By Topic

2013 1st FME Workshop on Formal Methods in Software Engineering (FormaliSE)

25-25 May 2013

Filter Results

Displaying Results 1 - 13 of 13
  • [Front cover]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • FME workshop on Formal Methods in Software Engineering FormaliSE 2013

    Publication Year: 2013, Page(s):iii - iv
    Request permission for commercial reuse | PDF file iconPDF (113 KB) | HTML iconHTML
    Freely Available from IEEE
  • Though this be madness, yet there is method in it? (Keynote)

    Publication Year: 2013, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (658 KB) | HTML iconHTML

    After decades of research, and despite significant advancement, formal methods are still not widely used in industrial software development. Industry practitioners believe that the methods and tools coming out of academia are, to a large extent, irrelevant and ineffective in tackling real-life projects. They are difficult to use, esoteric, and do not scale (at all). This paper reflects more than t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Do you speak Z? Formal methods under the perspective of a cross-cultural adaptation problem

    Publication Year: 2013, Page(s):8 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (521 KB) | HTML iconHTML

    The use of formal specifications seems to be a silver bullet in a world where technical systems become more and more software intensive and where quality considerations become increasingly important. However, formal methods and the use of formal specifications are by far not so widespread as they should and could be. This position paper argues that a broader view onto this situation can be very he... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Functional SMT solving with Z3 and racket

    Publication Year: 2013, Page(s):15 - 21
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    Satisfiability Modulo Theories (SMT) solvers are powerful tools that can quickly solve complex constraints involving Booleans, integers, first-order logic predicates, lists, and other data types. They have a vast number of potential applications, from constraint solving to program analysis and verification. However, they are so complex to use that their power is inaccessible to all but experts in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trace based reachability verification for statecharts

    Publication Year: 2013, Page(s):22 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    Statecharts are widely used to model the behavior of reactive systems. While this visual formalism makes modeling easier, the state of the art in verification of statechart specifications is far from satisfactory due to the state explosion problem. We present History ion, a trace-based verification technique to address this problem. Given a set of traces in a statechart model, the model is abstrac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An integrated data model verifier with property templates

    Publication Year: 2013, Page(s):29 - 35
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (355 KB) | HTML iconHTML

    Most modern web applications are built using development frameworks based on the Model-View-Controller (MVC) pattern. In MVC-based web applications the data model specifies the types of objects used by the application and the relations among them. Since the data model forms the foundation of such applications, its correctness is crucial. In this paper we present a tool, IDAVER, that 1) automatical... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a formalism-based toolkit for automotive applications

    Publication Year: 2013, Page(s):36 - 42
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    The success of a number of projects has been shown to be significantly improved by the use of a formalism. However, there remains an open issue: to what extent can a development process based on a singular formal notation and method succeed. The majority of approaches demonstrate a low level of flexibility by attempting to use a single notation to express all of the different aspects encountered i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recommendations for improving the usability of formal methods for product lines

    Publication Year: 2013, Page(s):43 - 49
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (146 KB) | HTML iconHTML

    While there may be general agreement on what it means for a formal method to be usable (e.g., ease of modelling, automated and scalable analysis), there is no consensus in the software-engineering or formal-methods communities on what strategies lead to more usable formalisms. In this paper, we aim to raise discussion around such strategies by proposing fourteen concrete recommendations for achiev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lightweight formal models of software weaknesses

    Publication Year: 2013, Page(s):50 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (522 KB) | HTML iconHTML

    Many vulnerabilities in today's software products are rehashes of past vulnerabilities. Such rehashes could be a result of software complexity that masks inadvertent loopholes in design and implementation, developer ignorance/disregard for security issues, or use of software in contexts not anticipated for the original specification. While weaknesses and exposures in code are vendor, language, or ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic validation of infinite real-time systems

    Publication Year: 2013, Page(s):57 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (567 KB) | HTML iconHTML

    In safety-critical areas, complete and machine-assisted verification techniques for infinite real-time systems are required to ensure their correctness in all cases and to cope with their complexity. Previously, we presented a theorem prover-based comprehensive and compositional verification approach using the Timed CSP process calculus to model and verify possibly infinite real-time systems. Howe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for the rigorous design of highly adaptive timed systems

    Publication Year: 2013, Page(s):64 - 70
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    Adaptive systems can be regarded as a set of static programs and transitions between these programs. These transitions allow the system to adapt its behaviour in response to unexpected changes in its environment. Modelling highly dynamic systems is cumbersome, as these may go through a large number of adaptations. Moreover, often they must also satisfy real-time requirements whereas adaptations ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.