3 research outputs found

    Using Spec Explorer for Automatic Checking of Constraints in Software €Controlled Systems.

    Get PDF
    In software engineering, several formal models and tools are proposed for defining system requirements and constraints formally. Such formal definitions can help in the automatic checking and verification for them. It can also help in the automatic test case generation, execution and verification. In this paper, we will demonstrate and evaluate the usage of Spec Explorer from Microsoft for defining and checking examples of software controlled system such as cruise control. Such formal requirements can be eventually embedded in the developed system or can help in exposing important elements to test in the testing stage or through the usage of the applicationModel-Based Testing, Spec Explorer, FSM Models, Software Controlled Systems

    Abnormal Transactions Detection In The Ethereum Network Using Semi-Supervised Generative Adversarial Networks

    Get PDF
    Ethereum network is a blockchain platform that allows users to use cryptocurrency transactions, create, and deploy decentralized applications using smart contracts. Several abnormal transactions came to light due to the existing attacks that targeted Ethereum, for instance, the Ethereum DAO attack, and malicious users might exploit and compromise the vulnerabilities in smart contracts, to steal amount of cryptocurrency or working for their own objectives through abnormal transactions. Therefore, detecting abnormal transactions initiated from these malicious users, implicated in fraudulent activities as well as attribution is excessively complex. However, malicious activities using cryptocurrency transactions, through pseudo-anonymous accounts for sending and receiving ransom payment, consolidation of funds heaped up under diverse identities; thus, controlling and detecting these abnormal transactions is a fundamental pre-requisite to ensure the high level of security in Ethereum network
    corecore