Model-Based Verification: A Technology for Dependable Upgrade
نویسندگان
چکیده
v Acknowledgements vii Executive Summary ix 1 Background and Introduction 1 1.1 Goals of Model-Based Verification Efforts 1 1.2 Structure and Content of the Report 2 2 Model-Based Verification 3 2.1 The Model-Based Verification Paradigm 3 2.2 Context and Related Work 6 2.3 Model-Based Verification in Software Upgrades 6 3 Technical Aspects of Model-Based Verification 9 3.1 Models 9 3.2 Formalism in Modeling 10 3.3 Formal Methods for Verification 11 3.4 Formal Methods and Essential Models 11 3.4.1 Formalism 12 3.4.2 Abstraction 12 3.4.3 Perspective 13 3.4.4 Scope 13 3.5 Model-Based Verification Techniques 13 4 Model Checking 15 4.1 State Machines in Model Checking 15 4.2 Model-Checking Successes 16 4.2.1 IEEE Futurebus+ 16 4.2.2 Protocol Verification 17 4.2.3 Chip Set Design Checking 18 4.2.4 PowerPC 620 Microprocessor 18 4.2.5 Fujitsu Communications Chip 19
منابع مشابه
Model-Based Verification: A Technology for Dependable System Upgrade
v Acknowledgements vii Executive Summary ix 1 Background and Introduction 1 1.1 Goals of Model-Based Verification Efforts 1 1.2 Structure and Content of the Report 2 2 Model-Based Verification 3 2.1 The Model-Based Verification Paradigm 3 2.2 Context and Related Work 6 2.3 Model-Based Verification in Software Upgrades 6 3 Technical Aspects of Model-Based Verification 9 3.1 Models 9 3.2 Formalis...
متن کاملAnalysis of Intent Specification and System
The impact of computer programs in safety-critical systems has increased in the past decades and computer-based systems can now be found in a wide range of applications. A new approach for developing dependable systems is documenting all design rationale that affects safety using Intent Specifications. A recent approach for developing complex systems efficiently and in an upgradeable manner is ...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملWhy Do Upgrades Fail And What Can We Do About It? Toward Dependable, Online Upgrades in Enterprise System
Enterprise-system upgrades are unreliable and often produce downtime or data-loss. Errors in the upgrade procedure, such as broken dependencies, constitute the leading cause of upgrade failures. We propose a novel upgrade-centric fault model, based on data from three independent sources, which focuses on the impact of procedural errors rather than software defects. We show that current approach...
متن کاملWhy Do Upgrades Fail and What Can We Do about It? Toward Dependable, Online Upgrades in Enterprise Systems
Enterprise-system upgrades are unreliable and often produce downtime or data-loss. Errors in the upgrade procedure, such as broken dependencies, constitute the leading cause of upgrade failures. We propose a novel upgradecentric fault model, based on data from three independent sources, which focuses on the impact of procedural errors rather than software defects. We show that current approache...
متن کامل