1998
DOI: 10.1109/32.730543
|View full text |Cite
|
Sign up to set email alerts
|

Using abstraction and model checking to detect safety violations in requirements specifications

Abstract: Abstract-Exposing inconsistencies can uncover many defects in software specifications. One approach to exposing inconsistencies analyzes two redundant specifications, one operational and the other property-based, and reports discrepancies. This paper describes a "practical" formal method, based on this approach and the SCR (Software Cost Reduction) tabular notation, that can expose inconsistencies in software requirements specifications. Because users of the method do not need advanced mathematical training or… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
91
0
1

Year Published

2002
2002
2015
2015

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 159 publications
(92 citation statements)
references
References 57 publications
(108 reference statements)
0
91
0
1
Order By: Relevance
“…An advantage of our approach is that the synthesized requirements models can be analyzed using the SCR toolsvalidated using simulation [12], analyzed automatically for consistency and completeness [14], and verified formally using model checking [13], theorem proving [12], composition [17], and automatically generated invariants [21].…”
Section: A Formal Modeling and Analysismentioning
confidence: 99%
“…An advantage of our approach is that the synthesized requirements models can be analyzed using the SCR toolsvalidated using simulation [12], analyzed automatically for consistency and completeness [14], and verified formally using model checking [13], theorem proving [12], composition [17], and automatically generated invariants [21].…”
Section: A Formal Modeling and Analysismentioning
confidence: 99%
“…There have been some notable industrial and military applications of tool supported formal methods, especially for the analysis of software systems requirements (e.g., [11,12,13,14]). Unfortunately, the formal methods advocates concerned, typically were not given the opportunity to fully integrate their techniques with the overall software engineering process.…”
Section: Canadian Nuclear Power Safety Systemsmentioning
confidence: 99%
“…For example, in Table 1 the mode transition defined in the second row is caused by the occurrence of conditioned event "@F(Ignited)" whose condition is that "Running" is false. Different semantics have been used for conditioned events [11], all of which are expressible in our Event Calculus approach. In this case study, we have adopted the following interpretation.…”
Section: Mode Transition Tablesmentioning
confidence: 99%
“…[20,27,28]). Most techniques based on model checking facilitate automated analysis of requirements specifications and generation of counterexamples when errors are detected [2,4,11]. However, in contrast to our approach they presuppose complete descriptions of the initial state(s) of the system to compute successor states.…”
Section: Abductive Analysis Of Invariantsmentioning
confidence: 99%
See 1 more Smart Citation