• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chen Donghuo, Liu Quan, Jin Haidong, Zhu Fei, Wang Hui. A Temporal Logic with a Semantics Defined on the Static Structure and Dynamic Behavior of Program[J]. Journal of Computer Research and Development, 2016, 53(9): 2067-2084. DOI: 10.7544/issn1000-1239.2016.20150370
Citation: Chen Donghuo, Liu Quan, Jin Haidong, Zhu Fei, Wang Hui. A Temporal Logic with a Semantics Defined on the Static Structure and Dynamic Behavior of Program[J]. Journal of Computer Research and Development, 2016, 53(9): 2067-2084. DOI: 10.7544/issn1000-1239.2016.20150370

A Temporal Logic with a Semantics Defined on the Static Structure and Dynamic Behavior of Program

More Information
  • Published Date: August 31, 2016
  • The paper presents an interval temporal logic—CFITL(control flow interval temporal logic) which is used to specify the temporal properties of abstract model of program, for example control flow graph, generally abbreviated to CFG. The targeted logic differs from the general sense of temporal logics, typically CTL and LTL, whose semantical models are defined in term of the state-based structures. The semantics of CFITL is defined on an ordered CFG structure, which encodes the static structure and dynamic behavior of program. The ordered CFGs are a subset of CFGs, and their topology can be summarized by partially ordered sets, such that the induced natural number intervals can be mapped onto the well-formed structures of program. In other words, the CFITL formulae have the ability of specifying the properties related to not only the dynamic behavior but also static structure of programs. After the syntax and semantics of CFITL are expounded, the problem of model checking over CFITL is detailedly discussed. Furthermore, two types of algorithms are designed: one is based on the computation of reachable state space as well as the another is based on bounded model checking employing the SMT(satisfiability modulo theories) solvers power. Because programs implemented by advanced programming languages inevitably involve complex abstract data types with unbounded domains and operators, and the semantics of CFITL is more complex than the one of CTL, the method of SMT based model checking is more practical than the method of direct search of state space. In the sequel, a prototype tool is implemented, and some case studies are conducted.
  • Related Articles

    [1]Wang Guoqing, Zhuang Lei, He Mengyang, Song Yu, Ma Ling. Calculation Principle and Algorithm for the Window of Exact Acceleration in Real-Time Model Checking[J]. Journal of Computer Research and Development, 2020, 57(1): 214-226. DOI: 10.7544/issn1000-1239.2020.20190052
    [2]Wang Chong, Lü Yinrun, Chen Li, Wang Xiuli, Wang Yongji. Survey on Development of Solving Methods and State-of-the-Art Applications of Satisfiability Modulo Theories[J]. Journal of Computer Research and Development, 2017, 54(7): 1405-1425. DOI: 10.7544/issn1000-1239.2017.20160303
    [3]Wei Ou, Shi Yufeng, Xu Bingfeng, Huang Zhiqiu, Chen Zhe. Abstract Modeling Formalisms in Software Model Checking[J]. Journal of Computer Research and Development, 2015, 52(7): 1580-1603. DOI: 10.7544/issn1000-1239.2015.20140413
    [4]Wang Lei, Chen Gui, and Jin Maozhong. Detection of Code Vulnerabilities via Constraint-Based Analysis and Model Checking[J]. Journal of Computer Research and Development, 2011, 48(9): 1659-1666.
    [5]Jia Yangli, Li Zhoujun, Xing Jianying, Chen Shikun. Advances in the Component Verification Technology Based on Model Checking[J]. Journal of Computer Research and Development, 2011, 48(6): 913-922.
    [6]Jiang Hua. Efficient Global Model-Checking for Propositional μ-Calculus[J]. Journal of Computer Research and Development, 2010, 47(8): 1424-1433.
    [7]Jiang Hua, Li Xiang. Model Checking for Mobile Ambients[J]. Journal of Computer Research and Development, 2009, 46(10): 1750-1757.
    [8]Zhang Junhua, Huang Zhiqiu, and Cao Zining. Counterexample Generation for Probabilistic Timed Automata Model Checking[J]. Journal of Computer Research and Development, 2008, 45(10): 1638-1645.
    [9]He Jian, Qin Zheng. Modeling and Checking the Behavior of Software Architecture[J]. Journal of Computer Research and Development, 2005, 42(11): 2018-2024.
    [10]Pei Yu, Li Xuandong, and Zheng Guoliang. LDPChecker—A Model Checking Tool for Real-Time and Hybrid System[J]. Journal of Computer Research and Development, 2005, 42(1): 38-46.
  • Cited by

    Periodical cited type(16)

    1. 董艳燕. 基于混合密码技术的一种大数据加密技术研究. 湖北师范大学学报(自然科学版). 2024(02): 52-55 .
    2. 刘小都,赵慧奇. 基于混合密码体制的大数据隐匿性特征安全提取技术. 南京信息工程大学学报(自然科学版). 2023(03): 286-292 .
    3. 李博. 基于元模型控制的智能电网大数据安全监测技术研究. 电气自动化. 2023(04): 112-114+118 .
    4. 王腾腾,柴志雷. SM4国密算法的异构可重构计算系统研究. 计算机应用研究. 2023(09): 2826-2831 .
    5. 吴艾青,李伟,别梦妮,南龙梅,陈韬. 分簇式VLIW密码专用处理器的编译器后端优化研究. 小型微型计算机系统. 2023(10): 2346-2352 .
    6. 李高磊,李建华,周志洪,张昊. 面向新型关键基础设施的密码应用安全性评估技术综述. 网络与信息安全学报. 2023(06): 1-19 .
    7. 史运涛 ,董广亮 ,雷振伍 . 工业互联网云网关架构及实现. 计算机应用与软件. 2022(02): 138-143+227 .
    8. 李斌,周清雷,陈晓杰,冯峰. 可重构的素域SM2算法优化方法. 通信学报. 2022(03): 30-41 .
    9. 翟嘉琪,李斌,周清雷,陈晓杰. 基于FPGA的高性能可扩展SM4-GCM算法实现. 计算机科学. 2022(10): 74-82 .
    10. 刘育平,杨尔欣,高攀,于光宗,顾冰凌,田琳. 基于大数据技术的智慧后勤信息动态加密方法. 信息安全研究. 2022(11): 1104-1110 .
    11. 任伟峰. 内网敏感大数据共享交换安全性监控平台设计. 信息技术. 2022(10): 118-123 .
    12. 李萍,朱春琴,曹磊,孙毅,魏房忠. 基于高性能密码实现的大数据安全研究. 无线互联科技. 2021(01): 104-107 .
    13. 容爱琼,周超,陈东青. 野外环境数据加密传输及远程监测系统设计. 单片机与嵌入式系统应用. 2021(02): 86-89 .
    14. 李庆,刘涵阅,张春生. 基于折叠技术的大数据样本洗牌算法研究. 计算机技术与发展. 2021(05): 43-47 .
    15. 卫婧. 铁路商用密码应用及安全技术体系研究. 铁路计算机应用. 2020(08): 43-47 .
    16. 李杰,李雷孝,孔冬冬. 一种基于中文助记词的椭圆曲线密钥生成方案. 内蒙古工业大学学报(自然科学版). 2020(02): 128-135 .

    Other cited types(1)

Catalog

    Article views (1173) PDF downloads (446) Cited by(17)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return