Ransomware steals your phone. formal methods rescue it

F Mercaldo, V Nardone, A Santone… - … 2016, Held as Part of the …, 2016 - Springer
Ransomware is a recent type of malware which makes inaccessible the files or the device of
the victim. The only way to unlock the infected device or to have the keys for decrypting the …

10 years of research on debugging concurrent and multicore software: A systematic mapping study

S Abbaspour Asadollah, D Sundmark, S Eldh… - Software quality …, 2017 - Springer
Debugging—the process of identifying, localizing and fixing bugs—is a key activity in
software development. Due to issues such as non-determinism and difficulties of …

A heuristic solution for model checking graph transformation systems

R Yousefian, V Rafe, M Rahmani - Applied Soft Computing, 2014 - Elsevier
One of the commonly used techniques to verify software and hardware systems which have
been specified through graph transformation system (GTS), especially safety critical ones, is …

Deadlock detection in complex software systems specified through graph transformation using Bayesian optimization algorithm

E Pira, V Rafe, A Nikanjam - Journal of Systems and Software, 2017 - Elsevier
While developing concurrent systems, one of the important properties to be checked is
deadlock freedom. Model checking is an accurate technique to detect errors, such as …

Hey malware, i can find you!

F Mercaldo, V Nardone, A Santone… - 2016 IEEE 25th …, 2016 - ieeexplore.ieee.org
Android smartphones are the most widespread in the world. This is the reason why attackers
write code more and more aggressive in order to steal data and other important information …

EMCDM: Efficient model checking by data mining for verification of complex software systems specified through architectural styles

E Pira, V Rafe, A Nikanjam - Applied Soft Computing, 2016 - Elsevier
Software architectural style is one of the best concepts to define a family of related
architectures and their common properties. Despite the essential role of software …

A meta-heuristic solution for automated refutation of complex software systems specified through graph transformations

V Rafe, M Moradi, R Yousefian, A Nikanjam - Applied Soft Computing, 2015 - Elsevier
One of the best approaches for verifying software systems (especially safety critical systems)
is the model checking in which all reachable states are generated from an initial state. All of …

Grease: a tool for efficient “nonequivalence” checking

N Francesco, G Lettieri, A Santone… - ACM Transactions on …, 2014 - dl.acm.org
Equivalence checking plays a crucial role in formal verification to ensure the correctness of
concurrent systems. However, this method cannot be scaled as easily with the increasing …

Using evolutionary algorithms for reachability analysis of complex software systems specified through graph transformation

E Pira, V Rafe, A Nikanjam - Reliability Engineering & System Safety, 2019 - Elsevier
Assessing the reliability of safety-critical systems is an important and challenging task
because even a minor failure in these systems may result in catastrophic consequences, like …

A hybrid meta-heuristic approach to cope with state space explosion in model checking technique for deadlock freeness

N Rezaee, H Momeni - Journal of AI and Data Mining, 2020 - jad.shahroodut.ac.ir
Model checking is an automatic technique for software verification through which all
reachable states are generated from an initial state to finding errors and desirable patterns …