Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Formal verification
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Industry use == {{Cleanup|section|date=October 2022|reason=needs a more well-rounded overview of the subject; filter for what is actually used in industry; only mention notable papers}} The growth in complexity of designs increases the importance of formal verification techniques in the [[Electronics industry|hardware industry]].<ref>{{Cite book|doi=10.1109/LICS.2003.1210044|year=2003|last1=Harrison|first1=J.|title=18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings|pages=45–54|isbn=978-0-7695-1884-8|chapter=Formal verification at Intel|s2cid=44585546}}</ref><ref>[http://portal.acm.org/citation.cfm?id=800667 Formal verification of a real-time hardware design]. Portal.acm.org (June 27, 1983). Retrieved on April 30, 2011.</ref> At present, formal verification is used by most or all leading hardware companies,<ref>{{cite web|url=http://formalverificationbook.com|title=Formal Verification: An Essential Tool for Modern VLSI Design by Erik Seligman, Tom Schubert, and M V Achutha Kirankumar|year=2015}}</ref> but its use in the [[software industry]] is still languishing.{{citation needed|date=December 2011}} This could be attributed to the greater need in the hardware industry, where errors have greater commercial significance.{{citation needed|date=December 2011}} Because of the potential subtle interactions between components, it is increasingly difficult to exercise a realistic set of possibilities by simulation. Important aspects of hardware design are amenable to automated proof methods, making formal verification easier to introduce and more productive.<ref>{{cite web|url=http://www.cl.cam.ac.uk/~jrh13/slides/types-04sep99/slides1.pdf |title=Formal Verification in Industry |access-date=September 20, 2012}}</ref> {{As of|2011}}, several operating systems have been formally verified: NICTA's Secure [[L4 microkernel family#University of New South Wales and NICTA|Embedded L4 microkernel]], sold commercially as [[seL4]] by OK Labs;<ref>{{cite web |url=https://sel4.systems/Docs/seL4-spec.pdf |title=Abstract Formal Specification of the seL4/ARMv6 API |access-date=May 19, 2015 |url-status=dead |archive-url=https://web.archive.org/web/20150521171234/https://sel4.systems/Docs/seL4-spec.pdf |archive-date=May 21, 2015 }}</ref> OSEK/VDX based real-time operating system ORIENTAIS by [[East China Normal University]];{{Citation needed|date=March 2012}} Green Hills Software's [[Integrity (operating system)|Integrity operating system]];{{Citation needed|date=March 2012}} and [[SYSGO]]'s [[PikeOS]].<ref>Christoph Baumann, Bernhard Beckert, Holger Blasum, and Thorsten Bormer [http://www-wjp.cs.uni-saarland.de/publikationen/Ba10EW.pdf Ingredients of Operating System Correctness? Lessons Learned in the Formal Verification of PikeOS] {{Webarchive|url=https://web.archive.org/web/20110719110932/http://www-wjp.cs.uni-saarland.de/publikationen/Ba10EW.pdf |date=July 19, 2011 }}</ref><ref> [http://www.ganssle.com/rants/gettingitright.htm "Getting it Right"] by Jack Ganssle</ref> In 2016, a team led by Zhong Shao at Yale developed a formally verified operating system kernel called CertiKOS.<ref>{{cite web|url=https://www.zdnet.com/article/certikos-a-hacker-proof-os/|title=Unhackable OS? CertiKOS enables creation of secure system kernels|first=Robin|last=Harris|website=ZDNet|access-date=June 10, 2019}}</ref><ref>{{cite web|url=https://www.ibtimes.co.uk/certikos-yale-develops-worlds-first-hacker-resistant-operating-system-1591712|title=CertiKOS: Yale develops world's first hacker-resistant operating system|date=November 15, 2016|website=International Business Times UK|access-date=June 10, 2019}}</ref> As of 2017, formal verification has been applied to the design of large computer networks through a mathematical model of the network,<ref>{{cite web|last=Scroxton|first=Alex|title=For Cisco, intent-based networking heralds future tech demands|url=http://www.computerweekly.com/news/252434028/For-Cisco-intent-based-networking-heralds-future-tech-demands|publisher=Computer Weekly|access-date=February 12, 2018}}</ref> and as part of a new network technology category, [[Intent-Based Networking|intent-based networking]].<ref>{{cite web|last=Lerner|first=Andrew|title=Intent-based networking|url=https://blogs.gartner.com/andrew-lerner/2017/02/07/intent-based-networking/|publisher=Gartner|access-date=February 12, 2018}}</ref> Network software vendors that offer formal verification solutions include [[Cisco]]<ref>{{cite web|last=Kerravala|first=Zeus|title=Cisco brings intent based networks to the data center|url=https://www.networkworld.com/article/965142/cisco-brings-intent-based-networks-to-the-data-center.html|publisher=NetworkWorld|access-date=February 12, 2018|archive-date=December 11, 2023|archive-url=https://web.archive.org/web/20231211215137/https://www.networkworld.com/article/965142/cisco-brings-intent-based-networks-to-the-data-center.html|url-status=live}}</ref> Forward Networks<ref>{{cite web|title=Forward Networks: Accelerating and De-risking Network Operations|work=Insightssuccess Media and Technology Pvt. Ltd. |date=January 16, 2018 |url=http://www.insightssuccess.com/forward-networks-accelerating-de-risking-network-operations/|publisher=Insights Success|access-date=February 12, 2018}}</ref><ref>{{cite web|title=Getting Grounded in Intent=based Networking|url=https://images.idgesg.net/assets/2018/01/idg_2018_intent-based_networking.pdf|publisher=NetworkWorld|access-date=February 12, 2018}}</ref> and Veriflow Systems.<ref>{{cite web|title=Veriflow Systems|url=https://www.bloomberg.com/research/stocks/private/snapshot.asp?privcapid=274750862|publisher=Bloomberg|access-date=February 12, 2018}}</ref> The [[SPARK (programming language)|SPARK programming language]] provides a toolset which enables software development with formal verification and is [[SPARK (programming language)#Industrial applications|used in several high-integrity systems]].{{citation needed|date=October 2022}} The [[CompCert|CompCert C compiler]] is a formally verified C compiler implementing the majority of ISO C.<ref>{{Cite web |title=CompCert - The CompCert C compiler |url=https://compcert.org/compcert-C.html |access-date=2023-02-22 |website=compcert.org}}</ref><ref>{{Cite journal |last1=Barrière |first1=Aurèle |last2=Blazy |first2=Sandrine|author2-link=Sandrine Blazy |last3=Pichardie |first3=David |date=2023-01-09 |title=Formally Verified Native Code Generation in an Effectful JIT: Turning the CompCert Backend into a Formally Verified JIT Compiler |journal=Proceedings of the ACM on Programming Languages |volume=7 |issue=POPL |pages=249–277 |doi=10.1145/3571202 |s2cid=253736486 |issn=2475-1421|doi-access=free |arxiv=2212.03129 }}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)