Doctor of PhilosophyDepartment of Computing and Information SciencesJohn M. HatcliffHigh-integrity applications are safety- and security-critical applications developed for a variety of critical tasks. The correctness of these applications must be thoroughly tested or formally verified to ensure their reliability and robustness. The major properties to be verified for the correctness of applications include: (1) functional properties, capturing the expected behaviors of a software, (2) dataflow property, tracking data dependency and preventing secret data from leaking to the public, and (3) robustness property, the ability of a program to deal with errors during execution. This dissertation presents and explores formal verification and pro...
International audienceVerification activities mandated for critical software are essential to achiev...
In today's world, critical infrastructure is often controlled by computing systems. This introduces ...
A central issue in program verification is the generation of verification conditions (VCs): proof ob...
Software is an increasingly integral and sophisticated part of safety- and mission-critical systems....
We present a link between the interactive proof assistant Isabelle/HOL and the SPARK/Ada tool suite ...
There is a strong link between software quality and software reliability. By decreasing the probabil...
Computer software is developed through software engineering. At its most precise, software engineer...
We present a case-study of developing a simple software module using contracts, and rigorously verif...
The objective of the lectures is to present type-based and logic-based mechanisms to ensure reliabil...
Many distributed systems use a minimum spanning tree (MST) as the backbone of efficient communicatio...
In this paper we describe an industrial project whose goal was the certification of the translator p...
AbstractWe present lessons learned from using mechanical theorem proving for proof support in softwa...
Existing security models require that information of a given security level be prevented from “leaki...
In our increasingly computer-oriented society, the computer programs we rely on tend to increase in ...
This paper presents a formal verification framework and tool that evaluates the robustness of softwa...
International audienceVerification activities mandated for critical software are essential to achiev...
In today's world, critical infrastructure is often controlled by computing systems. This introduces ...
A central issue in program verification is the generation of verification conditions (VCs): proof ob...
Software is an increasingly integral and sophisticated part of safety- and mission-critical systems....
We present a link between the interactive proof assistant Isabelle/HOL and the SPARK/Ada tool suite ...
There is a strong link between software quality and software reliability. By decreasing the probabil...
Computer software is developed through software engineering. At its most precise, software engineer...
We present a case-study of developing a simple software module using contracts, and rigorously verif...
The objective of the lectures is to present type-based and logic-based mechanisms to ensure reliabil...
Many distributed systems use a minimum spanning tree (MST) as the backbone of efficient communicatio...
In this paper we describe an industrial project whose goal was the certification of the translator p...
AbstractWe present lessons learned from using mechanical theorem proving for proof support in softwa...
Existing security models require that information of a given security level be prevented from “leaki...
In our increasingly computer-oriented society, the computer programs we rely on tend to increase in ...
This paper presents a formal verification framework and tool that evaluates the robustness of softwa...
International audienceVerification activities mandated for critical software are essential to achiev...
In today's world, critical infrastructure is often controlled by computing systems. This introduces ...
A central issue in program verification is the generation of verification conditions (VCs): proof ob...