2009 IEEE/IFIP International Conference on Dependable Systems &Amp; Networks 2009
DOI: 10.1109/dsn.2009.5270355
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting refactoring in formal verification

Abstract: In previous work, we introduced

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(13 citation statements)
references
References 8 publications
0
13
0
Order By: Relevance
“…The manual annotation of AES with sufficient invariants to admit machine-checked full formal verification was a significant undertaking involving hours of tool-assisted manual effort [25], [26]. Annotating pre-and postconditions and loop invariants has not been solved in general and is known to be a key bottleneck in approaches based on axiomatic semantics [27].…”
Section: B Results Qualitymentioning
confidence: 99%
See 1 more Smart Citation
“…The manual annotation of AES with sufficient invariants to admit machine-checked full formal verification was a significant undertaking involving hours of tool-assisted manual effort [25], [26]. Annotating pre-and postconditions and loop invariants has not been solved in general and is known to be a key bottleneck in approaches based on axiomatic semantics [27].…”
Section: B Results Qualitymentioning
confidence: 99%
“…The second benchmark, AES , is an annotated AES implementation from Yin et al [25]. It exemplifies a realworld security-critical application and contains nontrivial array invariants.…”
Section: A Programsmentioning
confidence: 99%
“…Other possibilities for integrating sound program analysis techniques into unsound approaches for program repair include automatically generating proofs for repairs in the context of proof carrying code (Necula 1997), or automatically mutating code in a semantics-preserving way with a goal of simplifying automatic verification (because equisatisfiable verification conditions are not always equally easy to discharge) (Yin et al 2009). These potential applications could lead to higher-quality repairs as well as repairs that are easier for humans to validate and trust.…”
Section: Combining Unsound Repair Algorithms and Formal Methodsmentioning
confidence: 99%
“…While this and other works, e.g. Garrido & Meseguer (2006), Carvalho Júnior et al (2007, Ubayashi et al (2008) and Yin et al (2009), show that verification is possible in principle, practical verification of refactoring engines for Haskell or Erlang remains some way off, and is predicated on the mechanisation of the static and dynamic semantics as well as the module structure and type systems of the languages in question. 10 A generic general-purpose refactoring tool?…”
Section: Trust and Verificationmentioning
confidence: 97%