期刊文献+

基于Hoare逻辑的过程调用的形式化方法 被引量:2

Formal method of procedure call based on Hoare logic
在线阅读 下载PDF
导出
摘要 采用Hoare逻辑风格的推理,提出了一些从源代码推导过程和这些过程调用的形式化语义规范的技术和算法。为了推导一个过程调用的语义,将过程看作一个抽象单元从程序分离出来,提取过程的形式化语义规范。对于一个具体的过程调用,形式化这个调用的前置条件,根据这些条件形式化求解调用的最强后置条件,也就是调用的语义作用。 Techniques and algorithms for deriving specifications directly from code for procedures and for deriving specifications of the semantic effects of calling those procedures are presented based on Hoare logic style reasoning.In order to reason about the semantic effects of a procedure call,the semantic specification of the procedure is called as an independent abstract unit needs to be abstracted.A specific procedure call is given,and the formal precondition is abstracted that hold at invocation of a procedure,and then these conditions is used as a precondition to the procedure body to calculate its strongest postcondition,the postcondition is also the semantic effects of procedure call.
出处 《计算机工程与设计》 CSCD 北大核心 2011年第1期197-201,共5页 Computer Engineering and Design
关键词 HOARE逻辑 过程语义 过程调用语义 前置条件 后置条件 Hoare logic procedure semantic procedure call semantic precondition postcondition
作者简介 雷富兴(1986-),男,河南许昌人,硕士,研究方向为信息管理系统; 张来顺(1963-),男,河南郑州人,硕士,教授,研究方向为计算机应用技术。E-mail:leifuxing@gmail.com
  • 相关文献

参考文献7

  • 1Powell D.Deriving verification conditions and program assertions to support software inspection[C].Proc of 9th Asia Pacific Software Engineering Conference,2002:447-456.
  • 2郭宇,陈意云,林春晓.一种构造代码安全性证明的方法[J].软件学报,2008,19(10):2720-2727. 被引量:6
  • 3BergerpmJ.SystemVerilog验证方法学[M].夏宇闻,译.北京:北京航空航天大学出版社,2007:315-363.
  • 4Regis-Gianas Y, Pottier F.A Hoare logic for call-by-value functional programs [C]. Marseille: Proceedings of the 9th International Conference on Mathematics of Program Construction, 2008:305-335.
  • 5Gannod G, Cheng B. Strongest postcondition semantics as the formal basis for reverse enigineering [J]. Automated Software Engineering, Springer Netherlands, 1996,3(1): 139-164.
  • 6Powell D.Tool support for verification-based software inspection [C]. Australia: Proceeding of Software Engineering Conference, 2004:232-240.
  • 7David Faitelson.From predicates to programs: the semantics of a method language [C].Proceediugs of the Second Brazilian Symposium on Formal Methods, Electronic Notes in Theoretical Computer Science,2007,184(12):171-187.

二级参考文献15

  • 1Necula G. Proof-Carrying code. In: Jones N, Lee P, eds. Proc. of the POPL'97. New York: ACM Press, 1997. 106-119.
  • 2Appel AW. Foundational proof-carrying code. In: Mairson H, ed. Prec. of the 16th Annual IEEE Syrup. on Logic in Computer Science. Washington: IEEE Computer Society, 2001. 247-258.
  • 3Chen J, Wu D, Appel AW, Fang H. A provably sound tail for back-end optimization. In: Cytron R, Gupta R, eds. Proc. of the PLDI 2003. New York: ACM Press, 2003. 208-219.
  • 4Crary K. Toward a foundational typed assembly language. In: Morrisett G, ed. Proc. of the POPL 2003. New York: ACM Press, 2003. 198-212.
  • 5Yu DC, Hamid NA, Shao Z. Building certified libraries for PCC: Dynamic storage allocation. In: Degano P, ed. Proc. of the 2003 European Syrup. on Programming. LNCS 2618. Berlin: Springer-Verlag, 2003.
  • 6Feng XY, Shao Z, Vaynberg A, Xiang S, Ni ZZ. Modular verification of assembly code with stack-based control abstractions. In: Schwartzbacb M, Ball T, eds. Proc. of the PLDI2006. New York: ACM Press, 2006. 401-414.
  • 7Feng XY, Ni ZZ, Shao Z, and Guo Y. An open framework for foundational proof-carrying code. In: Hofmann M, FeUeisen M, eds. Proc. of the TLDI2007. New York: ACM Press, 2007.67-78,
  • 8Wu D, Appel AW, Stump A. Foundational proof checkers with small witnesses. In: Sagonas K, Miller D, eds. Proc. of the PPDP 2003. New York: ACM Press, 2003.264-274.
  • 9Crary K, Sarkar S. Foundational certified code in a metalogical framework. In: Baade F, ed. Automated Deduction. LNCS 2741, Berlin: Springer-Verlag, 2003. 106-120.
  • 10Pfenning F. Logic programming in the LF logical framework. In: Huet G, Plotkin G, eds, Logical Frameworks. Cambridge: Cambridge University Press, 1991. 149-181.

共引文献5

同被引文献24

  • 1张晓琳,王国仁.用继承扩展XML-RL[J].小型微型计算机系统,2005,26(2):243-247. 被引量:25
  • 2阳小奇,刘坚.一种基于契约的跨过程安全分析方法[J].西安电子科技大学学报,2006,33(3):390-394. 被引量:6
  • 3陈再良,徐德智,陈学工,沈海澜.基于链式结构XML文档的生成方法[J].计算机工程,2006,32(20):59-61. 被引量:5
  • 4Coverity[CP/OL]. http://www, coverity, corn, 2012.
  • 5CodeCheck[CP/OL]. http://www, abraxas-softwar eom/, 2012.
  • 6FlawFinderHomePage[OL]. http://www, dwheeler, comlflawf-inder/.
  • 7Bloch V J, Kohno J T T, McGraw G. ITS4 : A Static Vulnerabilb ty Scanner for C and C-k-+ Code[C]//Proc. 16th Computer Se- curity Applications Conferences. New Orleans, LA, 2000: 257- 266.
  • 8Bauer T, Lips H P, Thiele G, et al. Operational tests on HVDC thyristor modules in a synthetic test circuit for the sylmar east restoration project[J]. IEEE Transactions on Power Delivery, 1997.
  • 9Swiler L P,Phillips C, Ellis 13. Computer-attack Graph Genera- tion Tool[C] // Proceedings of the 2nd DARPA Information Survivability Conference Exposition. Los Alamitos, Califor- nia,USA: IEEE Computer Society, 2001 : 307-321.
  • 10ISC. Internet Domain Survey[OL]. http://www, isc. org/ds/.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部