[{"publication_identifier":{"issn":["2732-527X"]},"has_accepted_license":"1","publication_status":"published","intvolume":"         5","page":"3031-3040","citation":{"chicago":"Gräßler, Iris, and Marcel Ebel. “Test-Oriented Resilient Requirements Engineering (ToRRE): Extending Model-Based Effect Chain Analysis to Verification Objectives.” In <i>Proceedings of the Design Society</i>, 5:3031–40. Cambridge University Press (CUP), 2025. <a href=\"https://doi.org/10.1017/pds.2025.10317\">https://doi.org/10.1017/pds.2025.10317</a>.","ieee":"I. Gräßler and M. Ebel, “Test-oriented Resilient Requirements Engineering (ToRRE): extending model-based effect chain analysis to verification objectives,” in <i>Proceedings of the Design Society</i>, Dallas, Texas, USA, 2025, vol. 5, pp. 3031–3040, doi: <a href=\"https://doi.org/10.1017/pds.2025.10317\">10.1017/pds.2025.10317</a>.","ama":"Gräßler I, Ebel M. Test-oriented Resilient Requirements Engineering (ToRRE): extending model-based effect chain analysis to verification objectives. In: <i>Proceedings of the Design Society</i>. Vol 5. Cambridge University Press (CUP); 2025:3031-3040. doi:<a href=\"https://doi.org/10.1017/pds.2025.10317\">10.1017/pds.2025.10317</a>","short":"I. Gräßler, M. Ebel, in: Proceedings of the Design Society, Cambridge University Press (CUP), 2025, pp. 3031–3040.","mla":"Gräßler, Iris, and Marcel Ebel. “Test-Oriented Resilient Requirements Engineering (ToRRE): Extending Model-Based Effect Chain Analysis to Verification Objectives.” <i>Proceedings of the Design Society</i>, vol. 5, Cambridge University Press (CUP), 2025, pp. 3031–40, doi:<a href=\"https://doi.org/10.1017/pds.2025.10317\">10.1017/pds.2025.10317</a>.","bibtex":"@inproceedings{Gräßler_Ebel_2025, title={Test-oriented Resilient Requirements Engineering (ToRRE): extending model-based effect chain analysis to verification objectives}, volume={5}, DOI={<a href=\"https://doi.org/10.1017/pds.2025.10317\">10.1017/pds.2025.10317</a>}, booktitle={Proceedings of the Design Society}, publisher={Cambridge University Press (CUP)}, author={Gräßler, Iris and Ebel, Marcel}, year={2025}, pages={3031–3040} }","apa":"Gräßler, I., &#38; Ebel, M. (2025). Test-oriented Resilient Requirements Engineering (ToRRE): extending model-based effect chain analysis to verification objectives. <i>Proceedings of the Design Society</i>, <i>5</i>, 3031–3040. <a href=\"https://doi.org/10.1017/pds.2025.10317\">https://doi.org/10.1017/pds.2025.10317</a>"},"volume":5,"author":[{"full_name":"Gräßler, Iris","id":"47565","last_name":"Gräßler","orcid":"0000-0001-5765-971X","first_name":"Iris"},{"orcid":"https://orcid.org/0009-0007-5400-4436","last_name":"Ebel","full_name":"Ebel, Marcel","id":"81788","first_name":"Marcel"}],"oa":"1","date_updated":"2025-08-28T13:14:46Z","doi":"10.1017/pds.2025.10317","conference":{"start_date":"2025-08-11","name":"25th International Conference on Engineering Design","location":"Dallas, Texas, USA","end_date":"2025-08-14"},"main_file_link":[{"url":"https://www.cambridge.org/core/journals/proceedings-of-the-design-society/article/testoriented-resilient-requirements-engineering-torre-extending-modelbased-effect-chain-analysis-to-verification-objectives/F1D33C094BAAF635E4E03519E15A4C08","open_access":"1"}],"type":"conference","status":"public","department":[{"_id":"152"}],"user_id":"81788","_id":"61057","project":[{"_id":"516","name":"CREXDATA: Kritische Maßnahmenplanung über extreme Datenmengen"}],"quality_controlled":"1","year":"2025","date_created":"2025-08-28T12:53:19Z","publisher":"Cambridge University Press (CUP)","title":"Test-oriented Resilient Requirements Engineering (ToRRE): extending model-based effect chain analysis to verification objectives","publication":"Proceedings of the Design Society","abstract":[{"lang":"eng","text":"Verification and Validation (V&V) are essential processes in engineering Cyber-Physical Systems. However, the role of V&V engineers is often not given sufficient attention. Based on a systematic literature analysis and practical observations, a four-step method for Test-oriented Resilient Requirements Engineering (ToRRE) is developed. The steps are planning V&V, executing V&V activities, documenting V&V activities and analyzing results of V&V activities. Applying ToRRE ensures continuous information flow and traceability. Engineers are enabled to analyze requirements using engineering artifacts connected through Model-Based Systems Engineering. Adopting methods for Model-Based Effect Chain analysis to evaluated test cases and test scenarios, conclusions on requirements engineering and change management are enabled. The method is evaluated in an EU research project."}],"language":[{"iso":"eng"}],"keyword":["systems engineering (SE)","product modelling/models","design methods","verification & validation","test cases & test scenarios"],"ddc":["620"]},{"doi":"10.3389/frbhe.2025.1645749","main_file_link":[{"open_access":"1","url":"https://www.frontiersin.org/journals/behavioral-economics/articles/10.3389/frbhe.2025.1645749/full"}],"title":"Human vs. Algorithmic Auditors: The Impact of Entity Type and Ambiguity on Human Dishonesty","volume":4,"date_created":"2025-09-18T07:52:40Z","author":[{"full_name":"Protte, Marius","id":"44549","last_name":"Protte","first_name":"Marius"},{"first_name":"Behnud Mir","last_name":"Djawadi","full_name":"Djawadi, Behnud Mir"}],"date_updated":"2025-09-29T09:31:38Z","oa":"1","intvolume":"         4","page":"1645749","citation":{"chicago":"Protte, Marius, and Behnud Mir Djawadi. “Human vs. Algorithmic Auditors: The Impact of Entity Type and Ambiguity on Human Dishonesty.” <i>Frontiers in Behavioral Economics</i> 4 (2025): 1645749. <a href=\"https://doi.org/10.3389/frbhe.2025.1645749\">https://doi.org/10.3389/frbhe.2025.1645749</a>.","ieee":"M. Protte and B. M. Djawadi, “Human vs. Algorithmic Auditors: The Impact of Entity Type and Ambiguity on Human Dishonesty,” <i>Frontiers in Behavioral Economics</i>, vol. 4, p. 1645749, 2025, doi: <a href=\"https://doi.org/10.3389/frbhe.2025.1645749\">10.3389/frbhe.2025.1645749</a>.","ama":"Protte M, Djawadi BM. Human vs. Algorithmic Auditors: The Impact of Entity Type and Ambiguity on Human Dishonesty. <i>Frontiers in Behavioral Economics</i>. 2025;4:1645749. doi:<a href=\"https://doi.org/10.3389/frbhe.2025.1645749\">10.3389/frbhe.2025.1645749</a>","apa":"Protte, M., &#38; Djawadi, B. M. (2025). Human vs. Algorithmic Auditors: The Impact of Entity Type and Ambiguity on Human Dishonesty. <i>Frontiers in Behavioral Economics</i>, <i>4</i>, 1645749. <a href=\"https://doi.org/10.3389/frbhe.2025.1645749\">https://doi.org/10.3389/frbhe.2025.1645749</a>","bibtex":"@article{Protte_Djawadi_2025, title={Human vs. Algorithmic Auditors: The Impact of Entity Type and Ambiguity on Human Dishonesty}, volume={4}, DOI={<a href=\"https://doi.org/10.3389/frbhe.2025.1645749\">10.3389/frbhe.2025.1645749</a>}, journal={Frontiers in Behavioral Economics}, author={Protte, Marius and Djawadi, Behnud Mir}, year={2025}, pages={1645749} }","short":"M. Protte, B.M. Djawadi, Frontiers in Behavioral Economics 4 (2025) 1645749.","mla":"Protte, Marius, and Behnud Mir Djawadi. “Human vs. Algorithmic Auditors: The Impact of Entity Type and Ambiguity on Human Dishonesty.” <i>Frontiers in Behavioral Economics</i>, vol. 4, 2025, p. 1645749, doi:<a href=\"https://doi.org/10.3389/frbhe.2025.1645749\">10.3389/frbhe.2025.1645749</a>."},"year":"2025","language":[{"iso":"eng"}],"keyword":["cheating","human-machine interaction","ambiguity","verification process","algorithm aversion","algorithm appreciation"],"user_id":"44549","_id":"61339","status":"public","publication":"Frontiers in Behavioral Economics","type":"journal_article"},{"status":"public","type":"conference","_id":"61103","project":[{"_id":"516","name":"CREXDATA: Kritische Maßnahmenplanung über extreme Datenmengen"}],"department":[{"_id":"152"}],"user_id":"81788","page":"213-218","intvolume":"       136","citation":{"bibtex":"@inproceedings{Gräßler_Ebel_Pottebaum_2025, title={Method for systematic creation of test scenarios for early customer involvement}, volume={136}, DOI={<a href=\"https://doi.org/10.1016/j.procir.2025.08.038\">https://doi.org/10.1016/j.procir.2025.08.038</a>}, booktitle={Procedia CIRP}, publisher={Elsevier BV}, author={Gräßler, Iris and Ebel, Marcel and Pottebaum, Jens}, year={2025}, pages={213–218} }","short":"I. Gräßler, M. Ebel, J. Pottebaum, in: Procedia CIRP, Elsevier BV, 2025, pp. 213–218.","mla":"Gräßler, Iris, et al. “Method for Systematic Creation of Test Scenarios for Early Customer Involvement.” <i>Procedia CIRP</i>, vol. 136, Elsevier BV, 2025, pp. 213–18, doi:<a href=\"https://doi.org/10.1016/j.procir.2025.08.038\">https://doi.org/10.1016/j.procir.2025.08.038</a>.","apa":"Gräßler, I., Ebel, M., &#38; Pottebaum, J. (2025). Method for systematic creation of test scenarios for early customer involvement. <i>Procedia CIRP</i>, <i>136</i>, 213–218. <a href=\"https://doi.org/10.1016/j.procir.2025.08.038\">https://doi.org/10.1016/j.procir.2025.08.038</a>","ama":"Gräßler I, Ebel M, Pottebaum J. Method for systematic creation of test scenarios for early customer involvement. In: <i>Procedia CIRP</i>. Vol 136. Elsevier BV; 2025:213-218. doi:<a href=\"https://doi.org/10.1016/j.procir.2025.08.038\">https://doi.org/10.1016/j.procir.2025.08.038</a>","ieee":"I. Gräßler, M. Ebel, and J. Pottebaum, “Method for systematic creation of test scenarios for early customer involvement,” in <i>Procedia CIRP</i>, Patras, Greece, 2025, vol. 136, pp. 213–218, doi: <a href=\"https://doi.org/10.1016/j.procir.2025.08.038\">https://doi.org/10.1016/j.procir.2025.08.038</a>.","chicago":"Gräßler, Iris, Marcel Ebel, and Jens Pottebaum. “Method for Systematic Creation of Test Scenarios for Early Customer Involvement.” In <i>Procedia CIRP</i>, 136:213–18. Elsevier BV, 2025. <a href=\"https://doi.org/10.1016/j.procir.2025.08.038\">https://doi.org/10.1016/j.procir.2025.08.038</a>."},"publication_identifier":{"issn":["2212-8271"]},"publication_status":"published","doi":"https://doi.org/10.1016/j.procir.2025.08.038","conference":{"start_date":"2025-04-02","name":"35th CIRP Design Conference","location":"Patras, Greece","end_date":"2025-04-04"},"main_file_link":[{"url":"https://www.sciencedirect.com/science/article/pii/S2212827125007905","open_access":"1"}],"oa":"1","date_updated":"2026-03-30T11:38:22Z","volume":136,"author":[{"id":"47565","full_name":"Gräßler, Iris","last_name":"Gräßler","orcid":"0000-0001-5765-971X","first_name":"Iris"},{"full_name":"Ebel, Marcel","id":"81788","last_name":"Ebel","orcid":"https://orcid.org/0009-0007-5400-4436","first_name":"Marcel"},{"full_name":"Pottebaum, Jens","id":"405","orcid":"http://orcid.org/0000-0001-8778-2989","last_name":"Pottebaum","first_name":"Jens"}],"abstract":[{"lang":"eng","text":"Verification planning for engineering complex systems lacks a systematic procedure for creating test scenarios. Test scenarios can be generated by combining test cases, or by integrating test cases into pre-specified scenarios. Based on a systematic literature analysis a method is developed to simplify verification planning by creating new test scenarios and enriching existing ones. To assist the V&V engineer in planning test scenarios, a catalogue of combination premises is created to support the method. The method is evaluated in the development of a platform for emergency management. Evaluation proves that the method makes modelling of test scenarios more efficient."}],"publication":"Procedia CIRP","keyword":["Systems Engineering","test scenario creation","verification","customer involvement"],"language":[{"iso":"eng"}],"year":"2025","quality_controlled":"1","title":"Method for systematic creation of test scenarios for early customer involvement","publisher":"Elsevier BV","date_created":"2025-09-01T07:17:50Z"},{"title":"Ganzheitliches Metadatenmodel für die Verifikation und Validierung in der Entwicklung komplexer technischer Systeme","date_created":"2025-11-10T08:37:55Z","publisher":"The Design Society","year":"2025","quality_controlled":"1","language":[{"iso":"eng"}],"keyword":["verification","metadata model","Systems Engineering"],"abstract":[{"text":"The increasing complexity of technical systems requires early, structured verification and validation (V&V). Existing metadata models only map parts of the engineering process and do not enable a continuous chain of effects from requirements to test results. The aim of this publication is to develop a holistic V&V metadata model for the consistent, transparent and machine-processable description and linking of relevant engineering artifacts. In a five-stage research approach, essential model components are derived from literature and are integrated into a holistic model. Initial applications as part of a European research project show the potential of the model for a well-founded effect chain analysis and decision-supporting V&V processes.","lang":"eng"}],"publication":"DS 140: Proceedings of the 36th Symposium Design for X (DFX2025)","main_file_link":[{"open_access":"1"}],"doi":"10.35199/dfx2025.09","conference":{"name":"36th Design for X Symposium (DFX 2025)","start_date":"2025-09-11","end_date":"2025-09-12","location":"Hamburg"},"author":[{"full_name":"Gräßler, Iris","id":"47565","orcid":"0000-0001-5765-971X","last_name":"Gräßler","first_name":"Iris"},{"first_name":"Marcel","id":"81788","full_name":"Ebel, Marcel","last_name":"Ebel","orcid":"https://orcid.org/0009-0007-5400-4436"}],"date_updated":"2026-03-30T11:41:01Z","oa":"1","citation":{"ama":"Gräßler I, Ebel M. Ganzheitliches Metadatenmodel für die Verifikation und Validierung in der Entwicklung komplexer technischer Systeme. In: <i>DS 140: Proceedings of the 36th Symposium Design for X (DFX2025)</i>. The Design Society; 2025. doi:<a href=\"https://doi.org/10.35199/dfx2025.09\">10.35199/dfx2025.09</a>","chicago":"Gräßler, Iris, and Marcel Ebel. “Ganzheitliches Metadatenmodel Für Die Verifikation Und Validierung in Der Entwicklung Komplexer Technischer Systeme.” In <i>DS 140: Proceedings of the 36th Symposium Design for X (DFX2025)</i>. The Design Society, 2025. <a href=\"https://doi.org/10.35199/dfx2025.09\">https://doi.org/10.35199/dfx2025.09</a>.","ieee":"I. Gräßler and M. Ebel, “Ganzheitliches Metadatenmodel für die Verifikation und Validierung in der Entwicklung komplexer technischer Systeme,” presented at the 36th Design for X Symposium (DFX 2025), Hamburg, 2025, doi: <a href=\"https://doi.org/10.35199/dfx2025.09\">10.35199/dfx2025.09</a>.","apa":"Gräßler, I., &#38; Ebel, M. (2025). Ganzheitliches Metadatenmodel für die Verifikation und Validierung in der Entwicklung komplexer technischer Systeme. <i>DS 140: Proceedings of the 36th Symposium Design for X (DFX2025)</i>. 36th Design for X Symposium (DFX 2025), Hamburg. <a href=\"https://doi.org/10.35199/dfx2025.09\">https://doi.org/10.35199/dfx2025.09</a>","mla":"Gräßler, Iris, and Marcel Ebel. “Ganzheitliches Metadatenmodel Für Die Verifikation Und Validierung in Der Entwicklung Komplexer Technischer Systeme.” <i>DS 140: Proceedings of the 36th Symposium Design for X (DFX2025)</i>, The Design Society, 2025, doi:<a href=\"https://doi.org/10.35199/dfx2025.09\">10.35199/dfx2025.09</a>.","bibtex":"@inproceedings{Gräßler_Ebel_2025, title={Ganzheitliches Metadatenmodel für die Verifikation und Validierung in der Entwicklung komplexer technischer Systeme}, DOI={<a href=\"https://doi.org/10.35199/dfx2025.09\">10.35199/dfx2025.09</a>}, booktitle={DS 140: Proceedings of the 36th Symposium Design for X (DFX2025)}, publisher={The Design Society}, author={Gräßler, Iris and Ebel, Marcel}, year={2025} }","short":"I. Gräßler, M. Ebel, in: DS 140: Proceedings of the 36th Symposium Design for X (DFX2025), The Design Society, 2025."},"publication_status":"published","user_id":"81788","department":[{"_id":"152"}],"_id":"62149","status":"public","type":"conference"},{"has_accepted_license":"1","publication_status":"published","citation":{"apa":"Gräßler, I., Ebel, M., &#38; Pottebaum, J. (2024). Model-based planning of test cases and test scenarios to support engineering of Cyber-Physical Systems. <i>2024 IEEE International Symposium on Systems Engineering (ISSE)</i>.  IEEE International Symposium on Systems Engineering 2024, Perugia. <a href=\"https://doi.org/10.1109/isse63315.2024.10741135\">https://doi.org/10.1109/isse63315.2024.10741135</a>","bibtex":"@inproceedings{Gräßler_Ebel_Pottebaum_2024, title={Model-based planning of test cases and test scenarios to support engineering of Cyber-Physical Systems}, DOI={<a href=\"https://doi.org/10.1109/isse63315.2024.10741135\">10.1109/isse63315.2024.10741135</a>}, booktitle={2024 IEEE International Symposium on Systems Engineering (ISSE)}, publisher={IEEE}, author={Gräßler, Iris and Ebel, Marcel and Pottebaum, Jens}, year={2024} }","mla":"Gräßler, Iris, et al. “Model-Based Planning of Test Cases and Test Scenarios to Support Engineering of Cyber-Physical Systems.” <i>2024 IEEE International Symposium on Systems Engineering (ISSE)</i>, IEEE, 2024, doi:<a href=\"https://doi.org/10.1109/isse63315.2024.10741135\">10.1109/isse63315.2024.10741135</a>.","short":"I. Gräßler, M. Ebel, J. Pottebaum, in: 2024 IEEE International Symposium on Systems Engineering (ISSE), IEEE, 2024.","chicago":"Gräßler, Iris, Marcel Ebel, and Jens Pottebaum. “Model-Based Planning of Test Cases and Test Scenarios to Support Engineering of Cyber-Physical Systems.” In <i>2024 IEEE International Symposium on Systems Engineering (ISSE)</i>. IEEE, 2024. <a href=\"https://doi.org/10.1109/isse63315.2024.10741135\">https://doi.org/10.1109/isse63315.2024.10741135</a>.","ieee":"I. Gräßler, M. Ebel, and J. Pottebaum, “Model-based planning of test cases and test scenarios to support engineering of Cyber-Physical Systems,” presented at the  IEEE International Symposium on Systems Engineering 2024, Perugia, 2024, doi: <a href=\"https://doi.org/10.1109/isse63315.2024.10741135\">10.1109/isse63315.2024.10741135</a>.","ama":"Gräßler I, Ebel M, Pottebaum J. Model-based planning of test cases and test scenarios to support engineering of Cyber-Physical Systems. In: <i>2024 IEEE International Symposium on Systems Engineering (ISSE)</i>. IEEE; 2024. doi:<a href=\"https://doi.org/10.1109/isse63315.2024.10741135\">10.1109/isse63315.2024.10741135</a>"},"author":[{"first_name":"Iris","orcid":"0000-0001-5765-971X","last_name":"Gräßler","id":"47565","full_name":"Gräßler, Iris"},{"first_name":"Marcel","last_name":"Ebel","orcid":"https://orcid.org/0009-0007-5400-4436","full_name":"Ebel, Marcel","id":"81788"},{"first_name":"Jens","last_name":"Pottebaum","orcid":"http://orcid.org/0000-0001-8778-2989","full_name":"Pottebaum, Jens","id":"405"}],"date_updated":"2025-01-17T16:20:14Z","oa":"1","conference":{"location":"Perugia","end_date":"2024-10-18","start_date":"2024-10-16","name":" IEEE International Symposium on Systems Engineering 2024"},"doi":"10.1109/isse63315.2024.10741135","main_file_link":[{"open_access":"1","url":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10741135&tag=1"}],"type":"conference","status":"public","department":[{"_id":"152"}],"user_id":"405","_id":"57300","project":[{"_id":"516","name":"CREXDATA: CREXDATA: Kritische Maßnahmenplanung über extreme Datenmengen","grant_number":"101092749"}],"quality_controlled":"1","year":"2024","date_created":"2024-11-20T20:06:22Z","publisher":"IEEE","title":"Model-based planning of test cases and test scenarios to support engineering of Cyber-Physical Systems","publication":"2024 IEEE International Symposium on Systems Engineering (ISSE)","abstract":[{"text":"Engineering methodologies for Cyber-Physical Systems (CPS) call for planning simulations and physical testing in early phases of product creation. Even in Model-Based Systems Engineering, there is a lack of systematic support that results in avoidable costs and iterations in the engineering process. Planning test cases and test scenarios along the product engineering process is not sufficiently integrated in terms of support especially for verification and validation engineers. Based on a systematic literature review, concepts for model-based planning of testing are developed. Characteristics of test cases and test scenarios of CPS are systematically identified. Generic templates for the creation of test cases and scenarios are derived. Based on the templates, a System Modeling Language (SysML) profile extension is developed which enables intuitive modelling of test cases and scenarios. The SysML profile is evaluated in a sample System-of-Systems in Disaster Response. It subsumes various types of sensor systems like rescue robotics, data science algorithms and visualization technologies like Augmented Reality to support decisions in extreme weather events. The templates and SysML profile significantly add value for engineers in the early and systematic planning of verification and validation.","lang":"eng"}],"language":[{"iso":"eng"}],"keyword":["Systems Engineering","Systems verification","System testing"]},{"language":[{"iso":"eng"}],"ddc":["004"],"keyword":["FPGA Security","Hardware Trojans","Bitstream-level Trojans","Bitstream Verification"],"abstract":[{"text":"Wettstreit zwischen der Entwicklung neuer Hardwaretrojaner und entsprechender Gegenmaßnahmen beschreiten Widersacher immer raffiniertere Wege um Schaltungsentwürfe zu infizieren und dabei selbst fortgeschrittene Test- und Verifikationsmethoden zu überlisten. Abgesehen von den konventionellen Methoden um einen Trojaner in eine Schaltung für ein Field-programmable Gate Array (FPGA) einzuschleusen, können auch die Entwurfswerkzeuge heimlich kompromittiert werden um einen Angreifer dabei zu unterstützen einen erfolgreichen Angriff durchzuführen, der zum Beispiel Fehlfunktionen oder ungewollte Informationsabflüsse bewirken kann. Diese Dissertation beschäftigt sich hauptsächlich mit den beiden Blickwinkeln auf Hardwaretrojaner in rekonfigurierbaren Systemen, einerseits der Perspektive des Verteidigers mit einer Methode zur Erkennung von Trojanern auf der Bitstromebene, und andererseits derjenigen des Angreifers mit einer neuartigen Angriffsmethode für FPGA Trojaner. Für die Verteidigung gegen den Trojaner ``Heimtückische LUT'' stellen wir die allererste erfolgreiche Gegenmaßnahme vor, die durch Verifikation mittels Proof-carrying Hardware (PCH) auf der Bitstromebene direkt vor der Konfiguration der Hardware angewendet werden kann, und präsentieren ein vollständiges Schema für den Entwurf und die Verifikation von Schaltungen für iCE40 FPGAs. Für die Gegenseite führen wir einen neuen Angriff ein, welcher bösartiges Routing im eingefügten Trojaner ausnutzt um selbst im fertigen Bitstrom in einem inaktiven Zustand zu verbleiben: Hierdurch kann dieser neuartige Angriff zur Zeit weder von herkömmlichen Test- und Verifikationsmethoden, noch von unserer vorher vorgestellten Verifikation auf der Bitstromebene entdeckt werden.","lang":"eng"},{"lang":"eng","text":"The battle of developing hardware Trojans and corresponding countermeasures has taken adversaries towards ingenious ways of compromising hardware designs by circumventing even advanced testing and verification methods. Besides conventional methods of inserting Trojans into a design by a malicious entity, the design flow for field-programmable gate arrays (FPGAs) can also be surreptitiously compromised to assist the attacker to perform a successful malfunctioning or information leakage attack. This thesis mainly focuses on the two aspects of hardware Trojans in reconfigurable systems, the defenders perspective which corresponds to the bitstream-level Trojan detection technique, and the attackers perspective which corresponds to a novel FPGA Trojan attack. From the defender's perspective, we introduce a first-ever successful pre-configuration countermeasure against the ``Malicious LUT''-hardware Trojan, by employing bitstream-level Proof-Carrying Hardware (PCH) and present the complete design-and-verification flow for iCE40 FPGAs. Likewise, from an attackers perspective, we present a novel attack that leverages malicious routing of the inserted Trojan circuit to acquire a dormant state even in the generated and transmitted bitstream. Since the Trojan is injected in a post-synthesis step and remains unconnected in the bitstream, the presented attack can currently neither be prevented by conventional testing and verification methods nor by bitstream-level verification techniques."}],"date_created":"2022-02-07T14:02:36Z","publisher":" Paderborn University, Paderborn, Germany","title":"Hardware Trojans in Reconfigurable Computing","year":"2022","user_id":"477","department":[{"_id":"78"}],"project":[{"_id":"1","name":"SFB 901: SFB 901"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"_id":"14","name":"SFB 901 - C2: SFB 901 - Subproject C2"}],"_id":"29769","type":"dissertation","status":"public","supervisor":[{"first_name":"Marco","last_name":"Platzner","id":"398","full_name":"Platzner, Marco"}],"author":[{"first_name":"Qazi Arbab","last_name":"Ahmed","orcid":"0000-0002-1837-2254","id":"72764","full_name":"Ahmed, Qazi Arbab"}],"date_updated":"2022-11-30T13:39:01Z","oa":"1","main_file_link":[{"url":"\turn:nbn:de:hbz:466:2-40303","open_access":"1"}],"doi":"10.17619/UNIPB/1-1271","publication_status":"published","has_accepted_license":"1","citation":{"apa":"Ahmed, Q. A. (2022). <i>Hardware Trojans in Reconfigurable Computing</i>.  Paderborn University, Paderborn, Germany. <a href=\"https://doi.org/10.17619/UNIPB/1-1271\">https://doi.org/10.17619/UNIPB/1-1271</a>","short":"Q.A. Ahmed, Hardware Trojans in Reconfigurable Computing,  Paderborn University, Paderborn, Germany, Paderborn, 2022.","bibtex":"@book{Ahmed_2022, place={Paderborn}, title={Hardware Trojans in Reconfigurable Computing}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-1271\">10.17619/UNIPB/1-1271</a>}, publisher={ Paderborn University, Paderborn, Germany}, author={Ahmed, Qazi Arbab}, year={2022} }","mla":"Ahmed, Qazi Arbab. <i>Hardware Trojans in Reconfigurable Computing</i>.  Paderborn University, Paderborn, Germany, 2022, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-1271\">10.17619/UNIPB/1-1271</a>.","chicago":"Ahmed, Qazi Arbab. <i>Hardware Trojans in Reconfigurable Computing</i>. Paderborn:  Paderborn University, Paderborn, Germany, 2022. <a href=\"https://doi.org/10.17619/UNIPB/1-1271\">https://doi.org/10.17619/UNIPB/1-1271</a>.","ieee":"Q. A. Ahmed, <i>Hardware Trojans in Reconfigurable Computing</i>. Paderborn:  Paderborn University, Paderborn, Germany, 2022.","ama":"Ahmed QA. <i>Hardware Trojans in Reconfigurable Computing</i>.  Paderborn University, Paderborn, Germany; 2022. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-1271\">10.17619/UNIPB/1-1271</a>"},"place":"Paderborn"},{"publication_status":"published","place":"Paderborn","page":"293","citation":{"ama":"Wiersema T. <i>Guaranteeing Properties of Reconfigurable Hardware Circuits with Proof-Carrying Hardware</i>. Paderborn University; 2021.","chicago":"Wiersema, Tobias. <i>Guaranteeing Properties of Reconfigurable Hardware Circuits with Proof-Carrying Hardware</i>. Paderborn: Paderborn University, 2021.","ieee":"T. Wiersema, <i>Guaranteeing Properties of Reconfigurable Hardware Circuits with Proof-Carrying Hardware</i>. Paderborn: Paderborn University, 2021.","bibtex":"@book{Wiersema_2021, place={Paderborn}, title={Guaranteeing Properties of Reconfigurable Hardware Circuits with Proof-Carrying Hardware}, publisher={Paderborn University}, author={Wiersema, Tobias}, year={2021} }","mla":"Wiersema, Tobias. <i>Guaranteeing Properties of Reconfigurable Hardware Circuits with Proof-Carrying Hardware</i>. Paderborn University, 2021.","short":"T. Wiersema, Guaranteeing Properties of Reconfigurable Hardware Circuits with Proof-Carrying Hardware, Paderborn University, Paderborn, 2021.","apa":"Wiersema, T. (2021). <i>Guaranteeing Properties of Reconfigurable Hardware Circuits with Proof-Carrying Hardware</i>. Paderborn University."},"date_updated":"2022-01-06T06:57:26Z","oa":"1","author":[{"first_name":"Tobias","last_name":"Wiersema","full_name":"Wiersema, Tobias","id":"3118"}],"supervisor":[{"first_name":"Marco","last_name":"Platzner","id":"398","full_name":"Platzner, Marco"}],"main_file_link":[{"url":"https://nbn-resolving.de/urn:nbn:de:hbz:466:2-39800","open_access":"1"}],"type":"dissertation","status":"public","_id":"26746","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901 - Subproject B4","_id":"12"}],"department":[{"_id":"78"}],"user_id":"3118","year":"2021","publisher":"Paderborn University","date_created":"2021-10-25T06:35:41Z","title":"Guaranteeing Properties of Reconfigurable Hardware Circuits with Proof-Carrying Hardware","abstract":[{"lang":"eng","text":"Previous research in proof-carrying hardware has established the feasibility and utility of the approach, and provided a concrete solution for employing it for the certification of functional equivalence checking against a specification, but fell short in connecting it to state-of-the-art formal verification insights, methods and tools. Due to the immense complexity of modern circuits, and verification challenges such as the state explosion problem for sequential circuits, this restriction of readily-available verification solutions severely limited the applicability of the approach in wider contexts.\r\n\r\nThis thesis closes the gap between the PCH approach and current advances in formal hardware verification, provides methods and tools to express and certify a wide range of circuit properties, both functional and non-functional, and presents for the first time prototypes in which circuits that are implemented on actual reconfigurable hardware are verified with PCH methods. Using these results, designers can now apply PCH to establish trust in more complex circuits, by using more diverse properties which they can express using modern, efficient property specification techniques."},{"lang":"ger","text":"Die bisherige Forschung zu Proof-Carrying Hardware (PCH) hat dessen Machbarkeit und Nützlichkeit gezeigt und einen Ansatz zur Zertifizierung der funktionalen Äquivalenz zu einer Spezifikation geliefert, jedoch ohne PCH mit aktuellen Erkenntnissen, Methoden oder Werkzeugen formaler Hardwareverifikation zu verknüpfen. Aufgrund der Komplexität moderner Schaltungen und Verifikationsherausforderungen wie der Zustandsexplosion bei sequentiellen Schaltungen, limitiert diese Einschränkung sofort verfügbarer Verifikationslösungen die Anwendbarkeit des Ansatzes in einem größeren Kontext signifikant.\r\n\r\nDiese Dissertation schließt die Lücke zwischen PCH und modernen Entwicklungen in der Schaltungsverifikation und stellt Methoden und Werkzeuge zur Verfügung, welche die Zertifizierung einer großen Bandbreite von Schaltungseigenschaften ermöglicht; sowohl funktionale, als auch nicht-funktionale. Überdies werden erstmals Prototypen vorgestellt in welchen Schaltungen mittels PCH verifiziert werden, die auf tatsächlicher rekonfigurierbarer Hardware realisiert sind. Dank dieser Ergebnisse können Entwickler PCH zur Herstellung von Vertrauen in weit komplexere Schaltungen verwenden, unter Zuhilfenahme einer größeren Vielfalt von Eigenschaften, welche durch moderne, effiziente Spezifikationstechniken ausgedrückt werden können."}],"keyword":["Proof-Carrying Hardware","Formal Verification","Sequential Circuits","Non-Functional Properties","Functional Properties"],"ddc":["006"],"language":[{"iso":"eng"}]},{"quality_controlled":"1","publication_status":"published","year":"2021","citation":{"ama":"Jakobs M-C, Pauck F, Platzner M, Wehrheim H, Wiersema T. Software/Hardware Co-Verification for Custom Instruction Set Processors. <i>IEEE Access</i>. Published online 2021. doi:<a href=\"https://doi.org/10.1109/ACCESS.2021.3131213\">10.1109/ACCESS.2021.3131213</a>","chicago":"Jakobs, Marie-Christine, Felix Pauck, Marco Platzner, Heike Wehrheim, and Tobias Wiersema. “Software/Hardware Co-Verification for Custom Instruction Set Processors.” <i>IEEE Access</i>, 2021. <a href=\"https://doi.org/10.1109/ACCESS.2021.3131213\">https://doi.org/10.1109/ACCESS.2021.3131213</a>.","ieee":"M.-C. Jakobs, F. Pauck, M. Platzner, H. Wehrheim, and T. Wiersema, “Software/Hardware Co-Verification for Custom Instruction Set Processors,” <i>IEEE Access</i>, 2021, doi: <a href=\"https://doi.org/10.1109/ACCESS.2021.3131213\">10.1109/ACCESS.2021.3131213</a>.","mla":"Jakobs, Marie-Christine, et al. “Software/Hardware Co-Verification for Custom Instruction Set Processors.” <i>IEEE Access</i>, IEEE, 2021, doi:<a href=\"https://doi.org/10.1109/ACCESS.2021.3131213\">10.1109/ACCESS.2021.3131213</a>.","bibtex":"@article{Jakobs_Pauck_Platzner_Wehrheim_Wiersema_2021, title={Software/Hardware Co-Verification for Custom Instruction Set Processors}, DOI={<a href=\"https://doi.org/10.1109/ACCESS.2021.3131213\">10.1109/ACCESS.2021.3131213</a>}, journal={IEEE Access}, publisher={IEEE}, author={Jakobs, Marie-Christine and Pauck, Felix and Platzner, Marco and Wehrheim, Heike and Wiersema, Tobias}, year={2021} }","short":"M.-C. Jakobs, F. Pauck, M. Platzner, H. Wehrheim, T. Wiersema, IEEE Access (2021).","apa":"Jakobs, M.-C., Pauck, F., Platzner, M., Wehrheim, H., &#38; Wiersema, T. (2021). Software/Hardware Co-Verification for Custom Instruction Set Processors. <i>IEEE Access</i>. <a href=\"https://doi.org/10.1109/ACCESS.2021.3131213\">https://doi.org/10.1109/ACCESS.2021.3131213</a>"},"date_updated":"2023-01-18T08:34:50Z","publisher":"IEEE","date_created":"2021-11-25T14:12:22Z","author":[{"first_name":"Marie-Christine","full_name":"Jakobs, Marie-Christine","last_name":"Jakobs"},{"id":"22398","full_name":"Pauck, Felix","last_name":"Pauck","first_name":"Felix"},{"first_name":"Marco","id":"398","full_name":"Platzner, Marco","last_name":"Platzner"},{"id":"573","full_name":"Wehrheim, Heike","last_name":"Wehrheim","first_name":"Heike"},{"first_name":"Tobias","last_name":"Wiersema","full_name":"Wiersema, Tobias","id":"3118"}],"title":"Software/Hardware Co-Verification for Custom Instruction Set Processors","doi":"10.1109/ACCESS.2021.3131213","publication":"IEEE Access","type":"journal_article","abstract":[{"text":"Verification of software and processor hardware usually proceeds separately, software analysis relying on the correctness of processors executing machine instructions. This assumption is valid as long as the software runs on standard CPUs that have been extensively validated and are in wide use. However, for processors exploiting custom instruction set extensions to meet performance and energy constraints the validation might be less extensive, challenging the correctness assumption. In this paper we present a novel formal approach for hardware/software co-verification targeting processors with custom instruction set extensions. We detail two different approaches for checking whether the hardware fulfills the requirements expected by the software analysis. The approaches are designed to explore a trade-off between generality of the verification and computational effort. Then, we describe the integration of software and hardware analyses for both techniques and describe a fully automated tool chain implementing the approaches. Finally, we demonstrate and compare the two approaches on example source code with custom instructions, using state-of-the-art software analysis and hardware verification techniques.","lang":"eng"}],"status":"public","_id":"27841","project":[{"_id":"1","name":"SFB 901"},{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"12","name":"SFB 901 - Subproject B4"}],"department":[{"_id":"78"}],"user_id":"22398","keyword":["Software Analysis","Abstract Interpretation","Custom Instruction","Hardware Verification"],"language":[{"iso":"eng"}],"funded_apc":"1"},{"citation":{"ama":"Witschen LM, Wiersema T, Platzner M. Proof-carrying Approximate Circuits. <i>IEEE Transactions On Very Large Scale Integration Systems</i>. 2020;28(9):2084-2088. doi:<a href=\"https://doi.org/10.1109/TVLSI.2020.3008061\">10.1109/TVLSI.2020.3008061</a>","ieee":"L. M. Witschen, T. Wiersema, and M. Platzner, “Proof-carrying Approximate Circuits,” <i>IEEE Transactions On Very Large Scale Integration Systems</i>, vol. 28, no. 9, pp. 2084–2088, 2020.","chicago":"Witschen, Linus Matthias, Tobias Wiersema, and Marco Platzner. “Proof-Carrying Approximate Circuits.” <i>IEEE Transactions On Very Large Scale Integration Systems</i> 28, no. 9 (2020): 2084–88. <a href=\"https://doi.org/10.1109/TVLSI.2020.3008061\">https://doi.org/10.1109/TVLSI.2020.3008061</a>.","apa":"Witschen, L. M., Wiersema, T., &#38; Platzner, M. (2020). Proof-carrying Approximate Circuits. <i>IEEE Transactions On Very Large Scale Integration Systems</i>, <i>28</i>(9), 2084–2088. <a href=\"https://doi.org/10.1109/TVLSI.2020.3008061\">https://doi.org/10.1109/TVLSI.2020.3008061</a>","bibtex":"@article{Witschen_Wiersema_Platzner_2020, title={Proof-carrying Approximate Circuits}, volume={28}, DOI={<a href=\"https://doi.org/10.1109/TVLSI.2020.3008061\">10.1109/TVLSI.2020.3008061</a>}, number={9}, journal={IEEE Transactions On Very Large Scale Integration Systems}, publisher={IEEE}, author={Witschen, Linus Matthias and Wiersema, Tobias and Platzner, Marco}, year={2020}, pages={2084–2088} }","mla":"Witschen, Linus Matthias, et al. “Proof-Carrying Approximate Circuits.” <i>IEEE Transactions On Very Large Scale Integration Systems</i>, vol. 28, no. 9, IEEE, 2020, pp. 2084–88, doi:<a href=\"https://doi.org/10.1109/TVLSI.2020.3008061\">10.1109/TVLSI.2020.3008061</a>.","short":"L.M. Witschen, T. Wiersema, M. Platzner, IEEE Transactions On Very Large Scale Integration Systems 28 (2020) 2084–2088."},"intvolume":"        28","page":"2084 - 2088","publication_status":"published","publication_identifier":{"issn":["1063-8210"],"eissn":["1557-9999"]},"doi":"10.1109/TVLSI.2020.3008061","date_updated":"2022-01-06T06:53:09Z","author":[{"first_name":"Linus Matthias","id":"49051","full_name":"Witschen, Linus Matthias","last_name":"Witschen"},{"id":"3118","full_name":"Wiersema, Tobias","last_name":"Wiersema","first_name":"Tobias"},{"first_name":"Marco","last_name":"Platzner","full_name":"Platzner, Marco","id":"398"}],"volume":28,"status":"public","type":"journal_article","article_type":"original","funded_apc":"1","project":[{"name":"SFB 901 - Subproject B4","_id":"12"},{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"1","name":"SFB 901"}],"_id":"17358","user_id":"49051","department":[{"_id":"78"}],"year":"2020","quality_controlled":"1","issue":"9","title":"Proof-carrying Approximate Circuits","publisher":"IEEE","date_created":"2020-07-06T11:21:30Z","abstract":[{"text":"Approximate circuits trade-off computational accuracy against improvements in hardware area, delay, or energy consumption. IP core vendors who wish to create such circuits need to convince consumers of the resulting approximation quality. As a solution we propose proof-carrying approximate circuits: The vendor creates an approximate IP core together with a certificate that proves the approximation quality. The proof certificate is bundled with the approximate IP core and sent off to the consumer. The consumer can formally verify the approximation quality of the IP core at a fraction of the typical computational cost for formal verification. In this paper, we first make the case for proof-carrying approximate circuits and then demonstrate the feasibility of the approach by a set of synthesis experiments using an exemplary approximation framework.","lang":"eng"}],"publication":"IEEE Transactions On Very Large Scale Integration Systems","keyword":["Approximate circuit synthesis","approximate computing","error metrics","formal verification","proof-carrying hardware"],"language":[{"iso":"eng"}]},{"date_created":"2020-04-25T08:02:07Z","author":[{"last_name":"Witschen","full_name":"Witschen, Linus Matthias","id":"49051","first_name":"Linus Matthias"},{"id":"61186","full_name":"Ghasemzadeh Mohammadi, Hassan","last_name":"Ghasemzadeh Mohammadi","first_name":"Hassan"},{"full_name":"Artmann, Matthias","last_name":"Artmann","first_name":"Matthias"},{"first_name":"Marco","last_name":"Platzner","full_name":"Platzner, Marco","id":"398"}],"date_updated":"2022-01-06T06:52:57Z","title":"Jump Search: A Fast Technique for the Synthesis of Approximate Circuits","has_accepted_license":"1","publication_status":"accepted","page":"2","citation":{"ieee":"L. M. Witschen, H. Ghasemzadeh Mohammadi, M. Artmann, and M. Platzner, “Jump Search: A Fast Technique for the Synthesis of Approximate Circuits,” <i>Fourth Workshop on Approximate Computing (AxC 2019)</i>. .","chicago":"Witschen, Linus Matthias, Hassan Ghasemzadeh Mohammadi, Matthias Artmann, and Marco Platzner. “Jump Search: A Fast Technique for the Synthesis of Approximate Circuits.” <i>Fourth Workshop on Approximate Computing (AxC 2019)</i>, n.d.","ama":"Witschen LM, Ghasemzadeh Mohammadi H, Artmann M, Platzner M. Jump Search: A Fast Technique for the Synthesis of Approximate Circuits. <i>Fourth Workshop on Approximate Computing (AxC 2019)</i>.","apa":"Witschen, L. M., Ghasemzadeh Mohammadi, H., Artmann, M., &#38; Platzner, M. (n.d.). Jump Search: A Fast Technique for the Synthesis of Approximate Circuits. <i>Fourth Workshop on Approximate Computing (AxC 2019)</i>.","short":"L.M. Witschen, H. Ghasemzadeh Mohammadi, M. Artmann, M. Platzner, Fourth Workshop on Approximate Computing (AxC 2019) (n.d.).","bibtex":"@article{Witschen_Ghasemzadeh Mohammadi_Artmann_Platzner, title={Jump Search: A Fast Technique for the Synthesis of Approximate Circuits}, journal={Fourth Workshop on Approximate Computing (AxC 2019)}, author={Witschen, Linus Matthias and Ghasemzadeh Mohammadi, Hassan and Artmann, Matthias and Platzner, Marco} }","mla":"Witschen, Linus Matthias, et al. “Jump Search: A Fast Technique for the Synthesis of Approximate Circuits.” <i>Fourth Workshop on Approximate Computing (AxC 2019)</i>."},"year":"2019","department":[{"_id":"78"}],"user_id":"49051","_id":"16853","project":[{"_id":"52","name":"Computing Resources Provided by the Paderborn Center for Parallel Computing"}],"language":[{"iso":"eng"}],"file_date_updated":"2020-04-25T08:00:35Z","keyword":["Approximate computing","parameter selection","search space exploration","verification","circuit synthesis"],"ddc":["006"],"publication":"Fourth Workshop on Approximate Computing (AxC 2019)","type":"preprint","status":"public","file":[{"file_size":152806,"file_id":"16854","access_level":"closed","file_name":"AxC19_paper_3.pdf","date_updated":"2020-04-25T08:00:35Z","date_created":"2020-04-25T08:00:35Z","creator":"witschen","success":1,"relation":"main_file","content_type":"application/pdf"}],"abstract":[{"text":"State-of-the-art frameworks for generating approximate circuits usually rely on information gained through circuit synthesis and/or verification to explore the search space and to find an optimal solution. Throughout the process, a large number of circuits may be subject to processing, leading to considerable runtimes. In this work, we propose a search which takes error bounds and pre-computed impact factors into account to reduce the number of invoked synthesis and verification processes. In our experimental results, we achieved speed-ups of up to 76x while area savings remain comparable to the reference search method, simulated annealing.","lang":"eng"}]},{"_id":"1097","project":[{"_id":"12","name":"SFB 901 - Subproject B4"},{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area B","_id":"3"}],"department":[{"_id":"78"}],"user_id":"477","keyword":["Approximate Computing","Proof-Carrying Hardware","Formal Veriﬁcation"],"language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:50:54Z","date_created":"2018-01-15T16:48:05Z","author":[{"full_name":"Jentzsch, Felix Paul","last_name":"Jentzsch","first_name":"Felix Paul"}],"supervisor":[{"last_name":"Wiersema","full_name":"Wiersema, Tobias","id":"3118","first_name":"Tobias"}],"title":"Enforcing IP Core Connection Properties with Verifiable Security Monitors","year":"2018","citation":{"ama":"Jentzsch FP. <i>Enforcing IP Core Connection Properties with Verifiable Security Monitors</i>. Universität Paderborn; 2018.","chicago":"Jentzsch, Felix Paul. <i>Enforcing IP Core Connection Properties with Verifiable Security Monitors</i>. Universität Paderborn, 2018.","ieee":"F. P. Jentzsch, <i>Enforcing IP Core Connection Properties with Verifiable Security Monitors</i>. Universität Paderborn, 2018.","mla":"Jentzsch, Felix Paul. <i>Enforcing IP Core Connection Properties with Verifiable Security Monitors</i>. Universität Paderborn, 2018.","short":"F.P. Jentzsch, Enforcing IP Core Connection Properties with Verifiable Security Monitors, Universität Paderborn, 2018.","bibtex":"@book{Jentzsch_2018, title={Enforcing IP Core Connection Properties with Verifiable Security Monitors}, publisher={Universität Paderborn}, author={Jentzsch, Felix Paul}, year={2018} }","apa":"Jentzsch, F. P. (2018). <i>Enforcing IP Core Connection Properties with Verifiable Security Monitors</i>. Universität Paderborn."}},{"date_updated":"2023-01-16T11:44:06Z","date_created":"2023-01-16T11:43:50Z","author":[{"full_name":"Kuznik, Christoph","last_name":"Kuznik","first_name":"Christoph"},{"full_name":"Müller, Wolfgang","id":"16243","last_name":"Müller","first_name":"Wolfgang"},{"last_name":"Defo","full_name":"Defo, Gilles Bertrand","first_name":"Gilles Bertrand"}],"title":"An Assisted Single Source Verification Metric Model Code Generation Methodology","conference":{"name":"Proceedings of the Electronic System Level Synthesis Conference (ESLSyn)"},"year":"2014","place":"San Francisco, USA","citation":{"apa":"Kuznik, C., Müller, W., &#38; Defo, G. B. (2014). <i>An Assisted Single Source Verification Metric Model Code Generation Methodology</i>. Proceedings of the Electronic System Level Synthesis Conference (ESLSyn).","mla":"Kuznik, Christoph, et al. <i>An Assisted Single Source Verification Metric Model Code Generation Methodology</i>. 2014.","short":"C. Kuznik, W. Müller, G.B. Defo, in: San Francisco, USA, 2014.","bibtex":"@inproceedings{Kuznik_Müller_Defo_2014, place={San Francisco, USA}, title={An Assisted Single Source Verification Metric Model Code Generation Methodology}, author={Kuznik, Christoph and Müller, Wolfgang and Defo, Gilles Bertrand}, year={2014} }","ieee":"C. Kuznik, W. Müller, and G. B. Defo, “An Assisted Single Source Verification Metric Model Code Generation Methodology,” presented at the Proceedings of the Electronic System Level Synthesis Conference (ESLSyn), 2014.","chicago":"Kuznik, Christoph, Wolfgang Müller, and Gilles Bertrand Defo. “An Assisted Single Source Verification Metric Model Code Generation Methodology.” San Francisco, USA, 2014.","ama":"Kuznik C, Müller W, Defo GB. An Assisted Single Source Verification Metric Model Code Generation Methodology. In: ; 2014."},"_id":"36917","user_id":"5786","department":[{"_id":"58"}],"keyword":["System Design","Verification"],"language":[{"iso":"eng"}],"type":"conference","abstract":[{"lang":"eng","text":"The ever-increasing complexity of heterogeneous electronic systems demand for intensified abstraction and automation efforts to improve design, verification and validation productivity, especially in earlier phases of system engineering. Within the verification activity various metrics can be applied to determine functional correctness or the overall progress. Here, a supporting verification methodology defining high-level verification planning down to the actual metric code development is essential. Moreover, an advanced assistance for the designer, such as a tooling infrastructure to automatize and accelerate the metric code implementation, is needed to minimize the influence of errorprone manual coding. In this article we present a single-source verification metric code-generation methodology for improved coverage automation. We determine (i) a suitable metric model for model-based capture of verification metrics as well as (ii) an assisted model-based processing and generation flow of the verification environment and metric skeletons. We apply our method to a SystemC case-study, in doing so, targeting metric code implementation productivity and consistency enhancement."}],"status":"public"},{"_id":"34585","user_id":"15931","department":[{"_id":"58"}],"keyword":["System Design","Verification"],"language":[{"iso":"eng"}],"type":"conference","publication":"Proceedings of the Design and Verification Conference Europe (DVCON Europe)","abstract":[{"lang":"eng","text":"In this paper, we present an efficient approach to virtual platform modeling for TriCore-based SoCs by combining fast and open software emulation with IEEE-1666 Standard SystemC simulation.  For evaluation we consider Infineon's recently introduced AURIX processor family as a target platform, which utilizes multiple CPU cores operating in lockstep mode, memories, hierarchical buses, and a rich set of peripherals. For SoC prototyping, we integrate the fast and open instruction accurate QEMU software emulator with the TLMu library for SystemC co-verification. This article reports our most recent efforts of the implementation of the TriCore instruction set for QEMU. The experimental results demonstrate the functional correctness and performance of our TriCore implementation."}],"status":"public","date_updated":"2023-02-01T08:12:02Z","author":[{"last_name":"Koppelmann","id":"25260","full_name":"Koppelmann, Bastian","first_name":"Bastian"},{"first_name":"Bernd","full_name":"Messidat, Bernd","last_name":"Messidat"},{"last_name":"Becker","full_name":"Becker, Markus","first_name":"Markus"},{"first_name":"Wolfgang","last_name":"Müller","full_name":"Müller, Wolfgang","id":"16243"},{"id":"37144","full_name":"Scheytt, J. Christoph","orcid":"https://orcid.org/0000-0002-5950-6618","last_name":"Scheytt","first_name":"J. Christoph"}],"date_created":"2022-12-20T10:48:25Z","title":"Fast and Open Virtual Platforms for TriCore-based SoCs Using QEMU","year":"2014","place":"München","citation":{"ama":"Koppelmann B, Messidat B, Becker M, Müller W, Scheytt JC. Fast and Open Virtual Platforms for TriCore-based SoCs Using QEMU. In: <i>Proceedings of the Design and Verification Conference Europe (DVCON Europe)</i>. ; 2014.","chicago":"Koppelmann, Bastian, Bernd Messidat, Markus Becker, Wolfgang Müller, and J. Christoph Scheytt. “Fast and Open Virtual Platforms for TriCore-Based SoCs Using QEMU.” In <i>Proceedings of the Design and Verification Conference Europe (DVCON Europe)</i>. München, 2014.","ieee":"B. Koppelmann, B. Messidat, M. Becker, W. Müller, and J. C. Scheytt, “Fast and Open Virtual Platforms for TriCore-based SoCs Using QEMU,” 2014.","apa":"Koppelmann, B., Messidat, B., Becker, M., Müller, W., &#38; Scheytt, J. C. (2014). Fast and Open Virtual Platforms for TriCore-based SoCs Using QEMU. <i>Proceedings of the Design and Verification Conference Europe (DVCON Europe)</i>.","bibtex":"@inproceedings{Koppelmann_Messidat_Becker_Müller_Scheytt_2014, place={München}, title={Fast and Open Virtual Platforms for TriCore-based SoCs Using QEMU}, booktitle={Proceedings of the Design and Verification Conference Europe (DVCON Europe)}, author={Koppelmann, Bastian and Messidat, Bernd and Becker, Markus and Müller, Wolfgang and Scheytt, J. Christoph}, year={2014} }","short":"B. Koppelmann, B. Messidat, M. Becker, W. Müller, J.C. Scheytt, in: Proceedings of the Design and Verification Conference Europe (DVCON Europe), München, 2014.","mla":"Koppelmann, Bastian, et al. “Fast and Open Virtual Platforms for TriCore-Based SoCs Using QEMU.” <i>Proceedings of the Design and Verification Conference Europe (DVCON Europe)</i>, 2014."}},{"abstract":[{"lang":"eng","text":"In this paper, we present an efficient approach to virtual platform modeling for TriCore-based SoCs by combining fast and open software emulation with IEEE-1666 Standard SystemC simulation.  For evaluation we consider Infineon's recently introduced AURIX processor family as a target platform, which utilizes multiple CPU cores operating in lockstep mode, memories, hierarchical buses, and a rich set of peripherals. For SoC prototyping, we integrate the fast and open instruction accurate QEMU software emulator with the TLMu library for SystemC co-verification. This article reports our most recent efforts of the implementation of the TriCore instruction set for QEMU. The experimental results demonstrate the functional correctness and performance of our TriCore implementation."}],"status":"public","type":"conference","publication":"Proceedings of the Design and Verification Conference Europe (DVCON Europe)","keyword":["System Design","Verification"],"language":[{"iso":"eng"}],"_id":"34583","user_id":"16243","department":[{"_id":"58"}],"year":"2014","place":"München","citation":{"chicago":"Koppelmann, Bastian, Bernd Messidat, Christoph Kuznik, Wolfgang Müller, Markus Becker, and J. Christoph Scheytt. “Fast and Open Virtual Platforms for TriCore-Based SoCs Using QEMU.” In <i>Proceedings of the Design and Verification Conference Europe (DVCON Europe)</i>. München, 2014.","ieee":"B. Koppelmann, B. Messidat, C. Kuznik, W. Müller, M. Becker, and J. C. Scheytt, “Fast and Open Virtual Platforms for TriCore-based SoCs Using QEMU,” 2014.","ama":"Koppelmann B, Messidat B, Kuznik C, Müller W, Becker M, Scheytt JC. Fast and Open Virtual Platforms for TriCore-based SoCs Using QEMU. In: <i>Proceedings of the Design and Verification Conference Europe (DVCON Europe)</i>. ; 2014.","bibtex":"@inproceedings{Koppelmann_Messidat_Kuznik_Müller_Becker_Scheytt_2014, place={München}, title={Fast and Open Virtual Platforms for TriCore-based SoCs Using QEMU}, booktitle={Proceedings of the Design and Verification Conference Europe (DVCON Europe)}, author={Koppelmann, Bastian and Messidat, Bernd and Kuznik, Christoph and Müller, Wolfgang and Becker, Markus and Scheytt, J. Christoph}, year={2014} }","short":"B. Koppelmann, B. Messidat, C. Kuznik, W. Müller, M. Becker, J.C. Scheytt, in: Proceedings of the Design and Verification Conference Europe (DVCON Europe), München, 2014.","mla":"Koppelmann, Bastian, et al. “Fast and Open Virtual Platforms for TriCore-Based SoCs Using QEMU.” <i>Proceedings of the Design and Verification Conference Europe (DVCON Europe)</i>, 2014.","apa":"Koppelmann, B., Messidat, B., Kuznik, C., Müller, W., Becker, M., &#38; Scheytt, J. C. (2014). Fast and Open Virtual Platforms for TriCore-based SoCs Using QEMU. <i>Proceedings of the Design and Verification Conference Europe (DVCON Europe)</i>."},"title":"Fast and Open Virtual Platforms for TriCore-based SoCs Using QEMU","date_updated":"2025-02-26T14:42:18Z","date_created":"2022-12-20T10:45:38Z","author":[{"first_name":"Bastian","id":"25260","full_name":"Koppelmann, Bastian","last_name":"Koppelmann"},{"full_name":"Messidat, Bernd","last_name":"Messidat","first_name":"Bernd"},{"first_name":"Christoph","last_name":"Kuznik","full_name":"Kuznik, Christoph"},{"first_name":"Wolfgang","id":"16243","full_name":"Müller, Wolfgang","last_name":"Müller"},{"last_name":"Becker","full_name":"Becker, Markus","first_name":"Markus"},{"full_name":"Scheytt, J. Christoph","id":"37144","orcid":"https://orcid.org/0000-0002-5950-6618","last_name":"Scheytt","first_name":"J. Christoph"}]},{"_id":"2370","department":[{"_id":"27"},{"_id":"518"}],"user_id":"15278","keyword":["WSN","testing","verification"],"language":[{"iso":"eng"}],"publication":"IEEE Int. Conf. on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC)","type":"conference","status":"public","date_updated":"2023-09-26T13:55:02Z","publisher":"IEEE Computer Society","author":[{"first_name":"Matthias","full_name":"Woehrle, Matthias","last_name":"Woehrle"},{"full_name":"Plessl, Christian","id":"16153","orcid":"0000-0001-5728-9982","last_name":"Plessl","first_name":"Christian"},{"last_name":"Lim","full_name":"Lim, Roman","first_name":"Roman"},{"full_name":"Beutel, Jan","last_name":"Beutel","first_name":"Jan"},{"last_name":"Thiele","full_name":"Thiele, Lothar","first_name":"Lothar"}],"date_created":"2018-04-17T12:03:20Z","title":"EvAnT: Analysis and Checking of event traces for Wireless Sensor Networks","doi":"10.1109/SUTC.2008.24","quality_controlled":"1","publication_identifier":{"isbn":["978-0-7695-3158-8"]},"place":"Los Alamitos, CA, USA","year":"2008","page":"201-208","citation":{"ama":"Woehrle M, Plessl C, Lim R, Beutel J, Thiele L. EvAnT: Analysis and Checking of event traces for Wireless Sensor Networks. In: <i>IEEE Int. Conf. on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC)</i>. IEEE Computer Society; 2008:201-208. doi:<a href=\"https://doi.org/10.1109/SUTC.2008.24\">10.1109/SUTC.2008.24</a>","chicago":"Woehrle, Matthias, Christian Plessl, Roman Lim, Jan Beutel, and Lothar Thiele. “EvAnT: Analysis and Checking of Event Traces for Wireless Sensor Networks.” In <i>IEEE Int. Conf. on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC)</i>, 201–8. Los Alamitos, CA, USA: IEEE Computer Society, 2008. <a href=\"https://doi.org/10.1109/SUTC.2008.24\">https://doi.org/10.1109/SUTC.2008.24</a>.","ieee":"M. Woehrle, C. Plessl, R. Lim, J. Beutel, and L. Thiele, “EvAnT: Analysis and Checking of event traces for Wireless Sensor Networks,” in <i>IEEE Int. Conf. on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC)</i>, 2008, pp. 201–208, doi: <a href=\"https://doi.org/10.1109/SUTC.2008.24\">10.1109/SUTC.2008.24</a>.","apa":"Woehrle, M., Plessl, C., Lim, R., Beutel, J., &#38; Thiele, L. (2008). EvAnT: Analysis and Checking of event traces for Wireless Sensor Networks. <i>IEEE Int. Conf. on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC)</i>, 201–208. <a href=\"https://doi.org/10.1109/SUTC.2008.24\">https://doi.org/10.1109/SUTC.2008.24</a>","mla":"Woehrle, Matthias, et al. “EvAnT: Analysis and Checking of Event Traces for Wireless Sensor Networks.” <i>IEEE Int. Conf. on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC)</i>, IEEE Computer Society, 2008, pp. 201–08, doi:<a href=\"https://doi.org/10.1109/SUTC.2008.24\">10.1109/SUTC.2008.24</a>.","bibtex":"@inproceedings{Woehrle_Plessl_Lim_Beutel_Thiele_2008, place={Los Alamitos, CA, USA}, title={EvAnT: Analysis and Checking of event traces for Wireless Sensor Networks}, DOI={<a href=\"https://doi.org/10.1109/SUTC.2008.24\">10.1109/SUTC.2008.24</a>}, booktitle={IEEE Int. Conf. on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC)}, publisher={IEEE Computer Society}, author={Woehrle, Matthias and Plessl, Christian and Lim, Roman and Beutel, Jan and Thiele, Lothar}, year={2008}, pages={201–208} }","short":"M. Woehrle, C. Plessl, R. Lim, J. Beutel, L. Thiele, in: IEEE Int. Conf. on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), IEEE Computer Society, Los Alamitos, CA, USA, 2008, pp. 201–208."}},{"publication":"Proc. Int. Conf. Networked Sensing Systems (INSS)","type":"conference","status":"public","_id":"2393","department":[{"_id":"27"},{"_id":"518"}],"user_id":"15278","keyword":["WSN","testing","verification"],"language":[{"iso":"eng"}],"quality_controlled":"1","publication_identifier":{"isbn":["1-4244-1231-5"]},"place":"Piscataway, NJ, USA","year":"2007","page":"303-303","citation":{"short":"J. Beutel, M. Dyer, R. Lim, C. Plessl, M. Woehrle, M. Yuecel, L. Thiele, in: Proc. Int. Conf. Networked Sensing Systems (INSS), IEEE, Piscataway, NJ, USA, 2007, pp. 303–303.","bibtex":"@inproceedings{Beutel_Dyer_Lim_Plessl_Woehrle_Yuecel_Thiele_2007, place={Piscataway, NJ, USA}, title={Automated Wireless Sensor Network Testing}, DOI={<a href=\"https://doi.org/10.1109/INSS.2007.4297445\">10.1109/INSS.2007.4297445</a>}, booktitle={Proc. Int. Conf. Networked Sensing Systems (INSS)}, publisher={IEEE}, author={Beutel, Jan and Dyer, Matthias and Lim, Roman and Plessl, Christian and Woehrle, Matthias and Yuecel, Mustafa and Thiele, Lothar}, year={2007}, pages={303–303} }","mla":"Beutel, Jan, et al. “Automated Wireless Sensor Network Testing.” <i>Proc. Int. Conf. Networked Sensing Systems (INSS)</i>, IEEE, 2007, pp. 303–303, doi:<a href=\"https://doi.org/10.1109/INSS.2007.4297445\">10.1109/INSS.2007.4297445</a>.","apa":"Beutel, J., Dyer, M., Lim, R., Plessl, C., Woehrle, M., Yuecel, M., &#38; Thiele, L. (2007). Automated Wireless Sensor Network Testing. <i>Proc. Int. Conf. Networked Sensing Systems (INSS)</i>, 303–303. <a href=\"https://doi.org/10.1109/INSS.2007.4297445\">https://doi.org/10.1109/INSS.2007.4297445</a>","chicago":"Beutel, Jan, Matthias Dyer, Roman Lim, Christian Plessl, Matthias Woehrle, Mustafa Yuecel, and Lothar Thiele. “Automated Wireless Sensor Network Testing.” In <i>Proc. Int. Conf. Networked Sensing Systems (INSS)</i>, 303–303. Piscataway, NJ, USA: IEEE, 2007. <a href=\"https://doi.org/10.1109/INSS.2007.4297445\">https://doi.org/10.1109/INSS.2007.4297445</a>.","ieee":"J. Beutel <i>et al.</i>, “Automated Wireless Sensor Network Testing,” in <i>Proc. Int. Conf. Networked Sensing Systems (INSS)</i>, 2007, pp. 303–303, doi: <a href=\"https://doi.org/10.1109/INSS.2007.4297445\">10.1109/INSS.2007.4297445</a>.","ama":"Beutel J, Dyer M, Lim R, et al. Automated Wireless Sensor Network Testing. In: <i>Proc. Int. Conf. Networked Sensing Systems (INSS)</i>. IEEE; 2007:303-303. doi:<a href=\"https://doi.org/10.1109/INSS.2007.4297445\">10.1109/INSS.2007.4297445</a>"},"publisher":"IEEE","date_updated":"2023-09-26T14:00:58Z","author":[{"full_name":"Beutel, Jan","last_name":"Beutel","first_name":"Jan"},{"first_name":"Matthias","last_name":"Dyer","full_name":"Dyer, Matthias"},{"first_name":"Roman","full_name":"Lim, Roman","last_name":"Lim"},{"orcid":"0000-0001-5728-9982","last_name":"Plessl","full_name":"Plessl, Christian","id":"16153","first_name":"Christian"},{"last_name":"Woehrle","full_name":"Woehrle, Matthias","first_name":"Matthias"},{"first_name":"Mustafa","last_name":"Yuecel","full_name":"Yuecel, Mustafa"},{"first_name":"Lothar","last_name":"Thiele","full_name":"Thiele, Lothar"}],"date_created":"2018-04-17T13:35:55Z","title":"Automated Wireless Sensor Network Testing","doi":"10.1109/INSS.2007.4297445"},{"author":[{"last_name":"Flake","full_name":"Flake, Stephan","first_name":"Stephan"},{"first_name":"Wolfgang","last_name":"Müller","full_name":"Müller, Wolfgang","id":"16243"}],"date_created":"2023-01-24T09:03:36Z","publisher":"IEEE","date_updated":"2023-01-24T09:03:41Z","conference":{"name":" Proceedings of the Second International Conference on Software Engineering and Formal Methods"},"doi":"10.1109/SEFM.2004.1347516","title":"Past- and Future-Oriented Time-Bound Temporal Properties with OCL","publication_identifier":{"isbn":["0-7695-2222-X"]},"citation":{"bibtex":"@inproceedings{Flake_Müller_2004, place={Beijing, China}, title={Past- and Future-Oriented Time-Bound Temporal Properties with OCL}, DOI={<a href=\"https://doi.org/10.1109/SEFM.2004.1347516\">10.1109/SEFM.2004.1347516</a>}, booktitle={Proceedings of SEFM´04}, publisher={IEEE}, author={Flake, Stephan and Müller, Wolfgang}, year={2004} }","short":"S. Flake, W. Müller, in: Proceedings of SEFM´04, IEEE, Beijing, China, 2004.","mla":"Flake, Stephan, and Wolfgang Müller. “Past- and Future-Oriented Time-Bound Temporal Properties with OCL.” <i>Proceedings of SEFM´04</i>, IEEE, 2004, doi:<a href=\"https://doi.org/10.1109/SEFM.2004.1347516\">10.1109/SEFM.2004.1347516</a>.","apa":"Flake, S., &#38; Müller, W. (2004). Past- and Future-Oriented Time-Bound Temporal Properties with OCL. <i>Proceedings of SEFM´04</i>.  Proceedings of the Second International Conference on Software Engineering and Formal Methods. <a href=\"https://doi.org/10.1109/SEFM.2004.1347516\">https://doi.org/10.1109/SEFM.2004.1347516</a>","ieee":"S. Flake and W. Müller, “Past- and Future-Oriented Time-Bound Temporal Properties with OCL,” presented at the  Proceedings of the Second International Conference on Software Engineering and Formal Methods, 2004, doi: <a href=\"https://doi.org/10.1109/SEFM.2004.1347516\">10.1109/SEFM.2004.1347516</a>.","chicago":"Flake, Stephan, and Wolfgang Müller. “Past- and Future-Oriented Time-Bound Temporal Properties with OCL.” In <i>Proceedings of SEFM´04</i>. Beijing, China: IEEE, 2004. <a href=\"https://doi.org/10.1109/SEFM.2004.1347516\">https://doi.org/10.1109/SEFM.2004.1347516</a>.","ama":"Flake S, Müller W. Past- and Future-Oriented Time-Bound Temporal Properties with OCL. In: <i>Proceedings of SEFM´04</i>. IEEE; 2004. doi:<a href=\"https://doi.org/10.1109/SEFM.2004.1347516\">10.1109/SEFM.2004.1347516</a>"},"place":"Beijing, China","year":"2004","user_id":"5786","department":[{"_id":"672"}],"_id":"39069","language":[{"iso":"eng"}],"keyword":["Unified modeling language","Logic","Clocks","Boolean functions","Application software","Time factors","Real time systems","Formal verification","Buffer storage","Software packages"],"type":"conference","publication":"Proceedings of SEFM´04","status":"public","abstract":[{"lang":"eng","text":"We present the syntax and semantics of a past- and future-oriented temporal extension of the Object Constraint Language (OCL). Our extension supports designers to express time-bounded properties over a state-oriented UML model of a system under development. The semantics is formally defined over the system states of a mathematical object model. Additionally, we present a mapping to Clocked Linear Temporal Logic (Clocked LTL) formulae, which is the basis for further application in verification with model checking. We demonstrate the applicability of the approach by the example of a buffer specification in the context of a production system."}]},{"place":"Nagoya, Japan","year":"2002","citation":{"short":"W. Müller, R. Dömer, A. Gerstlauer, in: Proceedings of the ISSS02, Nagoya, Japan, 2002.","bibtex":"@inproceedings{Müller_Dömer_Gerstlauer_2002, place={Nagoya, Japan}, title={The Formal Execution Semantics of SpecC}, DOI={<a href=\"https://doi.org/10.1145/581199.581234 \">10.1145/581199.581234 </a>}, booktitle={Proceedings of the ISSS02}, author={Müller, Wolfgang and Dömer, Rainer and Gerstlauer, Andreas}, year={2002} }","mla":"Müller, Wolfgang, et al. “The Formal Execution Semantics of SpecC.” <i>Proceedings of the ISSS02</i>, 2002, doi:<a href=\"https://doi.org/10.1145/581199.581234 \">10.1145/581199.581234 </a>.","apa":"Müller, W., Dömer, R., &#38; Gerstlauer, A. (2002). The Formal Execution Semantics of SpecC. <i>Proceedings of the ISSS02</i>. <a href=\"https://doi.org/10.1145/581199.581234 \">https://doi.org/10.1145/581199.581234 </a>","ama":"Müller W, Dömer R, Gerstlauer A. The Formal Execution Semantics of SpecC. In: <i>Proceedings of the ISSS02</i>. ; 2002. doi:<a href=\"https://doi.org/10.1145/581199.581234 \">10.1145/581199.581234 </a>","ieee":"W. Müller, R. Dömer, and A. Gerstlauer, “The Formal Execution Semantics of SpecC,” 2002, doi: <a href=\"https://doi.org/10.1145/581199.581234 \">10.1145/581199.581234 </a>.","chicago":"Müller, Wolfgang, Rainer Dömer, and Andreas Gerstlauer. “The Formal Execution Semantics of SpecC.” In <i>Proceedings of the ISSS02</i>. Nagoya, Japan, 2002. <a href=\"https://doi.org/10.1145/581199.581234 \">https://doi.org/10.1145/581199.581234 </a>."},"publication_identifier":{"isbn":["1-58113-576-9"]},"title":"The Formal Execution Semantics of SpecC","doi":"10.1145/581199.581234 ","date_updated":"2023-01-24T10:10:28Z","author":[{"id":"16243","full_name":"Müller, Wolfgang","last_name":"Müller","first_name":"Wolfgang"},{"last_name":"Dömer","full_name":"Dömer, Rainer","first_name":"Rainer"},{"first_name":"Andreas","last_name":"Gerstlauer","full_name":"Gerstlauer, Andreas"}],"date_created":"2023-01-24T10:10:24Z","abstract":[{"text":"We present a rigorous but transparent semantics definition of the SpecC language that covers the execution of SpecC behaviors and their interaction with the kernel process. The semantics include wait, wait for, par, and try statements as they are introduced in SpecC. We present our definition in form of distributed abstract state machine (ASM) rules strictly following the lines of the SpecC Language Reference Manual. We mainly see our formal semantics in three application areas. First, it is a concise, unambiguous description for documentation and standardization. Second, it applies as a high-level, pseudo code-oriented specification for the implementation of a SpecC simulator. Finally, it is a first step for SpecC synthesis in order to identify similar concepts with other languages like VHDL and SystemC for the definition of common patterns and language subsets.","lang":"eng"}],"status":"public","publication":"Proceedings of the ISSS02","type":"conference","keyword":["Standardization","Kernel","Permission","Formal verification","Logic functions","Documentation","Reasoning about programs","Specification languages","Formal specifications","Software systems"],"language":[{"iso":"eng"}],"_id":"39382","department":[{"_id":"672"}],"user_id":"5786"},{"year":"2002","place":"Big Island, HI, USA ","citation":{"apa":"Flake, S., &#38; Müller, W. (2002). Specification of Real-Time Properties for UML Models. <i>Proceedings of HICSS-35</i>. Proceedings of the 35th Annual Hawaii International Conference on System Sciences, Big Island, HI, USA . <a href=\"https://doi.org/10.1109/HICSS.2002.994469\">https://doi.org/10.1109/HICSS.2002.994469</a>","short":"S. Flake, W. Müller, in: Proceedings of HICSS-35, Big Island, HI, USA , 2002.","bibtex":"@inproceedings{Flake_Müller_2002, place={Big Island, HI, USA }, title={Specification of Real-Time Properties for UML Models}, DOI={<a href=\"https://doi.org/10.1109/HICSS.2002.994469\">10.1109/HICSS.2002.994469</a>}, booktitle={Proceedings of HICSS-35}, author={Flake, Stephan and Müller, Wolfgang}, year={2002} }","mla":"Flake, Stephan, and Wolfgang Müller. “Specification of Real-Time Properties for UML Models.” <i>Proceedings of HICSS-35</i>, 2002, doi:<a href=\"https://doi.org/10.1109/HICSS.2002.994469\">10.1109/HICSS.2002.994469</a>.","ieee":"S. Flake and W. Müller, “Specification of Real-Time Properties for UML Models,” presented at the Proceedings of the 35th Annual Hawaii International Conference on System Sciences, Big Island, HI, USA , 2002, doi: <a href=\"https://doi.org/10.1109/HICSS.2002.994469\">10.1109/HICSS.2002.994469</a>.","chicago":"Flake, Stephan, and Wolfgang Müller. “Specification of Real-Time Properties for UML Models.” In <i>Proceedings of HICSS-35</i>. Big Island, HI, USA , 2002. <a href=\"https://doi.org/10.1109/HICSS.2002.994469\">https://doi.org/10.1109/HICSS.2002.994469</a>.","ama":"Flake S, Müller W. Specification of Real-Time Properties for UML Models. In: <i>Proceedings of HICSS-35</i>. ; 2002. doi:<a href=\"https://doi.org/10.1109/HICSS.2002.994469\">10.1109/HICSS.2002.994469</a>"},"publication_identifier":{"isbn":["0-7695-1435-9"]},"title":"Specification of Real-Time Properties for UML Models","conference":{"location":"Big Island, HI, USA ","name":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences"},"doi":"10.1109/HICSS.2002.994469","date_updated":"2023-01-24T10:22:16Z","author":[{"first_name":"Stephan","last_name":"Flake","full_name":"Flake, Stephan"},{"first_name":"Wolfgang","last_name":"Müller","id":"16243","full_name":"Müller, Wolfgang"}],"date_created":"2023-01-24T10:22:12Z","abstract":[{"lang":"eng","text":"The Unified Modeling Language (UML) has received wide acceptance as a standard language in the field of software specification by means of different diagram types. In a recent version of UML, the textual Object Constraint Language (OCL) was introduced to support specification of constraints for UML models. But OCL currently does not provide sufficient means to specify constraints over the dynamic behavior of a model. This article presents an OCL extension that is consistent with current OCL and enables modelers to specify state-related time-bounded constraints. We consider the case study of a flexible manufacturing system and identify typical real-time constraints. The constraints are presented in our temporal OCL extension as well as in temporal logic formulae. For general application, we define a semantics of our OCL extension by means of a time-bounded temporal logic based on Computational Tree Logic (CTL)."}],"status":"public","publication":"Proceedings of HICSS-35","type":"conference","keyword":["Unified modeling language","Logic","Formal verification","Real time systems","Programming profession","Vehicle dynamics","Software standards","Flexible manufacturing systems","Electronics industry","Protocols"],"language":[{"iso":"eng"}],"_id":"39403","department":[{"_id":"672"}],"user_id":"5786"},{"keyword":["Yarn","Formal verification","Kernel","Hardware design languages","Electronic design automation and methodology","Algebra","Computational modeling","Logic functions","Computer languages","Clocks"],"language":[{"iso":"eng"}],"_id":"39421","department":[{"_id":"672"}],"user_id":"5786","abstract":[{"lang":"eng","text":"We present a rigorous but transparent semantics definition of SystemC that covers method, thread, and clocked thread behavior as well as their interaction with the simulation kernel process. The semantics includes watching statements, signal assignment, and wait statements as they are introduced in SystemC V1.O. We present our definition in form of distributed Abstract State Machines (ASMs) rules reflecting the view given in the SystemC User's Manual and the reference implementation. We mainly see our formal semantics as a concise, unambiguous, high-level specification for SystemC-based implementations and for standardization. Additionally, it can be used as a sound basis to investigate SystemC interoperability with Verilog and VHDL."}],"status":"public","publication":"Proceedings of the Design, Automation, and Test in Europe (DATE’01)","type":"conference","title":"The Simulation Semantics of SystemC","doi":"10.1109/DATE.2001.915002","conference":{"name":" Proceedings Design, Automation and Test in Europe. Conference and Exhibition 2001"},"publisher":"IEEE","date_updated":"2023-01-24T10:39:38Z","date_created":"2023-01-24T10:39:33Z","author":[{"last_name":"Müller","full_name":"Müller, Wolfgang","id":"16243","first_name":"Wolfgang"},{"full_name":"Ruf, Jürgen","last_name":"Ruf","first_name":"Jürgen"},{"first_name":"D. W.","last_name":"Hoffmann","full_name":"Hoffmann, D. W."},{"full_name":"Gerlach, Joachim","last_name":"Gerlach","first_name":"Joachim"},{"last_name":"Kropf","full_name":"Kropf, Thomas","first_name":"Thomas"},{"first_name":"W.","full_name":"Rosenstiehl, W.","last_name":"Rosenstiehl"}],"place":"Munich, Germany ","year":"2001","citation":{"ama":"Müller W, Ruf J, Hoffmann DW, Gerlach J, Kropf T, Rosenstiehl W. The Simulation Semantics of SystemC. In: <i>Proceedings of the Design, Automation, and Test in Europe (DATE’01)</i>. IEEE; 2001. doi:<a href=\"https://doi.org/10.1109/DATE.2001.915002\">10.1109/DATE.2001.915002</a>","chicago":"Müller, Wolfgang, Jürgen Ruf, D. W. Hoffmann, Joachim Gerlach, Thomas Kropf, and W. Rosenstiehl. “The Simulation Semantics of SystemC.” In <i>Proceedings of the Design, Automation, and Test in Europe (DATE’01)</i>. Munich, Germany : IEEE, 2001. <a href=\"https://doi.org/10.1109/DATE.2001.915002\">https://doi.org/10.1109/DATE.2001.915002</a>.","ieee":"W. Müller, J. Ruf, D. W. Hoffmann, J. Gerlach, T. Kropf, and W. Rosenstiehl, “The Simulation Semantics of SystemC,” presented at the  Proceedings Design, Automation and Test in Europe. Conference and Exhibition 2001, 2001, doi: <a href=\"https://doi.org/10.1109/DATE.2001.915002\">10.1109/DATE.2001.915002</a>.","short":"W. Müller, J. Ruf, D.W. Hoffmann, J. Gerlach, T. Kropf, W. Rosenstiehl, in: Proceedings of the Design, Automation, and Test in Europe (DATE’01), IEEE, Munich, Germany , 2001.","mla":"Müller, Wolfgang, et al. “The Simulation Semantics of SystemC.” <i>Proceedings of the Design, Automation, and Test in Europe (DATE’01)</i>, IEEE, 2001, doi:<a href=\"https://doi.org/10.1109/DATE.2001.915002\">10.1109/DATE.2001.915002</a>.","bibtex":"@inproceedings{Müller_Ruf_Hoffmann_Gerlach_Kropf_Rosenstiehl_2001, place={Munich, Germany }, title={The Simulation Semantics of SystemC}, DOI={<a href=\"https://doi.org/10.1109/DATE.2001.915002\">10.1109/DATE.2001.915002</a>}, booktitle={Proceedings of the Design, Automation, and Test in Europe (DATE’01)}, publisher={IEEE}, author={Müller, Wolfgang and Ruf, Jürgen and Hoffmann, D. W. and Gerlach, Joachim and Kropf, Thomas and Rosenstiehl, W.}, year={2001} }","apa":"Müller, W., Ruf, J., Hoffmann, D. W., Gerlach, J., Kropf, T., &#38; Rosenstiehl, W. (2001). The Simulation Semantics of SystemC. <i>Proceedings of the Design, Automation, and Test in Europe (DATE’01)</i>.  Proceedings Design, Automation and Test in Europe. Conference and Exhibition 2001. <a href=\"https://doi.org/10.1109/DATE.2001.915002\">https://doi.org/10.1109/DATE.2001.915002</a>"},"publication_identifier":{"isbn":["0-7695-0993-2"]}}]
