scholarly journals Quantitative analysis for symbolic heap bounds of CPS software

2011 ◽  
Vol 8 (4) ◽  
pp. 1251-1276 ◽  
Author(s):  
Renjian Li ◽  
Ji Wang ◽  
Liqian Chen ◽  
Wanwei Liu ◽  
Dengping Wei

One important quantitative property of CPS (Cyber-Physical Systems) software is its heap bound for which a precise analysis result needs to combine shape analysis and numeric reasoning. In this paper, we present a framework for statically finding symbolic heap bounds of CPS software. The basic idea is to separate numeric reasoning from shape analysis by first constructing an ASTG (Abstract State Transition Graph) and then extracting a pure numeric representation which can be analyzed for the heap bounds. A quantitative shape analysis method based on symbolic execution is defined in the framework to generate the ASTG. The numeric representation is extracted based on program slicing technique and inputted into an abstract interpretation tool for computing the heap bounds. We take list manipulating programs as an example to explain how to instantiate the framework for important data structures and to exhibit its practicability. A novel list abstraction method is also presented to support the instantiation of the framework.

Energies ◽  
2018 ◽  
Vol 11 (10) ◽  
pp. 2589 ◽  
Author(s):  
Ye Cai ◽  
Yu Chen ◽  
Yong Li ◽  
Yijia Cao ◽  
Xiangjun Zeng

With the increasing interaction between physical devices and communication components, the substation based on the IEC 61850 standard is a type of cyber–physical system. This paper proposes a reliability analysis method for substations with a cyber–physical interface matrix (CPIM). This method calculates the influences from both the physical device failures and the communication devices failures. Two indices, Probability of Load Curtailments and Expected Demand Not Supplied, are used in the reliability analysis. Given the simplified model of the practical substation based on the Chinese IEC 61850 standard, the results show that the substation system had a potential risk of cascading failure under the cyber–physical fusion trend, as the failure in cyber layer would increase the power loss of the whole system. The changing magnitude of Expected Demand Not Supplied increased significantly with increasing transmission delay rate of the process bus.


2015 ◽  
Vol 39 (3) ◽  
pp. 615-624
Author(s):  
Sungham Hong ◽  
Juhwan Choi ◽  
Sungsoo Rhim ◽  
Jin Hwan Choi

The design and development of Roll-to-Roll (R2R) system has been mainly executed by the expert’s experience. There are some important issues in the numerical analysis method about a roller path and the control of the R2R system. This study proposes the efficient R2R system analysis methods. The first one is an Approximated Winding Length Estimation (AWLE) algorithm which can calculate the analytic winded length of a workpiece. The winder can be approximated with line and arc segments at this algorithm. As a result, in the numerical model of the R2R system, we can replace the winder characteristics with the AWLE algorithm. The second one is the contact algorithm between workpiece and rollers. This contact algorithm must be stable and fast for precise analysis. The third one is the flexible workpiece model. The workpiece can be modeled by finite elements. By describing the implementation of these important methods, this paper proposes an efficient R2R system analysis method.


2015 ◽  
Vol 2015 ◽  
pp. 1-9 ◽  
Author(s):  
Zhi Wang ◽  
Zheng-Wen Long ◽  
Chao-Yun Long ◽  
Wei Zhang

The Duffin-Kemmer-Petiau oscillator for spin 0 particle in noncommutative plane is analyzed and the energy eigenvalue of the system is obtained by employing the functional analysis method. Furthermore, the thermodynamic properties of the noncommutative DKP oscillator are investigated via numerical method and the influence of noncommutative space on thermodynamic functions is also discussed. We show that the energy spectrum and corresponding thermodynamic functions of the considered physical systems depend explicitly on the noncommutative parameterθwhich characterizes the noncommutativity of the space.


1998 ◽  
Vol 49 (9-11) ◽  
pp. 1219-1223 ◽  
Author(s):  
Y. Takenaka ◽  
A. Uritani ◽  
K. Inoue ◽  
H. Sakai ◽  
C. Mori

2011 ◽  
Vol 488 (1) ◽  
pp. 65-69 ◽  
Author(s):  
Namkug Kim ◽  
Hengjun J. Kim ◽  
Jaeuk Hwang ◽  
Sujung J. Yoon ◽  
Han Byul Cho ◽  
...  

2021 ◽  
Author(s):  
Ahmed Bhayat ◽  
Lucas Cordeiro ◽  
Giles Reger ◽  
Fedor Shmarov ◽  
Konstantin Korovin ◽  
...  

Memory corruption bugs continue to plague low-level systems software generally written in unsafe programming languages. In order to detect and protect against such exploits, many pre- and post-deployment techniques exist. In this position paper, we propose and motivate the need for a <i>hybrid</i> approach for the protection against memory safety vulnerabilities, combining techniques that can identify the presence (and absence) of vulnerabilities pre-deployment with those that can detect and mitigate such vulnerabilities post-deployment. Our hybrid approach involves three layers: hardware runtime protection provided by capability hardware, software runtime protection provided by compiler instrumentation, and static analysis provided by bounded model checking and symbolic execution. The key aspect of the proposed hybrid approach is that the protection offered is greater than the sum of its parts -- the expense of post-deployment runtime checks is reduced via information obtained during pre-deployment analysis. During pre-deployment analysis, static checking can be guided by runtime information. <br>


Sign in / Sign up

Export Citation Format

Share Document