Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Operation formal verification method and system for source code

A formal verification, source code technology, applied in the field of runtime verification methods and systems, can solve problems such as manual intervention, low degree of automation, state explosion, etc., to achieve high practicability and improve security.

Active Publication Date: 2018-09-14
EAST CHINA NORMAL UNIV
View PDF2 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Theorem proof is based on deductive reasoning, through a series of reasoning to ensure the correctness of the high-level protocol, but the proof process often requires manual intervention, the degree of automation is relatively low, and it is not suitable for large-scale applications
As the scale of the system increases, the number of states of the system model that needs to be verified also increases exponentially, resulting in state explosion, which is also a major problem in its application and practice.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operation formal verification method and system for source code
  • Operation formal verification method and system for source code
  • Operation formal verification method and system for source code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] In this specific embodiment, the producer consumer program is taken as an example to perform runtime verification of the safety specifications to be met. For the producer consumer program, the producer stores data in the buffer, the consumer reads the data from the buffer, and the consumer must ensure the integrity of the data in the process of reading the data. In this embodiment, the producer stores the character string in the buffer, and the consumer reads the character string. The safety specification that needs to be met is that the character string read by the consumer is complete, that is, the program cannot appear read-only during the running process. Take part of the character string.

[0060] In this specific embodiment, the verification method for SystemC program runtime of the present invention is used to verify the safety specifications that the producer consumer program needs to meet, and the specific steps are as follows:

[0061] Step 1: Analyze the safety s...

Embodiment 2

[0086] In this specific embodiment, an ALU arithmetic logic unit program is taken as an example to perform runtime verification of the safety specifications to be met. The arithmetic logic unit program calculates the result according to the specified operand and the operation code and outputs it. If the divisor is zero during the division operation, it is necessary to find the operation error in time. In this embodiment, the monitor needs to monitor the divisor value in the division operation. If the divisor is zero, it should report an error in time to prevent serious consequences.

[0087] In this specific embodiment, the systemC program runtime verification method of the present invention is used to verify the safety specifications that the ALU arithmetic logic unit program needs to meet, and the specific steps are as follows:

[0088] Step 1: Analyze the safety regulations that the arithmetic logic unit program needs to meet. According to the calculation requirements, the foll...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an operation formal verification method and system for a source code. The method comprises the following steps: according to properties to be met by a source program, and parameters required by a tool, writing a configuration file for generating a monitor and a section; according to the written configuration file, automatically generating the monitor and the section by using an operation verification tool; according to the generated section, putting an involved variable into the source program; modifying a simulation kernel to be adaptive to an operation verification method; monitoring a source program operation state after column insertion in real time by using the generated monitor; performing formal verification on properties by the monitor according to a programoperation track, and if a route violating verification properties is resulted, carrying out recording to automatic repairing of programs. The method disclosed by the invention can be applied to formal verification on embedded systems and large-size software systems, and the software security and reliability can be improved.

Description

Technical field [0001] The invention belongs to the field of formal verification, and specifically relates to a runtime verification method and system for source code. Background technique [0002] The security of embedded systems is very important. With the development of computer science, more and more embedded systems have penetrated into people’s daily lives. People who travel need to take trains and airplanes, and banks need hundreds of millions of dollars. It is necessary for people who are sick to go to the hospital for examinations. These are inseparable from the support of embedded systems. Its safety and reliability are related to the people’s information security, property safety and even life safety. Therefore, how to ensure the safety and reliability of embedded systems has become an important issue for its development. Testing is currently the most important method to ensure the safety and reliability of the system, but limited test cases cannot cover all situation...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36
CPCG06F11/3608G06F11/3612G06F11/3644
Inventor 郭建李新张凯
Owner EAST CHINA NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products