scholarly journals Hardware/Software Verification Process through Cloud Computing

2016 ◽  
Vol 4 (2) ◽  
pp. 123-128
Author(s):  
Ousama Esbel ◽  
Ng Ah Ngan Mike Christian
10.29007/j2cm ◽  
2018 ◽  
Author(s):  
Reiner Hähnle ◽  
Marieke Huisman

Deductive software verification aims at formally verifying that all possible behaviors of a given program satisfy formally defined, complex properties, where the verification process is based on logical inference. We list the most important challenges for the further development of the field.


2018 ◽  
Vol 7 (2.21) ◽  
pp. 454
Author(s):  
S V. Gayetri Devi ◽  
C Nalini ◽  
N Kumar

Rapid advancements in Software Verification and Validation have been critical in the wide development of tools and techniques to identify potential Concurrent bugs and hence verify the software correctness. A concurrent program has multiple processes and shared objects. Each process is a sequential program and they use the shared objects for communication for completion of a task. The primary objective of this survey is retrospective review of different tools and methods used for the verification of real-time concurrent software. This paper describes the proposed tool ‘F-JAVA’ for multithreaded Java codebases in contrast with existing ‘FRAMA-C’ platform, which is dedicated to real-time concurrent C software analysis. The proposed system is comprised of three layers, namely Programming rules generation stage, Verification stage with Particle Swarm Optimization (PSO) algorithm, and Performance measurement stage. It aims to address some of the challenges in the verification process such as larger programs, long execution times, and false alarms or bugs, and platform independent code verification  


Cloud services among public and business companies have become popular in recent years. For production activities, many companies rely on cloud technology. Distributed Denial of Services (DDoS) attack is an extremely damaging general and critical type of cloud attacks. Several efforts have been made in recent years to identify numerous types of DDoS attacks. This paper discusses the different types of DDoS attacks and their cloud computing consequences. Distributed Denial of Service attack (DDoS) is a malicious attempt to disrupt the normal movement of a targeted server, service or network through influx of internet traffic overwhelming the target or its infrastructure. The use of multiple affected computer systems as a source of attacks makes DDoS attacks effective. Computers and other networked tools, including IoT phones, may be included on exploited machines. A DDoS attack from a high level resembles a traffic jam that is caused by roads that prevents normal travel at their desired destination. So DDoS Attack is a major challenging problem in integrated Cloud and IoT. Hence, this paper proposes Shield Advanced Mitigation System of Distributed Denial of Service Attack in the integration of Internet of Things and Cloud Computing Environment. This secure architecture use two verification process to identify whether user is legitimate or malicious. Dynamic Captcha Testing with Equal Probability test for first verification process, moreover Zigsaw Image Puzzle Test is used for second verification process, and Intrusion Detection Prevention System is used to identify and prevent malicious user, moreover reverse proxy is used to hide server location. These functional components and flow could strengthen security in Client side network to provide cloud services furthermore to overcome distributed denial of service attack in the integration of Internet of Things and Cloud Environment.


10.29007/pz3t ◽  
2018 ◽  
Author(s):  
Nikolaj Bjorner ◽  
Dejan Jovanović ◽  
Tancrède Lepoint ◽  
Philipp Rümmer ◽  
Martin Schäf

Crowdsourcing promises to quasi-automate tasks that cannot be automated otherwise. Success stories like natural language translation or recognition of cats in images show that carefully crafted crowdsourcing tasks solve large problem instances which could not be solved otherwise. To utilize crowdsourcing, one has to define the problem in a way that is easy to split into small tasks, that the tasks are easy to solve for humans and hard to solve for a machine, and that the machine can efficiently check if the solution is correct.In this paper we discuss a novel approach of using crowdsourcing to assist software verification. We argue that Horn clauses form a good base for crowdsourcing since they are easy to subdivide, and that logic abduction is a suitable task since it is hard to find abductive inferences for Horn clauses automatically, but it is easy to check if an inference makes a Horn clause valid. We describe a prototype implementation, we show how crowdsourcing integrates in the verification process, and present preliminary results.


2013 ◽  
Vol 4 (1) ◽  
pp. 33-35
Author(s):  
Prince Jain ◽  
Dr. Gurdev Singh ◽  
Dr. Mandeep Singh

Cloud computing is discipline which use everything as service that provide economic, convenient and on-demand services to requested end users and cloud service consumer. Building a cloud computing network is not an easy task. It requires lots of efforts and time. For this, there arises a concept called Cloud Engineering. Cloud engineering is a discipline that uses set of processes which help to engineer a cloud network. The structure and principles of cloud engineering plays an important role in the engineering of usable, economic and vibrant cloud. The cloud engineering use a cloud development life cycle (CDLC) which systematic developed cloud. Quality assurance and verification is an important and mandatory part of development cycle. Quality assurance ensures the quality and web service of cloud network. Cloud Verification is an irrespirable step in a development of an economic cloud computing solution of a network. Verify the performance, reliability, availability, elasticity and security of cloud network against the service level agreement with respect to specification, agreement and requirement. The work in this paper focuses on the Quality Assurance factors and parameters that influence quality. It also discuses quality of data used in a cloud. This paper proposes and explores the structure and its component used in verification process of a cloud.


2021 ◽  
Vol 25 (2) ◽  
pp. 61-76
Author(s):  
Przemysław Pukocz

The paper discusses proposals for implementing the COVID-19 digital Vaccination Passport based on Blockchain that protects privacy. Since the end of the last year, after the commencement of vaccination against COVID-19, there has been an intense discussion on the form of introducing such a tool and the consequences of its implementation. This discussion is taking place in many European countries. One element of this discussion was the safety and anonymity of the massively verified data of persons on vaccinations in various areas of society functioning. These issues are being resolved by the proposed digital Vaccination Passport system. This system uses two major methods: Blockchain and hash functions, which allow you to maintain security, privacy, and anonymity at the same time. To improve the intuitiveness and simplicity of the system operation, the QR code technology was proposed in the passport verification process. The system has been implemented and tested in the Amazon AWS cloud computing environment. A reference architecture based on Blockchain for the AWS environment was proposed, dedicated to large and demanding application solutions. In addition, the cloud environment offers access to many tools that were used in the system’s implementation, significantly increasing the security of the entire solution.


Author(s):  
Dirk Beyer ◽  
Heike Wehrheim

Abstract The goal of cooperative verification is to combine verification approaches in such a way that they work together to verify a system model. In particular, cooperative verifiers provide exchangeable information (verification artifacts) to other verifiers or consume such information from other verifiers with the goal of increasing the overall effectiveness and efficiency of the verification process. This paper first gives an overview over approaches for leveraging strengths of different techniques, algorithms, and tools in order to increase the power and abilities of the state of the art in software verification. To limit the scope, we restrict our overview to tools and approaches for automatic program analysis. Second, we specifically outline cooperative verification approaches and discuss their employed verification artifacts. Third, we formalize all artifacts in a uniform way, thereby fixing their semantics and providing verifiers with a precise meaning of the exchanged information.


2015 ◽  
Vol 8 (9) ◽  
pp. 2829-2840 ◽  
Author(s):  
A. H. Baker ◽  
D. M. Hammerling ◽  
M. N. Levy ◽  
H. Xu ◽  
J. M. Dennis ◽  
...  

Abstract. Climate simulation codes, such as the Community Earth System Model (CESM), are especially complex and continually evolving. Their ongoing state of development requires frequent software verification in the form of quality assurance to both preserve the quality of the code and instill model confidence. To formalize and simplify this previously subjective and computationally expensive aspect of the verification process, we have developed a new tool for evaluating climate consistency. Because an ensemble of simulations allows us to gauge the natural variability of the model's climate, our new tool uses an ensemble approach for consistency testing. In particular, an ensemble of CESM climate runs is created, from which we obtain a statistical distribution that can be used to determine whether a new climate run is statistically distinguishable from the original ensemble. The CESM ensemble consistency test, referred to as CESM-ECT, is objective in nature and accessible to CESM developers and users. The tool has proven its utility in detecting errors in software and hardware environments and providing rapid feedback to model developers.


Sign in / Sign up

Export Citation Format

Share Document