-
21
Analysis and improvement for authentication protocols of mobile ad hoc network with CSP approach
Published 2013-08-01“…An approach based on the communicating sequential process (CSP) and Model Checking tool FDR was proposed to model and verify a typical authentication protocol of MANET, callced TAM. …”
Get full text
Article -
22
Digital rule-based compliance processes. The urban regeneration of ex-Corradini, Naples (IT)
Published 2021-12-01“…The application of BIM-based procedures in the early design process stage becomes an opportunity to develop a multi-scenario approach, which employs Code and Model Checking systems as ‘heuristic’ tools to support decisions and enhancing risk management in complex projects.…”
Get full text
Article -
23
Automatic Analysis of Complex Interactions in Microservice Systems
Published 2020-01-01“…In this paper, we propose an approach for interaction analysis using model checking techniques, which is supported by the Process Analysis Toolkit (PAT) tool. …”
Get full text
Article -
24
Dilemma of Responsibility-Sensitive Safety in Longitudinal Mixed Autonomous Vehicles Flow: A Human-Driver-Error-Tolerant Driving Strategy
Published 2024-01-01“…Responsibility sensitive safety (RSS) is proposed to serve as a model checking tool for AV safety. However, RSS alone cannot guarantee safety when they are mixed with human-driven vehicles (HDVs). …”
Get full text
Article -
25
State-of-the-art survey of smart contract verification based on formal methods
Published 2022-08-01“…Smart contract represents an essential application scenario of blockchain technology.Smart contract technology improves programmability and scalability of blockchain, and has broad development prospects.However, a series of security incidents caused a great number of economic losses and weakened users’ confidence in the Ethereum platform.The security of smart contract has become a critical problem that restricts the further development of smart contract.Defects in smart contract code may cause serious consequences and cannot be modified once deployed, it is especially important to verify the correctness of smart contract in advance.In recent years, researchers have obtained many achievements in verification of smart contract, but there is a lack of systematic summary of these research results.Therefore, some basic principles of Ethereum were introduced, including the transaction, gas mechanism, storage and programming language.Eight common types of vulnerabilities in smart contract were summarized and their causes were explained.Some real security events were reviewed and some examples of vulnerability codes were presented.Then, the research work on automatic verification of smart contract based on symbolic execution, model checking and theorem proving was classified and summarized.Three open-source automated tools were selected, including Mythril, Slither and Oyente.And experiments were implemented to evaluate and compare the three tools from the aspects of efficiency, accuracy and the types of vulnerability can be detected.Furthermore, related review articles were surveyed, and the advantages of this paper compared with these works were summarized.The critical problems in the vulnerability detection technology of smart contract were also summarized and the direction of future research was proposed at last.…”
Get full text
Article -
26
A Framework for the Generation of Monitor and Plant Model From Event Logs Using Process Mining for Formal Verification of Event-Driven Systems
Published 2024-01-01“…The plant model and controller are connected in a closed loop and are used for the formal verification of the system with the help of the “fb2smv” converter and symbolic model checking tool NuSMV.…”
Get full text
Article -
27
Research on Operation Characteristics and Safety Risk Forecast of Bus Driven by Multisource Forewarning Data
Published 2020-01-01“…To prevent and control public transport safety accidents in advance and guide the safety management and decision-making optimization of public transport vehicles, based on the forewarning and other multisource data of public transport vehicles in Zhenjiang, holographic portraits of public transport safety operation characteristics are constructed from the perspectives of time, space, and driver factors, and a prediction model of fatigue driving and driving risk of bus drivers based on BP neural network is constructed. Finally, model checking and virtual simulation experiments are carried out. …”
Get full text
Article