. Sokolsky","doi":"10.1109/EMSOFT.2015.7318277","DOIUrl":"https://doi.org/10.1109/EMSOFT.2015.7318277","url":null,"abstract":"We consider the problem of verification of software implementations of linear time-invariant controllers. Commonly, different implementations use different representations of the controller's state, for example due to optimizations in a third-party code generator. To accommodate this variation, we exploit input-output controller specification captured by the controller's transfer function and show how to automatically verify correctness of C code controller implementations using a Frama-C/Why3/Z3 toolchain. Scalability of the approach is evaluated using randomly generated controller specifications of realistic size.","PeriodicalId":297297,"journal":{"name":"2015 International Conference on Embedded Software (EMSOFT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114675876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Nonvolatile main memory aware garbage collection in high-level language virtual machine 高级语言虚拟机非易失性主存感知垃圾回收
Pub Date : 2015-10-01 DOI: 10.1109/EMSOFT.2015.7318275
Chen Pan, Mimi Xie, Chengmo Yang, Z. Shao, J. Hu
Non-volatile memories (NVMs) such as Phase Change Memory (PCM) have been considered as promising candidates of next generation main memory for embedded systems due to their attractive features. These features include low power, high density, and better scalability. However, most existing NVMs suffer from two drawbacks, namely, limited write endurance and expensive write operation in terms of both time and energy. These problems are worsen when modern high-level languages employ virtual machine with garbage collector that generates a large amount of extra writes on non-volatile main memory. To tackle this challenge, this paper proposes three techniques: Living Objects Remapping (LORE), Dead Object Stamping (DOS), and Smart Wiping with Maximum Likelihood Estimation (SMILE) to reduce the unnecessary writes when garbage collector handles objects. The experimental results show that the proposed techniques not only significantly reduce the writes during each garbage collection cycle but also greatly improve the performance of virtual machine.
非易失性存储器(NVMs),如相变存储器(PCM),由于其诱人的特性,被认为是下一代嵌入式系统主存储器的有希望的候选者。这些特性包括低功耗、高密度和更好的可伸缩性。然而,大多数现有的nvm都有两个缺点,即写持久性有限,写操作在时间和精力上都很昂贵。当现代高级语言使用带有垃圾收集器的虚拟机时,这些问题变得更加严重,垃圾收集器会在非易失性主存上生成大量额外的写操作。为了解决这一挑战,本文提出了三种技术:活对象重新映射(LORE)、死对象冲压(DOS)和最大似然估计智能擦除(SMILE),以减少垃圾收集器处理对象时不必要的写入。实验结果表明,所提出的技术不仅显著减少了每个垃圾回收周期的写操作,而且大大提高了虚拟机的性能。
{"title":"Nonvolatile main memory aware garbage collection in high-level language virtual machine","authors":"Chen Pan, Mimi Xie, Chengmo Yang, Z. Shao, J. Hu","doi":"10.1109/EMSOFT.2015.7318275","DOIUrl":"https://doi.org/10.1109/EMSOFT.2015.7318275","url":null,"abstract":"Non-volatile memories (NVMs) such as Phase Change Memory (PCM) have been considered as promising candidates of next generation main memory for embedded systems due to their attractive features. These features include low power, high density, and better scalability. However, most existing NVMs suffer from two drawbacks, namely, limited write endurance and expensive write operation in terms of both time and energy. These problems are worsen when modern high-level languages employ virtual machine with garbage collector that generates a large amount of extra writes on non-volatile main memory. To tackle this challenge, this paper proposes three techniques: Living Objects Remapping (LORE), Dead Object Stamping (DOS), and Smart Wiping with Maximum Likelihood Estimation (SMILE) to reduce the unnecessary writes when garbage collector handles objects. The experimental results show that the proposed techniques not only significantly reduce the writes during each garbage collection cycle but also greatly improve the performance of virtual machine.","PeriodicalId":297297,"journal":{"name":"2015 International Conference on Embedded Software (EMSOFT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127582479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Forward invariant cuts to simplify proofs of safety 前向不变切割简化安全性证明
Pub Date : 2015-07-17 DOI: 10.1109/EMSOFT.2015.7318278
N. Aréchiga, J. Kapinski, Jyotirmoy V. Deshmukh, André Platzer, B. Krogh
The use of deductive techniques, such as theorem provers, has several advantages in safety verification of hybrid systems; however, state-of-the-art theorem provers require manual intervention to handle complex systems. Furthermore, there is often a gap between the type of assistance that a theorem prover requires to make progress on a proof task and the assistance that a system designer is able to provide directly. This paper presents an extension to KeYmaera, a deductive verification tool for differential dynamic logic; the new technique allows local reasoning using system designer intuition about performance within particular modes as part of a proof task. Our approach allows the theorem prover to leverage forward invariants, discovered using numerical techniques, as part of a proof of safety. We introduce a new inference rule into the proof calculus of KeYmaera, the forward invariant cut rule, and we present a methodology to discover useful forward invariants, which are then used with the new cut rule to complete verification tasks. We demonstrate how our new approach can be used to complete verification tasks that lie out of the reach of existing automatic verification approaches using several examples, including one involving an automotive powertrain control system.
使用演绎技术,如定理证明,在混合系统的安全验证中有几个优点;然而,最先进的定理证明者需要人工干预来处理复杂的系统。此外,定理证明者在证明任务中取得进展所需的帮助类型与系统设计师能够直接提供的帮助类型之间通常存在差距。本文对差分动态逻辑的演绎验证工具KeYmaera进行了扩展;新技术允许使用系统设计者对特定模式下性能的直觉进行局部推理,作为证明任务的一部分。我们的方法允许定理证明者利用前向不变量,使用数值技术发现,作为安全性证明的一部分。我们在KeYmaera的证明演算中引入了一个新的推理规则——前向不变切割规则,并提出了一种发现有用的前向不变量的方法,然后将这些前向不变量与新的切割规则一起使用来完成验证任务。我们通过几个例子,包括一个涉及汽车动力总成控制系统的例子,展示了我们的新方法如何用于完成现有自动验证方法无法完成的验证任务。
{"title":"Forward invariant cuts to simplify proofs of safety","authors":"N. Aréchiga, J. Kapinski, Jyotirmoy V. Deshmukh, André Platzer, B. Krogh","doi":"10.1109/EMSOFT.2015.7318278","DOIUrl":"https://doi.org/10.1109/EMSOFT.2015.7318278","url":null,"abstract":"The use of deductive techniques, such as theorem provers, has several advantages in safety verification of hybrid systems; however, state-of-the-art theorem provers require manual intervention to handle complex systems. Furthermore, there is often a gap between the type of assistance that a theorem prover requires to make progress on a proof task and the assistance that a system designer is able to provide directly. This paper presents an extension to KeYmaera, a deductive verification tool for differential dynamic logic; the new technique allows local reasoning using system designer intuition about performance within particular modes as part of a proof task. Our approach allows the theorem prover to leverage forward invariants, discovered using numerical techniques, as part of a proof of safety. We introduce a new inference rule into the proof calculus of KeYmaera, the forward invariant cut rule, and we present a methodology to discover useful forward invariants, which are then used with the new cut rule to complete verification tasks. We demonstrate how our new approach can be used to complete verification tasks that lie out of the reach of existing automatic verification approaches using several examples, including one involving an automotive powertrain control system.","PeriodicalId":297297,"journal":{"name":"2015 International Conference on Embedded Software (EMSOFT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131690176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2015 International Conference on Embedded Software (EMSOFT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1