Challenges of sofware verification:
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Singapore
Springer
2023
|
Schriftenreihe: | Intelligent systems reference library
238 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XV, 264 Seiten Illustrationen, Diagramme 24 cm |
ISBN: | 9811996008 9789811996009 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV049392481 | ||
003 | DE-604 | ||
005 | 20231117 | ||
007 | t | ||
008 | 231102s2023 a||| |||| 00||| eng d | ||
020 | |a 9811996008 |9 981-1996-00-8 | ||
020 | |a 9789811996009 |9 978-981-1996-00-9 | ||
035 | |a (OCoLC)1410706618 | ||
035 | |a (DE-599)BVBBV049392481 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
245 | 1 | 0 | |a Challenges of sofware verification |c Vincenzo Arceri ; Agostino Cortesi ; Pietro Ferrara ; Martina Olliaro editors |
264 | 1 | |a Singapore |b Springer |c 2023 | |
300 | |a XV, 264 Seiten |b Illustrationen, Diagramme |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Intelligent systems reference library |v 238 | |
650 | 0 | 7 | |a Programmverifikation |0 (DE-588)4135576-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Software |0 (DE-588)4055382-6 |2 gnd |9 rswk-swf |
653 | 0 | |a Computer software / Verification | |
653 | 0 | |a Logiciels / Vérification | |
653 | 0 | |a Computer software / Verification | |
689 | 0 | 0 | |a Software |0 (DE-588)4055382-6 |D s |
689 | 0 | 1 | |a Programmverifikation |0 (DE-588)4135576-3 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Arceri, Vincenzo |d ca. 20./21. Jh. |e Sonstige |0 (DE-588)1310231346 |4 oth | |
700 | 1 | |a Cortesi, Agostino |d 1963- |e Sonstige |0 (DE-588)121273229 |4 oth | |
700 | 1 | |a Ferrara, Pietro |e Sonstige |0 (DE-588)1228649685 |4 oth | |
700 | 1 | |a Olliaro, Martina |d ca. 20./21. Jh. |e Sonstige |0 (DE-588)131023146X |4 oth | |
830 | 0 | |a Intelligent systems reference library |v 238 |w (DE-604)BV035704685 |9 238 | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034719881&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-034719881 |
Datensatz im Suchindex
_version_ | 1804186103331160064 |
---|---|
adam_text | Contents 1 2 Abstract Interpretation: From 0,1, to oo ............................................... 1 Patrick Cousot 1.1 Introduction ...................................................................................... 1.2 Abstract Interpretation for the Untaught ....................................... 1.3 Abstract Interpretation for the Savant............................................. 1.3.1 Software Engineering ...................................................... 1.3.2 Education .......................................................................... 1.3.3 Scope of Abstract Interpretation .................................... 1.3.4 More Complex Properties ................................................ 1.3.5 Properties of More Complex Data Structures................. 1.3.6 Properties of More Complex Control Structures ........... 1.3.7 Computation Spaces ........................................................ 1.3.8 Choosing Precise and Efficient Abstractions ................. 1.3.9 Induction Abstraction ...................................................... 1.3.10 Calculational Design of Abstract Interpreters ............... 1.3.11 Language-Independent Abstract Interpretation ............. 1.3.12 New Computation Models and Challenges..................... 1.4 Conclusion ........................................................................................ References ................................................................................................... 1 2 6 6 8 8 8 9 9 10 10 10 11 11 12 13 13 LiSA: A Generic Framework for Multilanguage Static
Analysis ... 19 Luca Negrini. Pietro Ferrara, Vincenzo Arceri, and Agostino Cortesi 2.1 Introduction ....................................................................................... 2.1.1 An Illustrative Example..................................................... 2.1.2 Contribution and Paper Structure..................................... 2.2 LiSA’s Overall Architecture............................................................. 2.3 The Internal Language ..................................................................... 2.3.1 Control Flow Graphs ......................................................... 2.3.2 Symbolic Expressions ....................................................... 2.4 The Analysis State ........................................................................... 2.5 Interprocedural Analysis ................................................................. 20 20 22 23 25 26 27 29 31 vii
Contents viii 3 4 2.6 2.7 2.8 Frontends ........................................................................................... Multilanguage Analysis ................................................................... Conclusion ......................................................................................... 2.8.1 Future Directions ............................................................... 2.8.2 Related Work ..................................................................... References .................................................................................................... 32 33 36 37 37 39 How to Make Taint Analysis Precise ....................................................... 43 Francesco Logozzo and Ibrahim Mohamed 3.1 Introduction ....................................................................................... 3.2 Concrete Semantics........................................................................... 3.2.1 Influenced Concrete States ................................................ 3.2.2 Semantics of Basic Instructions ........................................ 3.2.3 Partial Traces Semantics .................................................... 3.2.4 Reachable States Semantics .............................................. 3.3 Application to Security..................................................................... 3.3.1 Sources ............................................................................... 3.3.2 Sinks ................................................................................... 3.3.3
Sanitizers............................................................................. 3.4 Data Flow Analyses for Security .................................................... 3.5 Reachable States-Based Taint Analysis .......................................... 3.6 Trace-Based Taint Analysis ............................................................. 3.6.1 Trace Influence Algebra ................................................... 3.6.2 Influence Semantics with Features................................... 3.6.3 Inter-Procedural Analysis ................................................. 3.6.4 Features for Analysis Approximations ............................ 3.7 Experience ......................................................................................... 3.8 Conclusions ....................................................................................... References .................................................................................................... 43 44 44 44 45 46 46 46 47 47 47 49 50 51 51 52 52 53 53 54 “Fixing” the Specification of Widenings ................................................. 57 Enea Zaffanella and Vincenzo Arceri 4.1 Introduction ....................................................................................... 4.2 Background ....................................................................................... 4.3 On the Specification of Widening Operators.................................. 4.3.1 Classifying Abstract Domain Implementations ............... 4.3.2 Classifying AI Engine Implementations
........................... 4.4 Combinations of Abstract Domains and AI Engines ..................... 4.4.1 Some Thoughts on the Unsafe Combinations ................ 4.4.2 Comparing the Safe Combinations .................................. 4.5 Lesson Learned and Recommendation............................................ 4.5.1 Safe Widenings for Convex Polyhedra ............................ 4.5.2 A Note on the Unusual Widening Specifications........... 4.6 Conclusion ........................................................................................ References ................................................................................................... 57 59 60 62 65 65 67 68 69 70 72 73 73
Contents 5 6 7 ix Static Analysis for Data Scientists............................................................. 77 Caterina Urban 5.1 Introduction ....................................................................................... 5.1.1 Example.............................................................................. 5.1.2 Data Expectation Static Analyses ................................... 5.2 Input Data-Aware Concrete Semantics............................................ 5.2.1 Input Data ........................................................................... 5.2.2 Dataframe-Manipulating Language.................................. 5.2.3 Input-Aware Semantics ...................................................... 5.3 Expectations Abstract Domains ...................................................... 5.3.1 Column Expectations Abstract Domain .......................... 5.3.2 Other Expectations Abstract Domains ............................ 5.4 Implementation ................................................................................. 5.5 Conclusion ......................................................................................... References .................................................................................................... 77 78 80 81 81 82 83 86 87 89 89 90 91 Completeness in Static Analysis by Abstract Interpretation: A Personal Point of View...................................................................... 93 David Monniaux 6.1 Introduction .......................................................................................
6.2 Completeness of the Abstraction: the Case of LRUCaches ......... 6.3 Completeness or Incompletenessof the Analysis Method ............ 6.3.1 Widening Operators........................................................... 6.3.2 Exact Solving ..................................................................... 6.3.3 Imprecise Abstract Transfer Functions ............................ 6.4 Undecidability of an Abstraction ...................................... 6.4.1 Polyhedral Abstraction ...................................................... 6.4.2 Richer Domains ................................................................. 6.5 Perspectives and Conclusion ............................................................ References ................................................................................................... 93 94 97 97 99 101 102 102 105 105 106 Lifting String Analysis Domains ............................................................... 109 Martina Olliaro. Vincenzo Arceri, Agostino Cortesi, and Pietro Ferrara 7.1 Introduction ...................................................................................... 7.1.1 Paper Contribution ............................................................. 7.1.2 Paper Structure ................................................................... 7.2 Background ...................................................................................... 7.2.1 Mathematical Notation ..................................................... 7.2.2 Abstract Interpretation.......................................................
7.2.3 Reduced Product ............................................................... 7.2.4 Granger Product ................................................................. 7.2.5 String Operators ................................................................. 7.3 Related Work .................................................................................... 7.3.1 Enhancing Operators ......................................................... 7.3.2 Combinations of String Analyses .................................... 109 110 112 113 113 113 114 114 115 115 115 116
Contents X 7.3.3 String Analysis: Applications............................................ Concrete Domain and Semantics .................................................... 7.4.1 Concrete Domain ................................................................ 7.4.2 Concrete Semantics ............................................................ 7.4.3 Example............................................................................... 7.5 String Abstract Domains .................................................................. 7.5.1 String Length ...................................................................... 7.5.2 Character Inclusion ............................................................ 7.5.3 Prefix and Suffix.................................................................. 7.6 Segmentation Abstract Domain........................................................ 7.6.1 Strings Concrete Representation ...................................... 7.6.2 Abstract Domain ................................................................ 7.6.3 Abstract Semantics.............................................................. 7.7 Refined String Abstract Domains .................................................... 7.7.1 Meaning of Refinement...................................................... 7.7.2 Combining Segmentation andString Length Domains ............................................................................ 7.7.3 Combining Segmentation andCharacter Inclusion Domains ............................................................................ 7.7.4 Combining
Segmentation andPrefix Domains ................ 7.8 Conclusion ......................................................................................... References ................................................................................................... 116 117 117 117 118 118 119 120 121 122 123 123 129 130 131 Local Completeness in Abstract Interpretation..................................... 145 Roberto Bruni, Roberto Giacobazzi. Roberta Gori, and Francesco Ranzato 8.1 Completeness, Fallacy,and Approximation .................................... 8.2 Proving Completeness .................................................................... 8.3 LCL: Local Completeness Logic ..................................................... 8.4 Concluding Remarks .................................................................... References ................................................................................................... 146 148 150 153 154 The Top-Down Solver—An Exercise in A2I ........................................... 157 Sarah Tilscher, Yannick Stade, Michael Schwarz, Ralf Vogler, and Helmut Seidl 9.1 Introduction ....................................................................................... 9.2 Getting Started................................................................................... 9.3 Adding Fixpoint Iteration.................................................................. 9.4 The Top-Down Solver TD ........................................................ 9.5 The Top-Down Solver withTabulation
........................................... 9.6 Introducing Widening and Narrowing ............................................ 9.7 Conclusion ......................................................................................... References ................................................................................................... 157 159 162 168 171 172 177 178 7.4 8 9 131 134 137 140 140
Contents 10 11 Regular Matching with Constraint Programming ............................... 181 Roberto Amadini and Maurizio Gabbrielli 10.1 Introduction ....................................................................................... 10.2 Preliminaries ..................................................................................... 10.2.1 Strings and Regular Languages ........................................ 10.2.2 Constraint Programming and String Solving .................. 10.3 Matching Regular Expressions ....................................................... 10.3.1 Match ................................................................................... 10.3.2 Generalization to replace.................................................. 10.4 Conclusions ....................................................................................... References .................................................................................................... 181 183 183 185 187 187 191 193 193 Floating-Point Round-off Error Analysis of Safety-Critical Avionics Software .................................................................................. 197 Laura Titolo, Mariano Moscato, Marco A. Feliu, Aaron Dutle, and César Munoz 11.1 Introduction ...................................................................................... 11.2 Formal Verification of the ADS-B CPR Algorithm ...................... 11.3 Automatizing the Verification with PRECiSA ............................. 11.4 Case Study: Point-in-Polygon Algorithm ..................................... 11.5
Related Work .................................................................................... 11.6 Conclusion and Future Challenges ................................................. References .................................................................................................... 12 xi 198 199 205 210 214 216 218 Risk Estimation in loT Systems................................................................ 221 Chiara Bodei, Gian-Luigi Ferrari, Letterio Galletta, and Pierpaolo Degano 12.1 Introduction ..................................................................................... 221 12.2 Indoor Environmental Monitoring Scenario ................................. 223 12.3 Technical Background ..................................................... 224 12.3.1 Overview of loT-LySa ................................................... 224 12.3.2 Control Flow Analysis....................................................... 229 12.4 Using the CFA Resultsfor Analysing Critical Decisions ............. 232 12.4.1 Taint Analysis..................................................................... 233 12.4.2 What if Reasoning ............................................................. 236 12.4.3 Estimation of Risks ........................................................... 238 12.5 Concluding Remarks ..................................................... 239 References ................................................................................................... 241 13 Verification of Reaction Systems Processes............................................. 243
Linda Brodo. Roberto Bruni, and Moreno Falaschi 13.1 Introduction ...................................................................................... 13.2 Reaction Systems ......................................................................... 13.3 SOS Rules for ReactionSystems ..................................................... 13.4 Bio-simulation .................................................................................. 13.4.1 AssertionLanguage ............................................................ 244 245 247 250 251
Contents xii 13.4.2 13.4.3 Bio-similarity and Biological Equivalence ...................... A Case Study: Metabolic Pathways in Mammalian Epithelial Cells .................................................... 13.4.4 Dynamic Slicing of RS Processes ................................... 13.5 Quantitative Extensions of RSs ........................................................ 13.6 Implementation and Experimentation ............................................ 13.7 Related Work ..................................................................................... 13.8 Conclusion and Future Work ............................................................ References .................................................................................................... 252 254 255 257 260 261 261 262
|
adam_txt |
Contents 1 2 Abstract Interpretation: From 0,1, to oo . 1 Patrick Cousot 1.1 Introduction . 1.2 Abstract Interpretation for the Untaught . 1.3 Abstract Interpretation for the Savant. 1.3.1 Software Engineering . 1.3.2 Education . 1.3.3 Scope of Abstract Interpretation . 1.3.4 More Complex Properties . 1.3.5 Properties of More Complex Data Structures. 1.3.6 Properties of More Complex Control Structures . 1.3.7 Computation Spaces . 1.3.8 Choosing Precise and Efficient Abstractions . 1.3.9 Induction Abstraction . 1.3.10 Calculational Design of Abstract Interpreters . 1.3.11 Language-Independent Abstract Interpretation . 1.3.12 New Computation Models and Challenges. 1.4 Conclusion . References . 1 2 6 6 8 8 8 9 9 10 10 10 11 11 12 13 13 LiSA: A Generic Framework for Multilanguage Static
Analysis . 19 Luca Negrini. Pietro Ferrara, Vincenzo Arceri, and Agostino Cortesi 2.1 Introduction . 2.1.1 An Illustrative Example. 2.1.2 Contribution and Paper Structure. 2.2 LiSA’s Overall Architecture. 2.3 The Internal Language . 2.3.1 Control Flow Graphs . 2.3.2 Symbolic Expressions . 2.4 The Analysis State . 2.5 Interprocedural Analysis . 20 20 22 23 25 26 27 29 31 vii
Contents viii 3 4 2.6 2.7 2.8 Frontends . Multilanguage Analysis . Conclusion . 2.8.1 Future Directions . 2.8.2 Related Work . References . 32 33 36 37 37 39 How to Make Taint Analysis Precise . 43 Francesco Logozzo and Ibrahim Mohamed 3.1 Introduction . 3.2 Concrete Semantics. 3.2.1 Influenced Concrete States . 3.2.2 Semantics of Basic Instructions . 3.2.3 Partial Traces Semantics . 3.2.4 Reachable States Semantics . 3.3 Application to Security. 3.3.1 Sources . 3.3.2 Sinks . 3.3.3
Sanitizers. 3.4 Data Flow Analyses for Security . 3.5 Reachable States-Based Taint Analysis . 3.6 Trace-Based Taint Analysis . 3.6.1 Trace Influence Algebra . 3.6.2 Influence Semantics with Features. 3.6.3 Inter-Procedural Analysis . 3.6.4 Features for Analysis Approximations . 3.7 Experience . 3.8 Conclusions . References . 43 44 44 44 45 46 46 46 47 47 47 49 50 51 51 52 52 53 53 54 “Fixing” the Specification of Widenings . 57 Enea Zaffanella and Vincenzo Arceri 4.1 Introduction . 4.2 Background . 4.3 On the Specification of Widening Operators. 4.3.1 Classifying Abstract Domain Implementations . 4.3.2 Classifying AI Engine Implementations
. 4.4 Combinations of Abstract Domains and AI Engines . 4.4.1 Some Thoughts on the Unsafe Combinations . 4.4.2 Comparing the Safe Combinations . 4.5 Lesson Learned and Recommendation. 4.5.1 Safe Widenings for Convex Polyhedra . 4.5.2 A Note on the Unusual Widening Specifications. 4.6 Conclusion . References . 57 59 60 62 65 65 67 68 69 70 72 73 73
Contents 5 6 7 ix Static Analysis for Data Scientists. 77 Caterina Urban 5.1 Introduction . 5.1.1 Example. 5.1.2 Data Expectation Static Analyses . 5.2 Input Data-Aware Concrete Semantics. 5.2.1 Input Data . 5.2.2 Dataframe-Manipulating Language. 5.2.3 Input-Aware Semantics . 5.3 Expectations Abstract Domains . 5.3.1 Column Expectations Abstract Domain . 5.3.2 Other Expectations Abstract Domains . 5.4 Implementation . 5.5 Conclusion . References . 77 78 80 81 81 82 83 86 87 89 89 90 91 Completeness in Static Analysis by Abstract Interpretation: A Personal Point of View. 93 David Monniaux 6.1 Introduction .
6.2 Completeness of the Abstraction: the Case of LRUCaches . 6.3 Completeness or Incompletenessof the Analysis Method . 6.3.1 Widening Operators. 6.3.2 Exact Solving . 6.3.3 Imprecise Abstract Transfer Functions . 6.4 Undecidability of an Abstraction . 6.4.1 Polyhedral Abstraction . 6.4.2 Richer Domains . 6.5 Perspectives and Conclusion . References . 93 94 97 97 99 101 102 102 105 105 106 Lifting String Analysis Domains . 109 Martina Olliaro. Vincenzo Arceri, Agostino Cortesi, and Pietro Ferrara 7.1 Introduction . 7.1.1 Paper Contribution . 7.1.2 Paper Structure . 7.2 Background . 7.2.1 Mathematical Notation . 7.2.2 Abstract Interpretation.
7.2.3 Reduced Product . 7.2.4 Granger Product . 7.2.5 String Operators . 7.3 Related Work . 7.3.1 Enhancing Operators . 7.3.2 Combinations of String Analyses . 109 110 112 113 113 113 114 114 115 115 115 116
Contents X 7.3.3 String Analysis: Applications. Concrete Domain and Semantics . 7.4.1 Concrete Domain . 7.4.2 Concrete Semantics . 7.4.3 Example. 7.5 String Abstract Domains . 7.5.1 String Length . 7.5.2 Character Inclusion . 7.5.3 Prefix and Suffix. 7.6 Segmentation Abstract Domain. 7.6.1 Strings Concrete Representation . 7.6.2 Abstract Domain . 7.6.3 Abstract Semantics. 7.7 Refined String Abstract Domains . 7.7.1 Meaning of Refinement. 7.7.2 Combining Segmentation andString Length Domains . 7.7.3 Combining Segmentation andCharacter Inclusion Domains . 7.7.4 Combining
Segmentation andPrefix Domains . 7.8 Conclusion . References . 116 117 117 117 118 118 119 120 121 122 123 123 129 130 131 Local Completeness in Abstract Interpretation. 145 Roberto Bruni, Roberto Giacobazzi. Roberta Gori, and Francesco Ranzato 8.1 Completeness, Fallacy,and Approximation . 8.2 Proving Completeness . 8.3 LCL: Local Completeness Logic . 8.4 Concluding Remarks . References . 146 148 150 153 154 The Top-Down Solver—An Exercise in A2I . 157 Sarah Tilscher, Yannick Stade, Michael Schwarz, Ralf Vogler, and Helmut Seidl 9.1 Introduction . 9.2 Getting Started. 9.3 Adding Fixpoint Iteration. 9.4 The Top-Down Solver TD . 9.5 The Top-Down Solver withTabulation
. 9.6 Introducing Widening and Narrowing . 9.7 Conclusion . References . 157 159 162 168 171 172 177 178 7.4 8 9 131 134 137 140 140
Contents 10 11 Regular Matching with Constraint Programming . 181 Roberto Amadini and Maurizio Gabbrielli 10.1 Introduction . 10.2 Preliminaries . 10.2.1 Strings and Regular Languages . 10.2.2 Constraint Programming and String Solving . 10.3 Matching Regular Expressions . 10.3.1 Match . 10.3.2 Generalization to replace. 10.4 Conclusions . References . 181 183 183 185 187 187 191 193 193 Floating-Point Round-off Error Analysis of Safety-Critical Avionics Software . 197 Laura Titolo, Mariano Moscato, Marco A. Feliu, Aaron Dutle, and César Munoz 11.1 Introduction . 11.2 Formal Verification of the ADS-B CPR Algorithm . 11.3 Automatizing the Verification with PRECiSA . 11.4 Case Study: Point-in-Polygon Algorithm . 11.5
Related Work . 11.6 Conclusion and Future Challenges . References . 12 xi 198 199 205 210 214 216 218 Risk Estimation in loT Systems. 221 Chiara Bodei, Gian-Luigi Ferrari, Letterio Galletta, and Pierpaolo Degano 12.1 Introduction . 221 12.2 Indoor Environmental Monitoring Scenario . 223 12.3 Technical Background . 224 12.3.1 Overview of loT-LySa . 224 12.3.2 Control Flow Analysis. 229 12.4 Using the CFA Resultsfor Analysing Critical Decisions . 232 12.4.1 Taint Analysis. 233 12.4.2 What if Reasoning . 236 12.4.3 Estimation of Risks . 238 12.5 Concluding Remarks . 239 References . 241 13 Verification of Reaction Systems Processes. 243
Linda Brodo. Roberto Bruni, and Moreno Falaschi 13.1 Introduction . 13.2 Reaction Systems . 13.3 SOS Rules for ReactionSystems . 13.4 Bio-simulation . 13.4.1 AssertionLanguage . 244 245 247 250 251
Contents xii 13.4.2 13.4.3 Bio-similarity and Biological Equivalence . A Case Study: Metabolic Pathways in Mammalian Epithelial Cells . 13.4.4 Dynamic Slicing of RS Processes . 13.5 Quantitative Extensions of RSs . 13.6 Implementation and Experimentation . 13.7 Related Work . 13.8 Conclusion and Future Work . References . 252 254 255 257 260 261 261 262 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author_GND | (DE-588)1310231346 (DE-588)121273229 (DE-588)1228649685 (DE-588)131023146X |
building | Verbundindex |
bvnumber | BV049392481 |
ctrlnum | (OCoLC)1410706618 (DE-599)BVBBV049392481 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01921nam a2200433 cb4500</leader><controlfield tag="001">BV049392481</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20231117 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">231102s2023 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9811996008</subfield><subfield code="9">981-1996-00-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789811996009</subfield><subfield code="9">978-981-1996-00-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1410706618</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049392481</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Challenges of sofware verification</subfield><subfield code="c">Vincenzo Arceri ; Agostino Cortesi ; Pietro Ferrara ; Martina Olliaro editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XV, 264 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Intelligent systems reference library</subfield><subfield code="v">238</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Programmverifikation</subfield><subfield code="0">(DE-588)4135576-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer software / Verification</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Logiciels / Vérification</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer software / Verification</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Programmverifikation</subfield><subfield code="0">(DE-588)4135576-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Arceri, Vincenzo</subfield><subfield code="d">ca. 20./21. Jh.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1310231346</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cortesi, Agostino</subfield><subfield code="d">1963-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)121273229</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ferrara, Pietro</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1228649685</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Olliaro, Martina</subfield><subfield code="d">ca. 20./21. Jh.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)131023146X</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Intelligent systems reference library</subfield><subfield code="v">238</subfield><subfield code="w">(DE-604)BV035704685</subfield><subfield code="9">238</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034719881&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034719881</subfield></datafield></record></collection> |
id | DE-604.BV049392481 |
illustrated | Illustrated |
index_date | 2024-07-03T23:01:37Z |
indexdate | 2024-07-10T10:05:48Z |
institution | BVB |
isbn | 9811996008 9789811996009 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034719881 |
oclc_num | 1410706618 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | XV, 264 Seiten Illustrationen, Diagramme 24 cm |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Springer |
record_format | marc |
series | Intelligent systems reference library |
series2 | Intelligent systems reference library |
spelling | Challenges of sofware verification Vincenzo Arceri ; Agostino Cortesi ; Pietro Ferrara ; Martina Olliaro editors Singapore Springer 2023 XV, 264 Seiten Illustrationen, Diagramme 24 cm txt rdacontent n rdamedia nc rdacarrier Intelligent systems reference library 238 Programmverifikation (DE-588)4135576-3 gnd rswk-swf Software (DE-588)4055382-6 gnd rswk-swf Computer software / Verification Logiciels / Vérification Software (DE-588)4055382-6 s Programmverifikation (DE-588)4135576-3 s DE-604 Arceri, Vincenzo ca. 20./21. Jh. Sonstige (DE-588)1310231346 oth Cortesi, Agostino 1963- Sonstige (DE-588)121273229 oth Ferrara, Pietro Sonstige (DE-588)1228649685 oth Olliaro, Martina ca. 20./21. Jh. Sonstige (DE-588)131023146X oth Intelligent systems reference library 238 (DE-604)BV035704685 238 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034719881&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Challenges of sofware verification Intelligent systems reference library Programmverifikation (DE-588)4135576-3 gnd Software (DE-588)4055382-6 gnd |
subject_GND | (DE-588)4135576-3 (DE-588)4055382-6 |
title | Challenges of sofware verification |
title_auth | Challenges of sofware verification |
title_exact_search | Challenges of sofware verification |
title_exact_search_txtP | Challenges of sofware verification |
title_full | Challenges of sofware verification Vincenzo Arceri ; Agostino Cortesi ; Pietro Ferrara ; Martina Olliaro editors |
title_fullStr | Challenges of sofware verification Vincenzo Arceri ; Agostino Cortesi ; Pietro Ferrara ; Martina Olliaro editors |
title_full_unstemmed | Challenges of sofware verification Vincenzo Arceri ; Agostino Cortesi ; Pietro Ferrara ; Martina Olliaro editors |
title_short | Challenges of sofware verification |
title_sort | challenges of sofware verification |
topic | Programmverifikation (DE-588)4135576-3 gnd Software (DE-588)4055382-6 gnd |
topic_facet | Programmverifikation Software |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034719881&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV035704685 |
work_keys_str_mv | AT arcerivincenzo challengesofsofwareverification AT cortesiagostino challengesofsofwareverification AT ferrarapietro challengesofsofwareverification AT olliaromartina challengesofsofwareverification |