• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
He Yanxiang, Wu Wei, Chen Yong, Li Qing'an, Liu Jianbo. A Kind of Safe Typed Memory Model for C-Like Languages[J]. Journal of Computer Research and Development, 2012, 49(11): 2440-2449.
Citation: He Yanxiang, Wu Wei, Chen Yong, Li Qing'an, Liu Jianbo. A Kind of Safe Typed Memory Model for C-Like Languages[J]. Journal of Computer Research and Development, 2012, 49(11): 2440-2449.

A Kind of Safe Typed Memory Model for C-Like Languages

More Information
  • Published Date: November 14, 2012
  • Verifying program by formal method is an important way to ensure software trusted. For low level imperative language like C language which can operate memory directly, a suitable memory model is needed to formalize the operational semantics or axiomatic semantics. The traditional byte memory model can describe various memory operations very well, however, it cant guarantee safety and make program-verifying complex. The memory model of object-oriented language is high-level. It is suitable for program verification but not for describing low level memory operation. A safe typed memory model is proposed by combining the previous two kind models. It can be used to formalize semantics and to verify program based on Hoare logic. This memory model allows pointer arithmetic, structure assignment, type cast and other memory operations, and makes pointer-based programs verification easier. The memory model is formalized and verified using Coq proof assistant.
  • Related Articles

    [1]Wu Haibo, Liu Hui, Sun Yi, Li Jun. A Concurrent Conflict Transaction Optimization Method for Consortium Blockchain Hyperledger Fabric[J]. Journal of Computer Research and Development, 2024, 61(8): 2110-2126. DOI: 10.7544/issn1000-1239.202220644
    [2]Yang Bo, Guo Haoran, Feng Junhui, Li Ge, Jin Zhi. A Rule Conflict Detection Approach for Intelligent System of Internet of Things[J]. Journal of Computer Research and Development, 2023, 60(3): 592-605. DOI: 10.7544/issn1000-1239.202110941
    [3]Ouyang Dantong, Gao Han, Xu Yini, Zhang Liming. Minimal Conflict Set Solving Method Combined with Fault Logic Relationship[J]. Journal of Computer Research and Development, 2020, 57(7): 1472-1480. DOI: 10.7544/issn1000-1239.2020.20190338
    [4]Xu Yini, Ouyang Dantong, Liu Meng, Zhang Liming, Zhang Yonggang. Algorithm of Computing Minimal Conflict Sets Based on the Structural Feature of Fault Output[J]. Journal of Computer Research and Development, 2018, 55(11): 2386-2394. DOI: 10.7544/issn1000-1239.2018.20170381
    [5]Huang Xiaohui, Li Dong, Shi Hailong, Cui Li. EasiRCC: A Method of Rule-Matching and Conflict Resolution for Smart Home[J]. Journal of Computer Research and Development, 2017, 54(12): 2711-2720. DOI: 10.7544/issn1000-1239.2017.20160646
    [6]Song Yang, Wang Houfeng. Chinese Zero Anaphora Resolution with Markov Logic[J]. Journal of Computer Research and Development, 2015, 52(9): 2114-2122. DOI: 10.7544/issn1000-1239.2015.20140620
    [7]Zhou Hang, Huang Zhiqiu, Zhu Yi, Xia Liang, Liu Linyuan. Real-Time Systems Contact Checking and Resolution Based on Time Petri Net[J]. Journal of Computer Research and Development, 2012, 49(2): 413-420.
    [8]Li Xiangjun, Meng Luoming, and Jiao Li. Problems in Results of Policy Conflict Resolutions and Detection and Resolution Methods in Network Management Systems[J]. Journal of Computer Research and Development, 2006, 43(7): 1297-1303.
    [9]Zhang Xinliang and Shi Chunyi. A Description-Logic Based Agent Organization[J]. Journal of Computer Research and Development, 2005, 42(11): 1843-1848.
    [10]Yao Jian, Mao Bing, and Xie Li. A DAG-Based Security Policy Conflicts Detection Method[J]. Journal of Computer Research and Development, 2005, 42(7): 1108-1114.

Catalog

    Article views (765) PDF downloads (562) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return