{"id":"https://openalex.org/W7123361820","doi":"https://doi.org/10.1109/dsa66321.2025.00010","title":"Testing-Based Formal Verification for Software Dependability","display_name":"Testing-Based Formal Verification for Software Dependability","publication_year":2025,"publication_date":"2025-11-24","ids":{"openalex":"https://openalex.org/W7123361820","doi":"https://doi.org/10.1109/dsa66321.2025.00010"},"language":null,"primary_location":{"id":"doi:10.1109/dsa66321.2025.00010","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsa66321.2025.00010","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 12th International Conference on Dependable Systems and Their Applications (DSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065946936","display_name":"S. Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shaoying Liu","raw_affiliation_strings":["East China Normal University,China"],"affiliations":[{"raw_affiliation_string":"East China Normal University,China","institution_ids":["https://openalex.org/I66867065"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5065946936"],"corresponding_institution_ids":["https://openalex.org/I66867065"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.74113985,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"xxi","last_page":"xxi"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.41019999980926514,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.41019999980926514,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.2102999985218048,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.17299999296665192,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/dependability","display_name":"Dependability","score":0.7384999990463257},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6021000146865845},{"id":"https://openalex.org/keywords/software-verification","display_name":"Software verification","score":0.5863999724388123},{"id":"https://openalex.org/keywords/verification-and-validation","display_name":"Verification and validation","score":0.579800009727478},{"id":"https://openalex.org/keywords/formal-methods","display_name":"Formal methods","score":0.5636000037193298},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.5131000280380249},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.41040000319480896},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.40149998664855957},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.39719998836517334}],"concepts":[{"id":"https://openalex.org/C77019957","wikidata":"https://www.wikidata.org/wiki/Q2689057","display_name":"Dependability","level":2,"score":0.7384999990463257},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7229999899864197},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.6123999953269958},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6021000146865845},{"id":"https://openalex.org/C33054407","wikidata":"https://www.wikidata.org/wiki/Q6504747","display_name":"Software verification","level":5,"score":0.5863999724388123},{"id":"https://openalex.org/C48002344","wikidata":"https://www.wikidata.org/wiki/Q2919644","display_name":"Verification and validation","level":2,"score":0.579800009727478},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.5636000037193298},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.5131000280380249},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.41040000319480896},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.40149998664855957},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.39719998836517334},{"id":"https://openalex.org/C116253237","wikidata":"https://www.wikidata.org/wiki/Q1437424","display_name":"Formal specification","level":2,"score":0.36570000648498535},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.36039999127388},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.358599990606308},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.35589998960494995},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.3458999991416931},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.32600000500679016},{"id":"https://openalex.org/C10272871","wikidata":"https://www.wikidata.org/wiki/Q929972","display_name":"Software inspection","level":5,"score":0.32269999384880066},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.3149000108242035},{"id":"https://openalex.org/C202973057","wikidata":"https://www.wikidata.org/wiki/Q7380130","display_name":"Runtime verification","level":3,"score":0.29989999532699585},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.28529998660087585},{"id":"https://openalex.org/C50712370","wikidata":"https://www.wikidata.org/wiki/Q4269346","display_name":"Software fault tolerance","level":3,"score":0.2851000130176544},{"id":"https://openalex.org/C180152950","wikidata":"https://www.wikidata.org/wiki/Q2904257","display_name":"Software development process","level":4,"score":0.2727999985218048},{"id":"https://openalex.org/C82214349","wikidata":"https://www.wikidata.org/wiki/Q657339","display_name":"Software metric","level":5,"score":0.2727000117301941},{"id":"https://openalex.org/C52928878","wikidata":"https://www.wikidata.org/wiki/Q7554226","display_name":"Software reliability testing","level":5,"score":0.26930001378059387},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.26460000872612},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.2619999945163727},{"id":"https://openalex.org/C142284323","wikidata":"https://www.wikidata.org/wiki/Q7921323","display_name":"Verification","level":5,"score":0.25859999656677246},{"id":"https://openalex.org/C2775928411","wikidata":"https://www.wikidata.org/wiki/Q2041312","display_name":"Fault injection","level":3,"score":0.25780001282691956},{"id":"https://openalex.org/C101317890","wikidata":"https://www.wikidata.org/wiki/Q940053","display_name":"Software maintenance","level":4,"score":0.2551000118255615}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dsa66321.2025.00010","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsa66321.2025.00010","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 12th International Conference on Dependable Systems and Their Applications (DSA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Software":[0],"dependability":[1],"encompasses":[2],"five":[3],"critical":[4],"properties:":[5],"reliability,":[6],"safety,":[7],"integrity,":[8],"availability,":[9],"and":[10,23,101,126,150,152],"maintainability.":[11],"Ensuring":[12],"these":[13],"attributes":[14],"throughout":[15],"the":[16,76,88,104,113,131],"software":[17,108,155],"engineering":[18],"process":[19],"remains":[20],"a":[21,35],"significant":[22],"ongoing":[24],"challenge.":[25],"In":[26],"this":[27],"talk,":[28],"I":[29,42,110],"will":[30,43,111],"begin":[31],"by":[32,70],"briefly":[33],"outlining":[34],"general":[36],"framework":[37],"for":[38,122],"developing":[39],"dependable":[40],"software.":[41],"then":[44],"focus":[45],"on":[46],"an":[47],"advanced":[48],"technique":[49],"known":[50],"as":[51,128,130],"Testing-Based":[52],"Formal":[53],"Verification":[54],"(TBFV),":[55],"which":[56],"integrates":[57],"specification-based":[58],"testing":[59,148],"with":[60,135],"formal":[61],"methods":[62],"to":[63,73,90,145],"verify":[64,75],"program":[65,80],"correctness.":[66],"TBFV":[67,142],"is":[68,143],"characterized":[69],"its":[71,136],"ability":[72],"automatically":[74],"correctness":[77],"of":[78,107,116],"all":[79],"paths":[81],"explored":[82],"during":[83],"testing,":[84],"while":[85],"also":[86],"having":[87],"potential":[89],"uncover":[91],"previously":[92],"untested":[93],"paths.":[94],"This":[95],"dual":[96],"capability":[97],"supports":[98],"both":[99],"validation":[100],"verification,":[102,127],"enhancing":[103],"overall":[105],"assurance":[106],"quality.":[109],"explain":[112],"core":[114],"principles":[115],"TBFV,":[117],"specific":[118],"techniques":[119],"it":[120],"employs":[121],"fault":[123],"prevention,":[124],"validation,":[125],"well":[129],"key":[132],"challenges":[133],"associated":[134],"practical":[137],"implementation.":[138],"When":[139],"fully":[140],"realized,":[141],"expected":[144],"significantly":[146],"reduce":[147],"time":[149],"cost,":[151],"substantially":[153],"improve":[154],"dependability.":[156]},"counts_by_year":[],"updated_date":"2026-01-14T00:46:21.520733","created_date":"2026-01-14T00:00:00"}
