首页 > 最新文献

2014 IEEE Eighth International Conference on Software Security and Reliability-Companion最新文献

英文 中文
Software Reliability Virtual Testing for Reliability Assessment 面向可靠性评估的软件可靠性虚拟测试
J. Ai, Hanyu Pei, Liang Yan
The basic condition of software reliability assessment is failure time, which must be acquired during a test based on operational profile or on real usage. Failure data from software development or other non-software reliability testing (SRT) cannot be used for reliability evaluation because such data do not include usage information and failure time. This paper presents a software reliability virtual test (SRVT), which constructs the software input space model and the known failure input space model through which possible failure time can be determined by matching the randomly generate inputs. An experiment comparing SRT and SRVT with different thresholds is introduced to verify SRVT. Results indicate that SRVT saves a large amount of testing time while providing reliability assessment with acceptable accuracy.
软件可靠性评估的基本条件是故障时间,故障时间必须在基于运行概况或实际使用的测试中获得。来自软件开发或其他非软件可靠性测试(SRT)的故障数据不能用于可靠性评估,因为这些数据不包括使用信息和故障时间。本文提出了一种软件可靠性虚拟测试(SRVT)方法,构建了软件输入空间模型和已知故障输入空间模型,通过匹配随机生成的输入来确定可能的故障时间。通过SRT与不同阈值的SRVT对比实验,验证了SRVT的有效性。结果表明,SRVT在提供精度可接受的可靠性评估的同时,节省了大量的测试时间。
{"title":"Software Reliability Virtual Testing for Reliability Assessment","authors":"J. Ai, Hanyu Pei, Liang Yan","doi":"10.1109/SERE-C.2014.24","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.24","url":null,"abstract":"The basic condition of software reliability assessment is failure time, which must be acquired during a test based on operational profile or on real usage. Failure data from software development or other non-software reliability testing (SRT) cannot be used for reliability evaluation because such data do not include usage information and failure time. This paper presents a software reliability virtual test (SRVT), which constructs the software input space model and the known failure input space model through which possible failure time can be determined by matching the randomly generate inputs. An experiment comparing SRT and SRVT with different thresholds is introduced to verify SRVT. Results indicate that SRVT saves a large amount of testing time while providing reliability assessment with acceptable accuracy.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133351339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm 施奈尔纸牌键流算法的概率循环检测
Wiem Tounsi, Benjamin Justus, N. Cuppens-Boulahia, F. Cuppens, Joaquín García
Pencil-and-paper ciphers are plausible solutions that could provide lightweight protection to the communication of resource-constrained devices. A good example in this category is Schneier's Solitaire cipher. In this paper, we propose a probabilistic solution that is able to estimate Solitaire's keystream cycle length. We also present a variation of Solitaire's original design, and evaluate the resulting construction in terms of predictability. We conduct statistical randomness tests on both the original design and the modified version based on the NIST randomness test suite. The results show that our approach improves the randomness of original Solitaire's output sequences.
纸笔密码是可行的解决方案,可以为资源受限设备的通信提供轻量级保护。Schneier的Solitaire密码就是一个很好的例子。在本文中,我们提出了一种能够估计纸牌键流周期长度的概率解。我们还提出了《纸牌》原始设计的一个变体,并根据可预测性评估了最终的结构。我们基于NIST随机性测试套件对原始设计和修改版本进行了统计随机性测试。结果表明,我们的方法改善了原始Solitaire输出序列的随机性。
{"title":"Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm","authors":"Wiem Tounsi, Benjamin Justus, N. Cuppens-Boulahia, F. Cuppens, Joaquín García","doi":"10.1109/SERE-C.2014.29","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.29","url":null,"abstract":"Pencil-and-paper ciphers are plausible solutions that could provide lightweight protection to the communication of resource-constrained devices. A good example in this category is Schneier's Solitaire cipher. In this paper, we propose a probabilistic solution that is able to estimate Solitaire's keystream cycle length. We also present a variation of Solitaire's original design, and evaluate the resulting construction in terms of predictability. We conduct statistical randomness tests on both the original design and the modified version based on the NIST randomness test suite. The results show that our approach improves the randomness of original Solitaire's output sequences.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131310208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Clock System Related to STeC Language 基于STeC语言的混合时钟系统
Yixiang Chen, Yuanrui Zhang
Cyber-Physical Systems(CPS) is a new trend of real-time systems in the area of distributed embedded systems or networked agent systems. The first author introduced a specification language for real-time system, called as spatial-temporal consistency language (Shortly, STeC) in 2010. In this paper, the authors introduce a novel clock system, called as hybrid clock, to specify both logical and chronometric time aspect of real time system. Some operations on hybrid clocks and relations between hybrid clocks are introduced. A satisfaction relation between a hybrid clock and a STeC design of real time system specified in term with STeC language is defined. Some properties and CPS case studies are given in this paper.
信息物理系统(CPS)是分布式嵌入式系统或网络代理系统领域实时系统发展的新趋势。第一作者在2010年引入了一种实时系统规范语言,称为时空一致性语言(简称STeC)。本文介绍了一种新的时钟系统,即混合时钟,它能同时体现实时系统的逻辑时间和时间方面。介绍了混合时钟的一些操作以及混合时钟之间的关系。定义了用STeC语言描述的实时系统的混合时钟与STeC设计之间的满足关系。本文给出了一些性质和实例分析。
{"title":"A Hybrid Clock System Related to STeC Language","authors":"Yixiang Chen, Yuanrui Zhang","doi":"10.1109/SERE-C.2014.39","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.39","url":null,"abstract":"Cyber-Physical Systems(CPS) is a new trend of real-time systems in the area of distributed embedded systems or networked agent systems. The first author introduced a specification language for real-time system, called as spatial-temporal consistency language (Shortly, STeC) in 2010. In this paper, the authors introduce a novel clock system, called as hybrid clock, to specify both logical and chronometric time aspect of real time system. Some operations on hybrid clocks and relations between hybrid clocks are introduced. A satisfaction relation between a hybrid clock and a STeC design of real time system specified in term with STeC language is defined. Some properties and CPS case studies are given in this paper.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131488596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Parameters Tuning Algorithm in Wireless Networks 无线网络中的参数调优算法
Hua-Ching Chen, Hsuan-Ming Feng, Benbin Chen, Donghui Guo
The arbitration inter frame space, Contention window minimum and Contention window maximum are some of the most important parameters of 802.11e, and the enhanced parameters tuning algorithm is applied for their adjustment. To achieve the high quality of service (QoS), priority combinations strategy with simpleness and effectiveness is proposed. In such a strategy, the internal competition of business analysis methods is used to detect the channel busy probability. Via different settings of the above parameters, the EPT reduces the conflict probability to complete the performance analysis while retreating the traffic business to the idle and zero states. Simulation environments are built for test and validation the better adapted regulation mechanism with the parameters.
仲裁帧间空间、竞争窗口最小值和竞争窗口最大值是802.11e中最重要的参数,采用增强型参数调优算法对其进行调整。为了实现高服务质量,提出了简单有效的优先级组合策略。在该策略中,利用业务分析方法的内部竞争来检测信道繁忙概率。通过上述参数的不同设置,EPT降低冲突概率完成性能分析,同时将流量业务退回到空闲和零状态。建立了仿真环境来测试和验证与参数相适应的调节机制。
{"title":"A Parameters Tuning Algorithm in Wireless Networks","authors":"Hua-Ching Chen, Hsuan-Ming Feng, Benbin Chen, Donghui Guo","doi":"10.1109/SERE-C.2014.49","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.49","url":null,"abstract":"The arbitration inter frame space, Contention window minimum and Contention window maximum are some of the most important parameters of 802.11e, and the enhanced parameters tuning algorithm is applied for their adjustment. To achieve the high quality of service (QoS), priority combinations strategy with simpleness and effectiveness is proposed. In such a strategy, the internal competition of business analysis methods is used to detect the channel busy probability. Via different settings of the above parameters, the EPT reduces the conflict probability to complete the performance analysis while retreating the traffic business to the idle and zero states. Simulation environments are built for test and validation the better adapted regulation mechanism with the parameters.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130284508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi-function Error Detection Policy to Enhance Communication Integrity in Critical Embedded Systems 增强关键嵌入式系统通信完整性的多功能错误检测策略
Amira Zammali, A. D. Bonneval, Y. Crouzet
We present, in this paper, ongoing work that investigates a new error detection policy aiming at enhancing the system safety level particularly communication integrity in the presence of permanent errors (single and multiple). We consider critical embedded systems which are based on complex networks including active interstage nodes. This property increases the occurrence probability of permanent errors. The novelty of the proposed policy lies in the fact that unlike classical policies using a single error detection function, it is based rather on a set of different error detection functions. The different used functions must be complementary in terms of detection capability in order to increase the resultant error detection capability. Our reference application to illustrate the proposed concepts is the Flight Control System (FCS). However, our objective is also to apply the proposed approach to other application domains sharing similar features and characteristics.
在本文中,我们提出了一项正在进行的工作,研究一种新的错误检测策略,旨在提高系统安全水平,特别是在存在永久性错误(单个和多个)时的通信完整性。我们考虑了基于复杂网络的关键嵌入式系统,包括活跃的阶段间节点。此属性增加了永久性错误发生的概率。该策略的新颖之处在于,与使用单个错误检测函数的传统策略不同,它基于一组不同的错误检测函数。不同的使用函数必须在检测能力方面是互补的,以增加最终的错误检测能力。我们的参考应用来说明所提出的概念是飞行控制系统(FCS)。然而,我们的目标也是将所提出的方法应用到其他共享类似特性和特征的应用程序领域。
{"title":"A Multi-function Error Detection Policy to Enhance Communication Integrity in Critical Embedded Systems","authors":"Amira Zammali, A. D. Bonneval, Y. Crouzet","doi":"10.1109/SERE-C.2014.18","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.18","url":null,"abstract":"We present, in this paper, ongoing work that investigates a new error detection policy aiming at enhancing the system safety level particularly communication integrity in the presence of permanent errors (single and multiple). We consider critical embedded systems which are based on complex networks including active interstage nodes. This property increases the occurrence probability of permanent errors. The novelty of the proposed policy lies in the fact that unlike classical policies using a single error detection function, it is based rather on a set of different error detection functions. The different used functions must be complementary in terms of detection capability in order to increase the resultant error detection capability. Our reference application to illustrate the proposed concepts is the Flight Control System (FCS). However, our objective is also to apply the proposed approach to other application domains sharing similar features and characteristics.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128996220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Accurate Fake Access Point Detection Method Based on Deviation of Beacon Time Interval 基于信标时间间隔偏差的假接入点精确检测方法
Kuo-Fong Kao, Wen-Ching Chen, Jui-Chi Chang, Heng-Te Chu
As wireless networks being prevalent, rogue access points (AP) become a serious security issue. Among various rogue APs, a fake AP with fully forging the SSID and MAC address of a legitimate AP is the hardest thing to detect and the highest probability of causing security breach. Among the past academic papers, which scholars had published, mainly relied on statistics of packets to detect fake APs. They are apt to trigger false alarms. To measure more precisely, this research proposes an algorithm that is based on the interval, serial number, and timestamp of beacons. In our analysis, even the hackers deliberately synchronize the sequence numbers and timestamp of both legal and fake APs, we are still able to exactly identify whether a fake AP exists or not.
随着无线网络的普及,非法接入点(AP)成为一个严重的安全问题。在各种恶意AP中,完全伪造合法AP的SSID和MAC地址的假AP是最难检测的,也是造成安全漏洞的可能性最大的AP。在过去学者发表的学术论文中,主要依靠数据包的统计来检测假ap。它们很容易触发假警报。为了更精确地测量,本研究提出了一种基于信标间隔、序列号和时间戳的算法。在我们的分析中,即使黑客故意同步合法AP和假AP的序列号和时间戳,我们仍然能够准确识别假AP是否存在。
{"title":"An Accurate Fake Access Point Detection Method Based on Deviation of Beacon Time Interval","authors":"Kuo-Fong Kao, Wen-Ching Chen, Jui-Chi Chang, Heng-Te Chu","doi":"10.1109/SERE-C.2014.13","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.13","url":null,"abstract":"As wireless networks being prevalent, rogue access points (AP) become a serious security issue. Among various rogue APs, a fake AP with fully forging the SSID and MAC address of a legitimate AP is the hardest thing to detect and the highest probability of causing security breach. Among the past academic papers, which scholars had published, mainly relied on statistics of packets to detect fake APs. They are apt to trigger false alarms. To measure more precisely, this research proposes an algorithm that is based on the interval, serial number, and timestamp of beacons. In our analysis, even the hackers deliberately synchronize the sequence numbers and timestamp of both legal and fake APs, we are still able to exactly identify whether a fake AP exists or not.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133867024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Specification and Analysis of Attribute-Based Access Control Policies: An Overview 基于属性的访问控制策略规范与分析综述
Dianxiang Xu, Yunpeng Zhang
Attribute-based access control (ABAC) is a new generation of access control techniques. It enables fine-grained access control by using various attributes of authorization elements, facilitates collaborative policy administration within a large enterprise or across multiple organizations, and allows for decoupling of access control policies from application logic. Nevertheless, ABAC-based systems can be very complex to manage. High expressiveness of ABAC specifications also increases the possibility of having defects. Therefore testing and verification are important for assuring that ABAC policies are specified and enforced correctly. This paper presents an overview of the existing work on specification, dynamic testing, and static verification of ABAC policies. It not only summarizes the up-to-date research progresses, but also provides an understanding about the limitations and open issues of the existing work. It is expected to serve as useful guidelines for future research.
基于属性的访问控制(ABAC)是新一代的访问控制技术。它通过使用授权元素的各种属性来实现细粒度的访问控制,促进大型企业内或跨多个组织的协作策略管理,并允许访问控制策略与应用程序逻辑解耦。然而,基于abac的系统管理起来可能非常复杂。ABAC规范的高表达性也增加了存在缺陷的可能性。因此,测试和验证对于确保正确指定和执行ABAC策略非常重要。本文概述了ABAC策略的规范、动态测试和静态验证方面的现有工作。它不仅总结了最新的研究进展,而且对现有工作的局限性和有待解决的问题提供了了解。它有望为今后的研究提供有用的指导。
{"title":"Specification and Analysis of Attribute-Based Access Control Policies: An Overview","authors":"Dianxiang Xu, Yunpeng Zhang","doi":"10.1109/SERE-C.2014.21","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.21","url":null,"abstract":"Attribute-based access control (ABAC) is a new generation of access control techniques. It enables fine-grained access control by using various attributes of authorization elements, facilitates collaborative policy administration within a large enterprise or across multiple organizations, and allows for decoupling of access control policies from application logic. Nevertheless, ABAC-based systems can be very complex to manage. High expressiveness of ABAC specifications also increases the possibility of having defects. Therefore testing and verification are important for assuring that ABAC policies are specified and enforced correctly. This paper presents an overview of the existing work on specification, dynamic testing, and static verification of ABAC policies. It not only summarizes the up-to-date research progresses, but also provides an understanding about the limitations and open issues of the existing work. It is expected to serve as useful guidelines for future research.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121285491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Evaluating Software Safety Standards: A Systematic Review and Comparison 评估软件安全标准:系统回顾与比较
W. E. Wong, Tej Gidvani, Alfonso Lopez, Ruizhi Gao, M. Horn
Software safety standards are commonly used to guide the development of safety-critical software systems. However, given the existence of multiple competing standards, it is critical to select the most appropriate one for a given project. We have developed a set of 15 criteria to evaluate each standard in terms of its usage, strengths, and limitations. Five standards are studied, including a NASA Software Safety Standard, an FAA System Safety Handbook, MIL-STD-882D (US Department of Defense), DEF-STAN 00-56 (UK Ministry of Defense), and DO-178B (Commercial avionics). Results of our evaluation suggest that different standards score differently with respect to each evaluation criterion. No standard performs better than others on all the criteria. The lessons learned from software-related accidents in which the standards were involved provide further insights on the pros and cons of using each standard.
软件安全标准通常用于指导安全关键软件系统的开发。然而,考虑到存在多个相互竞争的标准,为给定项目选择最合适的标准是至关重要的。我们已经制定了一套15个标准来评估每个标准的用途、优势和局限性。研究了五个标准,包括NASA软件安全标准、FAA系统安全手册、MIL-STD-882D(美国国防部)、DEF-STAN 00-56(英国国防部)和DO-178B(商业航空电子设备)。我们的评估结果表明,不同的标准在每个评估标准方面得分不同。没有哪个标准在所有标准上都比其他标准表现得更好。从涉及这些标准的软件相关事故中吸取的经验教训为使用每种标准的利弊提供了进一步的见解。
{"title":"Evaluating Software Safety Standards: A Systematic Review and Comparison","authors":"W. E. Wong, Tej Gidvani, Alfonso Lopez, Ruizhi Gao, M. Horn","doi":"10.1109/SERE-C.2014.25","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.25","url":null,"abstract":"Software safety standards are commonly used to guide the development of safety-critical software systems. However, given the existence of multiple competing standards, it is critical to select the most appropriate one for a given project. We have developed a set of 15 criteria to evaluate each standard in terms of its usage, strengths, and limitations. Five standards are studied, including a NASA Software Safety Standard, an FAA System Safety Handbook, MIL-STD-882D (US Department of Defense), DEF-STAN 00-56 (UK Ministry of Defense), and DO-178B (Commercial avionics). Results of our evaluation suggest that different standards score differently with respect to each evaluation criterion. No standard performs better than others on all the criteria. The lessons learned from software-related accidents in which the standards were involved provide further insights on the pros and cons of using each standard.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121906825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Post-condition-Directed Invariant Inference for Loops over Data Structures 数据结构上循环的后条件定向不变量推理
Juan Zhai, Hanfei Wang, Jianhua Zhao
In the automatic code verification, it is often necessary for programmers to provide logical annotations in the form of pre-/post-conditions and loop invariants. In this paper, we propose a framework that automatically infers loop invariants of loops manipulating commonly-used data structures. These data structures include one-dimensional arrays, singly-linked lists, doubly-linked lists and static lists. In practical cases, a majority of the loops operating on such data structures work by iterating over the elements of these data structures. The loop invariants of this kind of loops are usually similar in form with their corresponding post-conditions. The framework takes advantage of this observation by generating invariant candidates automatically from a given post-condition following several heuristics. These invariant candidates are subsequently validated via the SMT solver Z3 and the weakest-precondition calculator provided in the interactive code-verification tool Accumulator. The framework, which has been implemented for a small C-like language, suffices to infer suitable loop invariants of a range of loops w.r.t. given post-conditions. The framework has been integrated into the tool Accumulator to ease the verification tasks by alleviating the burden of providing loop invariants manually.
在自动代码验证中,程序员通常需要以前置/后置条件和循环不变量的形式提供逻辑注释。在本文中,我们提出了一个框架,可以自动推断操作常用数据结构的循环不变量。这些数据结构包括一维数组、单链表、双链表和静态表。在实际情况中,对此类数据结构进行操作的大多数循环都是通过遍历这些数据结构的元素来实现的。这类循环的循环不变量通常在形式上与其相应的后置条件相似。该框架利用这一观察结果,根据几个启发式方法,从给定的后置条件自动生成不变候选者。这些不变量候选者随后通过SMT求解器Z3和交互式代码验证工具Accumulator中提供的最弱前提计算器进行验证。该框架是为小型类c语言实现的,它足以在给定后设条件的情况下推断出一系列循环的合适循环不变量。该框架已集成到工具Accumulator中,通过减轻手动提供循环不变量的负担来简化验证任务。
{"title":"Post-condition-Directed Invariant Inference for Loops over Data Structures","authors":"Juan Zhai, Hanfei Wang, Jianhua Zhao","doi":"10.1109/SERE-C.2014.40","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.40","url":null,"abstract":"In the automatic code verification, it is often necessary for programmers to provide logical annotations in the form of pre-/post-conditions and loop invariants. In this paper, we propose a framework that automatically infers loop invariants of loops manipulating commonly-used data structures. These data structures include one-dimensional arrays, singly-linked lists, doubly-linked lists and static lists. In practical cases, a majority of the loops operating on such data structures work by iterating over the elements of these data structures. The loop invariants of this kind of loops are usually similar in form with their corresponding post-conditions. The framework takes advantage of this observation by generating invariant candidates automatically from a given post-condition following several heuristics. These invariant candidates are subsequently validated via the SMT solver Z3 and the weakest-precondition calculator provided in the interactive code-verification tool Accumulator. The framework, which has been implemented for a small C-like language, suffices to infer suitable loop invariants of a range of loops w.r.t. given post-conditions. The framework has been integrated into the tool Accumulator to ease the verification tasks by alleviating the burden of providing loop invariants manually.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129940270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2014 IEEE Eighth International Conference on Software Security and Reliability-Companion
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1