Search
Search Results
-
Formal Verification of a Neural Network Based Prognostics System for Aircraft Equipment
We demonstrate the use of formal methods to verify properties of a deep convolutional neural network that estimates remaining useful life of aircraft... -
Formal Verification of Arithmetic Masking in Hardware and Software
Masking is a popular countermeasure to protect cryptographic implementations against physical attacks like differential power analysis. So far,... -
Novel abstraction methods for TDMA based MAC protocols: Case of IIoT MAC Wireless HART Verification
All Internet of Things application layer protocols are built on top of the Medium Access Control layer (MAC layer). The MAC Layer’s primary goal is...
-
Verifying Collision Risk Estimation using Autonomous Driving Scenarios Derived from a Formal Model
Autonomous driving technology is safety-critical and thus requires thorough validation. In particular, the probabilistic algorithms employed in...
-
A Formal CHERI-C Semantics for Verification
CHERI-C extends the C programming language by adding hardware capabilities, ensuring a certain degree of memory safety while remaining efficient.... -
Formal Verification for VRM Requirement Models
At the requirements level, formal verification and analysis are the focus of task’s attention which is develo** complex systems by formal methods.... -
New Horizons for Metamorphic Relationships in Formal Verification
In this work we broadened the impact of the so called Metamorphic relationships (MR’s) in the formal verification phase. We showed the potential of... -
Formal Verification of the Burn-to-Claim Blockchain Interoperable Protocol
This paper introduces an abstract blockchain model that employs the Burn-to-Claim cross-blockchain protocol [1]. This multi-level simulator models a... -
Polynomial Formal Verification of Complex Circuits Using a Hybrid Proof Engine
The size and complexity of digital circuits are increasing; thus, they are becoming more and more error-prone. In order to prevent the bugs from... -
Exploring a Methodology for Formal Verification of Safety-Critical Systems
As the formal verification of safety-critical software systems often requires the integration of multiple tools and techniques, we propose a... -
Introduction to the Special Issue on Runtime Verification
Runtime verification (RV) refers to methods for formal reasoning about all aspects of the dynamic execution of systems, including hardware, software,...
-
Verification
This chapter emphasizes the critical need for thorough verification of embedded systems, building upon the advantages of SystemC models outlined in... -
Introduction to the Special Issue on Runtime Verification
Runtime verification (RV) refers to methods for formal reasoning about all aspects of the dynamic execution of systems, including hardware, software,...
-
Formal modeling and verification for amplification timing anomalies in the superscalar TriCore architecture
Static worst-case timing analyses compute safe timing bounds of applications running in real-time systems. These bounds are necessary to evaluate the...
-
Polynomial Formal Verification of Arithmetic Circuits
The size and the complexity of digital circuits are increasing rapidly. This makes the circuits highly error-prone. As a result, proving the... -
Embedding Formal Verification in Model-Driven Software Engineering with Slco: An Overview
In 2009, the Simple Language of Communicating Objects (Slco) Domain-Specific Language was designed. Since then, a range of tools have been developed... -
Formal specification and verification of decentralized self-adaptive systems using symmetric nets
Engineering distributed self-adaptive systems is challenging due to multiple interacting components, some of which monitor and possibly modify the...
-
Formal Methods for Industrial Critical Systems
To stimulate the development and application of formal methods in industry, we need to promote research and development for the improvement of formal...
-
An Approach for Formal Verification of Authentication Protocols
AbstractAuthentication protocols (APs) are one of the most important components of secure information systems. Authentication Protocols are...
-
Formal verification of neural agents in non-deterministic environments
We introduce a model for agent-environment systems where the agents are implemented via feed-forward ReLU neural networks and the environment is...