Trustworthy Systems

TS News

News

2014-08-26: Seminar Prof Vladimir Estivill-Castro on Correctness by Construction with Logic-Labelled Finite-State Machines – Comparison with Event-B
Formal methods have seen emergent success recently with the deployment of Event-B. However, Event-B explicitly postulates that models there are not executable. This seems to contradict the parallel emergence of model-driven development (MDD). We show here that logic-labelled finite-state machines (LLFSMs) are effective in carrying out the “correct from construction” agenda of formal methods such as Event-B and simultaneously achieve the aims of MDD. As a result, we obtain models that are directly interpretable, compilable, and executable enabling traceability, transparency and rapid maintainability; while at the same time enabling simulation, validation and formal verification with model checking. Moreover, the Event-B capacity to develop closed models is also very natural with arrangements of LLFSMs; and therefore further safety analysis such as failure-mode effects analysis (FMEA) can be performed. We demonstrate this with two well-known examples in the literature.
2014-08-25 Seminar Dr Han on Next-Generation Storage and Its Software
Recently, storage devices have been greatly improved in terms of both bandwidth and latency by using non-volatile memories such as Flash and PRAM. However, traditional storage software stack such as operating systems and database systems becomes major performance bottleneck since they are optimized for hard disk drives and they are not suitable for new storage devices. We call this phenomenon "slow software on fast storage". For the seminar, histories of storage devices will be given in terms of interconnection and bandwidth. Then, I will show an example of software optimizations for fast storage devices, and describe our current work about virtual memory of operating systems. Finally, I'll present our future work about application-level optimizations for fast storage devices.
2014-08-23 Doctorate Awarded
David Cock has received his Doctorate. He worked to extend seL4's assurance case to non-functional security properties. Established an empirical approach to detecting and mitigating covert and side channels.
2014-08-13 Seminar Roy on A CSP-theoretic framework of checking conformance of business processes
In this talk, we tackle the problem of conformance checking which > verifies if the event logs (observed) match/fit the reference (arbitrary) process. We use concepts from Communicating Sequential Processes (CSP), which facilitates automated analysis using PAT toolkit. By this technique one can identify all the logs which cannot be properly replayed on the process. We illustrate our approach with an example. Finally, we introduce some metrics based on conformance checking. They are related to fitness, closeness, and appropriateness of the event logs vis-a-vis reference process models. We further indicate that such a framework can be used to tackle the problem of both static and run-time compliance checking for business processes. Our work is motivated by user friendly need of employing easy input technique of models and keeping the model checking work at the back-end.
2014-08-05: Podcast Interview with Len Bass
Architect Len Bass and author of Software Architecture in Practice has been interviewed for a podcast .
Show older articles