{"title":"Modeling and Verification of the Bitcoin Protocol","authors":"K. Chaudhary, A. Fehnker, J. Pol, M. Stoelinga","doi":"10.4204/EPTCS.196.5","DOIUrl":"https://doi.org/10.4204/EPTCS.196.5","url":null,"abstract":"Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double spending, and inspired by its popularity, we would like to investigate the correctness of the Bitcoin protocol. Double spending is an important threat to electronic payment systems. Double spending would happen if one user could force a majority to believe that a ledger without his previous payment is the correct one. We are interested in the probability of success of such a double spending attack, which is linked to the computational power of the attacker. This paper examines the Bitcoin protocol and provides its formalization as an UPPAAL model. The model will be used to show how double spending can be done if the parties in the Bitcoin protocol behave maliciously, and with what probability double spending occurs.","PeriodicalId":92263,"journal":{"name":"Mars (Los Angeles, Calif.)","volume":"1 1","pages":"46-60"},"PeriodicalIF":0.0,"publicationDate":"2015-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76956201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Control of Self-Balancing Unicycles","authors":"Felix Freiberger, H. Hermanns","doi":"10.4204/EPTCS.196.3","DOIUrl":"https://doi.org/10.4204/EPTCS.196.3","url":null,"abstract":"This paper discusses the problem of designing a self-balancing unicycle where pedals are used for both power generation and speed control. After developing the principal physical aspects (in the longitudinal dimension), we describe an abstract model in the form of a collection of hybrid automata, together with design requirements to be met by an ideal controller. We discuss simplifications and assumptions that make this model amenable to verification and validation tools such as SpaceEx. To enable experimentation with different prototypical controllers and user behaviours in concrete scenarios, we also develop a simple simulation framework using digital time.","PeriodicalId":92263,"journal":{"name":"Mars (Los Angeles, Calif.)","volume":"1 1","pages":"25-36"},"PeriodicalIF":0.0,"publicationDate":"2015-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82996718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Specifying a Realistic File System","authors":"Sidney Amani, Toby C. Murray","doi":"10.4204/EPTCS.196.1","DOIUrl":"https://doi.org/10.4204/EPTCS.196.1","url":null,"abstract":"We present the most interesting elements of the correctness specification of BilbyFs, a performant Linux flash file system. The BilbyFs specification supports asynchronous writes, a feature that has been overlooked by several file system verification projects, and has been used to verify the correctness of BilbyFs’s fsync() C implementation. It makes use of nondeterminism to be concise and is shallowly-embedded in higher-order logic.","PeriodicalId":92263,"journal":{"name":"Mars (Los Angeles, Calif.)","volume":"59 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2015-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82312011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal Specification and Verification of Fully Asynchronous Implementations of the Data Encryption Standard","authors":"Wendelin Serwe","doi":"10.4204/EPTCS.196.6","DOIUrl":"https://doi.org/10.4204/EPTCS.196.6","url":null,"abstract":"This paper presents two formal models of the Data Encryption Standard (DES), a first using the international standard LOTOS, and a second using the more recent process calculus LNT. Both models encode the DES in the style of asynchronous circuits, i.e., the data-flow blocks of the DES algorithm are represented by processes communicating via rendezvous. To ensure correctness of the models, several techniques have been applied, including model checking, equivalence checking, and comparing the results produced by a prototype automatically generated from the formal model with those of existing implementations of the DES. The complete code of the models is provided as appendices and also available on the website of the CADP verification toolbox.","PeriodicalId":92263,"journal":{"name":"Mars (Los Angeles, Calif.)","volume":"8 1","pages":"61-147"},"PeriodicalIF":0.0,"publicationDate":"2015-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81042365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Controlled Owicki-Gries Concurrency: Reasoning about the Preemptible eChronos Embedded Operating System","authors":"June Andronick, Corey Lewis, Carroll Morgan","doi":"10.4204/EPTCS.196.2","DOIUrl":"https://doi.org/10.4204/EPTCS.196.2","url":null,"abstract":"We introduce a controlled concurrency framework, derived from the Owicki-Gries method, for describing a hardware interface in detail sufficient to suppor t the modelling and verification of small, embedded operating systems (OS’s) whose run-time responsiveness is paramount. Such real- time systems run with interrupts mostly enabled, including during scheduling. That differs from many other successfully modelled and verified OS’s that typically reduce the complexity of concurrency by running on uniprocessor platforms and by switching interrupts off as much as possible. Our framework builds on the traditional Owicki-Gries method, for its fine-grained concurrency is needed for high-performance system code. We adapt it to support explicit concurrency control, by providing a simple, faithful representation of the hardware interface that allows software to control the degree of interleaving between user code, OS code, interrupt handlers and a scheduler that controls context switching. We then apply this framework to model the interleaving behavior of the eChronos OS, a preemptible real-time OS for embedded micro-controllers. We discuss the accuracy and usability of our approach when instantiated to model the eChronos OS. Both our framework and the eChronosmodel are formalised in the Isabelle/HOL theorem prover, taking advantage of the high level of automation in modern reasoning tools.","PeriodicalId":92263,"journal":{"name":"Mars (Los Angeles, Calif.)","volume":"30 1","pages":"10-24"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80165785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Timed Automata for Modelling Caches and Pipelines","authors":"F. Cassez, Pablo González de Aledo Marugán","doi":"10.4204/EPTCS.196.4","DOIUrl":"https://doi.org/10.4204/EPTCS.196.4","url":null,"abstract":"In this paper, we focus on modelling the timing aspects of binary programs running on architectures featuring caches and pipelines. The objective is to obtain a timed automaton model to compute tight bounds for the worst-case execution time (WCET) of the programs using model-checking tehcniques.","PeriodicalId":92263,"journal":{"name":"Mars (Los Angeles, Calif.)","volume":"550 1","pages":"37-45"},"PeriodicalIF":0.0,"publicationDate":"2015-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77584565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R Aileen Yingst, B A Cohen, L Crumpler, M E Schmidt, C M Schrader
{"title":"Testing Mars-inspired operational strategies for semi-autonomous rovers on the Moon: The GeoHeuristic Operational Strategies Test in New Mexico.","authors":"R Aileen Yingst, B A Cohen, L Crumpler, M E Schmidt, C M Schrader","doi":"10.1555/mars.2011.0002","DOIUrl":"10.1555/mars.2011.0002","url":null,"abstract":"<p><strong>Background: </strong>We tested the science operational strategy used for the Mars Exploration Rover (MER) mission on Mars to determine its suitability for conducting remote geology on the Moon by conducting a field test at Cerro de Santa Clara, New Mexico. This region contains volcanic and sedimentary products from a variety of provenances, mimicking the variety that might be found at a lunar site such as South Pole-Aitken Basin.</p><p><strong>Method: </strong>At each site a Science Team broke down observational \"days\" into a sequence of observations of features and targets of interest. The number, timing, and sequence of observations was chosen to mimic those used by the MERs when traversing. Images simulating high-resolution stereo and hand lens-scale images were taken using a professional SLR digital camera; multispectral and XRD data were acquired from samples to mimic the availability of geochemical data. A separate Tiger Team followed the Science Team and examined each site using traditional terrestrial field methods, facilitating comparison between what was revealed by human versus rover-inspired methods.</p><p><strong>Lessons learned: </strong>We conclude from this field test that MER-inspired methodology is not conducive to utilizing all acquired data in a timely manner for the case of any lunar architecture that involves the acquisition of rover data in near real-time. We additionally conclude that a methodology similar to that used for MER can be adapted for use on the Moon if mission goals are focused on reconnaissance. If the goal is to locate and identify a specific feature or material, such as water ice, a different methodology will likely be needed.</p>","PeriodicalId":92263,"journal":{"name":"Mars (Los Angeles, Calif.)","volume":"6 ","pages":"13-31"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5754929/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"35714905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}