• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

Tools and Techniques for the Design and Systematic Analysis of Real-Time Systems,” (1999)

by P Kolano
Add To MetaCart

Tools

Sorted by:
Results 1 - 8 of 8

Generalized discrete timed automata: decidable approximations for safety verification

by Zhe Dang, Oscar H. Ibarra, Richard A. Kemmerer - Theoretical Computer Science
"... Abstract. We consider generalized discrete timed automata with general linearrelations over clocks and parameterized constants as clock constraints and with parameterized durations. We look at three approximation techniques (i.e., the r-reset-bounded approximation, the B-bounded approximation, and t ..."
Abstract - Cited by 4 (4 self) - Add to MetaCart
Abstract. We consider generalized discrete timed automata with general linearrelations over clocks and parameterized constants as clock constraints and with parameterized durations. We look at three approximation techniques (i.e., the r-reset-bounded approximation, the B-bounded approximation, and the hB; ri-crossing-bounded approximation), and derive automata-theoretic characterizations of the binary reachability under these approximations. The characteriza-tions allow us to show that the safety analysis problem is decidable for generalized discrete timed automata with unit durations and for deterministic generalizeddiscrete timed automata with parameterized durations. An example specification written in ASTRAL is used to run a number of experiments using one of theapproximation techniques. 1 Introduction As a standard model for analyzing real-time systems, timed automata [3] have receivedenormous attention during the past decade. A timed automaton can be considered as a finite automaton augmented with a finite number of clocks. The clocks can be reset orprogress at the same rate, and can be tested against clock constraints in the form of clock regions (i.e., comparisons of a clock or the difference of two clocks against an integerconstant, e.g.,

Proof Assistance for Real-Time Systems Using an Interactive Theorem Prover

by Paul Z. Kolano - 5th International AMAST Workshop on RealTime and Probabilistic Systems, LNCS
"... . This paper discusses the adaptation of the PVS theorem prover for performing analysis of real-time systems written in the ASTRAL formal specification language. A number of issues were encountered during the encoding of ASTRAL that are relevant to the encoding of many real-time specification la ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
. This paper discusses the adaptation of the PVS theorem prover for performing analysis of real-time systems written in the ASTRAL formal specification language. A number of issues were encountered during the encoding of ASTRAL that are relevant to the encoding of many real-time specification languages. These issues are presented as well as how they were handled in the ASTRAL encoding. A translator has been written that translates any ASTRAL specification into its corresponding PVS encoding. After performing the proofs of several systems using the encoding, PVS strategies have been developed to automate the proofs of certain types of properties. In addition, the encoding has been used as the basis for a transition sequence generator tool. 1 Introduction A real-time system is a system that must perform its actions within specified time bounds. With the advent of cheap processing power and increasingly sophisticated consumer demands, real-time systems have become commonplace ...

Formal Specification and Analysis of an e-Voting System. In:

by Komminist Weldemariam , Richard A Kemmerer , Adolfo Villafiorita - The 5th International Conference on Availability Reliability and Security, IEEE , 2010
"... Abstract-Electronic voting systems are a perfect example of security-critical computing. One of the critical and complex parts of such systems is the voting process, which is responsible for correctly and securely storing intentions and actions of the voters. Unfortunately, recent studies revealed ..."
Abstract - Cited by 3 (2 self) - Add to MetaCart
Abstract-Electronic voting systems are a perfect example of security-critical computing. One of the critical and complex parts of such systems is the voting process, which is responsible for correctly and securely storing intentions and actions of the voters. Unfortunately, recent studies revealed that various evoting systems show serious specification, design, and implementation flaws. The application of formal specification and verification can greatly help to better understand the system requirements of e-voting systems by thoroughly specifying and analyzing the underlying assumptions and the security specific properties. This paper presents the specification and verification of the electronic voting process for the Election Systems & Software (ES&S) system. We used the ASTRAL language to specify the voting process of ES&S machines and the critical security requirements for the system. Proof obligations that verify that the specified system meets the critical requirements were automatically generated by the ASTRAL Software Development Environment (SDE). The PVS interactive theorem prover was then used to apply the appropriate proof strategies and discharge the proof obligations.
(Show Context)

Citation Context

...at infer the whole clause so that the proof of each property could be tackled separately. Table I shows the number of invariants, schedules, and constraints for each of the four processes and the global invariants. It also shows the number after they are split by the ASTRAL SDE. Table I NUMBER OF PROOF OBLIGATIONS. Proof Obligations After Splitting Invar, Constr, Sched Invar, Constr, Sched DRE 4, 6,1 10, 9, 2 RTAL 1, 1, 3 1, 1, 3 PEB 1, 0, 1 2, 0, 1 CFCard 0, 0, 1 0, 0, 2 Global 6, 0, NA 9, 0, NA Total 12, 7, 6 22, 10, 8 Using the PVS interactive theorem-prover and the techniques discussed in [15] we have proved 13 of the 22 invariants, 3 of the 8 schedules, and 7 of the 10 constraints. We expect that the other global and local properties can be proved using the same or similar proof techniques and strategies. V. RELATED WORK Scientific literature on e-voting is wide and multidisciplinary. Sticking to the topic of this paper, we organize previous work in three different areas: understanding the risks posed by the introduction of e-voting systems in the polling stations; assessing existing systems; designing better e-voting systems using formal techniques. With respect to the first area...

Decidable Approximations on Generalized and Parameterized Discrete Timed Automata

by Zhe Dang, Oscar H. Ibarra, Richard A. Kemmerer - COCOON'01, LNCS 2108
"... . We consider generalized discrete timed automata with general linear relations over clocks and parameterized constants as clock constraints and with parameterized durations. We look at three approximation techniques (i.e., the r-reset-bounded approximation, the B-bounded approximation, and the hB ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
. We consider generalized discrete timed automata with general linear relations over clocks and parameterized constants as clock constraints and with parameterized durations. We look at three approximation techniques (i.e., the r-reset-bounded approximation, the B-bounded approximation, and the hB; ri-crossing-bounded approximation), and derive automata-theoretic characterizations of the binary reachability under these approximations. The characterizations allow us to show that the safety analysis problem is decidable for generalized discrete timed automata with unit durations and for deterministic generalized discrete timed automata with parameterized durations. An example specification written in ASTRAL is used to run a number of experiments using one of the approximation techniques. 1
(Show Context)

Citation Context

...is gives a different decidability result when the approximation techniques in this paper are used. These generalizations have practical motivation. For example, many complex real-world specifications =-=[10, 13, 15, 27]-=- written in real-time specification language ASTRAL [10] use generalized clock constraints and parameterized durations in almost every specification. Therefore, the results presented in this paper may...

Formal analysis of attacks for e-voting system

by Komminist Weldemariam , Richard A Kemmerer , Adolfo Villafiorita - In CRiSIS ’09: Fourth international , 2009
"... Abstract-Recently, the use of formal methods to specify and verify properties of electronic voting (e-voting) systems, with particular interest in security, verifiability, and anonymity, is getting much attention. Formal specification and verification of such systems can greatly help to better unde ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
Abstract-Recently, the use of formal methods to specify and verify properties of electronic voting (e-voting) systems, with particular interest in security, verifiability, and anonymity, is getting much attention. Formal specification and verification of such systems can greatly help to better understand the system requirements by thoroughly specifying and analyzing the underlying assumptions and security specific properties. Unfortunately, even though these systems have been formally verified to satisfy the desired system security requirements, they are still vulnerable to attack. In this paper we extend a formal specification of the ES&S voting system by specifying attacks that have been shown to successfully compromise the system. We believe that performing such analysis is important for two reasons: first, it allows us to discover some missing critical requirements for the specification and/or assumptions that were not met. Second, it allows us to derive mitigation or counter-measure strategies when the system behaves differently than it should. We used the ASTRAL language for the specification, and the verification is performed using the PVS tool.
(Show Context)

Citation Context

..., which enabled the specification to be passed to the PVS theorem-prover for verification. Before invoking the theorem prover, the ASTRAL split engine was used to split and classify the ASTRAL specification into collections of simpler properties that infer the whole clause so that the proof of each property could be tackled separately. Table I shows the number of invariants, schedules, and constraints for each of the four processes and the global invariants. It also shows the number after they are split by the ASLAN SDE. Using the PVS interactive theorem-prover and the techniques discussed in [18] we have proved many critical requirements for the system (mostly local invariants and constraints). More specifically we have proved 13 of the 22 invariants, 3 of the 8 schedules, and 7 of the 10 constraints. We expect that the other global and local properties can be proved using the same or similar proof techniques and strategies. IV. EXTENDING THE SYSTEM SPECIFICATION BY MODELING ATTACK SCENARIOS We model the attack scenarios presented in Section II-C in terms of threat actions expressed as ASTRAL transition specifications. The system model is extended by augmenting the specification with ...

Parallel Refinement Mechanisms

by Paul Z. Kolano
"... Refinement is a fundamental design technique that has often challenged the "formal methods" community. In most cases, mathematical elegance and proof manageability have been chosen over flexibility and freedom, which are often needed in practice to deal with unexpected or critical situatio ..."
Abstract - Add to MetaCart
Refinement is a fundamental design technique that has often challenged the "formal methods" community. In most cases, mathematical elegance and proof manageability have been chosen over flexibility and freedom, which are often needed in practice to deal with unexpected or critical situations. The issue of refinement becomes even more critical when dealing with real-time systems where time analysis is a crucial factor. In this case, the literature exhibits only a few, fairly limited proposals. In this paper, we propose general refinement mechanisms for real-time systems that allow several types of implementation strategies to be specified in a fairly natural way. Not surprisingly, generality has a price in terms of complexity. In our approach, however, this price is paid only when necessary. Furthermore, the proof system is amenable both for traditional hand-proofs, based on human ingenuity and only partially formalized, and for fully formalized, tool-supported proofs. The following is...

Parallel Refinement Mechanisms for Real-Time Systems

by Paul Z. Kolano, Richard A. Kemmerer, Dino Mandrioli - PROC. 3RD INT. CONF. ON FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING , 2000
"... Refinement is a fundamental design technique that has often challenged the "formal methods" community. In most cases, mathematical elegance and proof manageability have exhibited a deep trade-off with the flexibility and freedom that are often needed in practice to deal with unexpected ..."
Abstract - Add to MetaCart
Refinement is a fundamental design technique that has often challenged the "formal methods" community. In most cases, mathematical elegance and proof manageability have exhibited a deep trade-off with the flexibility and freedom that are often needed in practice to deal with unexpected or critical situations. The issue of refinement becomes even more critical when dealing with real-time systems where time analysis is a crucial factor. In this case, the literature exhibits only a few, fairly limited proposals. In this paper, we propose highly general refinement mechanisms for real-time systems that allow several types of implementation strategies to be specified in a fairly natural way. Not surprisingly, generality has a price in terms of complexity. In our approach, however, this price is paid only when necessary. Furthermore, the proof system is amenable both for traditional hand-proofs, based on human ingenuity and only partially formalized, and for fully formalized, t...
(Show Context)

Citation Context

...more complex example. Finally, section 9 provides some concluding remarks. For the sake of conciseness in this paper, we concentrate only on the essentials. Complete technical details can be found in =-=[10]-=-. 2 ASTRAL Overview An ASTRAL system specification is comprised of a single global specification and a collection of state machine specifications. Each state machine specification represents a process...

Classification Schemes to Aid in the Analysis of Real-Time Systems

by Paul Z. Kolano, Richard A. Kemmerer , 2000
"... This paper presents three sets of classification schemes for processes, properties, and transitions that can be used to assist in the analysis of real-time systems. These classification schemes are discussed in the context of ASTRAL, which is a formal specification language for real-time systems. Ei ..."
Abstract - Add to MetaCart
This paper presents three sets of classification schemes for processes, properties, and transitions that can be used to assist in the analysis of real-time systems. These classification schemes are discussed in the context of ASTRAL, which is a formal specification language for real-time systems. Eight testbed systems were specified in ASTRAL, and their proofs were performed to determine proof patterns that occur most often. The specifications were then examined in an attempt to derive specific characteristics that could be used to statically identify each pattern within a specification. Once the classifications were obtained, they were then used to provide systematic guidance for analyzing real-time systems by directing the prover to the proof techniques most applicable to each proof pattern. This paper presents the set of classification schemes that were developed and discusses how they can be used to assist the proof process.
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University