LEADER 09483nam 22007815 450 001 9910881098303321 005 20240821130252.0 010 $a9783031681509$b(electronic bk.) 010 $z9783031681493 024 7 $a10.1007/978-3-031-68150-9 035 $a(MiAaPQ)EBC31608954 035 $a(Au-PeEL)EBL31608954 035 $a(CKB)34118595400041 035 $a(DE-He213)978-3-031-68150-9 035 $a(EXLCZ)9934118595400041 100 $a20240821d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFormal Methods for Industrial Critical Systems $e29th International Conference, FMICS 2024, Milan, Italy, September 9?11, 2024, Proceedings /$fedited by Anne E. Haxthausen, Wendelin Serwe 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (267 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14952 311 08$aPrint version: Haxthausen, Anne E. Formal Methods for Industrial Critical Systems Cham : Springer,c2024 9783031681493 327 $aIntro -- Preface -- Organization -- Contents -- Real-Time Systems/Robotics -- Safe Linear Encoding of Vehicle Dynamics for the Instantiation of Abstract Scenarios -- 1 Introduction -- 2 Related Work -- 3 Encoding of Abstract Scenarios -- 4 Encoding Vehicle Dynamics and Scenes -- 4.1 Encoding Trajectories as Splines -- 4.2 Encoding of Scenes -- 4.3 Encoding of Vehicle Dynamics -- 5 Correctness -- 6 Demonstration -- 7 Conclusion -- References -- Evaluating the Effectiveness of Digital Twins Through Statistical Model Checking with Feedback and Perturbations -- 1 Introduction -- 2 Case Studies -- 3 The Stark Tool -- 3.1 The Evolution Sequence Model -- 3.2 RobTL -- 4 DT-Stark -- 4.1 The Feedback Mechanism -- 5 Experiments -- 6 Related Work -- 7 Concluding Remarks -- References -- UPPAAL-Based Modeling and Verification of ROS 2 Multi-threaded Execution and Operating System Reservations -- 1 Introduction -- 2 Background -- 2.1 ROS 2 -- 2.2 Reservation Based Scheduling -- 2.3 Timed Automata and UPPAAL -- 2.4 Pattern-Based Verification of ROS 2 Systems -- 3 Modeling and Verification in UPPAAL -- 3.1 Feature Selection and Abstraction -- 3.2 Modeling of Callbacks -- 3.3 Modeling of the Multi-threaded Executor -- 3.4 System Declaration and Verification in UPPAAL -- 3.5 Modeling of Operating System Reservations -- 4 Evaluation -- 4.1 Experimental Setup -- 4.2 Multi-threaded Execution -- 4.3 Reservation-Based Scheduling -- 4.4 Answer to the Research Questions -- 5 Related Work -- 6 Conclusion and Future Work -- References -- Semantics and Verification -- Formalising the Industrial Language SMMT in mCRL2 -- 1 Introduction -- 2 The SMMT Language -- 3 A Formal Semantics of SMMT -- 4 Translational Semantics in mCRL2 -- 5 Validation and Experiments -- 6 Discussion -- 7 Conclusions -- References. 327 $aFault Tree Inference Using Multi-objective Evolutionary Algorithms and Confusion Matrix-Based Metrics -- 1 Introduction -- 2 Preliminaries -- 2.1 Fault Trees -- 2.2 Failure Data Set -- 2.3 Inference of Fault Tree Models -- 3 FT-MOEA-CM's Methodology -- 4 Experimental Evaluation -- 5 Results -- 5.1 Feature Assessment -- 5.2 Comparing FT-MOEA and FT-MOEA-CM -- 5.3 FT-MOEA-CM's Features: Parallelization and Caching -- 6 Conclusions -- References -- Logika: The Sireum Verification Framework -- 1 Introduction -- 2 Design Goals and Background -- 3 Features -- 4 Assessment -- 5 Related Work -- 6 Conclusion -- References -- Case Studies -- Fuzzing an Industrial Proprietary Protocol -- 1 Introduction -- 2 Challenges -- 3 BinFuzz -- 3.1 Protocol Reconstruction Phase -- 3.2 Fuzzing Phase -- 4 Protocol Fuzzing -- 4.1 FTP Protocol -- 4.2 Proprietary Drone Control Protocol -- 4.3 Limitations and Potential Extensions -- 5 Related Work -- 6 Conclusion -- References -- Modelling and Analysis of DTLS: Power Consumption and Attacks -- 1 Introduction -- 2 Background -- 2.1 DTLS 1.3 -- 2.2 Uppaal -- 2.3 Uppaal SMC -- 3 Modelling DTLS -- 3.1 Default DTLS 1.3 Protocol -- 3.2 DTLS 1.3 with Heartbeat Extension on Server -- 3.3 DTLS 1.3 with Heartbeat Extension on Client -- 4 Modelling DTLS Under Attack -- 5 Experiments -- 5.1 Power Consumption Comparison -- 5.2 Power Consumption with Malicious Actor -- 6 Related Work -- 7 Conclusion -- References -- Verifying a Radio Telescope Pipeline Using HaliVer: Solving Nonlinear and Quantifier Challenges -- 1 Introduction -- 2 Background -- 3 Case Study Description -- 3.1 DDECAL -- 3.2 Halide Implementation -- 4 Verification Challenges and Solutions -- 4.1 Tuple Support -- 4.2 Verifying Flattened Multidimensional Arrays -- 4.3 Dealing with Quantifiers -- 5 Experiments -- 5.1 Micro-benchmarks -- 6 Lessons Learned -- 7 Related Work. 327 $a8 Conclusion -- References -- Reconstructing the High-Level Structure of Legacy Code via Software Model Checking: An Experience Report -- 1 Introduction -- 2 Methodology -- 2.1 Operating Assumptions -- 2.2 Main FSM Extraction Algorithm -- 2.3 Code Abstractions -- 3 The fsm-explorer Tool -- 3.1 Configuration -- 3.2 Analysis -- 4 Analysis of a Legacy Heat Pump Controller -- 5 Conclusions -- References -- Formal Analysis and Monitoring of Legacy Safety-Critical Interlocking Systems with the Use of Certified Industrial Tools -- 1 Introduction -- 2 Relay-Based RIS -- 3 The CLEARSY Safety Platform (CSSP) -- 4 Logical Description of the RIS Behaviour -- 5 Creation and Use of the RIS CSSP Monitor -- 6 Case Studies -- 6.1 Temporary Reversed Direction Installation -- 6.2 Signalling Light Panel -- 7 Discussion -- 8 Conclusion -- References -- Neural Networks -- Unifying Syntactic and Semantic Abstractions for Deep Neural Networks -- 1 Introduction -- 2 Background -- 2.1 Notation -- 2.2 Formal Analysis of Neural Networks -- 2.3 Semantic Compressions and Abstractions with Empirical Guarantees -- 2.4 Strong Formal Connections Between N and N' -- 2.5 Syntactic Neural Network Splitting and Merging -- 2.6 Syntactic Refinement -- 3 Methodology -- 3.1 Semantic Closeness Factor -- 3.2 Tree of Merges -- 3.3 Tree-Cuts and Refinement -- 3.4 Optimality of Tree -- 3.5 CEGAR ch12cegarspsnn,ch12cegar Loop Framework -- 4 Experiments -- 5 Related Work -- 6 Conclusion and Future Work -- References -- Multimodal Model Predictive Runtime Verification for Safety of Autonomous Cyber-Physical Systems -- 1 Introduction -- 2 Preliminaries -- 2.1 Mission-Time Linear Temporal Logic (MLTL) ch13LVR19,ch13RRS14 -- 2.2 Abstract Syntax Tree Architecture -- 2.3 Model Predictive Runtime Verification (MPRV) ch13ZADJR23 -- 3 Multimodal Model Predictive Runtime Verification (MMPRV). 327 $a3.1 Predictive Mission-Time Linear Temporal Logic (PMLTL) -- 3.2 MMPRV Algorithm -- 3.3 Memory Requirements for MMPRV -- 4 Autonomous Vehicle Case Study -- 4.1 F1Tenth Autonomous Racing -- 4.2 Argoverse Autonomous Driving -- 5 Conclusion and Future Work -- References -- Surrogate Neural Networks Local Stability for Aircraft Predictive Maintenance -- 1 Introduction -- 2 Related Work -- 3 Case Study: Aircraft Loads-to-Stress Prediction -- 3.1 Description -- 3.2 Tested Models -- 3.3 Property to be Ensured: Local Stability -- 4 Method Combination for Local Stability Assessment -- 5 Experiments -- 6 Results -- 6.1 A Significant Verification Time Gain -- 6.2 Insights into the Models -- 7 Conclusions and Future Work -- A Open-Source Verification Pipeline -- References -- Author Index. 330 $aThis book constitutes the proceedings of the 29th International Conference on Formal Methods for Industrial Critical Systems, FMICS 2024, held in Milan, Italy, during September 9?13, 2024. The 14 full papers included in this book were carefully reviewed and selected from 22 submissions. These papers have been organized in the following topical sections: Real-Time Systems/ Robotics; Semantics and Verification; Case Studies; Neural Networks. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14952 606 $aCompilers (Computer programs) 606 $aSoftware engineering 606 $aApplication software 606 $aArtificial intelligence 606 $aComputer science 606 $aComputer engineering 606 $aComputer networks 606 $aCompilers and Interpreters 606 $aSoftware Engineering 606 $aComputer and Information Systems Applications 606 $aArtificial Intelligence 606 $aTheory of Computation 606 $aComputer Engineering and Networks 615 0$aCompilers (Computer programs). 615 0$aSoftware engineering. 615 0$aApplication software. 615 0$aArtificial intelligence. 615 0$aComputer science. 615 0$aComputer engineering. 615 0$aComputer networks. 615 14$aCompilers and Interpreters. 615 24$aSoftware Engineering. 615 24$aComputer and Information Systems Applications. 615 24$aArtificial Intelligence. 615 24$aTheory of Computation. 615 24$aComputer Engineering and Networks. 676 $a005.45 700 $aHaxthausen$b Anne E$01423738 701 $aSerwe$b Wendelin$01765650 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910881098303321 996 $aFormal Methods for Industrial Critical Systems$94207487 997 $aUNINA