• Title/Summary/Keyword: Formal verification

Search Result 201, Processing Time 0.028 seconds

SDL-OPNET Model Conversion Technique for the Development of Communication Protocols with an Integrated Model Design Approach (통합 모델 설계 방식 기반 통신 프로토콜 개발을 위한 SDL-OPNET 모델 변환 기법)

  • Kim, Jae-Woo;Kim, Tae-Hyong
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.2
    • /
    • pp.67-76
    • /
    • 2010
  • Although both functional verification and performance evaluation are necessary for the development of effective and reliable communication systems, they have been often performed independently; by functional modeling with formal language tools and by performance modeling with professional network performance evaluation tools, respectively. Separate and repeated modeling of one system, however, would often result in cost increase and inconsistency between the models. This paper proposes an integrated model design approach in order to overcome this problem that evaluates the performance of a communication protocol designed in SDL with SDL-OPNET model conversion. The proposed technique generates OPNET skeleton code from Tau-generated C code of the SDL model by analyzing the relations between SDL and OPNET models. IEEE 802.2 LLC protocol was used as an example of model conversion to show the applicability and effectiveness of the proposed technique.

Verification Methodology of Security S/W using Security Formal Verification Tool (보안 정형 검증 도구를 이용한 보안 S/W 검증 방안)

  • Kim, Gi-Hwan;Jang, Seung-Ju;Prak, Il-Hwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1091-1094
    • /
    • 2005
  • 보안 소프트웨어 개발을 위한 정형 기법은 소프트웨어의 안정성과 신뢰성을 보장할 수 있는 기반을 마련해 준다. 정형화 기법에는 정형 명세와 정형 검증으로 분류할 수 있으며, 이를 위해 여러 도구가 제공되고 있다. 본 논문에서는 보안 소프트웨어 개발을 위한 RoZ 정형 명세 도구를 이용하여 ACS(Access Control System)의 UML 모델을 통한 Z 명세 자동 생성 과정을 살펴본다. 그리고, 정형 검증 도구인 Z/EVES를 이용하여 ACS 의 특정 기능의 명세에 대한 검증 과정을 수행함으로써, 소프트웨어 설계에 따른 보안 소프트웨어의 안정성을 보장할 수 있는 개발 방안을 제시하였다.

  • PDF

Protocol Verification and Conformance Test for Rail Signal Control Protocol specified in LTS (LTS로 명세화된 철도 신호제어용 프로토콜 검정 및 적합성시험)

  • Seo Mi-Seon;Kim Sung-Un;Hwang Jong-Gyu;Lee Jae-Ho
    • Proceedings of the KSR Conference
    • /
    • 2003.10c
    • /
    • pp.581-586
    • /
    • 2003
  • As a very important part in development of the protocol, verification and conformance test for protocol specification are complementary techniques that are used to increase the level of confidence in the system functions. as prescribed by their specifications. In this paper, we verify the safety and liveness properties of rail signal control protocol type 1 specified in LTS(Labeled Transition System) with model checking method, and experimentally prove that it is possible to check for the deadlock, livelock and rechability of the states and actions on LTS. We also propose a formal method on generation of conformance test cases using the concept of UIO sequences from verified protocol specification.

  • PDF

A Study on the Analytic Technique Combination and Evaluation of Development Process for Software Safety (S/W 안전성을 위한 분석기법 조합과 개발 프로세스 평가에 대한 연구)

  • Lee, Young-Soo;Ahn, Jin;Ha, Seung-Tea;Cho, Woo-Sik;Han, Chan-Hee
    • Proceedings of the KSR Conference
    • /
    • 2006.11b
    • /
    • pp.1468-1476
    • /
    • 2006
  • The goal of this thesis is to support safety and reliability characteristics of software intensive critical systems. The verification method developed is innovative from current state of the art in what concerns the verification viewpoint adopted: focusing on software faults, and not, like many other approaches purely on fulfilling functional requirements. As a first step and based on a number of well defined criteria a comparison was made of available literature in the area of static non formal non probabilistic software fault removal techniques. But, None of the techniques evaluated fulfilled all criteria set in isolation. Therefore a new technique was developed based on a combination of two existing techniques: the FMEA and FTA. These two techniques complement each other very well. It is possible to integrate both techniques with commonly used techniques at system level. The resulting new technique can be shown to combine nearly all aspects of existing fault removal techniques.

  • PDF

A Study on Analysis for Secure M-Commerce Transaction (안전한 모바일 전자상거래를 위한 분석 연구)

  • Lee Ji-Yeon
    • Journal of the Korea Computer Industry Society
    • /
    • v.7 no.3
    • /
    • pp.199-204
    • /
    • 2006
  • M-commerce protocols have usually been developed using informal design and verification techniques. However, many security protocols thought to be secure was found to be vulnerable later. With the rise of smart card's usage, mobile e-commerce services with CEPS which is one of e-commerce transaction standards has been increased. In this paper, we describe a methodology to analyze the security of e-commece protocols and identify the security vulnerability of the CEPS based good purchase and e-money load protocols using formal verification technique. Finally, we discuss a countermeasure against the vulnerability in the purchase transaction protocol.

  • PDF

Formal Verification of I-Link Bus arbiter Protocol Using VIS (VIS를 이용한 I-Link Bus 중재 프로토콜의 정형검증)

  • Um, Hyun-Sun;Choi, Jin-Young;Han, Woo-Jong;Ki, An-Do
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.04a
    • /
    • pp.149-154
    • /
    • 2000
  • 시스템이 복잡해짐에 따라 현재 사용되고 있는 무작위적 테스트나 시뮬레이션은 프로토콜의 정확성을 확인하기에 충분하지 못하므로 보다 효율적이고 믿을 만한 검증 방법이 필요하다. 본 논문은 ETRI에서 개발한 디렉토리 기반 CC-NUMA시스템의 CCA(Cache Coherent Agent)보드 내부 버스인 I-Link(Inside Link) 버스의 중재 프로토콜을 정형 검증에 쓰이는 도구 중의 하나인 VIS(Verification Interacting with Synthesis)를 이용하여 검증한다. VIS는 Verilog 입력을 받는 도구이므로 개발 단계에서 만들어진 소스를 그대로 이용하여 검증하는 기법을 사용하였고 이를 통해 보다 정확한 명세와 검증을 할 수 있었다.

  • PDF

A Study on the Management Strategy of Origin for Preparing the Origin Verification Of Export Companies (수출기업의 원산지검증 대비를 위한 원산지관리 전략에 관한 연구)

  • Bae, Myong-Ryeol
    • International Commerce and Information Review
    • /
    • v.18 no.4
    • /
    • pp.115-141
    • /
    • 2016
  • The purpose of this study is to examine the status of FTA origin verification for exported goods in Korea and analyze the cases of major origin verification to seek origin management strategies that enables exporters to actively satisfy origin verification requirements. The case analysis demonstrates that it is important to meet not only the substantive, but also formal and procedural requirements of origin verification. We identified origin management strategies including: develop internal origin management experts and origin management system, utilize external expertise and related support institutions, strengthen networking with supplier companies, consider origin management at the contract stage and continue origin management after export.

  • PDF

Verification, Validation, and Accreditation (VV&A) Considering Military and Defense Characteristics

  • Kim, Jung Hoon;Jeong, Seugmin;Oh, Sunkyung;Jang, Young Jae
    • Industrial Engineering and Management Systems
    • /
    • v.14 no.1
    • /
    • pp.88-93
    • /
    • 2015
  • In this paper, we identify the characteristics of modeling and simulation (M&S) for military and defense and propose the method of verification, validation, and accreditation (VV&A) using the identified characteristics. M&S has been widely used for many different applications in military and defense, including training, analysis, and acquisition. Various methods and processes of VV&A have been proposed by researchers and M&S practitioners to guarantee the correctness of M&S. The notion of applying formal credibility assessment in VV&A originated in software engineering reliability testing and the systems engineering development process. However, the VV&A techniques and processes proposed for M&S by the research community have not addressed the characteristics and issues specific to military and defense. We first identify the characteristics and issues of military/defense M&S and then propose techniques and methods for VV&A that are specific for military/defense M&S. Possible approaches for the development of VV&A are also proposed.

Automatic Verification of the Control Flow Model for Effective Embedded Software Design (효과적인 임베디드 소프트웨어 설계를 위한 제어흐름 모델의 자동 검증)

  • Park, Sa-Choun;Kwon, Gi-Hwon;Ha, Soon-Hoi
    • The KIPS Transactions:PartA
    • /
    • v.12A no.7 s.97
    • /
    • pp.563-570
    • /
    • 2005
  • Hardware and software codesign framework called PeaCE(Ptolemy extension as a Cod sign Environment) allows to express both data flow and control flow. To formally verify an fFSM specification which expresses control flow in PeaCE, the step semantics of the model was defined. In this paper, we introduce the automatic verification tool developed by formal semantics of previous work. This tool uses the SMV as inner model checker md, through our tool, users can formally verify some important bugs such as race condition, ambiguous transition, and circulartransition without directly writing logical formulae.

Integration and Verification of Privacy Policies Using DSML's Structural Semantics in a SOA-Based Workflow Environment (SOA기반 워크플로우 환경에서 DSML의 구조적 접근방법을 사용한 프라이버시 정책 모델의 통합과 검증)

  • Lee, Yong-Hwan;Jan, Werner;Janos, Sztipanovits
    • Journal of Internet Computing and Services
    • /
    • v.10 no.4
    • /
    • pp.139-149
    • /
    • 2009
  • In order to verify that a lot of legal requirements and regulations are correctly translated into software, this paper provides a solution for formal and computable representations of rules and requirements in data protection legislations with a DSML (Domain Specific Modeling Language). All policies are formally specified through Prolog and then integrated with DSML, According to the time of policy verification, this solution has two kinds of policies: static policies, dynamic policies.

  • PDF