Reverse engineering concurrent programs using formal modelling and analysis

被引:0
|
作者
Younger, EJ
Luo, Z
Bennett, KH
Bull, TM
机构
关键词
formal methods; reverse engineering; program transformations; concurrency; type theory;
D O I
10.1109/WCRE.1996.558918
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We describe a formally based approach to reverse engineering programs with concurrent constructs. This has been a topic which has not previously been addressed, yet is required for safety critical systems and many others. To achieve this we have used a transformation based approach which has been successful in coping with sequential systems. To accommodate concurrency we have extended the core kernel language (WSL) and introduce and then prove new transformations. We then describe preliminary results. The novel aspects of this work are the application of formal program transformations to the maintenance of concurrent software, and the use of modern type theory and type checking/proof tools to extend our existing method and the tool to new domains, namely concurrency and safety critical systems.
引用
收藏
页码:239 / 248
页数:10
相关论文
共 50 条
  • [1] Reverse engineering concurrent programs using formal modelling and analysis
    Younger, EJ
    Luo, Z
    Bennett, KH
    Bull, TM
    [J]. INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, 1996, : 255 - 264
  • [2] Using informal and formal techniques for the reverse engineering of C programs
    Gannod, GC
    Cheng, BHC
    [J]. PROCEEDINGS OF THE THIRD WORKING CONFERENCE ON REVERSE ENGINEERING, 1996, : 249 - 258
  • [3] Using informal and formal techniques for the reverse engineering of C programs
    Gannod, GC
    Cheng, BHC
    [J]. INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, 1996, : 265 - 274
  • [4] A formal automated approach for reverse engineering programs with pointers
    Gannod, GC
    Cheng, BHC
    [J]. AUTOMATED SOFTWARE ENGINEERING, 12TH IEEE INTERNATIONAL CONFERENCE, PROCEEDINGS, 1997, : 219 - 226
  • [5] A FORMAL SYSTEM FOR SPECIFICATION ANALYSIS OF CONCURRENT PROGRAMS
    HIROSE, K
    TAKAHASHI, M
    [J]. PUBLICATIONS OF THE RESEARCH INSTITUTE FOR MATHEMATICAL SCIENCES, 1983, 19 (03) : 911 - 926
  • [6] Formal verification of concurrent programs using the Larch prover
    Chetali, B
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1998, 24 (01) : 46 - 62
  • [7] MODELLING AND VERIFICATION OF CONCURRENT PROGRAMS USING UPPAAL
    Cicirelli, Franco
    Nigro, Libero
    Pupo, Francesco
    [J]. PROCEEDINGS - 25TH EUROPEAN CONFERENCE ON MODELLING AND SIMULATION, ECMS 2011, 2011, : 525 - 533
  • [8] Generation of High Level Views in Reverse Engineering Using Formal Concept Analysis
    Kumar, G. Nagendra
    Kumar, Ch. Aswani
    [J]. 2014 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & SOFT COMPUTING (ICNSC), 2014, : 334 - 338
  • [9] Formal modeling of concurrent AOP programs
    Bogdan, Crenguta Madalina
    Serbanati, Luca Dan
    [J]. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2006, 1 : 92 - 99
  • [10] A suite of tools for facilitating reverse engineering using formal methods
    Gannod, GC
    Cheng, BHC
    [J]. 9TH INTERNATIONAL WORKSHOP ON PROGRAM COMPREHENSION, PROCEEDINGS, 2001, : 221 - 232