Formal methods: Practice and experience

J Woodcock, PG Larsen, J Bicarregui… - ACM computing surveys …, 2009 - dl.acm.org
Formal methods use mathematical models for analysis and verification at any part of the
program life-cycle. We describe the state of the art in the industrial use of formal methods …

Maintaining consistency of data in mobile distributed environments

E Pitoura, B Bhargava - Proceedings of 15th International …, 1995 - ieeexplore.ieee.org
To deal with the frequent, foreseeable and variable disconnections that occur in a mobile
environment, we introduce a flexible, two-level consistency model. Semantically related or …

Evaluating the suitability of state‐based formal methods for industrial deployment

A Mashkoor, F Kossak, A Egyed - Software: Practice and …, 2018 - Wiley Online Library
After a number of success stories in safety‐critical domains, we are starting to witness
applications of formal methods in contemporary systems and software engineering …

Using formal reasoning on a model of tasks for FreeRTOS

S Cheng, J Woodcock, D D'souza - Formal Aspects of Computing, 2015 - Springer
FreeRTOS is an open-source real-time microkernel that has a wide community of users. We
present the formal specification of the behaviour of the task part of FreeRTOS that deals with …

Formal methods for security in the Xenon hypervisor

L Freitas, J McDermott - International journal on software tools for …, 2011 - Springer
This paper reports on the Xenon project's use of formal methods. Xenon is a higher-
assurance secure hypervisor based on re-engineering the Xen open-source hypervisor. The …

A Study of the Electrum and DynAlloy Dynamic Behavior Notations

C Cornejo, GE Regis, N Aguirre… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Alloy is a formal specification language, which despite featuring a simple syntax and
relational semantics, is very expressive and supports efficient automated specification …

POSIX and the verification grand challenge: A roadmap

L Freitas, J Woodcock… - 13th IEEE International …, 2008 - ieeexplore.ieee.org
We present a research roadmap for the second pilot project in the Verified Software Grand
Challenge on formally verified POSIX file stores. The work is inspired by the requirements for …

Proof score approach to analysis of electronic commerce protocols

K Ogata, K Futatsugi - International Journal of Software Engineering …, 2010 - World Scientific
Proof scores are documents of comprehensible plans to prove theorems. The proof score
approach to systems analysis is a method in which proof scores are used to verify that …

Contactless payments: usability at the cost of security?

MJ Emms - 2016 - theses.ncl.ac.uk
EMV (Europay, MasterCard, Visa), commonly termed “Chip & PIN”, is becoming the
dominant card based payment technology globally. The EMV Chip & PIN transaction …

A formal security policy for xenon

J McDermott, L Freitas - Proceedings of the 6th ACM workshop on …, 2008 - dl.acm.org
The up-front choice of security policy and formalism used to model it is critical to the success
of projects that seek to enforce information-flow security. This paper reports on the Xenon …