Showing 1 - 20 results of 27 for search '"formal verification"', query time: 0.07s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Formal Verification of Nonfunctional Requirements of Overall Instrumentation and Control Architectures by Polina Ovsiannikova, Antti Pakonen, Dmitry Muromsky, Maksim Kobzev, Viktor Dubinin, Valeriy Vyatkin

    Published 2024-01-01
    “…In this article, we focus on the latter and use formal verification methods to reason about the correctness of an I&C architecture represented with an ontology, using the example of a nuclear power plant design. …”
    Get full text
    Article
  5. 5
  6. 6

    Formal Verification Method for Configuration of Integrated Modular Avionics System Using MARTE by Lisong Wang, Miaofang Chen, Jun Hu

    Published 2018-01-01
    “…Then we present a formal verification framework for ARINC653 system configuration based on theorem proof techniques, including construction of corresponding REAL theorems according to the semantics of those key components of configuration information and formal verification of theorems for the properties of IMA, such as time constraints, spatial isolation, and health monitoring. …”
    Get full text
    Article
  7. 7

    Formal Verification of Multi-Thread Minimax Behavior Using mCRL2 in the Connect 4 by Diego Escobar, Jesus Insuasti

    Published 2024-12-01
    “…This study focuses on the formal verification of a parallel version of the minimax algorithm using the mCRL2 modeling language, applied to the game of Connect 4. …”
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Research on formal description and verification of automated trust negotiation by GUAN Shang-yuan 1, WU Wei-guo 1, DONG Xiao-she 1, QIAN De-pei1

    Published 2011-01-01
    “…First,a unified ATN formal framework was presented,into which typical negotiation strategies could be reduced.Second,the formal verification of ATN was defined based on the formal framework.The objectives and procedures of the formal verification of ATN were described.Third,several typical negotiation strategies were discussed,and the computational complexity of the corresponding verification problems was shown,several conclusions had been obtained.Last,the formal verification of ATN was implemented by using logic programming and model checking methods.The experimental results show that the number of rules is a crucial factor in determining the runtime.Both logic programming and model checking are efficient when the number of transition rules is small,and logic programming does not scale as well as model checking.…”
    Get full text
    Article
  15. 15

    Survey on model checking based hardware Trojan detection technology by Qizhi ZHANG, Yiqiang ZHAO, Ya GAO, Haocheng MA

    Published 2021-04-01
    “…Hardware Trojan is malicious tampering to the original circuit, which has become the most important security threat of integrated circuit.In order to ensure the safety and reliability of ICs, many hardware Trojan detection methods are proposed.As one of the formal verification methods, model checking can effectively detect the hardware Trojan in the design phase.Firstly, the working principle and process of model checking were described.Secondly, the research progress of hardware Trojan detection technology based on model checking was introduced.Finally, the bottlenecks faced by the current technology were pointed out and the potential research direction was discussed.…”
    Get full text
    Article
  16. 16

    Formalization of Linear Space Theory in the Higher-Order Logic Proving System by Jie Zhang, Danwen Mao, Yong Guan

    Published 2013-01-01
    “…Theorem proving is an important approach in formal verification. Higher-order logic is a form of predicate logic that is distinguished from first-order logic by additional quantifiers and stronger semantics. …”
    Get full text
    Article
  17. 17

    Probabilistic Model Checking: One Step Forward in Wireless Sensor Networks Simulation by José A. Mateo, Hermenegilda Macià, M. Carmen Ruiz, Javier Calleja, Fernando Royo

    Published 2015-05-01
    “…Thus, all the benefits of formal verification and simulation are gathered. These correctness properties as well as practical and relevant scenarios for the real world have agreed with the algorithm designers.…”
    Get full text
    Article
  18. 18

    Research on verification of behavior requirement patterns based on action sequences by DU Jun-wei1, XU Zhong-wei2, JIANG Feng1

    Published 2011-01-01
    “…Function behavior requirements(FBR) and safety behavior requirements(SBR) were described by action se-quences.Compared with the traditional logic or graphic form,action sequences can express the temporal relationship among interactive behaviors more exactly.Moreover,FBR pattern and SBR pattern are constructed by action sequences,and the operation semantics of these patterns are also given.To implement the requirement verification based on behavior patterns,the necessary and sufficient conditions as well as the checking algorithm for the satisfiability of FBR pattern and SBR pattern are presented and proven by redefining the property expression and combination operation of LTS’s safety and liveness.The framework has been widely applied in the formal verification & validation of component-based CTCS2/3 systems,and has shown great theoretical and practical significance to combinational verification of Compo-nent-based safety-critical systems.…”
    Get full text
    Article
  19. 19

    Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X by Yinghui ZHANG, Jiale QIAN, Jin CAO, Dong ZHENG

    Published 2023-08-01
    “…Aiming at the efficiency issue of handover authentication for a large number of vehicles in the 5G-V2X scenario, a secure and efficient group handover authentication protocol based on trajectory prediction was proposed.Firstly, the effect of completing key agreement protocol in advance was achieved by predicting vehicle trajectories.Secondly, vehicles with mobility relevance were treated as the same group through user grouping algorithms, and then all vehicles within the group were batch verified using certificateless aggregation signature technology.In addition, to address the vulnerability of aggregated signature technology to DoS attacks, a binary search method was used to quickly locate malicious users and improve the efficiency of group handover authentication protocol.Finally, the security analysis of the protocol was conducted using the formal verification tool Scyther, and compared with the existing optimal protocol, the computational efficiency is improved by 30%.…”
    Get full text
    Article
  20. 20

    Research on Access Authentication and Re-Authentication Mechanism of User Devices in Terrestrial Default Scenario in Satellite Internet by Qiuyu BU, Jin CAO, Lifu CHENG, Ruhui MA, Hui LI

    Published 2023-06-01
    “…For the current user device access authentication mechanism requires ground participation to bring about large communication delays and poor scalability, a user device access authentication and re-authentication protocol in the ground default scenario in the space-ground integrated network was proposed, and further for the user device authentication process may occur in the power outage reconnection and AV asynchronization and other problems, a user device fast authentication mechanism and AV fast security synchronization mechanism under power failure reconnection scenario were proposed to ensured that users could safely accessed the satellite network and obtain related services.In the proposed scheme, the AV vector generated in the initial access authentication was used to assisted the re-authentication process to completed the authentication between entities without the involvement of the network control center, which guaranteed the communication system resilience.The formal verification tool Scyther showed that the proposed protocol was resistant to common protocol attacks, guaranteed the confidentiality and integrity of the communication process, and had a small signaling, computational, and bandwidth overhead, made it suitable for the satellite internet.…”
    Get full text
    Article