Academic literature on the topic 'Software analysis and verification'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software analysis and verification.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Software analysis and verification"
V. Gayetri Devi, S., C. Nalini, and N. Kumar. "An efficient software verification using multi-layered software verification tool." International Journal of Engineering & Technology 7, no. 2.21 (April 20, 2018): 454. http://dx.doi.org/10.14419/ijet.v7i2.21.12465.
Full textChaki, Sagar, Edmund Clarke, Natasha Sharygina, and Nishant Sinha. "Verification of evolving software via component substitutability analysis." Formal Methods in System Design 32, no. 3 (May 2, 2008): 235–66. http://dx.doi.org/10.1007/s10703-008-0053-x.
Full textChun, Seung Su. "Effective Extraction of State Invariant for Software Verification." Applied Mechanics and Materials 752-753 (April 2015): 1097–104. http://dx.doi.org/10.4028/www.scientific.net/amm.752-753.1097.
Full textCao, Zongyu, Wanyou Lv, Yanhong Huang, Jianqi Shi, and Qin Li. "Formal Analysis and Verification of Airborne Software Based on DO-333." Electronics 9, no. 2 (February 14, 2020): 327. http://dx.doi.org/10.3390/electronics9020327.
Full textSa'd, M. Al, J. Graham, and G. P. Liney. "A software tool for 3D dose verification and analysis." Journal of Physics: Conference Series 444 (June 26, 2013): 012087. http://dx.doi.org/10.1088/1742-6596/444/1/012087.
Full textLiu, Hua Xiao, Peng Zhang, Li Wen Mu, Ying Jin, and Xue Hang Chi. "A Verification Method of Software Acceptability." Applied Mechanics and Materials 411-414 (September 2013): 436–39. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.436.
Full textCharlton, Nathaniel. "Program verification with interacting analysis plugins." Formal Aspects of Computing 19, no. 3 (April 5, 2007): 375–99. http://dx.doi.org/10.1007/s00165-007-0029-4.
Full textBertrane, Julien, Patrick Cousot, Radhia Cousot, Jérôme Feret, Laurent Mauborgne, Antoine Miné, and Xavier Rival. "Static Analysis and Verification of Aerospace Software by Abstract Interpretation." Foundations and Trends® in Programming Languages 2, no. 2-3 (2015): 71–190. http://dx.doi.org/10.1561/2500000002.
Full textKornecki, Andrew, and Mingye Liu. "Fault Tree Analysis for Safety/Security Verification in Aviation Software." Electronics 2, no. 4 (January 31, 2013): 41–56. http://dx.doi.org/10.3390/electronics2010041.
Full textVenet, Arnaud. "A practical approach to formal software verification by static analysis." ACM SIGAda Ada Letters XXVIII, no. 1 (April 2008): 92–95. http://dx.doi.org/10.1145/1387830.1387836.
Full textDissertations / Theses on the topic "Software analysis and verification"
Jobredeaux, Romain J. "Formal verification of control software." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53841.
Full textDomagoj, Babić. "Exploiting structure for scalable software verification." Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/1502.
Full textWhite, Maurice Walter. "Verification and evaluation of structural analysis and design software." Thesis, Virginia Tech, 1991. http://hdl.handle.net/10919/41489.
Full textde, Carvalho Gomes Pedro. "Automatic Extraction of Program Models for Formal Software Verification." Doctoral thesis, KTH, Teoretisk datalogi, TCS, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-176286.
Full textDen här avhandlingen studerar automatisk konstruktion av abstrakta modeller för formell verifikation av program skrivna i verkliga programmeringsspråk. Avhandlingen består av tre delar som involverar olika typer av program, programmeringsspråk, verifikationsscenarier, programmodeller och egenskaper.Del ett presenterar en algoritm för generation av flödesgrafer från sekventiella program i Java bytekod. Graferna är skräddarsydda för en kompositionell teknik för verifikationen av temporala kontrollflödens säkerhetsegenskaper. Vi visar att de extraherade modellerna sunt överapproximerar programbeteenden med avseende på sekvenser av metodanrop och -undantag. Således gäller egenskaperna som kan fastställas genom kompositionstekniken över kontrollflöden även för programmen. Vi implementerar dessutom algoritmen i form av verktyget ConFlEx och utvärderar verktyget på ett antal testfall.Del två presenterar en teknik för att generera modeller av ofullständiga program. Det vill säga, program där implementationen av åtminstone en komponent inte är tillgänglig. Vi definierar ett ramverk för att representera ofullständiga Java bytekodsprogram och utökar algoritmen från del ett till att hantera ofullständig kod. Därefter presenterar vi raffineringsregler - villkor för att instansiera den saknade koden - och bevisar att reglerna bevarar relevanta egenskaper av kontrollflödesgrafer. Vi har dessutom utökat ConFlEx till att stödja de nya definitionerna och har omvärderat verktyget på testfall av ofullständiga program.Del tre angriper verifikation av multitrådade program. Vi presenterar en teknik för att bevisa följande egenskap för synkronisering med vilkorsvariabler: "Om varje trådsynkronisering under samma villkor så småningom stiger in i sitt synkroniseringsblock så kommer varje tråd också till slut lämna synkroniseringen". För att stödja verifikationen så introducerar vi först SyncTask - ett enkelt mellanliggande språk för att specificera synkronisering av parallella beräkningar. Därefter presenterar vi ett annoteringsspråk för Java som tillåter automatisk extrahering av SyncTask-program och visar att egenskapen gäller om och endast om motsvarande SyncTask-program terminerar. Vi reducerar termineringsproblemet till ett nåbarhetsproblem på färgade Petrinät samt definierar en algoritm som skapar Petrinät från SyncTask-program där programmet terminerar om och endast om nätet alltid når en särskild mängd av döda konfigurationer. Extraktionen av SyncTask-program och deras motsvarande Petrinät är implementerade i form av verktyget STaVe. Slutligen utvärderar vi verktyget genom att mata annoterade.
QC 20151101
Molin, Oscar. "Design verification through software architecture recovery : Meeting ISO 26262 requirements on software using static analysis." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-202149.
Full textLimouee, Maryam. "Verification of NYSlab a software for the analysis of jointed pavements /." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2009. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textMrvaljevic, Pavle. "Tool orchestration for modeling, verification and analysis of collaborating autonomous machines." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-48884.
Full textMotta, Teixeira Leopoldo. "Verification and refactoring of configuration knowledge for software product lines." Universidade Federal de Pernambuco, 2010. https://repositorio.ufpe.br/handle/123456789/2323.
Full textConselho Nacional de Desenvolvimento Científico e Tecnológico
Uma linha de produtos de software (LPS) é definida como um conjunto de sistemas de software que compartilham características em comum, mas que são suficientemente distintos entre si, desenvolvidos a partir de um conjunto de artefatos reusáveis. Modelos de features e configuração são usados para possibilitar a geração automática de produtos a partir destes artefatos. Um modelo de features representa o conjunto de possíveis configurações de produto de uma LPS, enquanto o modelo de configuração estabelece o mapeamento entre features e implementação. Por exemplo, associando expressões de features, na forma de proposições lógicas, a artefatos. Os benefícios de produtividade que a abordagem de LPS fornece tornam possível que uma LPS seja capaz de gerar milhares de produtos. Neste contexto, erros cometidos ao especificar o modelo de configuração podem resultar em produtos inválidos - o problema da composição segura. Este problema pode ser difícil de ser detectado manualmente, já que os modelos de features e configuração podem tornar-se muito complexos. Gerar todos os produtos de uma LPS pode não ser prático, dado que existem LPS em que é possível gerar milhares de produtos. No entanto, mesmo modelos de configuração que não permitem a geração de produtos inválidos podem ter problemas na sua estrutura interna, como complexidade e duplicação, especialmente no contexto de LPS grandes, onde sua manutenção pode se tornar difícil. Precisamos nos certificar de que não introduzimos erros ao corrigir estes problemas. Neste trabalho, é proposta uma abordagem automática de verificação de composição segura para LPS baseadas em modelos de configuração. Esta abordagem é baseada na tradução de instâncias específicas de modelos de features e configuração em lógica proposicional, usando uma teoria codificada com Alloy. O suporte ferramental fornecido pelo Alloy Analyzer auxilia a verificação. Também é proposto um catálogo de refatoramentos simples para modelos de configuração, como uma maneira de evitar erros ao corrigir problemas na estrutura interna de tais modelos. Este catálogo é formalizado usando uma teoria geral para modelos de configuração especificada com o Prototype Verification System (PVS). Nós avaliamos a abordagem de verificação usando sete versões de uma LPS, com modelos de features que possibilitam a geração de até 272 produtos. Os resultados demonstram a vantagem de usar esta abordagem ao invés de gerar todos os produtos da LPS, já que o tempo médio para compilar um único produto da LPS é maior que o tempo para analisá-la na maior das versões analisadas. Também avaliamos o catálogo de refatoramento provando consistência (soundness) dos refatoramentos propostos no provador de teoremas de PVS
de, Carvalho Gomes Pedro. "Sound Modular Extraction of Control Flow Graphs from Java Bytecode." Licentiate thesis, KTH, Teoretisk datalogi, TCS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-105275.
Full textQC 20121122
de, Carvalho Gomes Pedro, and Attilio Picoco. "Sound Extraction of Control-Flow Graphs from open Java Bytecode Systems." KTH, Teoretisk datalogi, TCS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-104076.
Full textQC 20121029
Verification of Control-Flow Properties of Programs with Procedures(CVPP)
Books on the topic "Software analysis and verification"
Stanley, William, and Janusz Laski. Software Verification and Analysis. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84882-240-5.
Full textBultan, Tevfik, Fang Yu, Muath Alkhalaf, and Abdulbaki Aydin. String Analysis for Software Verification and Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68670-7.
Full textGermany) NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security (2011 Bayrischzell. Software safety and security: Tools for analysis and verification. Amsterdam: IOS Press published in cooperation with NATO Emerging Security Challenges Division, 2012.
Find full textKhedker, Uday. Data flow analysis: Theory and practice. Boca Raton, Fla: Taylor & Francis, 2009.
Find full textSymposium on Testing, Analysis, and Verification (1991 Victoria, B.C.). Proceedings of the Symposium on Testing, Analysis, and Verification (TAV4): Victoria, British Columbia, October 8-10, 1991. New York: ACM Press, 1991.
Find full textClarke, Dave. Aliasing in Object-Oriented Programming. Types, Analysis and Verification. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Find full textSymposium on Software Testing, Analysis, and Verification (3rd 1989 Key West, Fla.). Proceedings of the ACM SIGSOFT '89: Third Symposium on Software Testing, Analysis, and Verification (TAV3), Key West, Florida, December 13-15, 1989 / edited by Richard A. Kemmerer. New York: ACM Press, 1989.
Find full textZeljko, Zilic, ed. Verification by error modeling: Using testing techniques in hardware verification. Boston: Kluwer Academic Publishers, 2003.
Find full textBouajjani, Ahmed. Automated Technology for Verification and Analysis: 8th International Symposium, ATVA 2010, Singapore, September 21-24, 2010. Proceedings. Berlin, Heidelberg: Springer-Verlag Heidelberg, 2010.
Find full textSungdeok, Cha, ed. Automated technology for verification and analysis: 6th international symposium, ATVA 2008, Seoul, Korea, October 20-23, 2008, proceedings. Berlin: Springer, 2008.
Find full textBook chapters on the topic "Software analysis and verification"
Carré, Bernard. "Program analysis and verification." In High-Integrity Software, 176–97. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4684-5775-9_8.
Full textDonaldson, Alastair F., Leopold Haller, Daniel Kroening, and Philipp Rümmer. "Software Verification Using k-Induction." In Static Analysis, 351–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23702-7_26.
Full textHolzmann, Gerard_J. "Software Analysis and Model Checking." In Computer Aided Verification, 1–16. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45657-0_1.
Full textLaski, Janusz, and William Stanley. "Dynamic Program Analysis." In Software Verification and Analysis, 203–19. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84882-240-5_9.
Full textBerz, Martin, and Kyoko Makino. "Rigorous Reachability Analysis and Domain Decomposition of Taylor Models." In Numerical Software Verification, 90–97. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-63501-9_7.
Full textSekar, R. "Runtime Analysis and Instrumentation for Securing Software." In Runtime Verification, 58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16612-9_6.
Full textLaski, Janusz, and William Stanley. "Why Not Write Correct Software the First Time?" In Software Verification and Analysis, 1–14. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84882-240-5_1.
Full textLaski, Janusz, and William Stanley. "How to Prove a Program Correct: Programs Without Loops." In Software Verification and Analysis, 39–61. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84882-240-5_2.
Full textLaski, Janusz, and William Stanley. "How to Prove a Program Correct: Iterative Programs." In Software Verification and Analysis, 63–79. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84882-240-5_3.
Full textLaski, Janusz, and William Stanley. "Prepare Test for Any Implementation: Black-Box Testing." In Software Verification and Analysis, 81–99. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84882-240-5_4.
Full textConference papers on the topic "Software analysis and verification"
Podymov, Vladislav, and Uliana Popesko. "UPPAAL-based software-defined network verification." In 2013 Tools & Methods of Program Analysis (TMPA). IEEE, 2013. http://dx.doi.org/10.1109/tmpa.2013.7163715.
Full textMorell, L. J. "Theoretical insights into fault-based testing." In Workshop on Software Testing, Verification, and Analysis. IEEE, 1988. http://dx.doi.org/10.1109/wst.1988.5353.
Full text"Proceedings of the Second Workshop on Software Testing, Verification, and Analysis (Cat. No.88TH0225-3)." In Workshop on Software Testing, Verification, and Analysis. IEEE, 1988. http://dx.doi.org/10.1109/wst.1988.5360.
Full textWeiss, S. N. "A formal framework for the study of concurrent program testing." In Workshop on Software Testing, Verification, and Analysis. IEEE, 1988. http://dx.doi.org/10.1109/wst.1988.5362.
Full textKellogg, Martin, Vlastimil Dort, Suzanne Millstein, and Michael D. Ernst. "Lightweight verification of array indexing." In ISSTA '18: International Symposium on Software Testing and Analysis. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3213846.3213849.
Full textCarlson, Jan-Renee. "Verification of Software: The Textbook and Real Problems." In 11th AIAA/ISSMO Multidisciplinary Analysis and Optimization Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 2006. http://dx.doi.org/10.2514/6.2006-7128.
Full textCortesi, Agostino, Pietro Ferrara, and Nabendu Chaki. "Static analysis techniques for robotics software verification." In 2013 44th International Symposium on Robotics (ISR 2013). IEEE, 2013. http://dx.doi.org/10.1109/isr.2013.6739742.
Full textBeyene, Tewodros A., Marc Brockschmidt, and Andrey Rybalchenko. "CTL+FO verification as constraint solving." In ISSTA '14: International Symposium on Software Testing and Analysis. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2632362.2632364.
Full textLatorre, Nicolas, Francesco Alberti, and Natasha Sharygina. "Verige: verification with invariant generation engine." In ISSTA '14: International Symposium on Software Testing and Analysis. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2632362.2632373.
Full textAlqahtani, Sultan S. "Enhancing Trust – Software Vulnerability Analysis Framework." In 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST). IEEE, 2017. http://dx.doi.org/10.1109/icst.2017.76.
Full textReports on the topic "Software analysis and verification"
Leyva, Nha. Uncertainty Analysis and Software Verification. Office of Scientific and Technical Information (OSTI), July 2021. http://dx.doi.org/10.2172/1813900.
Full textNelson, Adam G., and Micheal A. Smith. Verification of the DIF3D Software to Support Fast Reactor Analysis. Office of Scientific and Technical Information (OSTI), February 2020. http://dx.doi.org/10.2172/1599877.
Full textVarma, Amit, and Jungil Seo. Verification of LRFD Bridge Design and Analysis Software for INDOT. West Lafayette, Indiana: Purdue University, 2011. http://dx.doi.org/10.5703/1288284314279.
Full textButler, Richard S. Air Force Systems Command Software Independent Verification and Validation Implementation Analysis and Guidance. Fort Belvoir, VA: Defense Technical Information Center, April 1988. http://dx.doi.org/10.21236/ada194309.
Full textLucon, Enrico. New software for the statistical analysis and qualification of NIST charpy verification specimen lots. Gaithersburg, MD: National Institute of Standards and Technology, April 2018. http://dx.doi.org/10.6028/nist.ir.8211.
Full textBRATZEL, D. R. Flammable Gas Refined Safety Analysis Tool Software Verification and Validation Report for Resolve Version 2.5. Office of Scientific and Technical Information (OSTI), September 2000. http://dx.doi.org/10.2172/804776.
Full textCopps, Kevin D. Verification of the coupled fluid/solid transfer in a CASL grid-to-rod-fretting simulation : a technical brief on the analysis of convergence behavior and demonstration of software tools for verification. Office of Scientific and Technical Information (OSTI), December 2011. http://dx.doi.org/10.2172/1038207.
Full textStrichman, Ofer. Software Regression Verification. Fort Belvoir, VA: Defense Technical Information Center, December 2013. http://dx.doi.org/10.21236/ada594501.
Full textCOMPUSEC INC SAN DIEGO CA. Secure Software Verification Tools. Fort Belvoir, VA: Defense Technical Information Center, February 1987. http://dx.doi.org/10.21236/ada189731.
Full textWallace, Dolores R., and Roger U. Fujii. Software verification and validation. Gaithersburg, MD: National Institute of Standards and Technology, 1989. http://dx.doi.org/10.6028/nist.sp.500-165.
Full text