ebook img

Engineering Trustworthy Software Systems: 5th International School, SETSS 2019, Chongqing, China, April 21–27, 2019, Tutorial Lectures PDF

236 Pages·2020·8.707 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Engineering Trustworthy Software Systems: 5th International School, SETSS 2019, Chongqing, China, April 21–27, 2019, Tutorial Lectures

Jonathan P. Bowen Zhiming Liu Zili Zhang (Eds.) l a i r o t u T 4 5 1 Engineering Trustworthy 2 1 S C Software Systems N L 5th International School, SETSS 2019 Chongqing, China, April 21–27, 2019 Tutorial Lectures Lecture Notes in Computer Science 12154 Founding Editors Gerhard Goos Karlsruhe Institute of Technology, Karlsruhe, Germany Juris Hartmanis Cornell University, Ithaca, NY, USA Editorial Board Members Elisa Bertino Purdue University, West Lafayette, IN, USA Wen Gao Peking University, Beijing, China Bernhard Steffen TU Dortmund University, Dortmund, Germany Gerhard Woeginger RWTH Aachen, Aachen, Germany Moti Yung Columbia University, New York, NY, USA More information about this series at http://www.springer.com/series/7408 Jonathan P. Bowen Zhiming Liu (cid:129) (cid:129) Zili Zhang (Eds.) Engineering Trustworthy Software Systems 5th International School, SETSS 2019 – Chongqing, China, April 21 27, 2019 Tutorial Lectures 123 Editors JonathanP. Bowen Zhiming Liu Southwest University Southwest University Chongqing,China Chongqing,China Zili Zhang Southwest University Chongqing,China ISSN 0302-9743 ISSN 1611-3349 (electronic) Lecture Notesin Computer Science ISBN 978-3-030-55088-2 ISBN978-3-030-55089-9 (eBook) https://doi.org/10.1007/978-3-030-55089-9 LNCSSublibrary:SL2–ProgrammingandSoftwareEngineering ©SpringerNatureSwitzerlandAG2020 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynow knownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbookare believedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsortheeditors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictionalclaimsin publishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Preface The5thSchoolonEngineeringTrustworthySoftwareSystems(SETSS2019)washeld duringApril21–27,2019,atSouthwestUniversity,Chongqing,China.Itwasaimedat PhD and Master students in particular, from around China and elsewhere, as well as being suitable for university researchers and industry softwareengineers. Thisvolume contains tutorial papers related to a selection of the lecture courses and evening sem- inars delivered at the School. SETSS2019wasorganizedbytheSchoolofComputerandInformationScience,in particular the Centre for Research and Innovation in Software Engineering (RISE), at Southwest University, providing lectures on leading-edge research in methods and toolsforuseincomputersystemengineering.TheSchoolaimedtoenableparticipants to learn about state-of-the-art software engineering methods and technology advances from experts in the field. The opening session was chaired by Prof. Guoqiang Xiao, Dean of the School of Computer and Information Science. A welcome speech was delivered by the Vice President of Southwest University, Prof. Yanqiang Cui, followed by an introductory briefingforSETSS2019byProf.ZhimingLiu.Thesessionfinishedwithaphotograph of participants at the School (see page xiii). The following lecture courses (each consisting of six, or for Yu Guo three, hour-long lecture sessions, with breaks) were delivered during the School, chaired by Zhiming Liu and Shmuel Tyszberowicz: – Manfred Broy: “Modeling Cyber Physical Systems: Requirements, Interface Specifications and Architectures in a Concurrent World” – Lei Bu: “From Bounded Reachability Analysis of Linear Hybrid Automata to Verification of Industrial CPS and IoT” – Yu Guo: “Blockchain Based Protocols for Perfectly Fair Exchange” – Joost-Pieter Katoen: “Principles of Probabilistic Programming” – Kim G. Larsen: “From Timed Automata to Stochastic Hybrid Games Model Checking, Synthesis, Refinement, Performance Analysis and Machine Learning” – Grigore Roşu: “K—A Semantic Framework for Programming Languages and Formal Analysis Tools” In addition, there were two two-hour evening seminars chaired by Bin Gu: – Yu Jiang: “Empirical Evaluation of Fuzzing Techniques and Some Potential Enhancements” – Zhiming Liu: “Software Architecture Modelling – Master Complexity and Enable Healthy Evolution” Three hour-long workshop sessions by Bin Gu, Zhibin Yang, and Bingqing Xu, werechairedbyZhimingLiu.Theseadditionalseminarsandworkshopscomplemented the longer lecture courses. vi Preface Courses “Modeling Cyber Physical Systems: Requirements, Interface Specifications and Architectures in a Concurrent World” Lecturer: Prof. Dr. Manfred Broy, Technical University of Munich, Germany Biography: Manfred Broy’s research is in software and systems engineering both in theoretical and practical aspects. This includes system models, specification and refinementofsystemandsoftwarecomponents,specificationtechniques, development methods, and verification. He is leading a research group working in a number of industrial projects that apply mathematically based techniques to combine practical approaches to software engineering with mathematical rigor. His main topics are requirementsengineering,softwareandsystemarchitectures,componentware,software development processes, software evolution, and software quality. The CASE tool AutoFocuswasdevelopedinhisgroup.OneofManfredBroy’smainthemesistherole of software in a networked world. As a member of acatech under his leadership the study Agenda Cyber-Physical Systems was created for the Federal Ministry of Research to comprehensively investigate the next stage of global networking through the combination of cyberspace and embedded systems in all their implications and potential. Since January 2016, Professor Broy has been the founding president of the Bavarian Center for Digitization. There he is working on the topics of digital trans- formation and digital innovation. Overview: Systems such as cyber-physical systems exist and act in a distributed concurrentworldwherespaceandtimearemostimportantissues.Thisisincontrastto concurrency as it appears in computer systems, operating systems, and programming languages.Whenmodelingsystemsthatarecloselyrelatedtotheirphysicaloperational context,weneedmodelsthatallowustoexpressaspectsofthephysicalworldsuchas time, interaction, concurrency, and distribution. The lectures presented a number of modelscapableofcapturingamodel-basedwaysuchastypesofsystemsasabasisfor writing requirements and finally systems specifications. “FromBoundedReachabilityAnalysisofLinearHybridAutomatatoVerification of Industrial CPS and IoT” Lecturer: Prof. Lei Bu, Nanjing University, China Biography:LeiBuiscurrentlyaprofessorattheDepartmentofComputerScienceand Technology, Nanjing University, China. He received his bachelor and PhD degree in Computer Science from Nanjing University in 2004 and 2010, respectively. He has beenvisitingscholarsininstituteslikeCarnegieMellonUniversity,MicrosoftResearch Asia, and so on. His main research interests include model checking, hybrid systems, andcyber-physicalsystems.Hehaspublishedmorethan50papersinleadingjournals and conferences like TC, TPDS, TCPS, RTSS, CAV, DATE, VMCAI, and so on. He has won awards under the Chinese Computer Federation young talent development program and the Microsoft Research Asia Star Track young faculty program. Preface vii Overview: Safety assurance of real-time safety-critical systems is a very important problem.Hybridautomata(HA)isthenaturalmodelinglanguageforreal-timesystems withbothdiscreteandcontinuousstatechanges.However,asthebehaviorofHAistoo complex,thestate-of-the-arttechniquescannotscaleuptoindustriallevelcases.Inthis series of lectures, I gave a brief introduction of HA and presented an overview of our specific path-oriented methods for complexity controlling in the bounded verification oflinearhybridautomata(LHA).Ialsoshowedhowourmethodsandtoolsareadapted and deployed in the verification of industrial CPS and smart home IoT systems. “Blockchain Based Protocols for Perfectly Fair Exchange” Lecturer: Dr. Yu Guo, SETBIT Labs, China Biography: Dr. Yu Guo is the Founder/CEO of SETBIT Labs, a startup focusing on blockchain technology and blockchain security. He graduated from the University of Science and Technology of China (USTC) and received his PhD degree in 2007. He was an associate professor in USTC between 2007–2016, working on formal verifi- cation, system software, and computer security. His research interests include pro- gramminglanguages,formalverification,systemsoftware,cryptography,andcomputer security. He worked in a Fintech company as a technical vice president for two years, owning more than 30 patents about blockchain infrastructure. He founded SETBIT Labsin2018,whichreportednumerousvulnerabilitiesinsmartcontractsandattacking events on blockchains, leading the research of smart contract verification, smart con- tract analysis, and cryptographic protocols. Overview:Onlinecommercetraditionallyneedstrustedthirdparties(TTP)tosolvethe deadlock where the buyer is willing to do the payment prior to receiving the goods, while the seller won’t send the data until the buyer pays. The TTP withholds the payment until the buyer confirms the goods. However, TTPs tend to be a centralized entitytoguaranteethetrust,whichinevitablyincreaserisksofbothprivacyleakingand functionalfailure.ReducingthedependenceonTTPswhilekeepingfairnesshasbeena classic open problem for decades. The perfect fairness, ensuring neither party of the buyer and seller cannot take any advantage over the other, helps to build trustless online trading system that can be highly effective. Participants are able to exchange digitalized goods (or data) without concerns about mistrust. The lectures presents recently-proposed protocols. They use state-of-the-art cryptographic schemes to achievefairexchangeofdatabymeansofblockchaintechniques.Thelecturescovered blockchains, security protocols, and cryptography, showing thriving research results from blockchain communities. “Principles of Probabilistic Programming” Lecturer: Prof. Joost-Pieter Katoen, RWTH Aachen University, Germany and University of Twente, The Netherlands Biography:Prof.Joost-PieterKatoenisaDistinguishedProfessorwithRWTHAachen University,Aachen,Germany,andholdsapart-timeprofessorshipattheUniversityof Twente, Enschede, The Netherlands. He is a member of Academia Europaea (since viii Preface 2013) and received a honorary doctorate degree from Aalborg University, Aalborg, Denmark in 2017. He has been visiting professor at, among others, the University of Oxford, IST Austria, and Macquarie University in Sydney. His research interests include formal methods, model checking, concurrency theory, and probabilistic com- putation.In2018,hereceivedanERCAdvancedResearchGranttocontinuehiswork on foundations of probabilistic programming. Joost-Pieter Katoen has co-authored more than 200 conference papers, 75 journal papers, and the book on Principles of ModelChecking(2008).Hisworkhasreceivedabout20,000citations.Prof.Katoenis theChairmanoftheSteeringCommitteeofTACAS,andSteeringCommitteemember of the conferences CONCUR, QEST, and FORMATS. He is also member of the IFIP Working Groups 1.8 (Concurrency Theory) and 2.2 (Programming Concepts). Overview: Probabilistic programming combines probability theory, statistics, and – mostimportantlyfromamodelingpointofview–programminglanguages.Theyallow modeling of a much larger class of models in a rather succinct manner. The full potential of modern probabilistic programming languages comes from automating the process of inferring unobserved variables in the model conditioned on observed data. As some researchers put it: The goal of probabilistic programming is to enable prob- abilistic modeling and machine learning to be accessible to the working programmer. Probabilistic programs steer autonomous robots, are at the heart of security mecha- nisms, encompass randomised algorithms, and are used in AI to infer statistical con- clusions about huge amounts of uncertain data. In this series of lectures, I introduced the main concepts of probabilistic programming and discussed how classical program verification a la Dijkstra can be used to answer questions such as: Do these programs compute what one expects them to do? Do they terminate at all? With what proba- bility? How much resources do they consume? Applications to Bayesian networks showedhowinsightfulinformationaboutanalyzingsuchnetworkscanbeobtainedina fully automated manner by using program verification. “FromTimedAutomatatoStochasticHybridGamesModelChecking,Synthesis, Refinement, Performance Analysis and Machine Learning” Lecturer: Prof. Kim G. Larsen, Aalborg University, Denmark Biography: Kim G. Larsen is a professor in the Department of Computer Science at Aalborg University within the Distributed and Embedded Systems Unit and director oftheICT-competencecenterCISS,CenterforEmbeddedSoftwareSystems.In2015, he won an ERC Advanced Grant with the project LASSO for learning, analysis, synthesis, and optimization of cyber-physical systems. He is also director of the Sino-Danish Basic Research Center IDEA4CPS, the Danish Innovation Network InfinIT, as well as the newly founded innovation research center DiCyPS: Data Intensive Cyber Physical Systems. Larsen is prime investigator of the tool UPPAAL and co-founder of the company UP4ALL International. In 2013 he was the recipient of the CAV Award for his work on UPPAAL as “the foremost model checker for real-time Systems.” Larsen became Honorary Doctor (Honoris causa) at Uppsala Preface ix University, Sweden, in 1999. In 2007, he became Knight of the Order of the Dannebrog. In 2007, he became Honorary Doctor (Honoris causa) at ENS Cachan, France. In 2012, he became Honary Member of Academia Europaea. Since 2016, he hasbeenappointedINRIAInternational Chair for afive-year period. He hasalso won theprestigiousindustrialGrundfosAward2016,andhasbeenappointedDistinguished Professor of Northeastern University under the Chinese Recruitment Program of Foreign Experts in 2018. Overview: Timed automata and games and their priced extensions have emerged as usefulformalismsformodelingreal-timeandenergy-awaresystemsasfoundinseveral embedded and cyber-physical systems. During the last 20 years the real-time model checkerUPPAALhasbeendevelopedallowingforefficientverificationofhardtiming constraints of timed automata. Moreover a number of significant branches exists, e.g. UPPAAL CORA providing efficient support for optimization, UPPAAL TIGA allowing for automatic synthesis of strategies for given safety and liveness objectives, andECDARsupportsrefinementandcompositionaldevelopmentofreal-timesystems. Also the branch UPPAAL SMC, provides a highly scalable new engine supporting (distributed) statistical model checking of stochastic hybrid automata. Most recently, the new branch UPPAAL STRATEGO supporting safe and optimal strategies for stochastic hybrid games by combining symbolic methods with machine learning. The lectures reviewed and provided demonstrations of the various branches of UPPAAL, the corresponding modeling formalisms as well as sketched the symbolic or statistical algorithms applied. The focus was on applications of the tools suite to a range of real-time and cyber-physical examples including schedulability and performance evaluation of mixed criticality systems, modeling and analysis of biological systems, energy-aware wireless sensor networks, smart grids and smart houses, and intelligent traffic. “K—A Semantic Framework for Programming Languages and Formal Analysis Tools” Lecturer: Prof. Grigore Roşu, University of Illinois at Urbana-Champaign, USA Biography:GrigoreRoşuisaprofessorintheDepartmentofComputerScienceatthe University of Illinois at Urbana-Champaign (UIUC), where he leads the Formal Sys- tems Laboratory (FSL), and the founder and president of Runtime Verification, Inc (RV). His research interests encompass both theoretical foundations and system development in the areas offormal methods, software engineering, and programming languages. Before joining UIUC in 2002, he was a research scientist at NASA Ames. He obtained his PhD at the University of California at San Diego in 2000. He was presented the CAREER Award by the NSF, the Dean’s Award for Excellence in research by the College of Engineering at UIUC in 2014, and the Outstanding Junior Award by the Computer Science Department at UIUC in 2005. He won the ASE IEEE/ACMMostInfluentialPaperAwardin2016(foranASE2001paper)andtheRV Test of Time Award (for an RV 2001 paper) for papers that helped shape the runtime

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.