Dissertations / Theses on the topic 'Formal verification'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Formal verification.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Tristan, Jean-Baptiste. "Formal verification of translation validators." Phd thesis, Université Paris-Diderot - Paris VII, 2009. http://tel.archives-ouvertes.fr/tel-00437582.
Full textTrinh, Cong Quy. "Formal Verification of Skiplist Algorithms." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-160314.
Full textDragomir, Ciprian. "Formal verification of P systems." Thesis, University of Sheffield, 2016. http://etheses.whiterose.ac.uk/15452/.
Full textHurd, J. "Formal verification of probabilistic algorithms." Thesis, University of Cambridge, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.604823.
Full textBotinčan, Matko. "Formal verification-driven parallelisation synthesis." Thesis, University of Cambridge, 2018. https://www.repository.cam.ac.uk/handle/1810/274136.
Full textJobredeaux, Romain J. "Formal verification of control software." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53841.
Full textParikh, Ankur. "Abstraction Guided Semi-formal Verification." Thesis, Virginia Tech, 2007. http://hdl.handle.net/10919/33596.
Full textMaster of Science
Bubel, Richard. "Formal verification of recursive predicates." [S.l. : s.n.], 2007. http://digbib.ubka.uni-karlsruhe.de/volltexte/1000008366.
Full textSuresh, Amrita. "Formal Verification of Communicating Automata." Electronic Thesis or Diss., université Paris-Saclay, 2022. http://www.theses.fr/2022UPASG092.
Full textDistributed systems involve processes that run independently and communicate asynchronously. While they capture a wide range of use cases and are hence, ubiquitous in our world, it is also particularly difficult to ensure their correctness. In this thesis, we model such systems using mathematical and logical formulation, and try to algorithmically verify them. In particular, we focus on FIFO (First In First Out) machines, with one or more finite-state machines communicating via unbounded reliable FIFO buffers.As most verification problems are known to be undecidable for FIFO machines, we focus on various subclasses and approximations of the model. The first model we consider are branch-well structured transition systems (branch-WSTS), a class which strictly includes the well-known class of WSTS. We study the problems of boundedness and termination for such systems, and demonstrate some examples of them. We also define another class of systems where the monotony condition is relaxed and show that a variant of the coverability problem is decidable under effectivity conditions.We then study the restriction of input-boundedness on FIFO machines, and show that rational reachability and various other properties are decidable for FIFO machines under the input-bounded restriction. In doing so, we answer a long standing open question regarding the reachability for input-bounded FIFO machines. We also derive some complexity bounds by considering the simplest case, a FIFO machine with a single channel.Another restriction that we study is synchronizability in communicating systems. In particular, we study this notion for MSCs (Message Sequence Charts), which is a model to represent executions of a communicating system. We show that if any set of MSCs can satisfy two properties, namely MSO (Monadic Second-order Logic) definability and bounded (special-)tree width, then synchronizability is decidable. Moreover, reachability and model-checking are also decidable within this framework. We also unify some classes from the literature using this framework, and for some other classes, show their undecidability
Wei, Jijie. "Formal verification of a digital PLL." Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/50048.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Pike, Lee. "Formal verification of time-triggered systems." [Bloomington, Ind.] : Indiana University, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3215296.
Full textSource: Dissertation Abstracts International, Volume: 67-04, Section: B, page: 2086. Adviser: Steven D. Johnson. "Title from dissertation home page (viewed June 20, 2007)."
Brückner, Ingo. "Slicing integrated formal specifications for verification /." Oldenburg : Univ., Fak. II, Dep. für Informatik, 2008. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=016564256&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Full textArnaud, Mathilde. "Formal verification of secured routing protocols." Phd thesis, École normale supérieure de Cachan - ENS Cachan, 2011. http://tel.archives-ouvertes.fr/tel-00675509.
Full textCompton, Michael James. "Formal verification of process algebra systems." Thesis, University of Cambridge, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.612067.
Full textMyreen, Magnus Oskar. "Formal verification of machine-code programs." Thesis, University of Cambridge, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.611450.
Full textOlthuis, Jorrit. "Verification of Formal Requirements through Tracing." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-289947.
Full textProgramvaruutveckling i järnvägsapplikationen styrs av strikta standarder som syftar till att säkerställa säkerheten. Det rekommenderas till exempel starkt att använda formella metoder när krav anges. Dessutom är det obligatoriskt att vissa roller uppfylls av olika ingenjörer. En vanlig teknik är att utveckla programvarutest för kraven. Det är en stor utmaning att se till att programvarukrav beskrivs, tolkas och implementeras på rätt sätt av olika ingenjörer. Tester beror helt på testaren för att täcka alla scenarier. Att ha fler metoder som förenklar spårning av krav och som beror mindre på testarens noggrannhet skulle ge många fördelar. Denna avhandling undersöker om och hur spårning av programvara (software tracing) kan användas för att värdera formella krav på programvara. Målet är att utföra spårningsvalidering så att den kan användas för att komplettera mer traditionella verifieringstekniker. Genom att verifiera formella krav på spår (trace) beror upptäckten av fel på händelserna i spåren. Som en konsekvens ger fler spår större möjlighet för att detektera fel. Därmed elimineras risken för att testaren missar viktiga fall. Den presenterade verifieringsmetoden specificerar först kraven i linear temporal logic och omvandlar denna specifikation till en icke-deterministisk Büchi-automat, eller en ändlig tillståndsautomat som också utvärderas. För det andra beskriver tillvägagångssättet flera alternativ för att samla in spår och hur man länkar dem till den formella specifikationen. Slutligen föreslår verifieringsmetoden en algoritm som tar Büchi-automaten och ett spår för att upptäcka överträdelser av kravet. Valideringsmetoden implementeras i form av flera verktyg och dess funktion visas med hjälp av ett leksaksexempel. Detta exempel modellerar en järnvägsapplikation så att dess krav kan verifieras med verktygen. Resultaten används sedan för att visa hur dessa verktyg kan användas i en verklig järnvägsapplikation. Med hjälp av dessa forskningsresultat och det fristående verktyget skapas en implementering i Trace Compass. Detta kan, precis som det fristående verktyget, avgöra för varje par av spår och krav om spårningen bryter mot kravet.
Limaye, Chinmay Avinash. "Formal Verification Techniques for Reversible Circuits." Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/33406.
Full textMaster of Science
Vimjam, Vishnu Chaithanya. "Strategies for SAT-Based Formal Verification." Diss., Virginia Tech, 2007. http://hdl.handle.net/10919/26078.
Full textPh. D.
Lu, Tianxiang. "Formal verification of the Pastry protocol." Thesis, Université de Lorraine, 2013. http://www.theses.fr/2013LORR0179/document.
Full textPastry is a structured P2P algorithm realizing a Distributed Hash Table over an underlying virtual ring of nodes. Several implementations of Pastry are available, but no attempt has so far been made to formally describe the algorithm or to verify its properties. Since Pastry combines complex data structures, asynchronous communication, and concurrency in the presence of spontaneous join and departure of nodes, it makes an interesting target for verification. This thesis focuses on the Join protocol of Pastry that integrates new nodes into the ring. All member nodes must have a consistent key mapping among each other. The main correctness property, named CorrectDelivery, states that there is always at most one node that can deliver an answer to a lookup request for a key and this node is the numerically closest member node to that key. This property is non-trivial to preserve in the presence of churn. In this thesis, unexpected violations of CorrectDelivery in the published versions of Pastry are discovered and analyzed using the TLA+ model checker TLC. Based on the analysis, the protocol IdealPastry is designed and verified using the interactive theorem prover TLAPS for TLA+. By relaxing certain hypotheses, IdealPastry is further improved to LuPastry, which is again formally proved correct under the assumption that no nodes leave the network. This hypothesis cannot be relaxed in general due to possible network separation when particular nodes simultaneously leave the network
Lu, Tianxiang. "Formal verification of the Pastry protocol." Electronic Thesis or Diss., Université de Lorraine, 2013. http://www.theses.fr/2013LORR0179.
Full textPastry is a structured P2P algorithm realizing a Distributed Hash Table over an underlying virtual ring of nodes. Several implementations of Pastry are available, but no attempt has so far been made to formally describe the algorithm or to verify its properties. Since Pastry combines complex data structures, asynchronous communication, and concurrency in the presence of spontaneous join and departure of nodes, it makes an interesting target for verification. This thesis focuses on the Join protocol of Pastry that integrates new nodes into the ring. All member nodes must have a consistent key mapping among each other. The main correctness property, named CorrectDelivery, states that there is always at most one node that can deliver an answer to a lookup request for a key and this node is the numerically closest member node to that key. This property is non-trivial to preserve in the presence of churn. In this thesis, unexpected violations of CorrectDelivery in the published versions of Pastry are discovered and analyzed using the TLA+ model checker TLC. Based on the analysis, the protocol IdealPastry is designed and verified using the interactive theorem prover TLAPS for TLA+. By relaxing certain hypotheses, IdealPastry is further improved to LuPastry, which is again formally proved correct under the assumption that no nodes leave the network. This hypothesis cannot be relaxed in general due to possible network separation when particular nodes simultaneously leave the network
Powell, Daniel, and n/a. "Formal Methods For Verification Based Software Inspection." Griffith University. School of Computing and Information Technology, 2003. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20030925.154706.
Full textPompeo, François. "A formal verification assistant for TROMLAB environment." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0003/MQ43667.pdf.
Full textLu, Jianping. "On the formal verification of ATM switches." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape8/PQDD_0001/MQ43654.pdf.
Full textZhang, Bairong. "Formal specification and verification of OSI protocols." Thesis, University of Bristol, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.337284.
Full textMancini, Loretta Ilaria. "Formal verification of privacy in pervasive systems." Thesis, University of Birmingham, 2015. http://etheses.bham.ac.uk//id/eprint/6105/.
Full textSmith, Mark Anthony Shawn 1968. "Formal verification of TCP and T/TCP." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/42779.
Full textIncludes bibliographical references (p. 421-424).
by Mark Anthony Shawn Smith.
Ph.D.
Davidson, Timothy A. S. "Formal verification techniques using quantum process calculus." Thesis, University of Warwick, 2012. http://wrap.warwick.ac.uk/51368/.
Full textFang, Lei. "Exploring Constraint Satisfiability Techniques in Formal Verification." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/27573.
Full textPh. D.
Sawada, Jun. "Formal verification of an advanced pipelined machine /." Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.
Full textKühne, Ulrich. "Advanced automation in formal verification of processors." Aachen Shaker, 2009. http://d-nb.info/998313092/04.
Full textMiyazawa, Alvaro Heiji. "Formal verification of implementations of stateflow charts." Thesis, University of York, 2012. http://etheses.whiterose.ac.uk/2353/.
Full textPowell, Daniel. "Formal Methods For Verification Based Software Inspection." Thesis, Griffith University, 2003. http://hdl.handle.net/10072/366466.
Full textThesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Computing and Information Technology
Full Text
Livadas, Carolos. "Formal verification of safety-critical hybrid systems." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/42817.
Full textIncludes bibliographical references (p. 181-185).
This thesis investigates how the formal modeling and verification techniques of computer science can be used for the analysis of hybrid systems [7,14,22,37] - systems involving both discrete and continuous behavior. The motivation behind such research lies in the inherent similarity of the hierarchical and decentralized control strategies of hybrid systems and the communication and operation protocols used for distributed systems in computer science. As a case study, the thesis focuses on the development of techniques that use hybrid I/O automata [29,30] to model and analyze automated vehicle transportation systems and, in particular, their various protection subsystems - control systems that are used to ensure that the physical plant at hand does not violate its various safety requirements. The thesis is split into two major parts. In the first part, we develop an abstract model of a physical plant and its various protection subsystems - also referred to as protectors. The specialization of this abstract model results in the specification of a particular automated transportation system. Moreover, the proof of correctness of the abstract model leads to simple correctness proofs of the protector implementations for particular specializations of the abstract model. In this framework, the composition of independent protectors is straightforward - their composition guarantees the conjunction of the safety properties guaranteed by the individual protectors. In fact, it is shown that under certain conditions composition holds for dependent protectors also. In the second part, we specialize the aforementioned abstract model to simplified versions of the personal rapid transit system (PRT 200TM) under development at Raytheon Corporation. We examine overspeed and collision protection for a set of vehicles traveling on straight tracks, on binary merges, and on a directed graph of tracks involving binary merges and diverges. In each case, the protectors sample the state of the physical plant and take protective actions to guarantee that the physical plant does not reach hazardous states. The proofs of correctness of such protectors involve specializing the abstract protector to the physical plant at hand and proving that the suggested protector implementations are correct. This is done by defining simulations among the states of the protector implementations and their abstract counterparts.
by Carolos Livadas.
M.Eng.
Griggio, Alberto. "An Effective SMT Engine for Formal Verification." Doctoral thesis, Università degli studi di Trento, 2009. https://hdl.handle.net/11572/368265.
Full textGriggio, Alberto. "An Effective SMT Engine for Formal Verification." Doctoral thesis, University of Trento, 2009. http://eprints-phd.biblio.unitn.it/145/1/thesis.pdf.
Full textGriggio, Alberto. "An Effective SMT Engine for Formal Verification." Doctoral thesis, Università degli studi di Trento, 2009. https://hdl.handle.net/11572/368765.
Full textGriggio, Alberto. "An Effective SMT Engine for Formal Verification." Doctoral thesis, University of Trento, 2009. http://eprints-phd.biblio.unitn.it/166/2/thesis.pdf.
Full textFerrara, Andrea. "Formal verification: further complexity issues and applications." Doctoral thesis, La Sapienza, 2006. http://hdl.handle.net/11573/917050.
Full textKattenbelt, Mark Alex. "Automated quantitative software verification." Thesis, University of Oxford, 2010. http://ora.ox.ac.uk/objects/uuid:62430df4-7fdf-4c4f-b3cd-97ba8912c9f5.
Full textEleftherakis, George. "Formal verification of X-machine models : towards formal development of computer-based systems." Thesis, University of Sheffield, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.400012.
Full textHossain, Mousam. "Formal Verification Methodology for Asynchronous Sleep Convention Logic Circuits Based on Equivalence Verification." Thesis, North Dakota State University, 2019. https://hdl.handle.net/10365/31574.
Full textMohnke, Janett. "A signature-based approach to formal logic verification." [S.l. : s.n.], 1999. http://deposit.ddb.de/cgi-bin/dokserv?idn=960520406.
Full textTraub, Johannes [Verfasser]. "Formal Verification of Concurrent Embedded Software / Johannes Traub." Kiel : Universitätsbibliothek Kiel, 2016. http://d-nb.info/1105472175/34.
Full textArgote, Garcia Gonzalo. "Formal verification and testing of software architectural models." FIU Digital Commons, 2009. http://digitalcommons.fiu.edu/etd/1308.
Full textYao, Håkansson Jonathan, and Niklas Rosencrantz. "Formal Verification of Hardware Peripheral with Security Property." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209807.
Full textMålet med vårt projekt är att verifiera olika specifikationer av externa enheter som ansluts till datorn. Vi utför formell verifikation av sådan datorutrustning och virtuellt minne. Verifikation med temporal logik, LTL, utförs. Specifikt verifierar vi 4 olika use-case och 9 formler för seriell datakommunikation, DMA och virtuellt minne. Slutsatsen är att anslutning av extern hårdvara är säker om den är ordentligt konfigurerad.Vi gör jämförelser mellan olika minnesstorlekar och mätte tidsåtgången för att verifiera olika system. Vi ser att tidsåtgången för verifikation är långsammare än linjärt beroende och att relativt små system tar relativt lång tid att verifiera.
Mejri, Mohamed. "A formal automatic verification of authentication cryptographic protocols." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq26244.pdf.
Full textNegulescu, Radu. "Process spaces and formal verification of asynchronous circuits." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/NQ32848.pdf.
Full textKong, Xiaohua 1974. "Formal verification of peephole optimization in asynchronous circuits." Thesis, McGill University, 2001. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=32962.
Full textSarraf, Danny. "Optimizing assertions in semi-formal assertion- based verification." Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=116927.
Full textLa vérification basée sur l'assertion (Assertion-based Verification - ABV) est une approche de vérification puissante ayant été prouvée à aider les architectes numériques de circuits intégrés, les concepteurs et les ingénieurs de vérification à améliorer la qualité de conception et de réduire le temps de mise sur le marché. Les assertions sont un outil très puissant et précis pour définir les propriétés de la conception logique. Elles peuvent être employées dans tous les environnements de vérification: simulation, émulation ou formelle. Aussi important, elles peuvent être utilisées comme corrections ou encore comme hypothèses.Les inconvénients majeurs d'ABV sont que les assertions nécessitent beaucoup de temps a déboguer, qu'il n'y a pas de bonne facon de mesurer la qualité des assertions produites manuellement et qu'on ne sait pas comment déterminer combien d'assertions on a besoin d'écrire.Cette thèse tente d'apporter de nouvelles idées afin de résoudre ces questions. Différentes méthodes d'ajouter des assertions ont été explorées. La tache de la rédaction d'assez d'assertions a été décomposée en plus petits et plus gérables morceaux.Pour réaliser ceci, différents types d'assertions ont été d'abord identifiées en termes de leur utilité des points de vue des concepteurs et ingénieurs de vérification.Enfin, la mise en œuvre des techniques de synthèse logique pour optimiser les assertions ont été explorées. Des améliorations notables en termes de minimisation du nombre total d'assertions ainsi que la production d'assertions plus efficaces ont été observées.
Meedeniya, Dulani Apeksha. "Correct model-to-model transformation for formal verification." Thesis, University of St Andrews, 2013. http://hdl.handle.net/10023/3691.
Full text