Trustworthy Systems

TS News

News

2014-03-18: Seminar Luttik (TU Eindhoven) on Unique Parallel Decomposition
A recurring question in process theory is to what extent the behaviours definable in a certain process calculus have a unique decomposition into indecomposable parallel components. Milner and Moller were the first to consider the unique decomposition property in a process calculus for specifying simple finite behaviours. Since then, the property has been re-established several times for different process calculi, each time using a variant of the same proof idea, and most recently for a fragment of the applied pi-calculus. Bas Luttik will present and discuss an abstract theory of unique decomposition in commutative monoids that is tailored towards application in process theory, explain how the theory can be straightforwardly applied to establish unique parallel decomposition in process calculi modulo strong bisimilarity, and how an adaptation facilitates application in settings modulo weak and branching bisimilarity.
2014-03-14: Seminar Futatsugi (JAIST) on Generate & Check Method for Verification of Transition Systems
Effective coordination of inference (a la theorem proving) and search (a la model checking) is one of the most important and interesting research topics in formal methods. We have developed several techniques for coordinating inference and search for verification with proof scores in CafeOBJ. The generate & check method is a recent development of this kind in verification of transition systems with CafeOBJ. The method is based on (1) state representations with state patterns, and (2) systematic generation of finite state patterns which subsume all possible infinite states. This talk explains the generate & check method using a simple but non-trivial example of mutual exclusion protocols.
2014-02-25: Seminar Reeves (University of Waikato, Hamilton) on Adding Visualisations to Formal Models of Interactive Medical Devices
Creating formal models of interactive medical devices, such as infusion pumps, allows us to perform important checks to ensure that both the functionality of the device and its interaction possibilities correctly support requirements. As these are safety-critical devices errors can be potentially fatal. We often want to be able to demonstrate aspects of behaviour from the models to medical practitioners, bio-technicians, device manufacturers etc. who are not typically familiar with the languages and notations of our models. The best way to communicate with these people is via simulations of the device, however developing such simulations is time-consuming and error-prone. In this paper we describe ongoing work which looks at ways of creating visualisations and simulations directly from the formal models as a way of addressing this problem.
2014-02-18: NSW Big Picture Seminar Franklin (University of California, Berkeley) on The Berkeley Data Analytics Stack: Present and Future
This talk will outline the AMPLab's research approach and describe how we have integrated the three main resources available to address the cross-disciplinary nature of Big Data challenges: Algorithms (such as machine learning and statistical techniques), Machines (in the form of scalable clusters and elastic cloud computing), and People (individually as analysts and as crowds).
2014-01-16: Seminar Clarke & Osterweil (University of Massachusetts Amherst) on Process-based Security Analysis for Human-intensive Systems
This talk describes a process-model based, systematic approach for detecting security vulnerabilities in human-intensive systems. Such systems typically involve complex interaction and cooperation among software applications, hardware devices, and human participants, and are increasingly central to key societal infrastructure.Thus, protecting such systems from attack is correspondingly centrally important. Clarke and Osterweil view is that these systems can be viewed as collections of processes whose security can be improved by modelling, analysing, and subsequently using the feedback gained to support continuous improvement. Their work features a process-modelling notation, with rich and well-defined semantics, that is able to represent the complexity of such systems as well as be the subject of rigorous analysis, such as model checking and fault-tree analysis. In this talk, Clarke and Osterweil will describe how they applied their approach to models of election processes used in Yolo and Marin Counties in California, show how their analyses have identified some example vulnerabilities, and indicate the kinds of improvements that can reduce vulnerabilities. Although no system can ever be made immune to any possible attack, Clarke and Osterweil believe that their approach of using technology to support continuous improvement represents an effective way to address the urgent need to protect the key infrastructure.
Show older articles