<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1 plus MathML 2.0 plus SVG 1.1//EN" "http://www.w3.org/2002/04/xhtml-math-svg/xhtml-math-svg.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
  <head>
    <meta http-equiv="Content-Type" content="application/xhtml+xml; charset=utf-8"/>
    <title>Project-Team:CASSIS</title>
    <link rel="stylesheet" href="../static/css/raweb.css" type="text/css"/>
    <meta name="description" content="Overall Objectives - Challenge"/>
    <meta name="dc.title" content="Overall Objectives - Challenge"/>
    <meta name="dc.subject" content=""/>
    <meta name="dc.publisher" content="INRIA"/>
    <meta name="dc.date" content="(SCHEME=ISO8601) 2013-01"/>
    <meta name="dc.type" content="Report"/>
    <meta name="dc.language" content="(SCHEME=ISO639-1) en"/>
    <meta name="projet" content="CASSIS"/>
  </head>
  <body>
    <div class="tdmdiv">
      <div class="logo">
        <a href="http://www.inria.fr">
          <img style="align:bottom; border:none" src="../static/img/icons/logo_INRIA-coul.jpg" alt="Inria"/>
        </a>
      </div>
      <div class="TdmEntry">
        <div class="tdmentete">
          <a href="uid0.html">Project-Team Cassis</a>
        </div>
        <span>
          <a href="uid1.html">Members</a>
        </span>
      </div>
      <div class="TdmEntry">Overall Objectives<ul><li><a href="./uid3.html">Background</a></li><li><a href="./uid4.html">Context</a></li><li class="tdmActPage"><a href="./uid12.html">Challenge</a></li><li><a href="./uid18.html">Highlights of the Year</a></li></ul></div>
      <div class="TdmEntry">Research Program<ul><li><a href="uid22.html&#10;&#9;&#9;  ">Introduction</a></li><li><a href="uid23.html&#10;&#9;&#9;  ">Automated Deduction</a></li><li><a href="uid24.html&#10;&#9;&#9;  ">Synthesizing and Solving Constraints</a></li><li><a href="uid25.html&#10;&#9;&#9;  ">Rewriting-based Safety Checking</a></li></ul></div>
      <div class="TdmEntry">Application Domains<ul><li><a href="uid27.html&#10;&#9;&#9;  ">Verification of Security Protocols</a></li><li><a href="uid28.html&#10;&#9;&#9;  ">Automated Boundary Testing from Formal Specifications</a></li><li><a href="uid29.html&#10;&#9;&#9;  ">Program Debugging and Verification</a></li><li><a href="uid30.html&#10;&#9;&#9;  ">Verification of Web Services</a></li><li><a href="uid31.html&#10;&#9;&#9;  ">Model-Checking of Collaborative Systems</a></li></ul></div>
      <div class="TdmEntry">Software and Platforms<ul><li><a href="uid33.html&#10;&#9;&#9;  ">Protocol Verification Tools</a></li><li><a href="uid42.html&#10;&#9;&#9;  ">Testing Tools</a></li><li><a href="uid48.html&#10;&#9;&#9;  ">Collaborative Tools</a></li><li><a href="uid52.html&#10;&#9;&#9;  ">Other Tools</a></li></ul></div>
      <div class="TdmEntry">New Results<ul><li><a href="uid54.html&#10;&#9;&#9;  ">Automated Deduction</a></li><li><a href="uid58.html&#10;&#9;&#9;  ">Security Protocol Verification</a></li><li><a href="uid69.html&#10;&#9;&#9;  ">Model-based Verification</a></li><li><a href="uid72.html&#10;&#9;&#9;  ">Model-based Testing</a></li><li><a href="uid81.html&#10;&#9;&#9;  ">Verification of Collaborative Systems</a></li></ul></div>
      <div class="TdmEntry">Bilateral Contracts and Grants with Industry<ul><li><a href="uid87.html&#10;&#9;&#9;  ">Research Result Transfer</a></li><li><a href="uid88.html&#10;&#9;&#9;  ">Study of the electronic voting system
of Voxaly</a></li></ul></div>
      <div class="TdmEntry">Partnerships and Cooperations<ul><li><a href="uid90.html&#10;&#9;&#9;  ">Regional Initiatives</a></li><li><a href="uid92.html&#10;&#9;&#9;  ">National Initiatives</a></li><li><a href="uid101.html&#10;&#9;&#9;  ">European Initiatives</a></li><li><a href="uid106.html&#10;&#9;&#9;  ">International Initiatives</a></li><li><a href="uid116.html&#10;&#9;&#9;  ">International Research Visitors</a></li></ul></div>
      <div class="TdmEntry">Dissemination<ul><li><a href="uid152.html&#10;&#9;&#9;  ">Scientific Animation</a></li><li><a href="uid182.html&#10;&#9;&#9;  ">Teaching - Supervision - Juries</a></li><li><a href="uid217.html&#10;&#9;&#9;  ">Popularization</a></li></ul></div>
      <div class="TdmEntry">
        <div>Bibliography</div>
      </div>
      <div class="TdmEntry">
        <ul>
          <li>
            <a id="tdmbibentmajor" href="bibliography.html">Major publications</a>
          </li>
          <li>
            <a id="tdmbibentyear" href="bibliography.html#year">Publications of the year</a>
          </li>
          <li>
            <a id="tdmbibentfoot" href="bibliography.html#References">References in notes</a>
          </li>
        </ul>
      </div>
    </div>
    <div id="main">
      <div class="mainentete">
        <div id="head_agauche">
          <small><a href="http://www.inria.fr">
	    
	    Inria
	  </a> | <a href="../index.html">
	    
	    Raweb 
	    2013</a> | <a href="http://www.inria.fr/en/teams/cassis">Presentation of the Project-Team CASSIS</a> | <a href="http://cassis.loria.fr">CASSIS Web Site
	  </a></small>
        </div>
        <div id="head_adroite">
          <table class="qrcode">
            <tr>
              <td>
                <a href="cassis.xml">
                  <img style="align:bottom; border:none" alt="XML" src="../static/img/icons/xml_motif.png"/>
                </a>
              </td>
              <td>
                <a href="cassis.pdf">
                  <img style="align:bottom; border:none" alt="PDF" src="IMG/qrcode-cassis-pdf.png"/>
                </a>
              </td>
              <td>
                <a href="../cassis/cassis.epub">
                  <img style="align:bottom; border:none" alt="e-pub" src="IMG/qrcode-cassis-epub.png"/>
                </a>
              </td>
            </tr>
            <tr>
              <td/>
              <td>PDF
</td>
              <td>e-Pub
</td>
            </tr>
          </table>
        </div>
      </div>
      <!--FIN du corps du module-->
      <br/>
      <div class="bottomNavigation">
        <div class="tail_aucentre">
          <a href="./uid4.html" accesskey="P"><img style="align:bottom; border:none" alt="previous" src="../static/img/icons/previous_motif.jpg"/> Previous | </a>
          <a href="./uid0.html" accesskey="U"><img style="align:bottom; border:none" alt="up" src="../static/img/icons/up_motif.jpg"/>  Home</a>
          <a href="./uid18.html" accesskey="N"> | Next <img style="align:bottom; border:none" alt="next" src="../static/img/icons/next_motif.jpg"/></a>
        </div>
        <br/>
      </div>
      <div id="textepage">
        <!--DEBUT2 du corps du module-->
        <h2>Section: 
      Overall Objectives</h2>
        <h3 class="titre3">Challenge</h3>
        <p>Verifying the safety of infinite-state systems is a challenge:
nowadays algorithmic techniques only apply to very specific
infinite-state systems.
On the other hand the deductive approaches are good candidates to
capture infinite system safety verification but are difficult to
bring into operation and require a deep expertise. A solution
consists of integrating several verification methods by combining, for example,
theorem-proving and model-checking.</p>
        <p>The behavior of infinite-state systems is expressed in
various models by composing or iterating actions. One of the main
problems with algorithmic techniques is to compute the effect of
these actions on the initial state. This computation is called
<i>reachability analysis</i>. The verification of safety
properties as well as the automatic generation of test cases relies
heavily on the accuracy of reachability analysis.</p>
        <p>The transverse goal is to push away the limitations on the use of
formal verification techniques, to ease their applications, and to
let them scale-up.</p>
        <ol>
          <li>
            <p class="notaparagraph"><a name="uid13"> </a>For properties that can be checked by reachability analysis
we have proposed models based on regular languages and rational
transductions. We have completed them by
designing algorithms for verifying a refinement relation between
two models <span class="math"><math xmlns="http://www.w3.org/1998/Math/MathML"><mi>𝒮</mi></math></span> and
<span class="math"><math xmlns="http://www.w3.org/1998/Math/MathML"><mi>𝒯</mi></math></span>  <a href="./bibliography.html#cassis-2013-bid0">[68]</a> .
This
refinement relation when satisfied preserves the safety
properties and therefore allows them to be inherited. We shall
investigate this approach with other representations.</p>
          </li>
          <li>
            <p class="notaparagraph"><a name="uid14"> </a>In order to generate boundary-value functional test
cases, we abstract models as constrained
states. These constraints are solved by a customized
solver, called CLPS.
The test cases are derived in two
steps:</p>
            <ol>
              <li>
                <p class="notaparagraph"><a name="uid15"> </a>partitioning of the formal model and extraction of
boundary values;</p>
              </li>
              <li>
                <p class="notaparagraph"><a name="uid16"> </a>reachability graph exploration from constrained states in
order to reach boundary values and generate state sequences
(traces) as test cases with the oracle.</p>
              </li>
            </ol>
            <p><a name="uid14"> </a>After the generation phase, a concretization is used to produce the
test drivers.
Furthermore, the kernel of the
engine allows one to perform specification animations in order
to validate the model  <a href="./bibliography.html#cassis-2013-bid1">[72]</a> .</p>
          </li>
          <li>
            <p class="notaparagraph"><a name="uid17"> </a>For the safety of infinite-state systems we have designed
automated deduction tools based on term rewriting
(<i>SPIKE</i>, <i>daTac</i>, <i>haRVey</i>) and an extensible and modular
platform for detecting flaws and potential attacks on security
protocols (<i>AVISPA</i>). The tools have been built on
the modeling of systems by terms and rewrite rules. Our work
with other models based on regular languages of words or trees
and of transducers should complement these term rewriting
models.</p>
          </li>
        </ol>
        <p>In order to address this challenge, we rely on complementary
skills within the project. We believe that each of the three
techniques will benefit from concepts and algorithms designed for
the two others.</p>
      </div>
      <!--FIN du corps du module-->
      <br/>
      <div class="bottomNavigation">
        <div class="tail_aucentre">
          <a href="./uid4.html" accesskey="P"><img style="align:bottom; border:none" alt="previous" src="../static/img/icons/previous_motif.jpg"/> Previous | </a>
          <a href="./uid0.html" accesskey="U"><img style="align:bottom; border:none" alt="up" src="../static/img/icons/up_motif.jpg"/>  Home</a>
          <a href="./uid18.html" accesskey="N"> | Next <img style="align:bottom; border:none" alt="next" src="../static/img/icons/next_motif.jpg"/></a>
        </div>
        <br/>
      </div>
    </div>
  </body>
</html>
