Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- demonstrationNovember 2007
UMLtoCSP: a tool for the formal verification of UML/OCL models using constraint programming
ASE '07: Proceedings of the 22nd IEEE/ACM International Conference on Automated Software EngineeringPages 547–548https://doi.org/10.1145/1321631.1321737We present UMLtoCSP, a tool for the formal verification of UML/OCL models. Given a UML class diagram annotated with OCL constraints, UMLtoCSP is able to automatically check several correctness properties, such as the strong and weak satisfiability of ...
- demonstrationNovember 2007
Tools for model-based security engineering: models vs. code
ASE '07: Proceedings of the 22nd IEEE/ACM International Conference on Automated Software EngineeringPages 545–546https://doi.org/10.1145/1321631.1321736We present tools to support model-based security engineering at both the model and the code level. In the approach supported by these tools, one firstly specifies the security-critical part of the system (e.g. a crypto protocol) using the UML security ...
- demonstrationNovember 2007
The eureka tool for software model checking
ASE '07: Proceedings of the 22nd IEEE/ACM International Conference on Automated Software EngineeringPages 541–542https://doi.org/10.1145/1321631.1321734We describe EUREKA, a symbolic model checker for Linear Programs with arrays, i.e. programs where variables and array elements range over a numeric domain and expressions involve linear combinations of variables and array elements. This language ...
- posterNovember 2007
Verifying C++ with STL containers via predicate abstraction
ASE '07: Proceedings of the 22nd IEEE/ACM International Conference on Automated Software EngineeringPages 521–524https://doi.org/10.1145/1321631.1321724This paper describes a flexible and easily extensible predicate abstraction-based approach to the verification of STLusage, and observes the advantages of verifying programsin terms of high-level data structures rather than low-level pointer ...
- posterNovember 2007
Model checking concurrent linux device drivers
ASE '07: Proceedings of the 22nd IEEE/ACM International Conference on Automated Software EngineeringPages 501–504https://doi.org/10.1145/1321631.1321719The S<scp>lam</scp> toolkit demonstrates that predicate abstraction enables automated verification of real world Windows device drivers. Our predicate abstraction-based tool DDV<scp>erify</scp>enables the automated verification of Linux device drivers ...
- research-articleNovember 2007
Testing concurrent programs using value schedules
ASE '07: Proceedings of the 22nd IEEE/ACM International Conference on Automated Software EngineeringPages 313–322https://doi.org/10.1145/1321631.1321678Concurrent programs are difficult to debug and verify because of the nondeterministic nature of concurrent executions. A particular concurrency-related bug may only show up under certain rarely-executed thread interleavings. Therefore, commonly used ...
- research-articleNovember 2007
Pallino: automation to support regression test selection for cots-based applications
ASE '07: Proceedings of the 22nd IEEE/ACM International Conference on Automated Software EngineeringPages 224–233https://doi.org/10.1145/1321631.1321665Software products are often built from commercial-off-the-shelf (COTS) components. When new releases of these components are made available for integration and testing, source code is usually not provided by the vendors. Various regression test ...
- research-articleNovember 2007
Context-aware statistical debugging: from bug predictors to faulty control flow paths
ASE '07: Proceedings of the 22nd IEEE/ACM International Conference on Automated Software EngineeringPages 184–193https://doi.org/10.1145/1321631.1321660Effective bug localization is important for realizing automated debugging. One attractive approach is to apply statistical techniques on a collection of evaluation profiles of program properties to help localize bugs. Previous research has proposed ...
- research-articleNovember 2007
Sequential circuits for program analysis
ASE '07: Proceedings of the 22nd IEEE/ACM International Conference on Automated Software EngineeringPages 114–123https://doi.org/10.1145/1321631.1321650A number of researchers have proposed the use of Boolean satisfiability solvers for verifying C programs. They encode correctness checks as Boolean formulas using finitization: loops and recursion are bounded, as is the size of the input instances. The ...
- research-articleNovember 2007
Ensuring consistency in long running transactions
ASE '07: Proceedings of the 22nd IEEE/ACM International Conference on Automated Software EngineeringPages 54–63https://doi.org/10.1145/1321631.1321642Flow composition languages permit the construction of long-running transactions from collections of independent atomic services. Due to environmental limitations, such transactions usually cannot be made to conform to standard ACID semantics. We propose ...
- research-articleNovember 2007
Diconic addition of failsafe fault-tolerance
ASE '07: Proceedings of the 22nd IEEE/ACM International Conference on Automated Software EngineeringPages 44–53https://doi.org/10.1145/1321631.1321641We present a divide-and-conquer method, called DiConic, for automatic addition of failsafe fault-tolerance to distributed programs, where a failsafe program guarantees to meet its safety specification even when faults occur. Specifically, instead of ...