Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

VERIFICATION ENGINEERING OF SAFETY AND SECURITY CRITICAL DYNAMIC INDUSTRIAL APPLICATIONS

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Enhanced version of tools (opens in new window)

This deliverable will contain the evolved versions of an environment of technologies to enable modular system verifications, of the “verification as a service” and of the GUI.

Preliminary version of the platforms (opens in new window)

This deliverable will contain the first prototypes of an environment of technologies to enable modular system verifications and of the “verification as a service” (tasks 3.1 and 3.3)

Basic analyzers final release (opens in new window)

Final version of front-ends, and specification libraries (task 2.1), improved analyzers (task 2.2) and prototypes of new analyzers (task 2.3)

Basic analyzers intermediate release (opens in new window)

Initial version of front-ends and specification libraries (task 2.1), improved analyzers (task 2.2) and prototypes of new analyzers (task 2.3).

Collaboration of analyses intermediate release V1 (opens in new window)

Prototype for inter-analyzers collaboration (task 2.4) and verification artefact management (task 2.5).

Collaboration of analyses intermediate release V2 (opens in new window)

Final version of inter-analyzers collaboration (task 2.4) and verification artefact management (task 2.5).

Economic rationale and metrics report of the effectiveness and efficiency of the use of VESSEDIA outcomes (opens in new window)

This deliverable consists of an academic publication on the topic of the economic rationale (effectiveness and efficiency) on the incentives for the advanced use of VESSEDIA outcomes based on use cases.

DA’s use case intermediate report (opens in new window)

Report on applying the VESSEDIA solutions to the Aircraft Maintenance use case, first iteration.

CEA’s use case final report (opens in new window)

Second iteration report on applying the VESSEDIA solutions to the 6LoWPAN manager use case.

Evaluation using the VESSEDIA use cases (opens in new window)

Report on evaluation activities performed in Task 4.2.

Project quality plan (opens in new window)

The project quality plan (the project handbook) constitutes a set of project templates, explanations on the project management process, review process, quality checks, meeting organisation, which is communicated to all partners.

Metrics for VESSEDIA tools in quality assurance (opens in new window)

Definition of metrics defined in Task 4.1.

Quality tests & limits of VESSEDIA tools regarding security vulnerabilities detection (opens in new window)

This report will assess the quality of VESSEDIA tools regarding both simple and advanced security vulnerabilities (Task 4.3).

Methodological report for modular reasoning for system validation and verification (opens in new window)

This report will contain the methodology about modular reasoning for system validation and verification (task 3.1).

Updated plan and initial report on Exploitation, Dissemination & Communication activities (opens in new window)

This report includes updates on the exploitation, dissemination and communication plans as well as initial reports on the executed activities. It furthermore includes a first view on the market, its opportunities and on the target audiences.

Security requirements for connected medium security-critical applications (opens in new window)

This deliverable reports the general methodology developed in T1.1.

DA’s use case final report (opens in new window)

Second iteration report on applying the VESSEDIA solutions to the Aircraft Maintenance use case.

Analyses choice methodology report (opens in new window)

This report presents the findings of T1.4 regarding a cost-efficient trade-off between basic and sophisticated analyses.

CEA’s use case intermediate report (opens in new window)

Report on applying the VESSEDIA solutions to the 6LoWPAN manager use case, first iteration.

VESSEDIA approach for security evaluation (opens in new window)

Analysis on using VESSEDIA results in security evaluation methodologies (Task 4.2).

Guidelines for combination of static and dynamic analyses (opens in new window)

This report is the output of task 3.2 and will contain guidelines for combination of static and dynamic analyses.

VESSEDIA in Common Criteria evaluations (opens in new window)

Report on the potential contributions expected from VESSEDIA in the context of a CC process (Task 4.4).

Benchmark for evaluating VESSEDIA tools (opens in new window)

This report will present a benchmark for evaluating the quality of VESSEDIA tools regarding both simple and complex security vulnerabilities (Task 4.3).

Risk Assessment Plan (opens in new window)

The risk assessment plan shows how potential risks are assessed and mitigated in order to avoid any negative influence on the VESSEDIA project objectives. The interrelated risk assessment plan – risk identification, handling and monitoring – will be established.

Vulnerability discovery methodology (opens in new window)

This report presents ways to detect the most common vulnerabilities using Frama-C.

Inria’s use case intermediate report (opens in new window)

Report on applying the VESSEDIA solutions to the Contiki use case, first iteration.

Modelling framework description (opens in new window)

This document describes the model-based language resulting from T1.2.

Minimal contract Hoare-style verification versus abstract interpretation (opens in new window)

Report on using verification-service based theorem proving compared to abstract interpretation.

Inria’s use case final report (opens in new window)

Second iteration report on applying the VESSEDIA solutions to the Contiki use case.

Internal and external IT communication infrastructure and project website (opens in new window)

The external IT communication infrastructure constitutes a guideline for communication of the VESSEDIA project to external target groups including conferences, marketing measures and communication channels. Furthermore this deliverable constitutes the launch of the internal VESSEDIA communication infrastructure including the establishment of mailing lists or a subversion server, and the VESSEDIA website.

Data Management Plan (DMP) (opens in new window)

The DMP will provide an analysis of the main elements of the data management policy that will be used by the applications with regard to all the datasets that will be generated by the project. The DMP is not a fixed document, but evolves (if necessary) during the lifespan of the project. According to the Guidelines on Data Management in Horizon 2020, the DMP should address data set reference and name, data set description, standards and metadata, data sharing and archiving and preservation (including storage and backup) on a dataset by dataset basis and should reflect the current status of reflection within the consortium about the data that will be produced.

Publications

Towards Formal Verification of Contiki: Analysis of the AES–CCM* Modules with Frama-C (opens in new window)

Author(s): Peyrard , Alexandre; Kosmatov , Nikolai; Duquennoy , Simon; Raza , Shahid
Published in: RED-IOT 2018 - Workshop on Recent advances in secure management of data and resources in the IoT, Issue 4, 2017
Publisher: Zenodo
DOI: 10.5281/zenodo.1160349

Static Analysis and Runtime-Assertion Checking: Contribution to Security Counter-Measures (opens in new window)

Author(s): Pariente, Dillon; Signoles, Julien
Published in: 2017
Publisher: Zenodo
DOI: 10.5281/zenodo.820856

Ghosts for Lists: from Axiomatic to Executable Specifications (opens in new window)

Author(s): Loulergue , Frédéric; Blanchard , Allan; Kosmatov , Nikolai
Published in: TAP 2018 - 12th International Conference on Tests and Proofs, Issue 1, 2018
Publisher: HAL
DOI: 10.5281/zenodo.1402504

Ghosts for Lists: A Critical Module of Contiki Verified in Frama-C (opens in new window)

Author(s): Blanchard , Allan; Kosmatov , Nikolai; Loulergue , Frédéric
Published in: Tenth NASA Formal Methods Symposium - NFM 2018, Issue 1, 2018
Publisher: Newport News
DOI: 10.5281/zenodo.1402494

Symbolic execution of transition systems with function summaries (opens in new window)

Author(s): Imen Boudhiba, Christophe Gaston, Pascale Le Gall, Virgile Prevosto
Published in: 11th International Conference on Tests, 2017, Page(s) 41-58
Publisher: Proofs
DOI: 10.1007/978-3-319-61467-0_3

Logic against ghosts - comparison of two proof approaches for a list module (opens in new window)

Author(s): Allan Blanchard, Nikolai Kosmatov, Frédéric Loulergue
Published in: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing - SAC '19, 2019, Page(s) 2186-2195, ISBN 9781-450359337
Publisher: ACM Press
DOI: 10.1145/3297280.3297495

Specifying I/O using abstract nested hoare triples in separation logic (opens in new window)

Author(s): Willem Penninckx, Amin Timany, Bart Jacobs
Published in: Proceedings of the 21st Workshop on Formal Techniques for Java-like Programs - FTfJP '19, 2019, Page(s) 1-7, ISBN 9781-450368643
Publisher: ACM Press
DOI: 10.1145/3340672.3341118

Transferring Obligations Through Synchronizations

Author(s): Hamin Jafar; Jacobs Bart
Published in: ECOOP, 2019
Publisher: Dagstuhl LIPIcs

Des listes et leurs fantômes : vérification d'un module critique de Contiki avec FRAMA-C

Author(s): Blanchard, Allan; Kosmatov, Nikolai; Loulergue, Frédéric
Published in: 17èmes Journées AFADL : Approches Formelles Dans L'assistance Au Développement De Logiciels, Issue 14, 2018
Publisher: HAL

Verication Coverage for Combining Test and Proof (opens in new window)

Author(s): Hoang Le, Viet; Correnson, Loïc; Signoles, Julien; Wiels, Virginie
Published in: International Conference on Tests and Proofs TAP 2018 (Pre-Print), 2018
Publisher: zenodo
DOI: 10.5281/zenodo.3609494

Synthesizing invariants by solving solvable loops (opens in new window)

Author(s): Oliveira , S. ,; BENSALEM , S.; Prevosto , V.
Published in: Automated Technology for Verification and Analysis (ATVA), Issue 2, 2017, ISSN 0302-9743
Publisher: Springer Verlag
DOI: 10.5281/zenodo.893067

MMFilter : A CHR-Based Solver for Generation of Executions under Weak Memory Models (opens in new window)

Author(s): Allan Blanchard, Nikolai Kosmatov, Frédéric Loulergue
Published in: Computer Languages, Systems & Structures, Issue 53, 2018, Page(s) 121-142, ISSN 1477-8424
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.cl.2018.03.002

The future is ours: prophecy variables in separation logic (opens in new window)

Author(s): Ralf Jung, Rodolphe Lepigre, Gaurav Parthasarathy, Marianna Rapoport, Amin Timany, Derek Dreyer, Bart Jacobs
Published in: Proceedings of the ACM on Programming Languages, Issue 4/POPL, 2020, Page(s) 1-32, ISSN 2475-1421
Publisher: ACM
DOI: 10.1145/3371113

Soundness of a Dataflow Analysis for Memory Monitoring. (opens in new window)

Author(s): Ly, Dara; Kosmatov, Nikolai; Signoles, Julien; Loulergue, Frédéric
Published in: ACM SIGAda Ada Letters (Pre-print), Issue Volume 38, Issue 2, 2019, Page(s) 97-108
Publisher: ACM
DOI: 10.5281/zenodo.3609499

MetAcsl: Specification and Verification of High-Level Properties (opens in new window)

Author(s): Virgile Robles, Nikolai Kosmatov, Virgile Prevosto, Louis Rilling, Pascale Le Gall
Published in: Tools and Algorithms for the Construction and Analysis of Systems - 25th International Conference, TACAS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings, Part I, Issue 11427, 2019, Page(s) 358-364, ISBN 978-3-030-17461-3
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-17462-0_22

Tame Your Annotations with MetAcsl: Specifying, Testing and Proving High-Level Properties (opens in new window)

Author(s): Virgile Robles, Nikolai Kosmatov, Virgile Prevosto, Louis Rilling, Pascale Le Gall
Published in: Tests and Proofs - 13th International Conference, TAP 2019, Held as Part of the Third World Congress on Formal Methods 2019, Porto, Portugal, October 9–11, 2019, Proceedings, Issue 11823, 2019, Page(s) 167-185, ISBN 978-3-030-31156-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-31157-5_11

Starvation-Free Monitors (opens in new window)

Author(s): Jafar Hamin
Published in: Theoretical Aspects of Computing – ICTAC 2019 - 16th International Colloquium, Hammamet, Tunisia, October 31 – November 4, 2019, Proceedings, Issue 11884, 2019, Page(s) 175-195, ISBN 978-3-030-32504-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-32505-3_11

Runtime Assertion Checking and Static Verification: Collaborative Partners (opens in new window)

Author(s): Fonenantsoa Maurica, David R. Cok, Julien Signoles
Published in: Leveraging Applications of Formal Methods, Verification and Validation. Verification - 8th International Symposium, ISoLA 2018, Limassol, Cyprus, November 5-9, 2018, Proceedings, Part II, Issue 11245, 2018, Page(s) 75-91, ISBN 978-3-030-03420-7
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-03421-4_6

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0