Maintaining verified software

被引:0
作者
Leslie-Hurd, Joe [1 ]
机构
[1] Intel Corp., United States
来源
ACM SIGPLAN Notices | 2014年 / 48卷 / 12期
关键词
Dependency analysis; Formal verification; Software maintenance;
D O I
10.1145/2578854.2503787
中图分类号
学科分类号
摘要
Maintaining software in the face of evolving dependencies is a challenging problem, and in addition to good release practices there is a need for automatic dependency analysis tools to avoid errors creeping in. Verified software reveals more semantic information in the form of mechanized proofs of functional specifications, and this can be used for dependency analysis. In this paper we present a scheme for automatic dependency analysis of verified software, which for each program checks that the collection of installed libraries is sufficient to guarantee its functional correctness. We illustrate the scheme with a case study of Haskell packages verified in higher order logic. The dependency analysis reduces the burden of maintaining verified Haskell packages by automatically computing version ranges for the packages they depend on, such that any combination provides the functionality required for correct operation.
引用
收藏
页码:71 / 80
页数:9
相关论文
共 50 条
[41]   Towards verified programming of embedded devices [J].
Talpin, Jean-Pierre ;
Marty, Jean-Joseph ;
Narayan, Shravan ;
Stefan, Deian ;
Gupta, Rajesh .
2019 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2019, :1445-1450
[42]   Verified correctness and security of OpenSSL HMAC [J].
Beringer, Lennart ;
Petcher, Adam ;
Ye, Katherine Q. ;
Appel, Andrew W. .
PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, :207-221
[43]   Verified Lustre Normalization with Node Subsampling [J].
Bourke, Timothy ;
Jeanmaire, Paul ;
Pesin, Basile ;
Pouzet, Marc .
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2021, 20 (05)
[44]   A Formally Verified Mechanism for Countering SPIT [J].
Soupionis, Yannis ;
Basagiannis, Stylianos ;
Katsaros, Panagiotis ;
Gritzalis, Dimitris .
CRITICAL INFORMATION INFRASTRUCTURES SECURITY, (CRITIS 2010), 2010, 6712 :128-139
[45]   Machine-Verified Network Controllers [J].
Guha, Arjun ;
Reitblatt, Mark ;
Foster, Nate .
ACM SIGPLAN NOTICES, 2013, 48 (06) :483-494
[46]   Towards a Dynabook for verified VM construction [J].
Shingarov, Boris ;
Vrany, Jan .
JOURNAL OF COMPUTER LANGUAGES, 2024, 80
[47]   TRX: A FORMALLY VERIFIED PARSER INTERPRETER [J].
Koprowski, Adam ;
Binsztok, Henri .
LOGICAL METHODS IN COMPUTER SCIENCE, 2011, 7 (02)
[48]   A Verified Compiler for a Functional Tensor Language [J].
Liu, Amanda ;
Bernstein, Gilbert ;
Chlipala, Adam ;
Ragan-Kelley, Jonathan .
PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2024, 8 (PLDI)
[49]   A Mechanically Verified Garbage Collector for OCamlA Mechanically Verified Garbage Collector for OCamlS. Shamsu et al. [J].
Sheera Shamsu ;
Dipesh Kafle ;
Dhruv Maroo ;
Kartik Nagar ;
Karthikeyan Bhargavan ;
KC Sivaramakrishnan .
Journal of Automated Reasoning, 2025, 69 (2)
[50]   Towards a verified Lustre compiler with modular reset [J].
Bourke, Timothy ;
Brun, Lelio ;
Pouzet, Marc .
SCOPES '18: PROCEEDINGS OF THE 21ST INTERNATIONAL WORKSHOP ON SOFTWARE AND COMPILERS FOR EMBEDDED SYSTEMS, 2018, :14-17