5,746 research outputs found

    A methodology for producing reliable software, volume 1

    Get PDF
    An investigation into the areas having an impact on producing reliable software including automated verification tools, software modeling, testing techniques, structured programming, and management techniques is presented. This final report contains the results of this investigation, analysis of each technique, and the definition of a methodology for producing reliable software

    A Contribution to Solving the Problem of Automated Functional Verification ofConsumer Electronic Devices with Touchscreens

    Get PDF
    Predmet istraživanja ove doktorske disertacije je pronalaženje rešenja problema automatske funkcionalne provere uređaja potrošačke elektronike koji su zasnovani na ekranu osetljivom na dodir. Osnovni izazov je pronaći efikasan i pouzdan način električne stimulacije ekrana, bez mehaničke pobude. Drugi izazov je definisati algoritam za proveru sadržaja na ekranu posmatrajući ga sa stanovišta percepcije korisnika, pomoću kamere. Rezultat istraživanja je integrisani sistem sa stimulacionom pločom koja kontrolisano pobuđuje ekran električnim stimulusom, bez mehaničkih pokreta. Provera uređaja se vrši po principu crne kutije. Cilj sistema je proveriti da li se uređaj i njegova programska podrška ponašaju očekivano.Topic of research of this PhD thesis is finding the solution for the mentioned problem of automated functional verification of consumer electronics devices with touchscreens. The main challenge is to find a reliable and efficient way of electric stimulation of touchscreens, without mechanical movements. The second challenge is to design an algorithm for analysis of content on the touchscreen, observing it from the user’s perception, with the help of a camera. Result of the research is the integrated system with the stimulation board for controllable electrical stimulation of touchscreens, without mechanical movements. The integrated system verifies whether the device and its software behave as expected

    Embodied Footprints: A Safety-guaranteed Collision Avoidance Model for Numerical Optimization-based Trajectory Planning

    Full text link
    Numerical optimization-based methods are among the prevalent trajectory planners for autonomous driving. In a numerical optimization-based planner, the nominal continuous-time trajectory planning problem is discretized into a nonlinear program (NLP) problem with finite constraints imposed on finite collocation points. However, constraint violations between adjacent collocation points may still occur. This study proposes a safety-guaranteed collision-avoidance modeling method to eliminate the collision risks between adjacent collocation points in using numerical optimization-based trajectory planners. A new concept called embodied box is proposed, which is formed by enlarging the rectangular footprint of the ego vehicle. If one can ensure that the embodied boxes at finite collocation points are collide-free, then the ego vehicle's footprint is collide-free at any a moment between adjacent collocation points. We find that the geometric size of an embodied box is a simple function of vehicle velocity and curvature. The proposed theory lays a foundation for numerical optimization-based trajectory planners in autonomous driving.Comment: 12 pages, 13 figure

    NASA space station automation: AI-based technology review

    Get PDF
    Research and Development projects in automation for the Space Station are discussed. Artificial Intelligence (AI) based automation technologies are planned to enhance crew safety through reduced need for EVA, increase crew productivity through the reduction of routine operations, increase space station autonomy, and augment space station capability through the use of teleoperation and robotics. AI technology will also be developed for the servicing of satellites at the Space Station, system monitoring and diagnosis, space manufacturing, and the assembly of large space structures

    TxT: Real-time Transaction Encapsulation for Ethereum Smart Contracts

    Full text link
    Ethereum is a permissionless blockchain ecosystem that supports execution of smart contracts, the key enablers of decentralized finance (DeFi) and non-fungible tokens (NFT). However, the expressiveness of Ethereum smart contracts is a double-edged sword: while it enables blockchain programmability, it also introduces security vulnerabilities, i.e., the exploitable discrepancies between expected and actual behaviors of the contract code. To address these discrepancies and increase the vulnerability coverage, we propose a new smart contract security testing approach called transaction encapsulation. The core idea lies in the local execution of transactions on a fully-synchronized yet isolated Ethereum node, which creates a preview of outcomes of transaction sequences on the current state of blockchain. This approach poses a critical technical challenge -- the well-known time-of-check/time-of-use (TOCTOU) problem, i.e., the assurance that the final transactions will exhibit the same execution paths as the encapsulated test transactions. In this work, we determine the exact conditions for guaranteed execution path replicability of the tested transactions, and implement a transaction testing tool, TxT, which reveals the actual outcomes of Ethereum transactions. To ensure the correctness of testing, TxT deterministically verifies whether a given sequence of transactions ensues an identical execution path on the current state of blockchain. We analyze over 1.3 billion Ethereum transactions and determine that 96.5% of them can be verified by TxT. We further show that TxT successfully reveals the suspicious behaviors associated with 31 out of 37 vulnerabilities (83.8% coverage) in the smart contract weakness classification (SWC) registry. In comparison, the vulnerability coverage of all the existing defense approaches combined only reaches 40.5%.Comment: To appear in IEEE Transactions on Information Forensics and Securit
    corecore