A formal software verification concept based on automated theorem proving and reverse engineering

被引:3
|
作者
Popovic, M [1 ]
Kovacevic, V [1 ]
Velikic, I [1 ]
机构
[1] Univ Novi Sad, Fac Engn, Dept Comp & Control, YU-21000 Novi Sad, Yugoslavia
来源
NINTH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOP ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS | 2002年
关键词
formal software verification; reverse engineering; predicate calculus; automated theorem proving; fault-tolerant and robust software; mission-critical embedded software;
D O I
10.1109/ECBS.2002.999823
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Formal software verification typically involves some level of static theorem proving which is a mathematical process of proving that the function computed by a program match the function specified. A theorem prover, such as THEO automates this process. On the other hand, reverse engineering is a process inverse to traditional engineering. An example is extracting software specification from its source code. Both subjects have been widely addressed in literature but there is still the need for additional research efforts in this area. In this paper we present a formal software verification concept, which is based on automated theorem proving and reverse engineering. We are mainly concerned with communications software and with software for families of communication protocols in particular. In the paper we describe how to: (i) model a group of finite state machines using predicate calculus, (ii) extract axiomatic software specification from the source code and log files, and (iii) formally veri, software for a given operational profile (set of test cases). The concept has been successfully applied to a call processing software for systems, which are installed and fully operational in Moscow and Saint Petersburg, Russia.
引用
收藏
页码:59 / 66
页数:8
相关论文
共 35 条
  • [1] On combining automated theorem proving and digital engineering for general intelligence
    Cody, Tyler
    Beling, Peter A.
    DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES VII, 2023, 12542
  • [2] Second level hypothetical inference based automated theorem proving
    Zhou Xunwei
    Bao Hong
    Proceedings of 2006 International Conference on Artificial Intelligence: 50 YEARS' ACHIEVEMENTS, FUTURE DIRECTIONS AND SOCIAL IMPACTS, 2006, : 126 - 128
  • [3] Verification of low-level crypto-protocol implementations -: Using automated theorem proving
    Jürjens, J
    THIRD ACM & IEEE INTERNATIONAL CONFERENCE ON FORMAL METHODS AND MODELS FOR CO-DESIGN, PROCEEDINGS, 2005, : 89 - 98
  • [4] An Eclipse Plugin for the Automated Reverse-Engineering of Software Programs
    Dugerdil, Philippe
    Kony, David
    Belmonte, Javier
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 284 - 289
  • [5] Formal Analysis of Galois Field Arithmetic Circuits-Parallel Verification and Reverse Engineering
    Yu, Cunxi
    Ciesielski, Maciej
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2019, 38 (02) : 354 - 365
  • [6] Reverse Engineering Software Tools Based on a Comprehension System
    Tenoyo, Bayu
    Mursanto, Petrus
    Santoso, Harry Budi
    2017 7TH WORLD ENGINEERING EDUCATION FORUM (WEEF), 2017, : 202 - 209
  • [7] RevSCA-2.0: SCA-Based Formal Verification of Nontrivial Multipliers Using Reverse Engineering and Local Vanishing Removal
    Mahzoon, Alireza
    Grosse, Daniel
    Drechsler, Rolf
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (05) : 1573 - 1586
  • [8] Automated theorem proving for many-sorted free description theory based on logic translation
    Nakamatsu, K
    Suzuki, A
    ADVANCES IN LOGIC, ARTIFICIAL INTELLIGENCE AND ROBOTICS, 2002, 85 : 17 - 28
  • [9] Extend graph based approach for reverse engineering component based software
    Zhou, B
    Wang, YF
    Yang, XH
    Proceedings of the 11th Joint International Computer Conference, 2005, : 704 - 707
  • [10] Data mining based automated reverse engineering and defect discovery
    Smith, JF
    Nguyen, TH
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2005, 2005, 5812 : 232 - 242