Dependable Software through Higher-order Strategic Programming
نویسندگان
چکیده
Program transformation is a restricted form of software construction that can be amenable to formal verification. When successful, the nature of the evidence provided by such a verification is considered strong and can constitute a major component of an argument that a high-consequence or safety-critical system meets its dependability requirements. This article explores the application of novel higher-order strategic programming techniques to the development of a portion of a class loader for a restricted implementation of the Java Virtual Machine (JVM). The implementation is called the SSP and is intended for use in high-consequence safety-critical embedded systems. Verification of the strategic program using ACL2 is also discussed.
منابع مشابه
Higher-order strategic programming: A road to software assurance
Program transformation through the repeated application of simple rewrite rules is conducive to formal verification. In practice, program transformation oftentimes requires data to be moved throughout the program structure. This article explores the use of higher-order rewrite rules as the mechanism for accomplishing such data movement. The effectiveness of higher-order rewrite rules is demonst...
متن کاملDéveloppement d'applications logicielles sûres de fonctionnement : une approche dirigée par la conception. (Development of dependable applications: a design-driven approach)
development of dependable applications: a design-driven approach In many domains such as avionics, medecine or home automation, software applications play an increasingly important role that can even be critical for their environment. In order to trust these applications, their development is contrained by dependability requirements. Indeed, it is necessary to demonstrate that these high-level ...
متن کاملImplementing Software Replication Through CORBA Interceptors: Lessons Learned
The Common Object Request Broker Architecture (CORBA) currently does not provide any speci c support for software replication, a core aspect of reliable and dependable distributed applications. In this paper we discuss the use of CORBA interceptors, introduced by the Object Management Group in the CORBA 2.2 speci cation, as a basic building block for handling object replication. More speci call...
متن کاملAn Approach to Dependable Embedded Software Development State of The Art and Concept of Doctoral Thesis
Developing a dependable software is a challenging problem. Dependability requirements are emphasized in the world of embedded systems that may be safety critical. This report summarizes state of the art of techniques suitable for dependable embedded software development: static type analysis, testing, simulation, formal methods. Software engineering techniques such as aspect oriented programmin...
متن کاملDependable Software
Achieving software reliability takes many complementary techniques, directed at the process or at the products. This survey summarizes some of the most fruitful ideas. Cite as follows: Bertrand Meyer, Dependable Software, to appear in Dependable Systems: Software, Computing, Networks, eds. Jürg Kohlas, Bertrand Meyer, André Schiper, Lecture Notes in Computer Science, Springer-Verlag, 2006.
متن کامل