Extracting Behavioral Models from Service Implementations
نویسندگان
چکیده
Formal behavioral models of software services are used as input by analysis tools which check their properties on hand of the given models. However, there is a gap between the real systems which have to be validated and their abstract models. This work proposes to bridge this gap by tools which extract behavioral models from software services implementations. The method proposed here aims at ensuring a general solution, applicable to several service technologies. The core of this solution consists of transforming the control flow graph of a communicating system into its corresponding behavioral model represented as an EFSM (Extended Finite State Machine). The extracted EFSM model can be automatically translated into an entity description in a formal security specification language for distributed systems. This will enable the use of formal analysis tools for real service implementations.
منابع مشابه
Automatic Extraction of Behavioral Models from Distributed Systems and Services
Many techniques used for discovering faults and vulnerabilities in distributed systems and services require as inputs formal behavioral models of the systems under validation. Such models are traditionally written by hand, according to the specifications which are known, leading to a gap between the real systems which have to be validated and their abstract models. A method to bridge this gap i...
متن کاملExtracting Service Process Models with Teams
This work continues our former study on extracting service process models from location data. We extend our former work for teams of professionals working in the process. A model for the teams is required in our analytics for the optimization of team based processes.
متن کاملExtracting REST resource models from procedure-oriented service interfaces
During the past decade a number of procedure-oriented protocols and standards have emerged for making service-offering systems available on the Web. The WS-∗ stack of protocols is the most prevalent example. However, this procedure and message-oriented approach has not aligned with the true potential of the Web’s own architectural principles, such as the uniform identification and manipulation ...
متن کاملVerified Cryptographic Implementations for TLS1
We intend to narrow the gap between concrete implementations of cryptographic protocols and their verified models. We develop and verify a small functional implementation of the Transport Layer Security protocol (TLS 1.0). We make use of the same executable code for interoperability testing against mainstream implementations, for automated symbolic cryptographic verification, and for automated ...
متن کاملCollective Specification and Verification of Behavioral Models and Object-oriented Implementations
We present a finite-state-machine-based language, iFSM, to seamlessly integrate the behavioral logic and implementation strategies of object-oriented applications to prevent their design and implementation from being out-of-sync. The language allows developers to focus on higher-level abstractions to support software analysis and design instead of focusing on language or architecture specific d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013