Formal methods: Practice and experience

J Woodcock, PG Larsen, J Bicarregui… - ACM computing surveys …, 2009 - dl.acm.org
Formal methods use mathematical models for analysis and verification at any part of the
program life-cycle. We describe the state of the art in the industrial use of formal methods …

New opportunities for integrated formal methods

M Gleirscher, S Foster, J Woodcock - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Formal methods have provided approaches for investigating software engineering
fundamentals and also have high potential to improve current practices in dependability …

[KNIHA][B] Software Abstractions: logic, language, and analysis

D Jackson - 2012 - books.google.com
An approach to software design that introduces a fully automated analysis giving designers
immediate feedback, now featuring the latest version of the Alloy language. In Software …

Teechain: a secure payment network with asynchronous blockchain access

J Lind, O Naor, I Eyal, F Kelbert, EG Sirer… - Proceedings of the 27th …, 2019 - dl.acm.org
Blockchains such as Bitcoin and Ethereum execute payment transactions securely, but their
performance is limited by the need for global consensus. Payment networks overcome this …

[KNIHA][B] Secure systems development with UML

J Jürjens - 2005 - books.google.com
Attacks against computer systems can cause considerable economic or physical damage.
High-quality development of security-critical systems is difficult, mainly because of the …

Manifold discriminant analysis

R Wang, X Chen - 2009 IEEE Conference on Computer Vision …, 2009 - ieeexplore.ieee.org
This paper presents a novel discriminative learning method, called manifold discriminant
analysis (MDA), to solve the problem of image set classification. By modeling each image …

The verifying compiler: A grand challenge for computing research

T Hoare - Journal of the ACM (JACM), 2003 - dl.acm.org
This contribution proposes a set of criteria that distinguish a grand challenge in science or
engineering from the many other kinds of short-term or long-term research problems that …

A survey of practical formal methods for security

T Kulik, B Dongol, PG Larsen, HD Macedo… - Formal aspects of …, 2022 - dl.acm.org
In today's world, critical infrastructure is often controlled by computing systems. This
introduces new risks for cyber attacks, which can compromise the security and disrupt the …

The Semantics of Circus

J Woodcock, A Cavalcanti - International Conference of B and Z Users, 2002 - Springer
The Semantics of Circus Page 1 The Semantics of Circus Jim Woodcock1 and Ana Cavalcanti2
1 Oxford University Computing Laboratory Wolfson Building, Parks Road, Oxford, UK …

Full functional verification of linked data structures

K Zee, V Kuncak, M Rinard - ACM SIGPLAN Notices, 2008 - dl.acm.org
We present the first verification of full functional correctness for a range of linked data
structure implementations, including mutable lists, trees, graphs, and hash tables …