2017 Winter Simulation Conference (WSC) 2017
DOI: 10.1109/wsc.2017.8247886
|View full text |Cite
|
Sign up to set email alerts
|

Modeling lessons from verifying large software systems for safety and security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…This category encompasses studies which used existing languages/tools for modeling, wherein studies which developed a language/tool for modeling were included in the group of system design. Only 4 studies [73,106,33,152] did not report any tool, instead, they either proposed an approach for modeling CPSs or used equational models. Table 15 shows various languages/tools used for modeling by the studies.…”
Section: Validation and Verification (Vandv)mentioning
confidence: 99%
“…This category encompasses studies which used existing languages/tools for modeling, wherein studies which developed a language/tool for modeling were included in the group of system design. Only 4 studies [73,106,33,152] did not report any tool, instead, they either proposed an approach for modeling CPSs or used equational models. Table 15 shows various languages/tools used for modeling by the studies.…”
Section: Validation and Verification (Vandv)mentioning
confidence: 99%
“…Secondly, LDV does not produce a verification evidence that can be checked by a human and hence it is difficult to validate LDV results. In fact, we found a bug in the Linux kernel which was verified as safe by LDV [91].…”
Section: Pointer Chains Due To Structuresmentioning
confidence: 94%