| dc.contributor.author | Dennis, Gregory D. | |
| dc.contributor.author | Yessenov, Kuat T. | |
| dc.contributor.author | Jackson, Daniel | |
| dc.date.accessioned | 2010-02-10T19:11:36Z | |
| dc.date.available | 2010-02-10T19:11:36Z | |
| dc.date.issued | 2008-09 | |
| dc.identifier.issn | 1611-3349 | |
| dc.identifier.issn | 0302-9743 | |
| dc.identifier.uri | http://hdl.handle.net/1721.1/51684 | |
| dc.description.abstract | We present a case-study in which vote-tallying software is analyzed using a bounded verification technique, whereby all executions of a procedure are exhaustively examined within a finite space given by a bound on the size of the heap and the number of loop unrollings. The technique involves an encoding of the procedure in an intermediate relational programming language, a translation of that language to relational logic, and an analysis of the logic that exploits recent advances in finite model-finding. Our technique yields concrete counterexamples – traces of the procedure that violate the specification.
The vote-tallying software, used for public elections in the Netherlands, had previously been annotated with specifications in the Java Modeling Language and analyzed with ESC/Java2. Our analysis found counterexamples to the JML contracts, indicating bugs in the code and errors in the specifications that evaded prior analysis. | en |
| dc.description.sponsorship | Toshiba Corporate Research and Development Center | en |
| dc.description.sponsorship | National Science Foundation | en |
| dc.language.iso | en_US | |
| dc.publisher | Springer Berlin Heidelberg | en |
| dc.relation.isversionof | http://dx.doi.org/10.1007/978-3-540-87873-5_13 | en |
| dc.rights | Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. | en |
| dc.source | Amy Stout / webpage | en |
| dc.title | Bounded verification of voting software | en |
| dc.type | Article | en |
| dc.identifier.citation | Dennis, Greg, Kuat Yessenov, and Daniel Jackson. “Bounded Verification of Voting Software.” Verified Software: Theories, Tools, Experiments 2008. | en |
| dc.contributor.department | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory | en_US |
| dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
| dc.contributor.approver | Jackson, Daniel | |
| dc.contributor.mitauthor | Dennis, Gregory D. | |
| dc.contributor.mitauthor | Yessenov, Kuat T. | |
| dc.contributor.mitauthor | Jackson, Daniel | |
| dc.relation.journal | Lecture Notes in Computer Science | en |
| dc.eprint.version | Author's final manuscript | |
| dc.type.uri | http://purl.org/eprint/type/SubmittedJournalArticle | en |
| eprint.status | http://purl.org/eprint/status/PeerReviewed | en |
| eprint.grantNumber | 0541183 | en |
| dspace.orderedauthors | Dennis, Greg; Yessenov, Kuat; Jackson, Daniel | en |
| dc.identifier.orcid | https://orcid.org/0000-0001-5959-5254 | |
| dc.identifier.orcid | https://orcid.org/0000-0003-4864-078X | |
| mit.license | PUBLISHER_POLICY | en |
| mit.metadata.status | Complete | |