Results 11 to 20 of about 580,783 (342)
Formal verification for a PMQTT protocol
The future of Internet of Things (IoT) foresees a world of interconnected people with every physical object in a seamless manner. The security related aspects for the IoT world are still an open field of discussion and research.
Eman Elemam +3 more
doaj +1 more source
FIVER – Robust Verification of Countermeasures against Fault Injections
Fault Injection Analysis is seen as a powerful attack against implementations of cryptographic algorithms. Over the last two decades, researchers proposed a plethora of countermeasures to secure such implementations.
Jan Richter-Brockmann +4 more
doaj +1 more source
Context-aware approach for formal verification
The Context-aware approach has proven to be an effective technique for software model-checking verification. It focuses on the explicit modelling of environment as one or more contexts.
Amel Benabbou +2 more
doaj +1 more source
From Event-B models to Dafny code contracts [PDF]
International audienceThe constructive approach to software correctness aims at formal modelling and verification of the structure and behaviour of a system in different levels of abstraction. In contrast, the analytical approach to software verification
C.A.R. Hoare +11 more
core +1 more source
A Specification-Based Semi-Formal Functional Verification Method by a Stage Transition Graph Model
The semi-formal verification method, in which the functionality is formally specified and the checking is undertaken through the formal model-based simulation, has been a promising choice for the functional verification of hardware designs.
Zhao Lv +3 more
doaj +1 more source
Formal Verification of a Hybrid IoT Operating System Model
The Internet of Things (IoT) is becoming an increasingly common paradigm. As IoT usage scenarios have increased, many challenges in IoT operating systems’ safety and adaptability have remained.
Yuqian Guan, Jian Guo, Qin Li
doaj +1 more source
SMACS: A framework for formal verification of complex adaptive systems
Self-adaptive systems (SASs) have the capability to evaluate and change their behavior according to changes occurring in the environment. Research in this field is being held since mid-60, and over the last decade, the importance of self-adaptivity is ...
Fakhir Ilyas +3 more
doaj +1 more source
Towards automatic Maude specifications generation from C functions
In this paper, we aim to contribute to the knowledge about how imperative C functions can be transformed to Maude functional and system modules respectively.
fateh boutekkouk
doaj +1 more source
USABILITY REQUIREMENT OF FORMAL VERIFICATION TOOLS
Formal notations employ mathematical symbols and interpretation to illustrate system elements. The formality imposed by the notations allows the accuracy and consistency of a system model to be confirmed by verification tools. Formal notations on
Rozilawati Razali, Paul Garratt
doaj +1 more source
A Modeling Strategy for the Verification of Context-Oriented Chatbot Conversational Flows via Model Checking [PDF]
Verification of chatbot conversational flows is paramount to capturing and understanding chatbot behavior and predicting problems that would cause the entire flow to be restructured from scratch.
Geovana Ramos Sousa Silva +2 more
doaj +3 more sources

