Abstract
High-integrity applications are safety- and security-critical applications developed for a variety of critical tasks. The correctness of these applications must be thoroughly tested or formally verified to ensure their reliability and robustness. The major properties to be verified for the correctness of applications include: (1) functional properties, capturing the expected behaviors of a software, (2) dataflow property, tracking data dependency and preventing secret data from leaking to the public, and (3) robustness property, the ability of a program to deal with errors during execution. This dissertation presents and explores formal verification and proof technique, a promising technique using rigorous mathematical methods, to verify critical applications from the above three aspects. Our research is carried out in the context of SPARK, a programming language designed for development of safety- and security-critical applications. First, we have formalized in the Coq proof assistant the dynamic semantics for a significant subset of the SPARK 2014 language, which includes run-time checks as an integral part of the language, as any formal methods for program specification and verification depend on the unambiguous semantics of the language. Second, we have formally defined and proved the correctness of run-time checks generation and optimization based on SPARK reference semantics, and have built the certifying tools within the mechanized proof infrastructure to certify the run-time checks inserted by the GNAT compiler frontend to guarantee the absence of run-time errors. Third, we have proposed a language-based information security policy framework and the associated enforcement algorithm, which is proved to be sound with respect to the formalized program semantics. We have shown how the policy framework can be integrated into SPARK 2014 for more advanced information security analysis.
ABSTRACT
Comparative in vitro bioequivalence study of biopharmaceutics class I and III drugs hadgained prominence in recent times. In vit...
Background of the Study
Historically the Internet emerged in the early 1970’s as a product of research which aimed to connect...
ABSTRACT
This study was carried out on the effect of peer group and parental socio-economic background...
ABSTRACT
The study examined perceived effect of sexual harassment and social intelligence on the social interaction of s...
Background To The Study
Infrastructure is very significant to a country’s developmental prospect,...
Background to the study
Bureaucracy is a major organizational structure within which policymaking, implementation, and e...
BACKGROUND OF THE STUDY
Culture is the sum of attitude, customs and beliefs that distinguishes one grou...
Statement of Problem
Personnel management involves a lot of paper work and the consequence of this is that it is difficu...
Abstract
Surgical wound infections constitute a major fraction of nosocomial infections and occur within 30 days of pro...
ABSTRACT
This study is on the effect of exchange rate and inflation on foreign direct investment and it...