Automated Verification With and Without Reference Behavior
نویسندگان
چکیده
Automated verification of software built from data abstraction is rendered difficult by reference behavior both in the client code and implementation code. In the client code, object encapsulation through component development in modern programming languages remains a problem, because clients can violate the abstraction boundary by accessing object internals through aliased object references. In data abstraction implementation code, references are often explicit and verification needs to account for them. To illustrate the solutions to the problem, this paper employs a classical list reversal example. For the client side problem, the proposed solution utilizes an abstract list interface specification that, by design, avoids the need for explicit references and aliasing. For internal code based explicitly on references, such as in place list reversal, the proposed solution involves the use of a concept that captures acyclic linked structures. Both solutions rely on standard logic and are shown to be verified automatically, using the same machinery.
منابع مشابه
Face Detection with methods based on color by using Artificial Neural Network
The face Detection methodsis used in order to provide security. The mentioned methods problems are that it cannot be categorized because of the great differences and varieties in the face of individuals. In this paper, face Detection methods has been presented for overcoming upon these problems based on skin color datum. The researcher gathered a face database of 30 individuals consisting of ov...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملAlive-FP: Automated Verification of Floating Point Based Peephole Optimizations in LLVM
Peephole optimizations optimize and canonicalize code to enable other optimizations but are error-prone. Our prior research on Alive, a domain-specific language for specifying LLVM’s peephole optimizations, automatically verifies the correctness of integer-based peephole optimizations and generates C++ code for use within LLVM. This paper proposes Alive-FP, an automated verification framework f...
متن کاملAutomatic measurement of instantaneous changes in the walls of carotid artery with sequential ultrasound images
Introduction: This study presents a computerized analyzing method for detection of instantaneous changes of far and near walls of the common carotid artery in sequential ultrasound images by applying the maximum gradient algorithm. Maximum gradient was modified and some characteristics were added from the dynamic programming algorithm for our applications. Methods: The algorithm was evaluat...
متن کاملDesign and formal verification of DZMBE+
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...
متن کامل