Coverart for item
The Resource Structured object-oriented formal language and method : 9th International Workshop, SOFL+MSVL 2019, Shenzhen, China, November 5, 2019, Revised selected papers, Huaikou Miao, Cong Tian, Shaoying Liu, Zhenhua Duan (eds.), (electronic book)

Structured object-oriented formal language and method : 9th International Workshop, SOFL+MSVL 2019, Shenzhen, China, November 5, 2019, Revised selected papers, Huaikou Miao, Cong Tian, Shaoying Liu, Zhenhua Duan (eds.), (electronic book)

Label
Structured object-oriented formal language and method : 9th International Workshop, SOFL+MSVL 2019, Shenzhen, China, November 5, 2019, Revised selected papers
Title
Structured object-oriented formal language and method
Title remainder
9th International Workshop, SOFL+MSVL 2019, Shenzhen, China, November 5, 2019, Revised selected papers
Statement of responsibility
Huaikou Miao, Cong Tian, Shaoying Liu, Zhenhua Duan (eds.)
Title variation
SOFL+MSVL 2019
Creator
Contributor
Subject
Genre
Language
eng
Member of
Cataloging source
EBLCP
Dewey number
005.1
Index
index present
LC call number
QA76.9.L63
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2019
http://bibfra.me/vocab/lite/meetingName
SOFL+MSVL (Workshop)
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorDate
  • 1953-
  • 1960-
http://library.link/vocab/relatedWorkOrContributorName
  • Miao, Huaikou
  • Tian, Cong
  • Liu, Shaoying
  • Duan, Zhenhua
Series statement
  • Lecture Notes in Computer Science
  • LNCS sublibrary. SL 1, Theoretical computer science and general issues
Series volume
12028
http://library.link/vocab/subjectName
  • Formal methods (Computer science)
  • Object-oriented methods (Computer science)
Label
Structured object-oriented formal language and method : 9th International Workshop, SOFL+MSVL 2019, Shenzhen, China, November 5, 2019, Revised selected papers, Huaikou Miao, Cong Tian, Shaoying Liu, Zhenhua Duan (eds.), (electronic book)
Instantiates
Publication
Note
  • Description based upon print version of record
  • 4.2 Protocol Modeling and Specification Description
  • Includes author index
Antecedent source
file reproduced from an electronic resource
Contents
  • Intro -- Preface -- Organization -- Contents -- Testing and Debugging -- Analysis and Remodeling of the DirtyCOW Vulnerability by Debugging and Abstraction -- 1 Introduction -- 2 The DirtyCOW Vulnerability -- 3 Our Analysis of DirtyCOW -- 3.1 The Attack Path -- 3.2 Concrete State Transformation -- 3.3 Rebuilding of Control Flow Diagram -- 4 Remodeling of Related System Calls -- 4.1 State Abstraction -- 4.2 The Model Rebuilt -- 5 Related Work -- 6 Conclusion -- References -- A Formal Technique for Concurrent Generation of Software's Functional and Security Requirements in SOFL Specifications
  • Abstract -- 1 Introduction -- 2 Related Works -- 3 Our Proposed Methodology -- 3.1 The Proposed Technique in Details -- 3.2 Adopted Attack Tree Analysis Algorithm -- 4 Case Study -- 4.1 Converting the SignUp Process into Its Equivalent System Functional Scenario Form -- 4.2 Deriving Operational Scenarios -- 4.3 Eliciting Potential Vulnerabilities for Each of the Derived Operational Scenarios -- 5 Discussions and Conclusions -- References -- Distortion and Faults in Machine Learning Software -- 1 Introduction -- 2 Machine Learning Software -- 2.1 Learning Programs -- 2.2 Inference Programs
  • 2.3 Quality Issues -- 3 Distortion Degrees -- 3.1 Observations and Hypotheses -- 3.2 Generating Distorted Dataset -- 3.3 Some Properties -- 4 A Case Study -- 4.1 MNIST Classification Problem -- 4.2 Experiments -- 5 Discussions -- 5.1 Neuron Coverage -- 5.2 Test Input Generation -- 6 Concluding Remarks -- References -- A Divide & Conquer Approach to Testing Concurrent Java Programs with JPF and Maude -- 1 Introduction -- 2 Preliminaries -- 3 Specification-Based Concurrent Program Testing with a Simulation Relation -- 4 State Sequence Generation from Concurrent Programs -- 4.1 Java Pathfinder (JPF)
  • 4.2 Generating State Sequences by JPF -- 5 A Divide & Conquer Approach to Generating State Sequences -- 6 A Divide & Conquer Approach to Testing Concurrent Programs -- 7 A Case Study: Alternating Bit Protocol (ABP) -- 8 Related Work -- 9 Conclusion -- References -- Formal Verification -- An Approach to Modeling and Verifying Multi-level Interrupt Systems with TMSVL -- 1 Introduction -- 2 Preliminaries -- 2.1 TPTL -- 2.2 TMSVL -- 3 Modeling of Multi-level Interrupt Systems -- 4 A Case Study -- 5 Conclusion -- References
  • Towards Formal Verification of Neural Networks: A Temporal Logic Based Framework -- 1 Introduction -- 2 Background -- 2.1 MSVL -- 2.2 PPTL -- 2.3 MC -- 3 A Practical Verification Method for Neural Networks Based on MSVL -- 4 Case Study -- 5 Related Work -- 6 Conclusions -- References -- UMC4M: A Verification Tool via Program Execution -- 1 Introduction -- 2 Preliminaries -- 2.1 MSVL -- 2.2 PPTL -- 3 Design and Implementation of UMC4M -- 3.1 LNFG2MSVL -- 3.2 Multi-thread and Execute -- 3.3 PathCheck -- 4 Case Study -- 4.1 Description of the Dining Cryptographers Protocol
Dimensions
unknown
Extent
1 online resource (366 p.).
File format
one file format
Form of item
online
Isbn
9783030414184
Level of compression
unknown
Quality assurance targets
unknown
Reformatting quality
unknown
Specific material designation
remote
System control number
  • on1142508150
  • (OCoLC)1142508150
Label
Structured object-oriented formal language and method : 9th International Workshop, SOFL+MSVL 2019, Shenzhen, China, November 5, 2019, Revised selected papers, Huaikou Miao, Cong Tian, Shaoying Liu, Zhenhua Duan (eds.), (electronic book)
Publication
Note
  • Description based upon print version of record
  • 4.2 Protocol Modeling and Specification Description
  • Includes author index
Antecedent source
file reproduced from an electronic resource
Contents
  • Intro -- Preface -- Organization -- Contents -- Testing and Debugging -- Analysis and Remodeling of the DirtyCOW Vulnerability by Debugging and Abstraction -- 1 Introduction -- 2 The DirtyCOW Vulnerability -- 3 Our Analysis of DirtyCOW -- 3.1 The Attack Path -- 3.2 Concrete State Transformation -- 3.3 Rebuilding of Control Flow Diagram -- 4 Remodeling of Related System Calls -- 4.1 State Abstraction -- 4.2 The Model Rebuilt -- 5 Related Work -- 6 Conclusion -- References -- A Formal Technique for Concurrent Generation of Software's Functional and Security Requirements in SOFL Specifications
  • Abstract -- 1 Introduction -- 2 Related Works -- 3 Our Proposed Methodology -- 3.1 The Proposed Technique in Details -- 3.2 Adopted Attack Tree Analysis Algorithm -- 4 Case Study -- 4.1 Converting the SignUp Process into Its Equivalent System Functional Scenario Form -- 4.2 Deriving Operational Scenarios -- 4.3 Eliciting Potential Vulnerabilities for Each of the Derived Operational Scenarios -- 5 Discussions and Conclusions -- References -- Distortion and Faults in Machine Learning Software -- 1 Introduction -- 2 Machine Learning Software -- 2.1 Learning Programs -- 2.2 Inference Programs
  • 2.3 Quality Issues -- 3 Distortion Degrees -- 3.1 Observations and Hypotheses -- 3.2 Generating Distorted Dataset -- 3.3 Some Properties -- 4 A Case Study -- 4.1 MNIST Classification Problem -- 4.2 Experiments -- 5 Discussions -- 5.1 Neuron Coverage -- 5.2 Test Input Generation -- 6 Concluding Remarks -- References -- A Divide & Conquer Approach to Testing Concurrent Java Programs with JPF and Maude -- 1 Introduction -- 2 Preliminaries -- 3 Specification-Based Concurrent Program Testing with a Simulation Relation -- 4 State Sequence Generation from Concurrent Programs -- 4.1 Java Pathfinder (JPF)
  • 4.2 Generating State Sequences by JPF -- 5 A Divide & Conquer Approach to Generating State Sequences -- 6 A Divide & Conquer Approach to Testing Concurrent Programs -- 7 A Case Study: Alternating Bit Protocol (ABP) -- 8 Related Work -- 9 Conclusion -- References -- Formal Verification -- An Approach to Modeling and Verifying Multi-level Interrupt Systems with TMSVL -- 1 Introduction -- 2 Preliminaries -- 2.1 TPTL -- 2.2 TMSVL -- 3 Modeling of Multi-level Interrupt Systems -- 4 A Case Study -- 5 Conclusion -- References
  • Towards Formal Verification of Neural Networks: A Temporal Logic Based Framework -- 1 Introduction -- 2 Background -- 2.1 MSVL -- 2.2 PPTL -- 2.3 MC -- 3 A Practical Verification Method for Neural Networks Based on MSVL -- 4 Case Study -- 5 Related Work -- 6 Conclusions -- References -- UMC4M: A Verification Tool via Program Execution -- 1 Introduction -- 2 Preliminaries -- 2.1 MSVL -- 2.2 PPTL -- 3 Design and Implementation of UMC4M -- 3.1 LNFG2MSVL -- 3.2 Multi-thread and Execute -- 3.3 PathCheck -- 4 Case Study -- 4.1 Description of the Dining Cryptographers Protocol
Dimensions
unknown
Extent
1 online resource (366 p.).
File format
one file format
Form of item
online
Isbn
9783030414184
Level of compression
unknown
Quality assurance targets
unknown
Reformatting quality
unknown
Specific material designation
remote
System control number
  • on1142508150
  • (OCoLC)1142508150

Library Locations

Processing Feedback ...