期刊文献+

翻译确认方法在核安全级GCG中的应用研究 被引量:2

Application Research of Translation Validation in Nuclear Safety-level Graphic Code Generator
下载PDF
导出
摘要 在核安全级数字化仪控系统中,人机交互安全控制显示装置的显示内容和控制逻辑由图形化组态工具实现。由于显示内容规模庞大,结构复杂,如何保证实现从图形到C转换的图形代码生成器(GCG)的正确性是一个难题,通过引入形式化验证方法对GCG生成过程的正确性进行验证。本文在对两种形式化验证技术比较并结合应用场景分析之后,选取了翻译确认方法,并通过示例说明了方法的可行性,为之后图形代码生成器的形式化验证工作奠定了基础。 In the digital control system of nuclear safety level, the display content and control logic of HMI (Human Machine Interlace) safety control display device are realized by graphical configuration tool. Because the display content in large scale, complex structure, how to ensure the realization of the conversion from graphics to C graphic code generator is correct is a problem, verified the correctness of the GCG by introducing a formal verification method. In this paper, based on the analysis of two kinds of formal verification technology and GCG application scenarios, selects the translation validation method, and illustrates the feasibility of the method by example, lays the foundation for the later formal verification of the graphic code generator.
出处 《自动化博览》 2018年第4期71-75,共5页 Automation Panorama1
关键词 图形代码生成器 形式化验证方法 翻译确认 求值流图 Graphic code generator Formal verification method Translation validation Value flow graph
  • 相关文献

参考文献4

二级参考文献41

  • 1Wheeler D A. Countering Trusting Trust Through Diverse Double-Compiling[M]. Tucson, AZ: IEEE Computer Society, 2005.
  • 2Boujarwah A S, Saleh K. Compiler Test Case Generation Methods:A Survey and Assessment[J]. Information and Software Technology, 1997,39(9):617-625.
  • 3Yoshikawa T,Shimura K, Ozawa T. Random Program Generator for Java JIT Compiler Test System[C]//Proc of the 3rd Int'l Conf on Quality Software, 2003:20.
  • 4Miller S P, Anderson E A, Wagner L G, et al. Formal Verification of Flight Critical Software[C]//Proc of the AIAA Guidance Navigation and Control Conf and Exhibit,2005.
  • 5Heitmeyer C L, Archer M, Leonard E, et al. Applying Formal Methods to a Certifiably Secure Software System[J]. IEEE Trans on Software Engineering, 2008,34 ( 1 ) : 82-98.
  • 6Feinerer I, Salzer G. A Comparison of Tools for Teaching Formal Software Verification[J]. Formal Aspects of Computing, 2009,21(3) :293-301.
  • 7Yoo J Jee E, Cha S.Formal Modeling and Verification of Safety- Critical Software[J]. IEEE Software, 2009,26(3) :42-49.
  • 8Cowan C,Pu C, Maier D, et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks[C] //Proc of the 7th USENIX Security Symp, 1998.
  • 9Thompson K. Reflections on Trusting Trust[J]. Communications of the ACM, 1984,27(8):761-763.
  • 10Palmer E R. An Introduction to Citadel - A Secure Crypto Coprocessor for Workstations[C]//Proc of the IFIP SEC' 94 Conf, 1994.

共引文献24

同被引文献1

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部