An integrated development environment for the prototype verification system

P Masci, CA Muñoz - arXiv preprint arXiv:1912.10632, 2019 - arxiv.org
The steep learning curve of formal technologies is a well-known barrier to the adoption of
formal verification tools in industry. This paper presents VSCode-PVS, a modern integrated …

[HTML][HTML] Formal verification of function blocks applied to IEC 61131-3

L Pang, CW Wang, M Lawford, A Wassyng - Science of Computer …, 2015 - Elsevier
Many industrial control systems use programmable logic controllers (PLCs) since they
provide a highly reliable, off-the-shelf hardware platform. On the programming side, function …

Model Checking and Gas Optimization of Move Smart Contracts, and Transaction Order Dependency Detection and Rectification

E Keilty - 2023 - search.proquest.com
Blockchain technology has revolutionized various industries by providing secure transaction
mechanisms in a decentralized, trustless environment. In 2014, the Ethereum blockchain …

Using small-step refinement for algorithm verification in computer science education

D Simić - International Journal for Technology in Mathematics …, 2015 - ingentaconnect.com
Stepwise program refinement techniques can be used to simplify program verification.
Programs are better understood since their main properties are clearly stated, and …

Trusted Building Blocks for Resilient Embedded Systems Design

A Dave - 2021 - search.proquest.com
The use of small embedded and IoT devices have increased monumentally with
technological advancements and industry 4.0 evolution. These devices are widely used in …

[PDF][PDF] Using Small-Step Refinement For Algorithm Verification In Computer Science Education.

D Petrovic - CICM Workshops, 2014 - ceur-ws.org
Stepwise program refinement techniques can be used to simplify program verification.
Programs are better understood since their main properties are clearly stated, and …

Formal proof of security algorithms based on reachability reduction

M Bouziane, S Gire, F Monin, L Nana - Proceedings of the 8th …, 2016 - dl.acm.org
This work is motivated by the rapid increase of the number of attacks in computer networks
and software engineering. In this paper we study identity snowball attacks and formally …