The role of model checking in software engineering |
| |
Authors: | Anil Kumar Karna Yuting Chen Haibo Yu Hao Zhong Jianjun Zhao |
| |
Affiliation: | 1. Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China2. School of Software, Shanghai Jiao Tong University, Shanghai 200240, China3. Department of Advanced Information Technology, Kyushu University, Fukuoka 819-0395, Japan |
| |
Abstract: | Model checking is a formal verification technique. It takes an exhaustively strategy to check hardware circuits and network protocols against desired properties. Having been developed for more than three decades, model checking is now playing an important role in software engineering for verifying rather complicated software artifacts.This paper surveys the role of model checking in software engineering. In particular, we searched for the related literatures published at reputed conferences, symposiums, workshops, and journals, and took a survey of (1) various model checking techniques that can be adapted to software development and their implementations, and (2) the use of model checking at different stages of a software development life cycle. We observed that model checking is useful for software debugging, constraint solving, and malware detection, and it can help verify different types of software systems, such as object- and aspect-oriented systems, service-oriented applications, web-based applications, and GUI applications including safety- and mission-critical systems.The survey is expected to help human engineers understand the role of model checking in software engineering, and as well decide which model checking technique(s) and/or tool(s) are applicable for developing, analyzing and verifying a practical software system. For researchers, the survey also points out how model checking has been adapted to their research topics on software engineering and its challenges. |
| |
Keywords: | software engineering model checking stateexplosion |
本文献已被 SpringerLink 等数据库收录! |
| 点击此处可从《Frontiers of Computer Science》浏览原始摘要信息 |
|
点击此处可从《Frontiers of Computer Science》下载全文 |
|