Dissertationen zum Thema „Méthodes formelles de génie logiciel“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Méthodes formelles de génie logiciel" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Le, Guennec Alain. „Génie logiciel et méthodes formelles avec UML : : spécification, validation et génération de tests“. Rennes 1, 2001. http://www.theses.fr/2001REN10156.
Der volle Inhalt der QuelleFayolle, Thomas. „Combinaison de méthodes formelles pour la spécification de systèmes industriels“. Thesis, Paris Est, 2017. http://www.theses.fr/2017PESC1078/document.
Der volle Inhalt der QuelleSpecifying industrial systems requires collaboration between an engineer that knows how the system works and an engineer that know the specification language. Graphical specification languages can help this collaboration. In this PhD Thesis a method is defined that combines ASTD (Algebraic State Transition Diagram), a formal graphical notation, with B and Event-B langagues. The ordering of actions is specified using ASTD and the data model is specified using Event-B. B specification is used to verify the consistency of the model : Event-B events have to be executed when the corresponding transitions have to be executed. A combined refinement allows to incrementaly design the system
Couturier, Raphaël. „Utilisation des méthodes formelles pour le développement de programmes parallèles“. Nancy 1, 2000. http://docnum.univ-lorraine.fr/public/SCD_T_2000_0001_COUTURIER.pdf.
Der volle Inhalt der QuelleHunel, Philippe. „Conception et réalisation d'un environnement intégré de génie logiciel pour le développement des protocoles“. Clermont-Ferrand 2, 1994. http://www.theses.fr/1994CLF21624.
Der volle Inhalt der QuelleHazem, Lotfi. „Développement d'architectures logicielles par application de patrons d'architecture prouvés : définition et application“. Versailles-St Quentin en Yvelines, 2007. http://www.theses.fr/2007VERS0005.
Der volle Inhalt der QuelleThe work presented in this thesis aims to reuse proved architectural solutions by combining formal and semi-formal development techniques to solve architectural development problems. Our contribution relates to the definition, the validation and the integration of architectural patterns into software development environments. We propose to formalize architectural patterns definition taking into account the problem part, the solution part and relationships between them. On one hand, the provided description is based on UML/OCL specification and a stereotype set, on the other hand on a quality model who establishes quality characteristics in terms of functional and non-functional requirements. Quality characteristics are specified using the ISO/IEC 9126-1 quality model. Our patterns are semantically consolidated by their B formal specifications following a transformational approach from UML/OCL to B. The integration of our approach in the UML Objecteering Modeler aims at helping the developer by providing a semantic framework for the architectural patterns without revealing the formal aspect used for their validation
Antignac, Thibaud. „Méthodes formelles pour le respect de la vie privée par construction“. Thesis, Lyon, INSA, 2015. http://www.theses.fr/2015ISAL0016/document.
Der volle Inhalt der QuellePrivacy by Design (PbD) is increasingly praised as a key approach to improving privacy protection. New information and communication technologies give rise to new business models and services. These services often rely on the exploitation of personal data for the purpose of customization. While privacy is more and more at risk, the growing view is that technologies themselves should be used to propose more privacy-friendly solutions. Privacy Enhancing Technologies (PETs) have been extensively studied, and many techniques have been proposed such as anonymizers or encryption mechanisms. However, PbD goes beyond the use of PETs. Indeed, the privacy requirements of a system should be taken into account from the early stages of the design because they can have a large impact on the overall architecture of the solution. The PbD approach can be summed up as ``prevent rather than cure''. A number of principles related to the protection of personal data and privacy have been enshrined in law and soft regulations. They involve notions such as data minimization, control of personal data by the subject, transparency of the data processing, or accountability. However, it is not clear how to translate these principles into technical features, and no method exists so far to support the design and verification of privacy compliant systems. This thesis proposes a systematic process to specify, design, and verify system architectures. This process helps designers to explore the design space in a systematic way. It is complemented by a formal framework in which confidentiality and integrity requirements can be expressed. Finally, a computer-aided engineering tool enables non-expert designers to perform formal verifications of the architectures. A case study illustrates the whole approach showing how these contributions complement each other and can be used in practice
Bon, Philippe. „Du cahier des charges aux spécifications formelles : une méthode basée sur les réseaux de Pétri de haut niveau“. Lille 1, 2000. https://pepite-depot.univ-lille.fr/RESTREINT/Th_Num/2000/50376-2000-149.pdf.
Der volle Inhalt der QuelleBelhaouari, Hakim. „Une approche intégrée pour la conception par contrat : vérification statique / dynamique et génération automatique de test“. Paris 6, 2010. http://www.theses.fr/2010PA066116.
Der volle Inhalt der QuelleCaffiau, Sybille. „Approche dirigée par les modèles pour la conception et la validation des applications interactives : une démarche basée sur la modélisation des tâches“. Phd thesis, Chasseneuil-du-Poitou, Ecole nationale supérieure de mécanique et d'aéronautique, 2009. http://tel.archives-ouvertes.fr/tel-00461497.
Der volle Inhalt der QuelleLissy, Alexandre. „Utilisation de méthodes formelles pour garantir des propriétés de logiciels au sein d'une distribution : exemple du noyau Linux“. Thesis, Tours, 2014. http://www.theses.fr/2014TOUR4019/document.
Der volle Inhalt der QuelleIn this thesis we are interested in integrating to the Linux distribution produced by Mandriva quality assurance level that allows ensuring user-Defined properties on the source code used. The core work of a distribution and its producer is to create a meaningful aggregate from software available. Those softwares are free and open source, hence it is possible to adapt it to improve end user’s experience. Hence, there is less control over the source code. Manual audit can of course be used to make sure it has good properties. Examples of such properties are often referring to security, but one could think of others. However, more and more software are getting integrated into distributions and each is showing an increase in source code volume: tools are needed to make quality assurance achievable. We start by providing a study of the distribution itself to document the current status. We use it to select some packages that we consider critical, and for which we can improve things with the condition that packages which are similar enough to the rest of the distribution will be considered first. This leads us to concentrating on the Linux kernel: we provide a state of the art overview of code verification applied to this piece of the distribution. We identify a need for a better understanding of the structure of the source code. To address those needs we propose to use a graph as a representation of the source code and use it to help document and understand its structure. Specifically we study applying some state of the art community detection algorithm to help handle the combinatory explosion. We also propose a distribution’s build system-Integrated architecture for executing, collecting and handling the analysis of data produced by verifications tools
Nemouchi, Yakoub. „Model-based Testing of Operating System-Level Security Mechanisms“. Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLS061/document.
Der volle Inhalt der QuelleFormal methods can be understood as the art of applying mathematical reasoningto the modeling, analysis and verification of computer systems. Three mainverification approaches can be distinguished: verification based on deductive proofs,model checking and model-based testing.Model-based testing, in particular in its radical form of theorem proving-based testingcite{brucker.ea:2012},bridges seamlessly the gap between the theory, the formal model, and the implementationof a system. Actually,theorem proving based testing techniques offer a possibility to directly interactwith "real" systems: via differentformal properties, tests can be derived and executed on the system under test.Suitably supported, the entire process can fully automated.The purpose of this thesis is to create a model-based sequence testing environmentfor both sequential and concurrent programs. First a generic testing theory basedon monads is presented, which is independent of any concrete program or computersystem. It turns out that it is still expressive enough to cover all common systembehaviours and testing concepts. In particular, we consider here: sequential executions,concurrent executions, synchronised executions, executions with abort.On the conceptual side, it brings notions like test refinements,abstract test cases, concrete test cases,test oracles, test scenarios, test data, test drivers, conformance relations andcoverage criteria into one theoretical and practical framework.In this framework, both behavioural refinement rules and symbolic executionrules are developed for the generic case and then refined and used for specificcomplex systems. As an application, we will instantiate our framework by an existingsequential model of a microprocessor called VAMP developed during the Verisoft-Project.For the concurrent case, we will use our framework to model and test the IPC API of areal industrial operating system called PikeOS.Our framework is implemented in Isabelle/HOL. Thus, our approach directly benefitsfrom the existing models, tools, and formal proofs in this system
Todorov, Vassil. „Automotive embedded software design using formal methods“. Electronic Thesis or Diss., université Paris-Saclay, 2020. http://www.theses.fr/2020UPASG026.
Der volle Inhalt der QuelleThe growing share of driver assistance functions, their criticality, as well as the prospect of certification of these functions, make their verification and validation necessary with a level of requirement that testing alone cannot ensure. For several years now, other industries such as aeronautics and railways have been subject to equivalent contexts. To respond to certain constraints, they have locally implemented formal methods. We are interested in the motivations and criteria that led to the use of formal methods in these industries in order to transpose them to automotive scenarios and identify the potential scope of application.In this thesis, we present our case studies and propose methodologies for the use of formal methods by non-expert engineers. Inductive model checking for a model-driven development process, abstract interpretation to demonstrate the absence of run-time errors in the code and deductive proof for critical library functions.Finally, we propose new algorithms to solve the problems identified during our experiments. These are, firstly, an invariant generator and a method using the semantics of data to process properties involving long-running timers in an efficient way, and secondly, an efficient algorithm to measure the coverage of the model by the properties using mutation techniques
Martinie, De Almeida Célia. „Une approche à base de modèles synergiques pour la prise en compte simultanée de l'utilisabilité, la fiabilité et l'opérabilité des systèmes interactifs critiques“. Toulouse 3, 2011. http://thesesups.ups-tlse.fr/1509/.
Der volle Inhalt der QuelleIn the field of interactive critical systems, the cost of a usage error or of a system failure can overcome the cost of the development of the system itself, and can result in loss of life, injury or damage to the system and its environment. Then, currently available Human Computer Interaction techniques, methods and processes are not sufficient, as they are not handling all of the design and development issues that are associated to interactive critical systems. First of all, these techniques, methods and processes do not enable to guarantee that the system will fulfil both usability and reliability properties. Then, they do not consider training and qualification of the users of the system. At last, they do not provide means for traceability of the needs and requirements through the whole development process. We propose an approach to develop interactive critical systems that are usable, reliable and operable and we describe the associated conceptual framework of our approach. We propose an implementation of this approach with a development process, notations and a software environment. The development process integrates phases for the development of the associated training program, and it provides support for the traceability of requirements and design choices during the whole phases of the process. This approach takes advantages from the User Centered Design paradigm and uses, in a synergistic way, task models, system's behaviour formal models and training program development model
Garchery, Quentin. „Certification de la transformation de tâches de preuve“. Electronic Thesis or Diss., université Paris-Saclay, 2022. http://www.theses.fr/2022UPASG006.
Der volle Inhalt der QuelleIn various provers and deductive verification tools, logical transformations are used extensively in order to reduce a proof task into a number of simpler tasks. Logical transformations are often part of the trusted base of such tools. In this thesis, we develop a framework to improve confidence in their results. We follow a skeptical} approach: transformations are instrumented to produce certificates that are checked by a third-party tool. Thus, we benefit from a modular approach that is also robust to changes in the source code of the transformations. We design two kinds of certificates. Transformations produce surface certificates} that are then translated to kernel certificates} which are destined for final verification. We made sure that surface certificates are easy to produce. Moreover, surface certificates are as independent of the transformation application as possible and this makes for a modular certification. On the contrary, kernel certificates include numerous details about the transformation application and are kept elementary. This helps to define simpler checkers and establish their correctness. We propose a translation procedure from surface certificates to kernel certificates which does not need to be trusted. Logical transformations are considered in a higher-order logic, with type polymorphism and built-in theories such as equality and integer arithmetic. We apply our framework to Why3 and use it to instrument pre-existing and complex transformations. Additionally, we implement two certificate checkers. The first one follows an efficient computational approach while the second is based on a shallow embedding of proof tasks inside the logical framework Lambdapi, thus exhibiting formal guaranties of its correctness
Bolusset, Thomas. „β-space : raffinement de descriptions architecturales en machines abstraites de la méthode formelle B“. Chambéry, 2004. http://www.theses.fr/2004CHAMS028.
Der volle Inhalt der QuelleA software architecture describes its structure and behaviour using components and connectors, but their languages do not support the complete development of complex software systems, from architectural design to executable code. Some formal development methods permit to refine a software specification to obtain another one closer to the implementation, or even code, but without taking into account the system architectural description. We propose to use a refinement, mechanism to transform the architectural description into a "classical" formal specification, already supported by tools allowing the development achievement. We develop a formal system - named ß -SPACE - to bring successive refinements into operation, leading from the starting architectural description (in π-SPACE, a software architecture description language based on a process algebra) to a formal specification (a set of abstract machines of the B method, which is supported by tools to help the formal development and the code generation) to make a formal development of the application possible, in the B method framework, while guaranteeing that each refinement step preserves the initial architectural properties. The formal definition of the refinement is based on the rewriting logic, in which the abstract architectural and the target specification elements are represented. This logic is also supported by a tool which permits to automate the transformations. Our approach of the architectural refinement differs from other existing methods, by being interested not only in the addition of details to the formal description, but also in the transformation of its control structure: the composition of components and connectors in the architecture is transformed to obtain a hierarchy of B abstract machines. We ensure the conservation of the interesting architectural properties. This is an original approach both concerning its architectural range, its formalisation and its connection with the classical formal methods
Leildé, Vincent. „Aide au diagnostic de vérification formelle de systèmes“. Thesis, Brest, École nationale supérieure de techniques avancées Bretagne, 2019. http://www.theses.fr/2019ENTA0011.
Der volle Inhalt der QuelleModel checking is a formal verification technique verifying that a system behavior satisfies formal properties. This technique explores all the possible executions of the system to discover execution paths (traces) violating formal properties. When a property is violated, the engineer must find the root causes that produced the trace. The goal of this work is to assist the engineer during this phase, which is called diagnosis. Our proposition is a framework combining various kinds of knowledge and cognitive activities, supported by a method and an infrastructure. We apply the approach to securing a SCADA system. When the diagnostician is the model verifier, he generally faces large traces. The diagnosis is obtained by mobilizing a multitude of complex cognitive activities. To tool these activities, we propose to classify them according to the Bloom’s taxonomy. Even so, these means are insufficient when the real cause doesn’t operate on model checking knowledge. When the diagnostician is the model designer, he may or may not have domain knowledge. This knowledge offers new perspectives about the trace, and may unblock the diagnosis. We propose a structure to capture and reuse this knowledge. Correlations can be explicited o reduce the semantic gap between domain and model checking knowledge. On the one hand, the problem case formulates the problem to be solved, and precises the diagnosis of the constructed solution. On the other hand, the sample, pattern and component cases capture elements of solutions, and isolate the diagnosis. When the diagnostician is the system architect, he combines elements of problemsand solutions from both domain and application engineering. To progress smoothly in the solution and enrich the properties to be checked, we propose a problem solving method. Fed by the domain knowledge base, the method goes back and forth between the problem space and the solution space, tracing chosen problems and solutions, and facilitating verification and diagnosis thanks to new properties. We propose an infrastructure to organize, share and reuse various knowledge implied during the verification process (model checking, domain, method). This infrastructure is divided into three levels, the physical level gathers the raw data, the knowledge level gathers ontologies, and the access level provides interactions supported by knowledge. We offer a trace simplification tool diagnosis based on facets, and promoted by our infrastructure
Aljer, Ammar. „Co-design et raffinement en B : BHDL tool, plateforme pourr la conception de composants numériques“. Lille 1, 2004. https://pepite-depot.univ-lille.fr/LIBRE/Th_Num/2004/50376-2004-Aljer.pdf.
Der volle Inhalt der QuellePerseil, Isabelle. „Méthode C, une méthode de génie logiciel pour les systèmes avioniques temps-réel“. Paris, Télécom ParisTech, 2009. http://www.theses.fr/2009ENST0057.
Der volle Inhalt der QuelleWe present here a software engineering method for avionic fault-tolerant distributed, real-time and embedded (DRE) systems which covers the whole software lifecycle thanks to a seamless process. We have called this method the “C-Method” as C stands for the main notion of “continuum” that we have introduced between each phase of the lifecycle. Because these “DRE” systems have safety critical concerns, they require the use of formal languages (that allow non ambiguous and rigorous specifications) in order to be able to prove their non functional properties. Therefore, the “C-Method” relies on the use of formal languages in the earliest steps of the system specification and on the use of semi-formal languages in the analysis, design and programming steps. The fundamental question is how to integrate several languages with different levels of formalization and abstraction. Here we propose to “navigate” from one language to another one thanks to model transformations techniques at the analysis step and code generation at the design step, when a full mechanization of the process is required. As the systems that we are studying are complex systems, and also because they need modularity, change management (these systems have a long duration), reuse, to be taken into account, the model-driven approach is the most appropriate to start with Considering the previous arguments, the “C-Method” is founded upon the cooperation of models and languages, in a way that enables continuity
Maïga, Oumar. „An integrated language for the specification, simulation, formal analysis and enactment of discrete event systems“. Thesis, Clermont-Ferrand 2, 2015. http://www.theses.fr/2015CLF22662/document.
Der volle Inhalt der QuelleThis thesis proposes a methodology which integrates formal methods in the specification, design, verification and validation processes of complex, concurrent and distributed systems with discrete events perspectives. The methodology is based on the graphical language HILLS (High Level Language for System Specification) that we defined. HiLLS integrates software engineering and system theoretic views for the specification of systems. Precisely, HiLLS integrates concepts and notations from DEVS (Discrete Event System Specification), UML (Unified Modeling Language) and Object-Z. The objectives of HILLS include the definition of a highly communicable graphical concrete syntax and multiple semantic domains for simulation, prototyping, enactment and accessibility to formal analysis. Enactment refers to the process of creating an instance of system executing in real-clock time. HILLS allows hierarchical and modular construction of discrete event systems models while facilitating the modeling process due to the simple and rigorous description of the static, dynamic, structural and functional aspects of the models. Simulation semantics is defined for HiLLS by establishing a semantic mapping between HiLLS and DEVS; in this way each HiLLS model can be simulated by a DEVS simulator. This approach allow DEVS users to use HiLLS as a modeling language in the modeling phase and use their own stand alone or distributed DEVS implementation package to simulate the models. An enactment of HiLLS models is defined by adapting the observer design-pattern to their implementation. The formal verification of HiLLS models is made by establishing morphisms between each level of abstraction of HILLS and a formal method adapted for the formal verification of the properties at this level. The formal models on which are made the formal verification are obtained from HILLS specifications by using the mapping functions. The three levels of abstraction of HILLS are: the Composite level, the Unitary level and the Traces level. These levels correspond respectively to the following levels of the system specification hierarchy proposed by Zeigler: CN (Coupled Network), IOS (Input Output System) and IORO (Input Output Relation Observation). We have established morphisms between the Composite level and CSP (Communicating Sequential Processes), between Unitary level and Z and we expect to use temporal logics like LTL, CTL and TCTL to express traces level properties. HiLLS allows the specification of both static and dynamic structure systems. In case of dynamic structure systems, the composite level integrates both sate-based and process-based properties. To handle at the same time state-based and process-based properties, morphism is established between the dynamic composite level and CSPZ (a combination of CSP and Z); The verification and validation process combine simulation, model checking and theorem proving techniques in a common framework. The model checking and theorem proving of HILLS models are based on an integrated tooling framework composed of tools supporting the notations of the selected formal methods in the established morphisms. We apply our methodology to modeling of the Alternating Bit Protocol (ABP) and the Automated Teller Machine (ATM)
Dahab, Sarah. „An approach to measuring software systems using new combined metrics of complex test“. Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLL015/document.
Der volle Inhalt der QuelleMost of the measurable software quality metrics are currently based on low level metrics, such as cyclomatic complexity, number of comment lines or number of duplicated blocks. Likewise, quality of software engineering is more related to technical or management factoid, and should provide useful metrics for quality requirements. Currently the assessment of these quality requirements is not automated, not empirically validated in real contexts, and the assessment is defined without considering principles of measurement theory. Therefore it is difficult to understand where and how to improve the software following the obtained result. In this domain, the main challenges are to define adequate and useful metrics for quality requirements, software design documents and other software artifacts, including testing activities.The main scientific problematic that are tackled in this proposed thesis are the following : defining metrics and its supporting tools for measuring modern software engineering activities with respect to efficiency and quality. The second consists in analyzing measurement results for identifying what and how to improve automatically. The last one consists in the measurement process automation in order to reduce the development time. Such highly automated and easy to deploy solution will be a breakthrough solution, as current tools do not support it except for very limited scope
Bellet, Thomas. „Transformations de graphes pour la modélisation géométrique à base topologique“. Thesis, Poitiers, 2012. http://www.theses.fr/2012POIT2261/document.
Der volle Inhalt der QuelleGeometric modeling is now involved in many fields such as: video games, architecture, engineering and archaeology. The represented objects are very different from one field to another, and so are their modeling operations. Furthermore, many specific types of modeling software are designed for high programing costs, but with a relatively low rate of effectiveness.The following is an alternative approach:– we have conceived a dedicated language for geometric modeling that will allow us to define any operation of any field; objects in this language are defined with the topological model of generalized maps, this definition has been extended to the embedding informations; here the operations are defined as graph transformation rules which originate from the category theory;– we have ensured operation definitions with consistency conditions; these operations that satisfy those conditions do not generate anomalies; – we have designed generic modeling software to serve as an interpreter of this language; the operation definitions are directly applied without the need for more programing; the software also automatically checks the language conditions and warns the user if he designs a non-consistent operation.The provided language and software prove to be efficient, and all for a low programing cost. Designing a new operation takes only minutes thanks to the language conditions, as opposed to hours of programming and debugging with the past approach
Sadaoui-Mouhoub, Samira. „Aide à la réutilisation de spécifications formelles en LOTOS“. Nancy 1, 2000. http://www.theses.fr/2000NAN10030.
Der volle Inhalt der QuelleReuse is a key to improve the quality and the productivity of software. However, there are still problems not entirely resolved limiting the practice of reuse such as construction of a reusable component and adaptation of a component in an application according to the specific needs of the user. In our work, we are interested to the reuse of formal specifications. These specifications allow on one hand a system description to de more abstract, explicit and modular than the code and on the other hand to prove the correction of new system. We focused on two specifications types : abstract data types and concurrent processes using LOTOS language. To support specification reuse, we defined new and complex methods : re-striction, promotion and generalization of data types as well a composition and extension of processes. These methods are aided with operators defined in Proplane model. Reuse operators are based on theories (to produce correct results), are automatic ( the users are not necessarily experts in formal methods) and interactive (to support the user intuition). We applied these operators on case studies
ANDRE, Pascal. „Méthodes formelles et à objets pour le développement du logiciel :“. Phd thesis, Université Rennes 1, 1995. http://tel.archives-ouvertes.fr/tel-00006148.
Der volle Inhalt der QuelleDufay, Guillaume. „Vérification formelle de la plate-forme Java Card“. Nice, 2003. http://www.theses.fr/2003NICE4046.
Der volle Inhalt der QuelleIn this thesis, we present a formalization, realized within the Coq proof assistant, of the Java Card platform. This programming environment derived from Java is intended to smart cards and to their security requirements. More precisely, we describe the formalization of the Java Card virtual machine and of a substantial part of its runtime environment. Then, we explain how to obtain, from this virtual machine dynamically verifying type safety, a bytecode verifier (BCV) and a virtual machine more effective for execution but as safe. We bring for the BCV a generic framework, expressed with modules, applying the most recent techniques from this domain and simplifying proofs needed to insure soundness of the built BCV. Finally, we show how the methodology applied for type safety can be generalized and describe tools realized to automate this task
MARQUESUZAÀ, Christophe. „OMAGE : Outils et Méthode pour la spécification des connaissances au sein d'un Atelier de Génie Educatif“. Phd thesis, Université de Pau et des Pays de l'Adour, 1998. http://tel.archives-ouvertes.fr/tel-00003699.
Der volle Inhalt der QuelleVoisinet, Jean-Christophe. „Contribution aux processus de développement d'applications spécifiées à l'aide de la méthode B par validation utilisant des vues UML et traduction vers des langages objets“. Besançon, 2004. http://www.theses.fr/2004BESA2015.
Der volle Inhalt der QuelleThe research works about software engineering allows to think up two approach types, the formal methods which allows to write and verify a system specification with a notation from mathematics and the semi-formal methods object-oriented which allows to model a system using graphic views. The departure of our works is the B formal method. We provide a contribution in two states of the software development. The first is the integration of the two method types by extraction of UML graphics views from a B formal specification. This extraction happen to maturity because it deals with state-charts, classes diagrams and OCL constraints like most integration works already done as graphic notation derivation to formal methods. In addition we also defined the extraction of concrete diagrams like sequence and activity ones. The second contribution of our works is the translation of B specifications to compilable and executable languages. This translation is targeted on a large domain because it is applied on standard software with Java and C# but also on embedded application with Java for JavaCard. A plate-forme merging the two contributions relatives tools was developed in order to factorize the common developments of syntactic and semantic analysis
Giron, Patricia. „Introduction de méthodes rigoureuses de génie logiciel pour le développement d'applications spatiales embarquées“. Toulouse 3, 1996. http://www.theses.fr/1996TOU30235.
Der volle Inhalt der QuelleLoulou, Hassan. „Verifying Design Properties at Runtime Using an MDE-Based Approach Models @Run.Time Verification-Application to Autonomous Connected Vehicles“. Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLS405.
Der volle Inhalt der QuelleAutonomous Connected Vehicles (ACVs) are Cyber-physical systems (CPS) where the computationalworld and the real one meet. These systems require a rigorous validation processthat starts at design phase and continues after the software deployment. Models@Runtimehas appeared as a new paradigm for continuously monitoring software systems execution inorder to enable adaptations whenever a change, a failure or a bug is introduced in the executionenvironment. In this thesis, we are going to tackle ACVs environment where vehicles tries tocollaborate and share their data in a secure manner.Different modeling approaches are already used for expressing access control requirementsin order to impose security policies. However, their validation tools do not consider the impactsof the interaction between the functional and the security requirements. This interaction canlead to unexpected security breaches during the system execution and its potential runtimeadaptations. Also, the real-time prediction of traffic states using crowd sourcing data could beuseful for proposition adaptations to AVCs cooperation models. Nevertheless, it has not beensufficiently studied yet. To overcome these limitations, many issues should be addressed:• The evolution of the system functional part must be considered during the validation ofthe security policy and attack scenarios must be generated automatically.• An approach for designing and automatically detecting security anti-patterns might bedeveloped. Furthermore, new reconfigurations for access control policies also must befound, validated and deployed efficiently at runtime.• ACVs need to observe and analyze their complex environment, containing big-datastreams to recommend new cooperation models, in near real-time.In this thesis, we build an approach for sensing the ACVs environment, validating its accesscontrol models and securely reconfiguring it on the fly. We cover three aspects:• We propose an approach for guiding security models checkers to find the attack scenariosat design time automatically.• We design anti-patterns to guide the validation process. Then, we develop an algorithmto detect them automatically during models reconfigurations. Also, we design a mechanismfor reconfiguring the access control model and we develop a lightweight modularframework for an efficient deployment of new reconfigurations.• We build an approach for the real-time monitoring of dynamic data streams to proposeadaptations for the access policy at runtime.Our proposed approach was validated using several examples related o ACVs. the results ofour experimentations prove the feasibility of this approach
Marquesuzaà, Christophe. „OMAGE : Outils et Méthode pour la spécification des connaissances au sein d'un Atelier de Génie Educatif“. Phd thesis, Université de Pau et des Pays de l'Adour, 1998. http://tel.archives-ouvertes.fr/hal-00002957.
Der volle Inhalt der QuelleBoussaid, Omar. „Conception et réalisation d'un logiciel graphique d'aide à la simulation“. Lyon 1, 1988. http://www.theses.fr/1988LYO10546.
Der volle Inhalt der QuelleDebrat, Henri. „Certification formelle de la correction d'algorithmes distribués avec erreurs de transmission“. Thesis, Université de Lorraine, 2013. http://www.theses.fr/2013LORR0268.
Der volle Inhalt der QuelleComputer systems fail. Whatever the reason of these failures, it has been a widespread approach to try and increase the faults-tolerance of a computer system through its replication. The resulting system is said to be a distributed one, in which replicas have to be kept consistent with each others. Hence, reaching agreement, and Consensus in particular, becomes the problem to solve - indeed, the paradigm. Solving Consensus (under various assumptions) is a hard task : algorithms designed on this purpose are subtle and proving their being correct is error-prone - whenever they are, which occasionally appears not to be the case. For more that thirty years, researchers interested in what is called Formal Methods have been working on mechanizing the verification process, in order to increase confidence in the correctness of (distributed) algorithms. The work we present here is at the intersection of distributed algorithms and formal methods. We use the Isabelle/HOL software to certify the correctness proof of various Consensus algorithms expressed in a uniform framework based on the Heard-Of Model, introduced by Charron-Bost and Schiper in 2009. Expressed in a common model, these algorithms, which, depending on the case, share some common mecanisms (number of steps, intermediate votes, ...), some elements of syntax, or types of assumptions (partial synchronism...), can be proved using some common arguments. As a consequence, the certification effort can be reduced by copying some intermediate lemmas from one proof to another and let the computer automatically parse them until some manual adaptation is required. This lead to the idea of certifying the correctness of multiple algorithms all together, instead of proving them one after the other, as one would do on paper in a traditional way. The effort of translation in the formal language of the proof assistant is then possibly reduced. Of course, each proof will also contain specific arguments, which will have to be isolated and translated into the software. Here, we illustrate this proposition through the presentation of formal certificates of correctness for six Consensus algorithms. As a consequence, on should not expect to find here a comprehensive linear presentation of each proof : we first show the arguments shared by multiple proofs, followed by those which are specific to each o them
Boender, Jaap. „Etude formelle des distributions de logiciel libre“. Phd thesis, Université Paris-Diderot - Paris VII, 2011. http://tel.archives-ouvertes.fr/tel-00698622.
Der volle Inhalt der QuelleKintz, Michel. „Etude et mise en place d'un environnement de production de logiciels à dominante temps reel : démarche, mesures et modèles, méthodes“. Mulhouse, 1988. http://www.theses.fr/1988MULH0075.
Der volle Inhalt der QuelleToussaint, Yannick. „Méthodes informatiques et linguistiques pour l'aide à la specification de logiciel“. Toulouse 3, 1992. http://www.theses.fr/1992TOU30105.
Der volle Inhalt der QuelleZighed, Djamel Abdelkader. „Méthodes et outils pour les processus d'interrogation non arborescents“. Lyon 1, 1985. http://www.theses.fr/1985LYO10498.
Der volle Inhalt der QuelleBartzia, Evmorfia-Iro. „A formalization of elliptic curves for cryptography“. Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLX002/document.
Der volle Inhalt der QuelleThis thesis is in the domain of formalization of mathematics and ofverification of cryptographic algorithms. The implementation ofcryptographic algorithms is often a complicated task becausecryptographic programs are optimized in order to satisfy bothefficiency and security criteria. As a result it is not alwaysobvious that a cryptographique program actually corresponds to themathematical algorithm, i.e. that the program is correct. Errors incryprtographic programs may be disastrous for the security of anentire cryptosystem, hence certification of their correctness isrequired. Formal systems and proof assistants such as Coq andIsabelle-HOL are often used to provide guarantees and proofs thatcryptographic programs are correct. Elliptic curves are widely usedin cryptography, mainly as efficient groups for asymmetriccryptography. To develop formal proofs of correctness forelliptic-curve schemes, formal theory of elliptic curves is needed.Our motivation in this thesis is to formalize elliptic curve theoryusing the Coq proof assistant, which enables formal analysis ofelliptic-curve schemes and algorithms. For this purpose, we used theSsreflect extension and the mathematical libraries developed by theMathematical Components team during the formalization of the FourColor Theorem. Our central result is a formal proof of Picard’stheorem for elliptic curves: there exists an isomorphism between thePicard group of divisor classes and the group of points of an ellipticcurve. An important immediate consequence of this proposition is theassociativity of the elliptic curve group operation. Furthermore, wepresent a formal proof of correctness for the GLV algorithm for scalarmultiplication on elliptic curve groups. The GLV algorithm exploitsproperties of the elliptic curve group in order to acceleratecomputation. It is composed of three independent algorithms:multiexponentiation on a generic group, decomposition of the scalarand computing endomorphisms on algebraic curves. This developmentincludes theory about endomorphisms on elliptic curves and is morethan 5000 lines of code. An application of our formalization is alsopresented
Humbert, Sophie. „Déclinaison d'exigences de sécurité, du niveau système vers le niveau logiciel, assistée par des modèles formels“. Bordeaux 1, 2008. http://www.theses.fr/2008BOR13580.
Der volle Inhalt der QuelleJourdan, Jacques-Henri. „Verasco : a Formally Verified C Static Analyzer“. Sorbonne Paris Cité, 2016. http://www.theses.fr/2016USPCC021.
Der volle Inhalt der QuelleIn order to develop safer software for critical applications, some static analyzers aim at establishing, with mathematical certitude, the absence of some classes of bug in the input program. A possible limit to this approach is the possibility of a soundness bug in the static analyzer itself, which would nullify the guarantees it is supposed to deliver. In this thesis, we propose to establish formal guarantees on the static analyzer itself: we present the design, implementation and proof of soundness using Coq of Verasco, a formally verified static analyzer based on abstract interpretation handling most of the ISO C99 language, including IEEE754 floating-point arithmetic (except recursion and dynamic memory allocation). Verasco aims at establishing the absence of erroneous behavior of the given programs. It enjoys a modular extendable architecture with several abstract domains and well-specified interfaces. We present the abstract iterator of Verasco, its handling of bounded machine arithmetic, its interval abstract domain, its symbolic abstract domain and its abstract domain of octagons. Verasco led to the development of new techniques for implementing data structure with sharing in Coq
Delmas, David. „Static analysis of program portability by abstract interpretation“. Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS342.
Der volle Inhalt der QuelleComputer programs tend to be used much longer than expected at design time, and in a wider variety of environments. Adapting a software product for new usage may turn out to be difficult and costly. Ensuring the portability of programs is a major stake: it amounts to ensuring that their compilation and execution in a different environment will have small controlled impact on their semantics. The goal of this thesis is to develop a novel class of static analyses by abstract interpretation, allowing to verify portability properties of low-level C programs. Portability verification aims at proving the equivalence of two syntactically close versions of a program running in different environments. We first focus on the particular case of regression verification, which aims at proving the equivalence of two program versions running in the same environment. We propose a static analysis of software patches that is able to infer such equivalence properties, in particular in the context of low-level C programs such as those used in embedded software. Then we develop an approach to portability analysis of C programs that is designed as an extension of patch analysis. We focus on two portability properties, related to the representation of the computer memory specified by the ABI: portability against different representations of scalars (endianness), and against different memory layouts (offsets of scalar fields in C structs). We implemented a prototype static analyzer on top of the MOPSA platform, and experimented it on real-world open source and industrial software. It allows successful analyses of large, real-world avionics software up to one million lines of C
Wilke, Pierre. „Compilation formellement vérifiée de code C de bas-niveau“. Thesis, Rennes 1, 2016. http://www.theses.fr/2016REN1S088/document.
Der volle Inhalt der QuelleThis thesis presents an extension of the CompCert compiler that aims at providing formal guarantees about the compilation of more programs than CompCert does. The CompCert compiler compiles C code into assembly code for various architectures and provides formal guarantees about the behaviour of the compiled assembly program. It states that whenever the C program has a defined semantics, the generated assembly program behaves similarly. However, the theorem does not provide any guarantee when the source program has undefined semantics, or, in C parlance, when it exhibits undefined behaviour, even though those behaviours actually happen in real-world code. This thesis exhibits a number of C idioms, that occur in real-life code and whose behaviour is undefined according to the C standard. Because they happen in real programs, our goal is to enhance the CompCert verified compiler so that it also provides formal guarantees for those programs. To that end, we propose a memory model for CompCert that makes pointer arithmetic and uninitialised data manipulation defined, introducing a notion of symbolic values that capture the meaning of otherwise undefined idioms. We adapt the whole memory model of CompCert with this new formalism and adapt the semantics of all the intermediate languages. We prove that our enhanced semantics subsumes that of CompCert. Moreover, we show that these symbolic semantics capture the behaviour of the previously undefined C idioms. The proof of semantic preservation from CompCert needs to be reworked to cope with our model. We therefore generalize important proof techniques such as memory injections, which enable us to port the whole proof of CompCert to our new memory model, therefore providing formal guarantees for more programs
Fleurquin, Régis. „Proposition d'une démarche qualité logicielle pour le PME. Un modèle d'évaluation de la qualité et des critères et conseils permettant sa mise en oeuvre à travers les outils et les méthodes“. Toulouse, INSA, 1996. http://www.theses.fr/1996ISAT0037.
Der volle Inhalt der QuelleDuplouy, Yann. „Applying Formal Methods to Autonomous Vehicle Control“. Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLN048/document.
Der volle Inhalt der QuelleThis thesis takes place in the context of autonomous vehicle design, and concerns more specifically the verification of controllers of such vehicles. Our contributions are the following: (1) give a syntax and a semantics for a hybrid system model, (2) extend the capacities of the model-checker Cosmos to that kind of models, and (3) empirically confirm the relevance of our approach on typical case studies handling autonomous vehicles.We chose to combine high-level stochastic Petri nets (which is the input formalism of Cosmos) with the input formalism of Simulink, to obtain an adequate expressive power. Indeed, Simulink is largely used in the automotive industry and numerous controllers have been specified using this tool. However, there is no formal semantics for Simulink, which lead us to define such a semantics in two steps:first, we propose an exact (but not operational) semantics, then we complete it by an approximate semantics that includes the targeted approximation level.In order to combine the discrete event model of Petri nets and the continous model specified in Simulink, we define a syntactic interface that relies on new transition types; its semantics consists of an extension of the simulation loop. The evaluation of this new formalism has been entirely implemented into Cosmos.Using this new formalism, we have designed and studied the two following case studies: on one hand, a heavy traffic on a motorway segment, and on the other hand the insertion of a vehicle into a motorway. Our approach has been validated by the analysis of the corresponding models
Le, Louarn Catherine. „Étude et réalisation d’un outil de simulation et de test pour le logiciel temps réel“. Compiègne, 1986. http://www.theses.fr/1986COMPI224.
Der volle Inhalt der QuelleDeléage, Gilbert. „Méthodes de prédiction de la structure secondaire des protéines : application à un modèle l'ATPase F1 mitochondriale : études des propriétés électriques et optiques de l'ATPase F1“. Lyon 1, 1988. http://www.theses.fr/1988LYO10080.
Der volle Inhalt der QuelleEl, Ayeb Béchir. „Méthodes, langages et outils de spécification et de construction des systèmes de diagnostic“. Nancy 1, 1989. http://www.theses.fr/1989NAN10054.
Der volle Inhalt der QuelleDuclos, Mathilde. „Méthodes pour la vérification des protocoles cryptographiques dans le modèle calculatoire“. Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAM002/document.
Der volle Inhalt der QuelleCritical and private information are exchanged on public environment. To protect it from dishonest users, we use cryptographic tools. Unfortunately, bad conception, poorly written security properties and required security hypothesis lead to attacks, and it may take years before one discover the attack and fix the security schemes involved. In this context, provable security provides formal definitions for security objectives and implied mathematical proofs that these objectives are fullfilled. On another hand, complexity and variety of cryptographic systems are increasing, and proofs by hand are too complicated to write and to verify (Bellare& Rogaway 2004, Shoup 2004, Halevi 2005). Thus, we need computer-assisted verification methods for cryptographic systems. The aim of this thesis is to progress in this direction. More precisely we want significant progress over formal proofs on cryptographic protocols. To verify cryptographic protocols we need to develop a theoritical framework providing: - a precise modelisation for cryptographic protocols and security properties we want to prove in the computationnal model, - designing tactics to automate proofs, - taking into account realistic models for adversary (side-channels...). By the end of the thesis we have enhanced a theoretical framework and computing tools helping verifying cryptographic protocols
Mashkoor, Atif. „Ingénierie Formelle de Domaine: Des Spécifications à la Validation“. Phd thesis, Université Nancy II, 2011. http://tel.archives-ouvertes.fr/tel-00614269.
Der volle Inhalt der QuelleMethni, Amira. „Méthode de conception de logiciel système critique couplée à une démarche de vérification formelle“. Electronic Thesis or Diss., Paris, CNAM, 2016. http://www.theses.fr/2016CNAM1057.
Der volle Inhalt der QuelleSoftware systems are critical and complex. In order to guarantee their correctness, the use of formal methodsis important. These methods can be defined as mathematically based techniques, languages and tools for specifying and reasoning about systems. But, the application of formal methods to software systems, implemented in C, is challenging due to the presence of pointers, pointer arithmetic andinteraction with hardware. Moreover, software systems are often concurrent, making the verification process infeasible. This work provides a methodology to specify and verify C software systems usingmodel-checking technique. The proposed methodology is based on translating the semantics of Cinto TLA+, a formal specification language for reasoning about concurrent and reactive systems. We define a memory and execution model for a sequential program and a set of translation rules from C to TLA+ that we developed in a tool called C2TLA+. Based on this model, we show that it can be extended to support concurrency, synchronization primitives and process scheduling. Although model-checking is an efficient and automatic technique, it faces the state explosion problem when the system becomes large. To overcome this problem, we propose a state-space reduction technique. The latter is based on agglomerating a set of C instructions during the generation phase of the TLA+ specification. This methodology has been applied to a concrete case study, a microkernel of an industrial real-time operating system, on which a set of functional properties has been verified. The application of the agglomeration technique to the case study shows the usefulness of the proposed technique in reducing the complexity of verification. The obtained results allow us to study the behavior of the system and to find errors undetectable using traditional testing techniques
Matoussi, Abderrahman. „Construction de spécifications formelles abstraites dirigée par les buts“. Thesis, Paris Est, 2011. http://www.theses.fr/2011PEST1036/document.
Der volle Inhalt der QuelleWith most of formal methods, an initial formal model can be refined in multiple steps, until the final refinement contains enough details for an implementation. Most of the time, this initial model is built from the description obtained by the requirements analysis. Unfortunately, this transition from the requirements phase to the formal specification phase is one of the most painful steps in the formal development chain. In fact, building this initial model requires a high level of competence and a lot of practice, especially as there is no well-defined process to assist designers. Parallel to this problem, it appears that non-functional requirements are largely marginalized in the software development process. The current industrial practices consist generally in specifying only functional requirements during the first levels of this process and in leaving the consideration of non-functional requirements in the implementation level. To overcome these problems, this thesis aims to define a coupling between a requirement model expressed in SysML/KAOS and an abstract formal specification, while ensuring a distinction between functional and non-functional requirements from the requirements analysis phase. For that purpose, this thesis proposes firstly two different approaches (one dedicated to the classical B and the other to Event-B) in which abstract formal models are built incrementally from the SysML/KAOS functional goal model. Afterwards, the thesis focuses on the approach dedicated to Event-B in order to complete it and enrich it by using the two other SysML/KAOS models describing the non-functional goals and their impact on functional goals. We present different ways to inject these non-functional goals and their impact into the obtained abstract Event-B models. Links of correspondance between the non-functional goals and the different Event-B elements are also defined in order to improve the management of the evolution of these goals. The different approaches proposed in this thesis have been applied to the specification of a localization component which is a critical part of a land transportation system. The approach dedicated to Event-B is implemented in the SysKAOS2EventB tool, allowing hence the generation of an Event-B refinement architecture from a SysML/KAOS functional goal model. This implementation is mainly based on the model-to-model transformation technologies
Azem, Sadia. „Ordonnancement des systemes flexibles de production sous contraintes de disponibilite des ressources“. Phd thesis, Ecole Nationale Supérieure des Mines de Saint-Etienne, 2010. http://tel.archives-ouvertes.fr/tel-00611830.
Der volle Inhalt der Quelle