Maintaining verified software

被引:0
作者
Leslie-Hurd, Joe [1 ]
机构
[1] Intel Corp., United States
来源
ACM SIGPLAN Notices | 2014年 / 48卷 / 12期
关键词
Dependency analysis; Formal verification; Software maintenance;
D O I
10.1145/2578854.2503787
中图分类号
学科分类号
摘要
Maintaining software in the face of evolving dependencies is a challenging problem, and in addition to good release practices there is a need for automatic dependency analysis tools to avoid errors creeping in. Verified software reveals more semantic information in the form of mechanized proofs of functional specifications, and this can be used for dependency analysis. In this paper we present a scheme for automatic dependency analysis of verified software, which for each program checks that the collection of installed libraries is sufficient to guarantee its functional correctness. We illustrate the scheme with a case study of Haskell packages verified in higher order logic. The dependency analysis reduces the burden of maintaining verified Haskell packages by automatically computing version ranges for the packages they depend on, such that any combination provides the functionality required for correct operation.
引用
收藏
页码:71 / 80
页数:9
相关论文
共 50 条
[31]   Verified Foundations for Differential Privacy [J].
de Medeiros, Markus ;
Naveed, Muhammad ;
Lepoint, Tancrede ;
Kahsai, Temesghen ;
Ravitch, Tristan ;
Zetzsche, Stefan ;
Joshi, Anjali ;
Tassarotti, Joseph ;
Albarghouthi, Aws ;
Tristan, Jean-Baptiste .
PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2025, 9 (PLDI)
[32]   A Verified Optimizer for Quantum Circuits [J].
Hietala, Kesha ;
Rand, Robert ;
Hung, Shih-Han ;
Wu, Xiaodi ;
Hicks, Michael .
PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2021, 5 (POPL)
[33]   A Verified Information-Flow Architecture [J].
de Amorim, Arthur Azevedo ;
Collins, Nathan ;
DeHon, Andre ;
Demange, Delphine ;
Hritcu, Catalin ;
Pichardie, David ;
Pierce, Benjamin C. ;
Pollack, Randy ;
Tolmach, Andrew .
ACM SIGPLAN NOTICES, 2014, 49 (01) :165-178
[34]   From Formal Specification to Verified Implementation [J].
Hocking, Ashlie B. ;
Di Vito, Ben L. ;
Rowanhill, Jonathan C. .
2024 AIAA DATC/IEEE 43RD DIGITAL AVIONICS SYSTEMS CONFERENCE, DASC, 2024,
[35]   A Verified Implementation of the DPLL Algorithm in Dafny [J].
Andrici, Cezar-Constantin ;
Ciobaca, Stefan .
MATHEMATICS, 2022, 10 (13)
[36]   A Mechanically Verified Garbage Collector for OCaml [J].
Shamsu, Sheera ;
Kafle, Dipesh ;
Maroo, Dhruv ;
Nagar, Kartik ;
Bhargavan, Karthikeyan ;
Sivaramakrishnan, Kc .
JOURNAL OF AUTOMATED REASONING, 2025, 69 (02)
[37]   Verified Programs for Frequent Itemset Mining [J].
Loulergue, Frederic ;
Whitney, Christopher D. .
2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, :1516-1523
[38]   Verified iptables Firewall Analysis and Verification [J].
Diekmann, Cornelius ;
Hupel, Lars ;
Michaelis, Julius ;
Haslbeck, Maximilian ;
Carle, Georg .
JOURNAL OF AUTOMATED REASONING, 2018, 61 (1-4) :191-242
[39]   Verified iptables Firewall Analysis and Verification [J].
Cornelius Diekmann ;
Lars Hupel ;
Julius Michaelis ;
Maximilian Haslbeck ;
Georg Carle .
Journal of Automated Reasoning, 2018, 61 :191-242
[40]   A verified information-flow architecture [J].
de Amorim, Arthur Azevedo ;
Collins, Nathan ;
DeHon, Andre ;
Demange, Delphine ;
Hritcu, Catalin ;
Pichardie, David ;
Pierce, Benjamin C. ;
Pollack, Randy ;
Tolmach, Andrew .
JOURNAL OF COMPUTER SECURITY, 2016, 24 (06) :689-734