• 제목/요약/키워드: correctness

검색결과 831건 처리시간 0.034초

Verifying Code toward Trustworthy Software

  • Kim, Hyong-Soon;Lee, Eunyoung
    • Journal of Information Processing Systems
    • /
    • 제14권2호
    • /
    • pp.309-321
    • /
    • 2018
  • In the conventional computing environment, users use only a small number of software systems intensively. So it had been enough to check and guarantee the functional correctness and safety of a small number of giant systems in order to protect the user systems and their information inside the systems from outside attacks. However, checking the correctness and safety of giant systems is not enough anymore, since users are using various software systems or web services provided by unskilled developers. To prove or guarantee the safety of software system, a lot of research has been conducted in diverse areas of computer science. We will discuss the on-going approaches for guaranteeing or verifying the safety of software systems in this paper. We also discuss the future research challenge which must be solved with better solutions in the near future.

A Security Metrics Taxonomization Model for Software-Intensive Systems

  • Savola, Reijo M.
    • Journal of Information Processing Systems
    • /
    • 제5권4호
    • /
    • pp.197-206
    • /
    • 2009
  • We introduce a novel high-level security metrics objective taxonomization model for software- intensive systems. The model systematizes and organizes security metrics development activities. It focuses on the security level and security performance of technical systems while taking into account the alignment of metrics objectives with different business and other management goals. The model emphasizes the roles of security-enforcing mechanisms, the overall security quality of the system under investigation, and secure system lifecycle, project and business management. Security correctness, effectiveness and efficiency are seen as the fundamental measurement objectives, determining the directions for more detailed security metrics development. Integration of the proposed model with riskdriven security metrics development approaches is also discussed.

SystemC 방법론을 적용한 JPEG Encoder 설계 (Design of a JPEG Encoder Using SystemC Methodology)

  • 오세준;조원경
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2001년도 하계종합학술대회 논문집(2)
    • /
    • pp.313-316
    • /
    • 2001
  • In this paper we present the design of a JPEG Encoder using SystemC Methodology Our methodology supports the efficient mapping of C/C++ functional descriptions directly into hardware. The use of C/C++ to model al1 parts of the system provides great flexibility and enables faster simulation compared to existing methodologies. The designer can estimate system performance and verify functional correctness of the designs using commonly available software compilers. A design flow in SystemC begins with an untimed description in C++, using a library of new data types useful for modeling hardware. The description can be compiled and simulated for functional correctness. Then, the design may be refined by adding interface specification and timing information, and again the timed description can be compiled with a standard C++ compiler, simulated, and debugged.

  • PDF

객체모델에 대한 형식명세로의 변환 방법 (The Translation Method to formal specification of Object Model)

  • 임근;권영만
    • 한국컴퓨터정보학회논문지
    • /
    • 제8권4호
    • /
    • pp.21-27
    • /
    • 2003
  • 본 논문에서는 정확한 분석 모델을 제시하기 위해서 객체 모델을 정의하고, 이 모델을 정형화와 표준화에 필요한 형식명세로 변환하는 방법을 제안한다. VDM 형식으로 변환된 모델은 정확성, 일관성, 완전성을 제공할 수 있다. 증명의 대상인 VDM 명세에서 오류가 발생한다면 초기 객체 모델 단계에 적용하여 객체 모델의 검증이 가능하다. 검증된 객체 모델을 설계 단계의 기반 명세로 사용하므로 추후 개발 단계의 비용과 노력을 최소화하고 객체 모델 선택의 정확성을 높일 수 있다.

  • PDF

객체지향 프로그램의 슬라이싱에 관한 연구 (A Study on Program Slicing of Object-Oriented Programs)

  • 김희천
    • 한국컴퓨터산업학회논문지
    • /
    • 제2권9호
    • /
    • pp.1199-1208
    • /
    • 2001
  • 프로그램 슬라이싱은 테스팅 및 유지보수 작업의 효율성을 높이기 위한 프로그램 분해 기술이다. 본 논문에서는 객체지향 프로그램 실행부의 슬라이싱 방법을 제안하고 정확성을 분석하였다. 또한 프로그램이 주어졌을 때 클래스 선언부에서 필요 없는 함수와 사용하지 않는 데이터멤버 및 서브객체를 제거하는 클래스 인터페이스 슬라이싱 방법을 제안하고 정확성을 증명하였다. 또 클래스 선언부만을 가지고 주어진 데이터멤버에 영향을 주는 또는 영향을 받는 부분을 추출해 내는 클래스 계층구조의 슬라이싱 방법을 제안하였다. 이러한 기술은 클래스 테스팅 같은 분야에서 정보분석 작업에 이용될 수 있다.

  • PDF

유아증언의 신뢰성 연구 (The credibility of child testimony)

  • 김재연;이재연
    • 아동학회지
    • /
    • 제21권3호
    • /
    • pp.53-68
    • /
    • 2000
  • This study investigated differences between the ability of children and young adults to describe their experience. Forty 5-year-olds and 40 16-year-olds viewed 12 pictures(Azmitia, 1987) and responded to open-ended, closed and misleading questions. Responses were categorized by the SPSS WIN program into rate of correctness, incorrectness, unresponsiveness and "don't know". Data were analyzed by t-test. On open-ended questions, the rate of incorrectness by young adults was higher than that of children. On closed questions, children had a higher rate of incorrectness than young adults. On misleading questions, children showed a lower performance in the rate of correctness and "don't know" and the rate of incorrectness by children was higher than that of young adults.

  • PDF

A Secure Auction Protocol without Any Dispute

  • Ha, Jung-Hoon;Kwak, Dong-Jin;Moon, Sang-Jae
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2003년도 동계학술대회
    • /
    • pp.518-522
    • /
    • 2003
  • We propose a new auction protocol scheme that uses the publicly verifiable secret sharing (PVSS) scheme. Unlike the existing scheme where a verifiable encryption scheme is employed when there is a dispute between a bidder and the auctioneer, the proposed scheme essentially removes the potential of a dispute. In addition, it has a robust registration phase and any entities participating in or observing the auction can verify the correctness of the auction process. The manager does not directly chooses the private key for the bidders, but only verifies the correctness between the private key and the public key, thereby improving the security, such as a bid submission of a malicious manager using the private key of a bidder.

  • PDF

A Joint Channel Estimation and Data Detection for a MIMO Wireless Communication System via Sphere Decoding

  • Patil, Gajanan R.;Kokate, Vishwanath K.
    • Journal of Information Processing Systems
    • /
    • 제13권4호
    • /
    • pp.1029-1042
    • /
    • 2017
  • A joint channel estimation and data detection technique for a multiple input multiple output (MIMO) wireless communication system is proposed. It combines the least square (LS) training based channel estimation (TBCE) scheme with sphere decoding. In this new approach, channel estimation is enhanced with the help of blind symbols, which are selected based on their correctness. The correctness is determined via sphere decoding. The performance of the new scheme is studied through simulation in terms of the bit error rate (BER). The results show that the proposed channel estimation has comparable performance and better computational complexity over the existing semi-blind channel estimation (SBCE) method.

Implementing a Verified Efficient RUP Checker

  • 어덕기
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2012년도 춘계학술발표대회
    • /
    • pp.1176-1179
    • /
    • 2012
  • To ensure the correctness of high performance satisfiability (SAT) solvers, several proof formats have been proposed. SAT solvers can report a formula being unsatisfiable with a proof, which can be independently verified by a trusted proof checker. Among the proof formats accepted at the SAT competition, the Reverse Unit Propagation (RUP) format is considered the most popular. However, the official proof checker was not efficient and failed to check many of the proofs at the competition. This inefficiency is one of the drawbacks of SAT proof checking. In this paper, I introduce a work-in-progress project, vercheck to implement an efficient RUP checker using modern SAT solving techniques. Even though my implementation is larger and more complex, the level of trust is preserved by statically verifying the correctness of the code. The vercheck program is written in GURU, a dependently typed functional programming language with a low-level resource management feature.

Application of mathematical metamodeling for an automated simulation of the Dong nationality drum tower architectural heritage

  • Deng, Yi;Guo, Shi Han;Cai, Ling
    • Computers and Concrete
    • /
    • 제28권6호
    • /
    • pp.605-619
    • /
    • 2021
  • Building Information Modeling (BIM) models are a powerful tool for preserving and using architectural history. Manually creating information models for such a significant number and variety of architectural monuments as Dong drum towers is challenging. The building logic based on "actual measurement construction" was investigated using the metamodel idea, and a metamodel-based automated modeling approach for the wood framework of Dong drum towers was presented utilizing programmable algorithms. Metamodels of fundamental frame kinds were also constructed. Case studies were used to verify the automated modeling's correctness, completeness, and efficiency using metamodel. The results suggest that, compared to manual modeling, automated modeling using metamodel may enhance the model's integrity and correctness by 5-10% while also reducing time efficiency by 10-20%. Metamodel and construction logic offer a novel way to investigate data-driven autonomous information-based modeling.