• Title/Summary/Keyword: 검증 소프트웨어

Search Result 2,336, Processing Time 0.03 seconds

Concurrent Object Model Verification with SPIN++ (SPIN++를 이용한 병렬 객체 모델의 검증)

  • 조웅희;배두환;차성덕;권용래;원성기;변성원
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10b
    • /
    • pp.472-474
    • /
    • 1998
  • 병렬 객체를 이용한 소프트웨어의 개발시, 병렬성에서 기인한 경쟁 조건의 만족 여부나 교착 상태, 기아 상태 등의 오류를 모델의 검증을 통하여 개발의 초기 단계에 발겨하고 수정하는 것은 개발의 효율성을 높일 수 있다. 이러한 병력 객체모델의 검증을 위해서는 객체간의 상호 메시지 교환과 동적 행위를 기술할 수 있는 모델링 언어가 필요하며, 검증하고자 하는 속성을 기술하기 위한 방법이 요구된다. 본 연구에서는 시스템의 모델링을 위해 SPIN에서 사용되는 PROMELA를 쓰레드 기반의 객체 모델링 언어인 SPIN++로 확장하고, 속성의 기술을 위해 확장된 선형 시제 논리를 제안하였으며, 유한 상태에서는 모델 검사(model checking) 도구인 SPIN을 이용하여 검증하는 방법을 제시하고자 한다. 이러한 연구를 통하여 병렬 객체 모델의 정형적인 검증을 수행할 수 있으며, 시스템 개발의 효율성을 높이는 데 도움을 줄 수 있다.

Online-Game Server Party System Verification using SPIN Model Checker (스핀 모델 체커를 이용한 온라인 게임 서버의 파티 시스템 검증)

  • Kim, Goanghun;Park, Mingyu;Choi, Yunja
    • Annual Conference of KIPS
    • /
    • 2014.11a
    • /
    • pp.609-612
    • /
    • 2014
  • 오늘날 신뢰할 수 있는 정보통신기술(Information and Communication Technology, ICT) 시스템의 중요성은 증대되고 있으며 그에 맞춰 고위험 시스템의 검증(Verification) 작업도 점점 체계화되고 있다. 반면 여전히 일반적인 소프트웨어들은 검증 과정을 인력에 의한 테스팅과 같은 기초적인 방법에 의존하고 있다. 본 논문에서는 그 대표적인 예인 온라인 게임 서버를 대상으로, SPIN 모델 체커(SPIN model checker)를 이용한 자동화 검증방법을 적용하는 실험적인 연구를 수행한다. 연구 결과 기존의 검증 과정으로는 파악하지 못한 오류를 파악할 수 있었고, 검증 비용도 납득할 만한 수준이라는 것을 확인하였다.

An Action-based LTS Bounded Model Checker for Analyzing Concurrency (병행성 분석을 위한 액션 기반의 LTS 바운드 모델 체커)

  • Park, Sa-Choun;Kwon, Gi-Hwon
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.9
    • /
    • pp.529-537
    • /
    • 2008
  • Since concurrent software is hard to debug, the verification of such systems inevitably needs automatic tools which support exhaustive searching. Bounded Model Checking (BMC) is one of them. Within a bound k, BMC exhaustively check some errors in execution traces of the given system. In this paper, we introduce the tool that performs BMC for LTS, modeling language for concurrent programs. In this tool, a property is described by a FLTL formula, which is suitable to present the property with actions in a LTS model. To experiment with existential model checkers and out tool, we compare and analysis the performance of the developed tool and others.

Realization and Test of the Transport Layer Protocol (전달 계층 프로토콜 구현 및 시험에 관한 연구)

  • 전동근;차균현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.5
    • /
    • pp.650-662
    • /
    • 1993
  • The thesis describes the realization and test of the transport layer operating on the CLNS (Connection Less Network Service) which is specified by ISO 8073 and ADDENDUM 2 protocol. For realization of the transport layer, five modules and interface primitives were definde. This protocol was formally described by SDL (Specification and Description Language) and was programmed in C-language. For verification of the software, protocol tester was implemented and test scenarios were defined. The verification was accomplished based on the test scenarios. Transport Layer software presented in this thesis may be utilized in a real situation with some modifications. Protocol tester presented in this thesis can also be used for verification of other protocol softwares.

  • PDF

Network Traffic-Based Access Control Using Software-Defined Perimeter (소프트웨어 정의 경계를 이용한 네트워크 트래픽 기반 동적 접근 제어)

  • Seo-Yi Kim;Il-Gu Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.735-746
    • /
    • 2024
  • The rapid advancement of computer technology has necessitated a safer user environment, prompting the adoption of the zero trust model, which verifies all internal and external network activities. This paper proposes an efficient network traffic data-based dynamic access control method leveraging Software-Defined Perimeter (SDP) capabilities to implement zero trust and address latency issues. According to the performance evaluation results, the detection performance of the proposed scheme is similar to that of conventional schemes, but the dataset size was reduced by 62.47%. Additionally, by proposing an adaptive zero trust verification approach, the dataset size and verification time were reduced by 83.9% and 9.1%, respectively, while maintaining similar detection performance to conventional methods.

Study on the Implications about Curriculum Design through the Analysis of Software Education Policy in Estonia (에스토니아의 소프트웨어 교육 정책 분석을 통한 교육과정 설계에 대한 시사점 고찰)

  • Shin, Seungki;Bae, Youngkwon
    • Journal of The Korean Association of Information Education
    • /
    • v.19 no.3
    • /
    • pp.361-372
    • /
    • 2015
  • The most significant change of educational field in 2015 year is the year the software education is started completely as a required curriculum. With the global attention and change to the software education, Korean ministry of education names the software industry as a new growth engine and software education is selected as a key challenge in the education field. In this study, we looked through the software education of Estonia as a reference model in order to design the software education and establish the national policy. Meanwhile, we examined the contents which can be helpful to organize the software education curriculum and select the way of software education based on the implications from the software education policy of Estonia. In addition, we verified the validity of this study through the expert qualification.

A study on Software Maintenance of Domestic Weapon System by using the Automatic Test Equipment

  • Chae, Il-Kwon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.1
    • /
    • pp.51-59
    • /
    • 2022
  • As the weapon system's dependence on software functions increased, software became a key factor in controlling the weapon system. In addition, as software development becomes more important domestically and internationally, software verification becomes an issue. The recent defense market has recognized this point and is demanding a plan for weapon system software maintenance. In this paper, we propose a weapon system software maintenance plan using Automatic Test Equipment. The specific method is to use a simulator to check the software function and identify failure cases. This is an effective way for developers to reduce the Total Corrective Maintenance Time(TCM) of the weapon system by reducing the time it takes to identify failure cases. It has been proven that the proposed Automatic Test Equipment can achieve software maintenance and excellent Maintainability and Operational Availability compared to the existing ones.