Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (9)

Search Parameters:
Keywords = formal soundness proofs

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
14 pages, 301 KiB  
Article
Fuzzy Epistemic Logic: Fuzzy Logic of Doxastic Attitudes
by Jinjin Zhang, Xiaoxia Zhou, Yan Zhang and Lixing Tan
Mathematics 2025, 13(7), 1105; https://doi.org/10.3390/math13071105 - 27 Mar 2025
Viewed by 348
Abstract
In traditional epistemic logic—particularly modal logic—agents are often assumed to have complete and certain knowledge, which is unrealistic in real-world scenarios where uncertainty, imprecision, and the incompleteness of information are common. This study proposes an extension of the logic of doxastic attitudes to [...] Read more.
In traditional epistemic logic—particularly modal logic—agents are often assumed to have complete and certain knowledge, which is unrealistic in real-world scenarios where uncertainty, imprecision, and the incompleteness of information are common. This study proposes an extension of the logic of doxastic attitudes to a fuzzy setting, representing beliefs or knowledge as continuous values in the interval [0, 1] rather than binary Boolean values. This approach offers a more nuanced and realistic modeling of belief states, capturing the inherent uncertainty and vagueness in human reasoning. We introduce a set of axioms for the fuzzy logic of doxastic attitudes, formalizing how agents reason with regard to uncertain beliefs. The theoretical foundations of this logic are established through proofs of soundness and completeness. To demonstrate practical utility, we present a concrete example, illustrating how the fuzzy logic of doxastic attitudes can model uncertain preferences and beliefs. Full article
(This article belongs to the Section E1: Mathematics and Computer Science)
28 pages, 538 KiB  
Article
A Comprehensive Formalization of Propositional Logic in Coq: Deduction Systems, Meta-Theorems, and Automation Tactics
by Dakai Guo and Wensheng Yu
Mathematics 2023, 11(11), 2504; https://doi.org/10.3390/math11112504 - 29 May 2023
Cited by 8 | Viewed by 4740
Abstract
The increasing significance of theorem proving-based formalization in mathematics and computer science highlights the necessity for formalizing foundational mathematical theories. In this work, we employ the Coq interactive theorem prover to methodically formalize the language, semantics, and syntax of propositional logic, a fundamental [...] Read more.
The increasing significance of theorem proving-based formalization in mathematics and computer science highlights the necessity for formalizing foundational mathematical theories. In this work, we employ the Coq interactive theorem prover to methodically formalize the language, semantics, and syntax of propositional logic, a fundamental aspect of mathematical reasoning and proof construction. We construct four Hilbert-style axiom systems and a natural deduction system for propositional logic, and establish their equivalences through meticulous proofs. Moreover, we provide formal proofs for essential meta-theorems in propositional logic, including the Deduction Theorem, Soundness Theorem, Completeness Theorem, and Compactness Theorem. Importantly, we present an exhaustive formal proof of the Completeness Theorem in this paper. To bolster the proof of the Completeness Theorem, we also formalize concepts related to mappings and countability, and deliver a formal proof of the Cantor–Bernstein–Schröder theorem. Additionally, we devise automated Coq tactics explicitly designed for the propositional logic inference system delineated in this study, enabling the automatic verification of all tautologies, all internal theorems, and the majority of syntactic and semantic inferences within the system. This research contributes a versatile and reusable Coq library for propositional logic, presenting a solid foundation for numerous applications in mathematics, such as the accurate expression and verification of properties in software programs and digital circuits. This work holds particular importance in the domains of mathematical formalization, verification of software and hardware security, and in enhancing comprehension of the principles of logical reasoning. Full article
(This article belongs to the Special Issue Mathematical Logic, Algorithms and Applications)
Show Figures

Figure 1

27 pages, 1136 KiB  
Article
A Sound Definitional Interpreter for a Simply Typed Functional Language
by Burak Ekici
Axioms 2023, 12(1), 43; https://doi.org/10.3390/axioms12010043 - 30 Dec 2022
Cited by 1 | Viewed by 1918
Abstract
In this paper, we develop, in the proof assistant Coq, a definitional interpreter and a type-checker for a simply typed functional language, and formally prove that the mentioned type-checker is sound with respect to the definitional interpreter via progress and preservation. To [...] Read more.
In this paper, we develop, in the proof assistant Coq, a definitional interpreter and a type-checker for a simply typed functional language, and formally prove that the mentioned type-checker is sound with respect to the definitional interpreter via progress and preservation. To represent binders, we embark on the choice of “concrete syntax” in which parameters are just names (or strings). Full article
(This article belongs to the Section Mathematical Analysis)
Show Figures

Figure 1

33 pages, 563 KiB  
Article
Abstracting Strings for Model Checking of C Programs
by Henrich Lauko, Martina Olliaro, Agostino Cortesi and Petr Roc̆kai
Appl. Sci. 2020, 10(21), 7853; https://doi.org/10.3390/app10217853 - 5 Nov 2020
Viewed by 3126
Abstract
Data type abstraction plays a crucial role in software verification. In this paper, we introduce a domain for abstracting strings in the C programming language, where strings are managed as null-terminated arrays of characters. The new domain M-String is parametrized on an index [...] Read more.
Data type abstraction plays a crucial role in software verification. In this paper, we introduce a domain for abstracting strings in the C programming language, where strings are managed as null-terminated arrays of characters. The new domain M-String is parametrized on an index (bound) domain and a character domain. By means of these different constituent domains, M-Strings captures shape information on the array structure as well as value information on the characters occurring in the string. By tuning these two parameters, M-String can be easily tailored for specific verification tasks, balancing precision against complexity. The concrete and the abstract semantics of basic operations on strings are carefully formalized, and soundness proofs are fully detailed. Moreover, for a selection of functions contained in the standard C library, we provide the semantics for character access and update, enabling an automatic lifting of arbitrary string-manipulating code into our new domain. An implementation of abstract operations is provided within a tool that automatically lifts existing programs into the M-String domain along with an explicit-state model checker. The accuracy of the proposed domain is experimentally evaluated on real-case test programs, showing that M-String can efficiently detect real-world bugs as well as to prove that program does not contain them after they are fixed. Full article
(This article belongs to the Special Issue Static Analysis Techniques: Recent Advances and New Horizons)
Show Figures

Figure 1

19 pages, 3239 KiB  
Article
Efficient and Secure NFC Authentication for Mobile Payment Ensuring Fair Exchange Protocol
by Chalee Thammarat
Symmetry 2020, 12(10), 1649; https://doi.org/10.3390/sym12101649 - 9 Oct 2020
Cited by 17 | Viewed by 4351
Abstract
The standard protocol of near field communication (NFC) has concentrated primarily on the speed of communication while ignoring security properties. Message between an NFC-enabled smartphone and a point of sale are exchanged over the air (OTA), which is a message considered an authentication [...] Read more.
The standard protocol of near field communication (NFC) has concentrated primarily on the speed of communication while ignoring security properties. Message between an NFC-enabled smartphone and a point of sale are exchanged over the air (OTA), which is a message considered an authentication request for payment, billing, ticketing, loyalty services, identification or access control. An attacker who has an antenna can intercept or manipulate the exchanged messages to take advantage of these. In order to solve this problem, many researchers have suggested authentication methods for NFC communications. However, these remain inadequate transaction security and fairness. In this paper, we will propose a technique that ensures mutual authentication, security properties, and strong fairness. Mutual authentication is a security property that prevents replay attacks and man-in-the-middle attacks. Both fair exchange and transaction security are also significant issues in electronic transactions with regards to creating trust among the parties participating in the transaction. The suggested protocol deploys a secure offline session key generation technique to increase transaction security and, importantly, make our protocol lightweight while maintaining the fairness property. Our analysis suggests that our protocol is more effective than others regarding transaction security, fairness, and lightweight protocol. The proposed protocol checks robustness and soundness using Burrows, Abadi and Needham (BAN) logic, the Scyther tool, and automated validation of internet security protocols and applications (AVISPA) that provide formal proofs for security protocols. Furthermore, our protocol can resolve disputes in case one party misbehaves. Full article
Show Figures

Figure 1

19 pages, 430 KiB  
Article
Formalization of Cost and Utility in Microeconomics
by Asad Ahmed, Osman Hasan, Falah Awwad and Nabil Bastaki
Energies 2020, 13(3), 712; https://doi.org/10.3390/en13030712 - 6 Feb 2020
Viewed by 3432
Abstract
Cost and utility modeling of economics agents based on the differential theory is fundamental to the analysis of the microeconomics models. In particular, the first and second-order derivative tests are used to specify the desired properties of the cost and utility models. Traditionally, [...] Read more.
Cost and utility modeling of economics agents based on the differential theory is fundamental to the analysis of the microeconomics models. In particular, the first and second-order derivative tests are used to specify the desired properties of the cost and utility models. Traditionally, paper-and-pencil proof methods and computer-based tools are used to investigate the mathematical properties of these models. However, these techniques do not provide an accurate analysis due to their inability to exhaustively specify and verify the mathematical properties of the cost and utility models. Additionally, these techniques cannot accurately model and analyze pure continuous behaviors of the economic agents due to the utilization of computer arithmetic. On the other hand, an accurate analysis is direly needed in many safety and cost-critical microeconomics applications, such as agriculture and smart grids. To overcome the issues pertaining to the above-mentioned techniques, in this paper, we propose a theorem proving based methodology to formally analyze and specify the mathematical properties of functions used in microeconomics modeling. The proposed methodology is primarily based on a formalization of the derivative tests and root analysis of the polynomial functions, within the sound core of the HOL-Light theorem prover. We also provide a formalization of the first-order condition, which is used to analyze the maximum of the profit function in a higher-order-logic theorem prover. We then present the formal analysis of the utility, cost and first-order condition based on the polynomial functions. To illustrate the usefulness of proposed formalization, the proposed formalization is used to formally analyze and verify the quadratic cost and utility functions, which have been used in an optimal power flow problem and demand response (DR) program, respectively. Full article
Show Figures

Graphical abstract

19 pages, 321 KiB  
Article
Model-Checking Speculation-Dependent Security Properties: Abstracting and Reducing Processor Models for Sound and Complete Verification
by Gianpiero Cabodi, Paolo Camurati, Fabrizio Finocchiaro and Danilo Vendraminetto
Electronics 2019, 8(9), 1057; https://doi.org/10.3390/electronics8091057 - 19 Sep 2019
Cited by 8 | Viewed by 4138
Abstract
Spectre and Meltdown attacks in modern microprocessors represent a new class of attacks that have been difficult to deal with. They underline vulnerabilities in hardware design that have been going unnoticed for years. This shows the weakness of the state-of-the-art verification process and [...] Read more.
Spectre and Meltdown attacks in modern microprocessors represent a new class of attacks that have been difficult to deal with. They underline vulnerabilities in hardware design that have been going unnoticed for years. This shows the weakness of the state-of-the-art verification process and design practices. These attacks are OS-independent, and they do not exploit any software vulnerabilities. Moreover, they violate all security assumptions ensured by standard security procedures, (e.g., address space isolation), and, as a result, every security mechanism built upon these guarantees. These vulnerabilities allow the attacker to retrieve leaked data without accessing the secret directly. Indeed, they make use of covert channels, which are mechanisms of hidden communication that convey sensitive information without any visible information flow between the malicious party and the victim. The root cause of this type of side-channel attacks lies within the speculative and out-of-order execution of modern high-performance microarchitectures. Since modern processors are hard to verify with standard formal verification techniques, we present a methodology that shows how to transform a realistic model of a speculative and out-of-order processor into an abstract one. Following related formal verification approaches, we simplify the model under consideration by abstraction and refinement steps. We also present an approach to formally verify the abstract model using a standard model checker. The theoretical flow, reliant on established formal verification results, is introduced and a sketch of proof is provided for soundness and correctness. Finally, we demonstrate the feasibility of our approach, by applying it on a pipelined DLX RISC-inspired processor architecture. We show preliminary experimental results to support our claim, performing Bounded Model-Checking with a state-of-the-art model checker. Full article
(This article belongs to the Special Issue State-of-the-Art of Cyber Security)
Show Figures

Figure 1

19 pages, 388 KiB  
Article
Power-Aware Synchronization of a Software Defined Clock
by Augusto Ciuffoletti
J. Sens. Actuator Netw. 2019, 8(1), 11; https://doi.org/10.3390/jsan8010011 - 18 Jan 2019
Cited by 1 | Viewed by 6706
Abstract
In a distributed system, a common time reference allows each component to associate the same timestamp to events that occur simultaneously. It is a design option with benefits and drawbacks since it simplifies and makes more efficient a number of functions, but requires [...] Read more.
In a distributed system, a common time reference allows each component to associate the same timestamp to events that occur simultaneously. It is a design option with benefits and drawbacks since it simplifies and makes more efficient a number of functions, but requires additional resources and control to keep component clocks synchronized. In this paper, we quantify how much power is spent to implement such a function, which helps to solve the dilemma in a system of low-power sensors. To find widely applicable results, the formal model used in our investigation is agnostic of the communication pattern that components use to synchronize their clocks, and focuses on the scheduling of clock synchronization operations needed to correct clock drift. This model helps us to discover that the dynamic calibration of clock drift significantly reduces power consumption. We derive an optimal algorithm to keep a software defined clock (SDCk) synchronized with the reference, and we find that its effectiveness is strongly influenced by hardware clock quality. To demonstrate the soundness of formal statements, we introduce a proof of concept. For its implementation, we privilege low-cost components and standard protocols, and we use it to find that the power needed to keep a clock within 200 ms from UTC (Universal Time Coordinate) as on the order of 10−5 W . The prototype is fully documented and reproducible. Full article
(This article belongs to the Special Issue Energy Management in Distributed Wireless Networks)
Show Figures

Figure 1

20 pages, 1342 KiB  
Article
Formal Asymptotic Analysis of Online Scheduling Algorithms for Plug-In Electric Vehicles’ Charging
by Asad Ahmed, Osman Hasan, Falah Awwad, Nabil Bastaki and Syed Rafay Hasan
Energies 2019, 12(1), 19; https://doi.org/10.3390/en12010019 - 21 Dec 2018
Cited by 4 | Viewed by 4656
Abstract
A large-scale integration of plug-in electric vehicles (PEVs) into the power grid system has necessitated the design of online scheduling algorithms to accommodate the after-effects of this new type of load, i.e., PEVs, on the overall efficiency of the power system. In online [...] Read more.
A large-scale integration of plug-in electric vehicles (PEVs) into the power grid system has necessitated the design of online scheduling algorithms to accommodate the after-effects of this new type of load, i.e., PEVs, on the overall efficiency of the power system. In online settings, the low computational complexity of the corresponding scheduling algorithms is of paramount importance for the reliable, secure, and efficient operation of the grid system. Generally, the computational complexity of an algorithm is computed using asymptotic analysis. Traditionally, the analysis is performed using the paper-pencil proof method, which is error-prone and thus not suitable for analyzing the mission-critical online scheduling algorithms for PEV charging. To overcome these issues, this paper presents a formal asymptotic analysis approach for online scheduling algorithms for PEV charging using higher-order-logic theorem proving, which is a sound computer-based verification approach. For illustration purposes, we present the complexity analysis of two state-of-the-art online algorithms: the Online cooRdinated CHARging Decision (ORCHARD) algorithm and online Expected Load Flattening (ELF) algorithm. Full article
Show Figures

Figure 1

Back to TopTop