Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/784820.784841guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

From Code to Models

Published: 25 June 2001 Publication History

Abstract

One of the corner stones of formal methods is the notion that abstraction enables analysis. By the construction of an abstract model we can trade implementation detail for analytical power. The intent of a model is to preserve selected characteristics of real-world artifact, while suppressing others. Unfortunately, practitioners are less likely to use a modeling tool if it cannot handle real-world artifacts in their native format. The requirement to build a model to enable analysis is often seen as a verdict to design a system twice: once in a verification language and once in an implementation language. Because the implementation phase cannot be skipped, verification is often sacrificed. In this paper we will consider a way to avoid this problem by automating the extraction of verification models from implementation level code. The user now provides only model extraction rules, or abstractions, rather than full-scale models.

Cited By

View all
  • (2020)Automatically learning formal modelsProceedings of the 23rd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings10.1145/3417990.3421262(1-10)Online publication date: 16-Oct-2020
  • (2018)The role of model checking in software engineeringFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-016-6192-012:4(642-668)Online publication date: 1-Aug-2018
  • (2017)Using contexts to extract models from codeSoftware and Systems Modeling (SoSyM)10.1007/s10270-015-0466-016:2(523-557)Online publication date: 1-May-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
ACSD '01: Proceedings of the Second International Conference on Application of Concurrency to System Design
June 2001
ISBN:076951071X

Publisher

IEEE Computer Society

United States

Publication History

Published: 25 June 2001

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Automatically learning formal modelsProceedings of the 23rd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings10.1145/3417990.3421262(1-10)Online publication date: 16-Oct-2020
  • (2018)The role of model checking in software engineeringFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-016-6192-012:4(642-668)Online publication date: 1-Aug-2018
  • (2017)Using contexts to extract models from codeSoftware and Systems Modeling (SoSyM)10.1007/s10270-015-0466-016:2(523-557)Online publication date: 1-May-2017
  • (2011)Practical, low-effort equivalence verification of real codeProceedings of the 23rd international conference on Computer aided verification10.5555/2032305.2032360(669-685)Online publication date: 14-Jul-2011
  • (2011)Practical software model checking via dynamic interface reductionProceedings of the Twenty-Third ACM Symposium on Operating Systems Principles10.1145/2043556.2043582(265-278)Online publication date: 23-Oct-2011
  • (2009)MODISTProceedings of the 6th USENIX symposium on Networked systems design and implementation10.5555/1558977.1558992(213-228)Online publication date: 22-Apr-2009
  • (2008)KLEEProceedings of the 8th USENIX conference on Operating systems design and implementation10.5555/1855741.1855756(209-224)Online publication date: 8-Dec-2008
  • (2008)EXEACM Transactions on Information and System Security10.1145/1455518.145552212:2(1-38)Online publication date: 1-Dec-2008
  • (2006)EXPLODEProceedings of the 7th symposium on Operating systems design and implementation10.5555/1298455.1298469(131-146)Online publication date: 6-Nov-2006
  • (2006)EXEProceedings of the 13th ACM conference on Computer and communications security10.1145/1180405.1180445(322-335)Online publication date: 30-Oct-2006
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media