Letychevskyi et al., 2019 - Google Patents
Algebraic approach to verification and testing of distributed applicationsLetychevskyi et al., 2019
View PDF- Document ID
- 6965701581051985497
- Author
- Letychevskyi O
- Peschanenko V
- Radchenko V
- Orlovsky M
- Sobol A
- Publication year
- Publication venue
- Proceedings of the 1st International Electronics Communication Conference
External Links
Snippet
Challenges in developing distributed applications have given rise to various different design techniques and technologies. This paper presents an algebraic approach using formal verification and model-based testing that can be applied to different development stages …
- 238000000034 method 0 abstract description 34
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
- G06F17/504—Formal methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
- G06F11/3608—Software analysis for verifying properties of programs using formal methods, e.g. model checking, abstract interpretation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30943—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
- G06F17/30946—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
- G06F17/30958—Graphs; Linked lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/445—Programme loading or initiating
- G06F9/44589—Programme code verification, e.g. Java bytecode verification, proof-carrying code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Frank et al. | {ETHBMC}: A bounded model checker for smart contracts | |
| Ma et al. | I4: incremental inference of inductive invariants for verification of distributed protocols | |
| Coenen et al. | Verifying hyperliveness | |
| Abdulla et al. | A survey of regular model checking | |
| Verma et al. | Introduction of formal methods in blockchain consensus mechanism and its associated protocols | |
| Chia et al. | Rethinking blockchain security: Position paper | |
| Balliu et al. | Encover: Symbolic exploration for information flow security | |
| Lopuhaä-Zwakenberg et al. | Efficient and generic algorithms for quantitative attack tree analysis | |
| Budde et al. | Efficient algorithms for quantitative attack tree analysis | |
| Letychevskyi et al. | Applying algebraic virtual machine to cybersecurity tasks | |
| Tun et al. | Requirements and specifications for adaptive security: concepts and analysis | |
| Letychevskyi et al. | Algebraic approach to verification and testing of distributed applications | |
| Holık et al. | Fast matching of regular patterns with synchronizing counting | |
| Marzouk et al. | On the computational tractability of the (many) shapley values | |
| Alur et al. | Model checking on trees with path equivalences | |
| Lemay et al. | Automated provenance analytics: A regular grammar based approach with applications in security | |
| Beaulaton et al. | Security analysis of IoT systems using attack trees | |
| Galletta et al. | Resilience of Hybrid Casper under varying values of parameters | |
| Letychevskyi et al. | Algebraic virtual machine project | |
| Hou et al. | Symbolic bisimulation for open and parameterized systems | |
| Namjoshi et al. | Program correctness through self-certification | |
| Pierro | A User-Centered Perspective for the blockchain Development | |
| Bahrampour et al. | Using search-based techniques for testing executable software models specified through graph transformations | |
| Nielsen | Languages for secure multiparty computation and towards strongly typed macros | |
| Ferrante et al. | CTL model-checking with graded quantifiers |