Search for dissertations about: "Runtime verification"

Showing result 1 - 5 of 14 swedish dissertations containing the words Runtime verification.

  1. 1. Unified Static and Runtime Verification of Object-Oriented Software

    Author : Mauricio Chimento; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Runtime Verification; Java; Static Verification; Formal Methods;

    Abstract : At the time of verifying software one can make use of several verification techniques. These techniques mostly fall in one of two categories: Static Verification and Dynamic Verification. READ MORE

  2. 2. Concurrency Bugs : Characterization, Debugging and Runtime Verification

    Author : Sara Abbaspour Asadollah; Hans Hansson; Tao Yue; Mälardalens högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Computer Science; datavetenskap;

    Abstract : Concurrent software has been increasingly adopted in recent years, mainly due to the introduction of multicore platforms. However, concurrency bugs are still difficult to test and debug due to their complex interactions involving multiple threads (or tasks). Typically, real world concurrent software has huge state spaces. READ MORE

  3. 3. Designing Trustworthy Autonomous Systems

    Author : Piergiuseppe Mallozzi; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; System Trustworthiness; Reactive Synthesis; Monitoring and enforcement; Assume-Guarantee Contracts; Runtime verification; Autonomous Systems; Formal Verification; Reinforcement Learning;

    Abstract : The design of autonomous systems is challenging and ensuring their trustworthiness can have different meanings, such as i) ensuring consistency and completeness of the requirements by a correct elicitation and formalization process; ii) ensuring that requirements are correctly mapped to system implementations so that any system behaviors never violate its requirements; iii) maximizing the reuse of available components and subsystems in order to cope with the design complexity; and iv) ensuring correct coordination of the system with its environment. Several techniques have been proposed over the years to cope with specific problems. READ MORE

  4. 4. Runtime Monitoring of Automated Driving Systems

    Author : Ayhan Mehmed; Sasikumar Punnekkat; Aida Causevic; Hans Hansson; Daniel Watzening; Mälardalens högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Runtime Monitoring; Automated Driving Systems; Computer Science; datavetenskap;

    Abstract : It is the period of the World's history, where the technological progress reached a level that enables the first steps towards the development of vehicles with automated driving capabilities. The swift response from the significant portion of the industry resulted in a race, the final line set at the introduction of vehicles with full automated driving capabilities. READ MORE

  5. 5. Secure System Virtualization : End-to-End Verification of Memory Isolation

    Author : Hamed Nemati; Mads Dam; Gustavo Betarte; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Platform Security; Hypervisor; Formal Verification; Theorem Proving; HOL4; Cache attack; Security Monitor; Information Flow; Computer Science; Datalogi;

    Abstract : Over the last years, security-kernels have played a promising role in reshaping the landscape of platform security on embedded devices. Security-kernels, such as separation kernels, enable constructing high-assurance mixed-criticality execution platforms on a small TCB, which enforces isolation between components. READ MORE