Show simple item record

dc.contributor.authorDennis, Gregory D.
dc.contributor.authorYessenov, Kuat T.
dc.contributor.authorJackson, Daniel
dc.date.accessioned2010-02-10T19:11:36Z
dc.date.available2010-02-10T19:11:36Z
dc.date.issued2008-09
dc.identifier.issn1611-3349
dc.identifier.issn0302-9743
dc.identifier.urihttp://hdl.handle.net/1721.1/51684
dc.description.abstractWe present a case-study in which vote-tallying software is analyzed using a bounded verification technique, whereby all executions of a procedure are exhaustively examined within a finite space given by a bound on the size of the heap and the number of loop unrollings. The technique involves an encoding of the procedure in an intermediate relational programming language, a translation of that language to relational logic, and an analysis of the logic that exploits recent advances in finite model-finding. Our technique yields concrete counterexamples – traces of the procedure that violate the specification. The vote-tallying software, used for public elections in the Netherlands, had previously been annotated with specifications in the Java Modeling Language and analyzed with ESC/Java2. Our analysis found counterexamples to the JML contracts, indicating bugs in the code and errors in the specifications that evaded prior analysis.en
dc.description.sponsorshipToshiba Corporate Research and Development Centeren
dc.description.sponsorshipNational Science Foundationen
dc.language.isoen_US
dc.publisherSpringer Berlin Heidelbergen
dc.relation.isversionofhttp://dx.doi.org/10.1007/978-3-540-87873-5_13en
dc.rightsArticle is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use.en
dc.sourceAmy Stout / webpageen
dc.titleBounded verification of voting softwareen
dc.typeArticleen
dc.identifier.citationDennis, Greg, Kuat Yessenov, and Daniel Jackson. “Bounded Verification of Voting Software.” Verified Software: Theories, Tools, Experiments 2008.en
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.approverJackson, Daniel
dc.contributor.mitauthorDennis, Gregory D.
dc.contributor.mitauthorYessenov, Kuat T.
dc.contributor.mitauthorJackson, Daniel
dc.relation.journalLecture Notes in Computer Scienceen
dc.eprint.versionAuthor's final manuscript
dc.type.urihttp://purl.org/eprint/type/SubmittedJournalArticleen
eprint.statushttp://purl.org/eprint/status/PeerRevieweden
eprint.grantNumber0541183en
dspace.orderedauthorsDennis, Greg; Yessenov, Kuat; Jackson, Danielen
dc.identifier.orcidhttps://orcid.org/0000-0001-5959-5254
dc.identifier.orcidhttps://orcid.org/0000-0003-4864-078X
mit.licensePUBLISHER_POLICYen
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record