期刊文献+

运行时验证及其在列车运行控制系统中的应用 被引量:4

Runtime Verification and its Applications in Train Control Systems
下载PDF
导出
摘要 运行时验证是一种将模型检验方法与测试相结合的轻量级验证技术,它能够有效地降低系统验证的复杂度,提供系统运行阶段的安全保障,因此在安全苛求系统的验证领域有着极其重要的应用。本文提出一种基于三值逻辑的有限轨迹LTL可执行语义,允许"真"和"假"以外的逻辑值来显式的刻画验证过程中可能出现的非确定性,从而使得验证的结果更加精确。针对新的LTL语义给出了基于公式重写的运行监控算法和近似优化策略,并结合欧洲列车运行控制系统的实例,分析探讨了该方法在轨道交通控制领域的应用。 Runtime verification has emerged as a promising verification technique that bridges the gap between traditional testing and model checking.It supplements formal verification with more lightweight dynamic techniques when these techniques fail due to complexity of issues,and it has important applications in the field of safety critical systems verification.In this paper,we present a 3-valued executable semantics for finite trace LTL,which can express the uncertainty during the monitoring proces by allowing additional truth values in the logic.The rewriting based monitoring algorithm and a novel approximation technique for the new semantics are proposed,and demonstrated by a use case from the European Train Control System.
出处 《铁道学报》 EI CAS CSCD 北大核心 2011年第12期65-71,共7页 Journal of the China Railway Society
基金 国家重点实验室自主课题基金(RCS2008ZQ002 RCS2008ZZ005) 中央高校基本科研业务费专项基金(2011JBM322) 北京交通大学-泰雷兹集团国际合作项目(M&V-SCHS)
关键词 模型检验 测试 多值逻辑 公式重写 列车运行控制系统 model checking test multi-valued logic formula rewriting train control systems
  • 相关文献

参考文献16

  • 1Leucker M,Schallhart C. A Brief Account of Runtime Verification[J]. Journal of Logic and Algebraic Programming, 2009,78(5): 293-303.
  • 2Havelund K, Rosu G. Monitoring Programs Using Rewriting [C]//Proceedings of International Conference on Automated Software Engineering, 2001 : 135-143.
  • 3DAmorim M,Rosu G. Efficient Monitoring of Omega-Languages [C]//Proceedings of International Conference on Computer Aided Verification, 2005 :364-378.
  • 4Bauer A, Leucker M, Schallhart C. Model-based methods for the runtime analysis of reactive distributed systems [C]//Proceedings of the Australian Software Engineering Conference, 2006 : 243-252.
  • 5Clarke E,Grumberg O,Peled D. Model Checking [M]. MIT Press,1999.
  • 6Artho C,Barringer H, Goldberg A, et al. Combining Test- Case C-eneration and Runtime Verification[J]. Journal of Theoretical Computer Science, 2005, (336) : 209-234.
  • 7Bauer A, Leucker M, and Schallhart C. Runtime Verification for LTL and TLTL[R]. Technical Report TUM- I0724. Technische Universitat Munchen,2007.
  • 8Bauer A, Leucker M, Schallhart C. The Good, the Bad, and the Ugly - But How Ugly is Ugly[C]//Proceedings of International Workshop on Runtime Verification, 2007:126-138.
  • 9Havelund K, Rosu G. Monitoring Programs Using Rewriting[C]//Proceedings of International Conference on Automated Software Engineering,2001:135-143.
  • 10Rosu G, Havelund K. Rewriting-Based Techniques for Runtime Verification[J]. Journal of Automated Software Engineering, 2004,12(2) : 151-197.

同被引文献61

  • 1Bertot Y,Castfran P. Interactive theorem proving and program development:Coq Art: the calculus of inductive constructions [M]. Springer, 2004.
  • 2Clarke E M,Grumberg O,Peled D A. Model checking[M]. M1T press, 1999.
  • 3Myers G J, Sandler C, Badgett T. The art of software testing [M]. John Wiley Sons,2011.
  • 4Leucker M,Schallhart C. A brief account of runtime verification [J]. Journal of Logic and Algebraic Programming, 2009,78 (5): 293-303.
  • 5Meredith P O N, Jin D, Griffith D, et al. An overview of the MOP runtime verification framework[J]. International Journal on Software Tools for Technology Transfer, 2012,14 (3) = 249- 289.
  • 6Bodden E. MOPBox: a library approach to runtime verification [C]//Runtime Verification. Springer Berlin Heidelberg, 2012: 365-369.
  • 7Havelund K, Rosu G. Monitoring java programs with java pathexplorer[J]. Electronic Notes in Theoretical Computer Sci- ence, 2001,55 (2) : 200-217.
  • 8Kim M,Kannan S, Lee I, et al. Java-MaC a run time assurancetool for Java programs[J]. Electronic Notes in Theoretical Com- puter Science, 2001,55(2) : 218-235.
  • 9Malik S. Runtime verification: a computer architecture perspec- tive[C]//Runtime Verification. Springer Berlin Heidelberg, 2012:49-62.
  • 10Beaucamps P, Gnaedig I, Marion J Y. Behavior abstraction in malware analysis [C]//Runtime Verification. Springer Berlin Heidelberg, 2010 : 168-182.

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部