Whiteside2013.Pdf (2.096Mb)

Total Page:16

File Type:pdf, Size:1020Kb

Whiteside2013.Pdf (2.096Mb) This thesis has been submitted in fulfilment of the requirements for a postgraduate degree (e.g. PhD, MPhil, DClinPsychol) at the University of Edinburgh. Please note the following terms and conditions of use: • This work is protected by copyright and other intellectual property rights, which are retained by the thesis author, unless otherwise stated. • A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. • This thesis cannot be reproduced or quoted extensively from without first obtaining permission in writing from the author. • The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the author. • When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given. REFACTORINGPROOFS iain johnston whiteside Doctor of Philosophy School of Informatics University of Edinburgh 2013 Iain Johnston Whiteside: Refactoring Proofs, Doctor of Philosophy © 2013 ABSTRACT Refactoring is an important Software Engineering technique for improving the struc- ture of a program after it has been written. Refactorings improve the maintainability, readability, and design of a program without affecting its external behaviour. In anal- ogy, this thesis introduces proof refactoring to make structured, semantics preserving changes to the proof documents constructed by interactive theorem provers as part of a formal proof development. In order to formally study proof refactoring, the first part of this thesis constructs a proof language framework, Hiscript. The Hiscript framework consists of a procedural tactic language, a declarative proof language, and a modular theory language. Each level of this framework is equipped with a formal semantics based on a hierarchical notion of proof trees. Furthermore, this framework is generic as it does not prescribe an underlying logical kernel. This part contributes an investigation of semantics for formal proof documents, which is proved to construct valid proofs. Moreover, in anal- ogy with type-checking, static well-formedness checks of proof documents are sepa- rated from evaluation of the proof. Furthermore, a subset of the SSReflect language for Coq, called eSSence, is also encoded using hierarchical proofs. Both Hiscript and eSSence are shown to have language elements with a natural hierarchical representa- tion. In the second part, proof refactoring is put on a formal footing with a definition using the Hiscript framework. Over thirty refactorings are formally specified and proved to preserve the semantics in a precise way for the Hiscript language, including traditional structural refactorings, such as rename item, and proof specific refactorings such as backwards proof to forwards proof and declarative to procedural. Finally, a concrete, generic refactoring framework, called Polar, is introduced. Polar is based on graph rewriting and has been implemented with over ten refactorings and for two proof languages, including Hiscript. Finally, the third part concludes with some wishes for the future. iii ACKNOWLEDGEMENTS Writing this thesis has been the final part of the wonderful adventure that has been my PhD. Like all adventurers, I’ve needed a lot of help and support along the way. I’d like to take this opportunity to say thanks. First and foremost I am deeply indebted to my supervisors David Aspinall, Lucas Dixon, and Gudmund Grov enough for their guidance, enthusiasm, and patient ex- planation when I so often needed it. When Lucas moved across the Atlantic to work for Google — I was a very difficult student — Gudmund was kind enough to step into the breach as my second supervisor. A decision perhaps regretted by Gudmund but much appreciated by me. This thesis has benefitted considerably from their care- ful proof reading, which has eliminated as much of my writing ‘style’ as possible. I’d like to also thank Georges Gonthier and Microsoft Research for sponsoring this work. Georges’ unrivalled experience in formal proof and his enthusiasm for refactoring have been a great source of inspiration. My fellow DReaMers helped create a wonderful environment for research and for providing me with an understanding of the clarity of mind, rigour, and objectivity that are crucial for doing science. Thank you. Dominik, you instilled in me a love of parsing and I am profoundly thankful to have had a chance to work with you. I’m sorry we never did have that table tennis match, but let’s face it, you would have beaten me and I don’t like losing. I am enormously grateful to Ewen Denney for giving me the dream opportunity of working with the Intelligent Systems Division at NASA Ames Research Center in sunny California. Aside from the stimulating chats and walks with Ewen and the enlightening conversations over burritos, the discovery of Anchor Steam, Sierra Nevada, sweet potato fries, and running in Yosemite with Matthias and David remain especially vibrant in my mind. Outside of research, I must thank all my running friends from the Haries and Carnethy. I’ve had too many memorable experiences with you all to count. Running keeps me sane — approx. 1150 miles ran writing this — and I’ve been privileged to have such wonderful people to run with. Football thursday was a fantastic way to spend one afternoon from the working week with great friends. I will miss the fun, though perhaps not the barbarity of the ‘cage’ more than I can say. To my flatmates and officemates: thank you for putting up with me and sorry about all the muddy shoes. Megan, you are an inspiration. Life without you is like a broken pencil. Pointless. Last but by no means least, I’d like to thank my family whose unconditional faith and encouragement have kept me going. My mum is used to taking the brunt of my frustrations, so this is the perfect place to say thank you. For everything. iv DECLARATION I declare that this thesis was composed by myself, that the work contained herein is my own except where explicitly stated otherwise in the text, and that this work has not been submitted for any other degree or professional qualification except as specified. Edinburgh, 2013 Iain Johnston Whiteside, May 31, 2013 CONTENTS 1 preliminaries1 1.1 The origin of the thesis . 1 1.2 Thesis roadmap . 2 1.3 How to read this thesis . 5 i proof language framework7 2 proof languages and hierarchy8 2.1 Introduction . 8 2.2 Hierarchical proof . 9 2.3 Proof languages . 11 2.3.1 Procedural proofs . 11 2.3.2 Declarative languages . 12 2.3.3 SSReflect . 13 2.4 Summary . 14 3 hiproofs and hitacs 15 3.1 Introduction . 15 3.2 Hierarchical proof . 15 3.2.1 A hiproof term language . 16 3.2.2 Hiproof validation . 17 3.2.3 A hiproof normal form . 19 3.2.4 Hiproof examples . 28 3.3 Hierarchical Tactics . 33 3.3.1 A Hitac term language . 33 3.3.2 Big step evaluation semantics . 36 3.3.3 Well-formed tactics . 38 3.3.4 Minimal environments . 40 3.3.5 Examples . 41 3.4 Summary . 44 4 the hiscript proof language 45 4.1 Introduction . 45 4.2 The Hiscript proof language . 46 4.3 Hiscript semantics . 49 4.4 Gap-free proofs . 53 4.5 Static checks on proofs and minimal environments . 54 4.5.1 Well-formedness checking . 54 4.5.2 Minimal environments . 56 4.5.3 Environment extension . 56 4.6 Discussion . 57 4.6.1 Comparison with other declarative languages . 58 5 proof documents 59 5.1 Introduction . 59 5.2 Theories and their semantics . 60 vi contents vii 5.2.1 Theory syntax . 60 5.2.2 Semantics for theories . 61 5.2.3 Correctness of evaluation . 63 5.2.4 Example theory . 64 5.3 Proof documents . 66 5.3.1 Proof document syntax . 69 5.3.2 Evaluating theories in a document . 70 5.3.3 Properties of theory evaluation . 75 5.3.4 Evaluating a proof document . 76 5.3.5 Example document . 76 5.4 Discussion . 79 6 an essence of ssreflect 81 6.1 Introduction . 81 6.2 Introducing the language . 81 6.3 SSReflect style . 83 6.4 Syntax of the language . 85 6.5 Sentence semantics . 89 6.5.1 A direct translation to Hitac . 93 6.6 Semantics for scripts . 95 6.7 Example. 97 6.8 Summary . 98 ii refactoring proofs 99 7 improving the design of existing code 100 7.1 Introduction . 100 7.2 Introducing refactoring . 100 7.3 Why refactor proof? . 102 7.4 Semantics preservation . 103 7.5 A survey of refactoring . 104 7.5.1 Informal refactoring presentations . 104 7.5.2 Formal programming language refactoring . 106 7.5.3 Refactoring tools . 108 7.5.4 Generic and language independent refactorings . 109 7.5.5 Refactoring in other paradigms . 109 7.6 Approach . 110 8 a catalogue of proof refactorings 111 8.1 Introduction . 111 8.2 Rename an item . 111 8.3 Copy an item . 113 8.4 Move item . 115 8.5 Flatten a subproof . 117 8.6 Fold a tactic . 119 8.7 Unfold a tactic . 121 8.8 Generalise a tactic . 123 8.9 Summary . 124 9 refactoring proofs 125 9.1 Introduction . 125 contents viii 9.2 A formal definition of refactoring . 126 9.3 Copy a have statement . 129 9.4 Delete unused have statement . ..
Recommended publications
  • The Design & Implementation of an Abstract Semantic Graph For
    Clemson University TigerPrints All Dissertations Dissertations 12-2011 The esiD gn & Implementation of an Abstract Semantic Graph for Statement-Level Dynamic Analysis of C++ Applications Edward Duffy Clemson University, [email protected] Follow this and additional works at: https://tigerprints.clemson.edu/all_dissertations Part of the Computer Sciences Commons Recommended Citation Duffy, Edward, "The eD sign & Implementation of an Abstract Semantic Graph for Statement-Level Dynamic Analysis of C++ Applications" (2011). All Dissertations. 832. https://tigerprints.clemson.edu/all_dissertations/832 This Dissertation is brought to you for free and open access by the Dissertations at TigerPrints. It has been accepted for inclusion in All Dissertations by an authorized administrator of TigerPrints. For more information, please contact [email protected]. THE DESIGN &IMPLEMENTATION OF AN ABSTRACT SEMANTIC GRAPH FOR STATEMENT-LEVEL DYNAMIC ANALYSIS OF C++ APPLICATIONS A Dissertation Presented to the Graduate School of Clemson University In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy Computer Science by Edward B. Duffy December 2011 Accepted by: Dr. Brian A. Malloy, Committee Chair Dr. James B. von Oehsen Dr. Jason P. Hallstrom Dr. Pradip K. Srimani In this thesis, we describe our system, Hylian, for statement-level analysis, both static and dynamic, of a C++ application. We begin by extending the GNU gcc parser to generate parse trees in XML format for each of the compilation units in a C++ application. We then provide verification that the generated parse trees are structurally equivalent to the code in the original C++ application. We use the generated parse trees, together with an augmented version of the gcc test suite, to recover a grammar for the C++ dialect that we parse.
    [Show full text]
  • Application of Graph Databases for Static Code Analysis of Web-Applications
    Application of Graph Databases for Static Code Analysis of Web-Applications Daniil Sadyrin [0000-0001-5002-3639], Andrey Dergachev [0000-0002-1754-7120], Ivan Loginov [0000-0002-6254-6098], Iurii Korenkov [0000-0002-8948-2776], and Aglaya Ilina [0000-0003-1866-7914] ITMO University, Kronverkskiy prospekt, 49, St. Petersburg, 197101, Russia [email protected], [email protected], [email protected], [email protected], [email protected] Abstract. Graph databases offer a very flexible data model. We present the approach of static code analysis using graph databases. The main stage of the analysis algorithm is the construction of ASG (Abstract Source Graph), which represents relationships between AST (Abstract Syntax Tree) nodes. The ASG is saved to a graph database (like Neo4j) and queries to the database are made to get code properties for analysis. The approach is applied to detect and exploit Object Injection vulnerability in PHP web-applications. This vulnerability occurs when unsanitized user data enters PHP unserialize function. Successful exploitation of this vulnerability means building of “object chain”: a nested object, in the process of deserializing of it, a sequence of methods is being called leading to dangerous function call. In time of deserializing, some “magic” PHP methods (__wakeup or __destruct) are called on the object. To create the “object chain”, it’s necessary to analyze methods of classes declared in web-application, and find sequence of methods called from “magic” methods. The main idea of author’s approach is to save relationships between methods and functions in graph database and use queries to the database on Cypher language to find appropriate method calls.
    [Show full text]
  • Dense Semantic Graph and Its Application in Single Document Summarisation
    Dense Semantic Graph and its Application in Single Document Summarisation Monika Joshi1, Hui Wang1 and Sally McClean2 1 University of Ulster, Co. Antrim, BT37 0QB, UK [email protected] , [email protected] 2 University of Ulster, Co. Londonderry, BT52 1SA, UK [email protected] Abstract Semantic graph representation of text is an important part of natural language processing applications such as text summarisation. We have studied two ways of constructing the semantic graph of a document from dependency parsing of its sentences. The first graph is derived from the subject-object-verb representation of sentence, and the second graph is derived from considering more dependency relations in the sentence by a shortest distance dependency path calculation, resulting in a dense semantic graph. We have shown through experiments that dense semantic graphs gives better performance in semantic graph based unsupervised extractive text summarisation. 1 Introduction Information can be categorized into many forms -- numerical, visual, text, and audio. Text is abundantly present in online resources. Online blogs, Wikipedia knowledge base, patent documents and customer reviews are potential information sources for different user requirements. One of these requirements is to present a short summary of the originally larger document. The summary is expected to include important in- formation from the original text documents. This is usually achieved by keeping the informative parts of the document and reducing repetitive information. There are two types of text summarization: multiple document summarisation and single document summarization. The former is aimed at removing repetitive content in a collection of documents.
    [Show full text]
  • Autowig: Automatic Generation of Python Bindings for C++ Libraries
    AutoWIG: automatic generation of python bindings for C++ libraries Pierre Fernique and Christophe Pradal EPI Virtual Plants, Inria, Montpellier, France AGAP, CIRAD, INRA, Montpellier SupAgro, Univ Montpellier, Montpellier, France ABSTRACT Most of Python and R scientific packages incorporate compiled scientific libraries to speed up the code and reuse legacy libraries. While several semi-automatic solutions exist to wrap these compiled libraries, the process of wrapping a large library is cumbersome and time consuming. In this paper, we introduce AutoWIG, a Python package that wraps automatically compiled libraries into high-level languages using LLVM/Clang technologies and the Mako templating engine. Our approach is auto- matic, extensible, and applies to complex C++ libraries, composed of thousands of classes or incorporating modern meta-programming constructs. Subjects Data Science, Scientific Computing and Simulation, Programming Languages, Software Engineering Keywords C++, Python, Automatic bindings generation INTRODUCTION Many scientific libraries are written in low-level programming languages such as C and C++. Such libraries entail the usage of the traditional edit/compile/execute cycle in order to produce high-performance programs. This leads to lower computer processing time at the cost of high scientist coding time. At the opposite end of the spectrum, scripting languages such as MATLAB, Octave (John, David Bateman & Wehbring, 2014, Submitted 6 July 2017 Accepted 26 February 2018 for numerical work) Sage (The Sage Developers, 2015, for symbolic mathematics), R (R Published 2 April 2018 Core Team, 2014, for statistical analyses) or Python (Oliphant, 2007, for general purposes) Corresponding author provide an interactive framework that allows data scientists to explore their data, test new Pierre Fernique, [email protected] ideas, combine algorithmic approaches and evaluate their results on the fly.
    [Show full text]
  • DART@AI*IA 2013 Proceedings
    Cristian Lai, Giovanni Semeraro, Alessandro Giuliani (Eds.) Proceedings of the 7th International Workshop on Information Filtering and Retrieval Workshop of the XIII AI*IA Conference December 6, 2013 Turin, Italy http://aixia2013.i-learn.unito.it/course/view.php?id=26 i Preface The series of DART workshops provides an interactive and focused platform for researchers and practitioners for presenting and discussing new and emerging ideas. Focusing on research and study on new challenges in intelligent information filtering and retrieval, DART aims to investigate novel systems and tools to web scenarios and semantic computing. Therefore, DART contributes to discuss and compare suitable novel solutions based on intelligent techniques and applied in real-world applications. Information Retrieval attempts to address similar filtering and ranking problems for pieces of information such as links, pages, and documents. Information Retrieval systems generally focus on the development of global retrieval techniques, often neglecting individual user needs and preferences. Information Filtering has drastically changed the way information seekers find what they are searching for. In fact, they effectively prune large information spaces and help users in selecting items that best meet their needs, interests, preferences, and tastes. These systems rely strongly on the use of various machine learning tools and algorithms for learning how to rank items and predict user evaluation. Submitted proposals received two or three review reports from Program Committee members. Based on the recommendations of the reviewers, 7 full papers have been selected for publication and presentation at DART 2013. When organizing a scientific conference, one always has to count on the efforts of many volunteers.
    [Show full text]
  • Graph-Based Source Code Analysis of Javascript Repositories
    Budapest University of Technology and Economics Faculty of Electrical Engineering and Informatics Department of Measurement and Information Systems Graph-Based Source Code Analysis of JavaScript Repositories Master’s Thesis Author: Dániel Stein Supervisors: Gábor Szárnyas Ádám Lippai Dávid Honfi 2016 ii Contents Contents ii Kivonat v Abstract vi 1 Introduction1 1.1 Context.......................................... 1 1.2 Problem Statement................................... 2 1.3 Objectives and Contributions............................. 2 1.4 Structure of the Thesis................................. 3 2 Preliminaries4 2.1 JavaScript......................................... 4 2.1.1 From Glue Language to a Full-Fledged Language............ 4 2.1.2 ECMAScript .................................. 4 2.2 Static Analysis...................................... 5 2.2.1 Use Cases.................................... 6 2.2.2 Advantages and Disadvantages....................... 6 2.2.3 Source Code Processing and Analysis................... 7 2.3 Handling Large Interconnected Data ........................ 12 2.3.1 On Graph Computing............................. 12 2.3.2 Evaluating Queries on a Data Structure.................. 14 2.3.3 Graph Databases ............................... 15 2.4 Integrated Development Environment (IDE).................... 17 2.4.1 Visual Studio Code .............................. 17 2.4.2 Alternative IDEs................................ 18 3 Related Work 20 3.1 Static Analysis Frameworks.............................. 20 3.1.1 Tern......................................
    [Show full text]
  • Domain Specific Languages and Their Type Systems
    Domain specific languages and their type systems Citation for published version (APA): Meer, van der, A. P. (2014). Domain specific languages and their type systems. Technische Universiteit Eindhoven. https://doi.org/10.6100/IR778421 DOI: 10.6100/IR778421 Document status and date: Published: 01/01/2014 Document Version: Publisher’s PDF, also known as Version of Record (includes final page, issue and volume numbers) Please check the document version of this publication: • A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers. Link to publication General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal.
    [Show full text]
  • CODE REFACTORING UNDER CONSTRAINTS by YAN LIANG
    CODE REFACTORING UNDER CONSTRAINTS by YAN LIANG NICHOLAS A. KRAFT, CO-CHAIR RANDY K. SMITH, CO-CHAIR JEFFREY C. CARVER ALLEN S. PARRISH UZMA RAJA A DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science in the Graduate School of The University of Alabama TUSCALOOSA, ALABAMA 2011 Copyright Yan Liang 2011 ALL RIGHTS RESERVED ABSTRACT Code refactoring is the process of changing the internal structure of the program without changing its external behaviors. Most refactoring tools ensure behavior preservation by enforcing preconditions that must hold for the refactoring to be valid. However, their approaches have three drawbacks that make the refactoring results far from satisfactory and reduce the utilization of refactoring tools in practice. Firstly, programmers are not sure how code will be changed by those tools due to the invisible refactoring rules hidden behind the interfaces of tools. Secondly, current refactoring tools have limited extensibility to accommodate new refactorings. Lastly, most refactoring tools lack mechanisms to allow programmer to specify their own preconditions to indicate as to which properties of a program are of interest. We consider refactoring a code change activity that, as with other constraints imposed on code during software development and maintenance such as naming rules, should be visible, easily extensible, and adaptable. It should also combine the developers’ opinions, implementation styles of existing code and other good coding practice. We propose a model- based approach to precondition specification and checking in which preconditions can be declared explicitly and dynamically against the designated program metamodel, and verified against concrete program models.
    [Show full text]
  • Final Thesis Jugraj Singh Vfinal
    Computational Augmentation of Model Based System Engineering Supporting Mechatronic System Model Development with AI Technologies Mechatronics Research Centre Faculty of Technology De Montfort University, United Kingdom This thesis is submitted in partial fulfilment of the requirements of De Montfort University for the award of Doctor of Philosophy December, 2019 By: Jugraj Singh Table of Contents Introduction .......................................................................................................................... 11 1.1. Introduction ................................................................................................................................ 11 1.2. Motivation and Background....................................................................................................... 12 1.2.1. Research Gap ...................................................................................................................... 15 1.3. Research Scope .......................................................................................................................... 18 1.4. Research Aims and Objectives .................................................................................................. 20 1.5. Chapters Overview ..................................................................................................................... 21 Literature review .................................................................................................................. 22 2.1. System Engineering and MBSE
    [Show full text]
  • Code Structure Visualization
    Eindhoven University of Technology MASTER Code structure visualization Lommerse, G.L.P.M. Award date: 2005 Link to publication Disclaimer This document contains a student thesis (bachelor's or master's), as authored by a student at Eindhoven University of Technology. Student theses are made available in the TU/e repository upon obtaining the required degree. The grade received is not published on the document as presented in the repository. The required complexity or quality of research of student theses may vary by program, and the required minimum study period may vary in duration. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain TECHNISCHE UNIVERSITEIT EINDHOVEN Department of Mathematics and Computer Science MASTER’S THESIS Code Structure Visualization by G.L.P.M. Lommerse Supervisor: Dr. Ir. A.C. Telea (TUE) Eindhoven, August 2005 Abstract This thesis describes a tool that helps programmers to get insight in software projects and also helps them to manage projects. The tool, called Code Structure Visualizer (CSV), visualizes the structure of source code by augmenting a textual representation of source code with a graphical representation of the structure.
    [Show full text]
  • Languages, Applications and Technologies
    IV Symposium on Languages, Applications and Technologies June 18th and 19th, 2015 Universidad Complutense de Madrid, Spain Editors: José-Luis Sierra-Rodríguez José Paulo Leal Alberto Simões ISBN: 978-84-606-8762-7 II Schedule and Table of Contents Thursday, 18th June Time Page 8h45 Registration 9h15 Opening Session 9h30 Keynote I chair: José Paulo Leal The role of ontologies in machine-machine communication. 1 Asunción Gómez 10h40 Coffee Break Session I: Document Processing chair: José João Almeida 11h00 Tree String Path Subsequences Automaton and Its Use for Indexing XML Documents ........................................................... 3 Eliška Šestáková and Jan Janousek 11h25 A structural approach to assess graph-based exercises ..................... 13 José Paulo Leal and Rúben Sousa 11h50 Automatic generation of CVs from Online Social Networks. 23 Sérgio Maia Dias, Alda Lopes Gançarski and Pedro Rangel Henriques 12h10 Knowledge Extraction from Requirements Specification................... 29 Eduardo Barra and Jorge Morato Session II: Domain-Specific Languages chair: Marjan Mernik 12h30 Domain Specific Languages for Data Mining: A Case Study for Educational Data Mining.......................................................... 35 Alfonso de la Vega, Diego García-Saiz, Marta Zorrilla and Pablo Sanchez 12h55 WSDLUD: A Metric to Measure the Understanding Degree of WSDL Descriptions.......................................................... 45 M. Berón, H. Bernardis, E. Miranda, D. Riesco, M. J. Varanda Pereira and P. Henriques 13h20 Towards the generation of graphical modelling environments aided by patterns 55 Antonio Garmendia, Ana Pescador, Esther Guerra and Juan De Lara 13h40 Lunch III Time Page Session III: Tools for Natural Language Speech and Text processing chair: Hugo Gonçalo Oliveira 15h00 Speech Features for Discriminating Stress Using Branch and Bound Wrapper Search...............................................................
    [Show full text]
  • Towards a Generic Framework for Trustworthy Program Refactoring∗
    Acta Cybernetica | online–first paper version | pages 1{27. Towards a Generic Framework for Trustworthy Program Refactoring∗ D´anielHorp´acsiab, Judit K}oszegi,b and D´avidJ. N´emethb Abstract Refactoring has to preserve the dynamics of the transformed program with respect to a particular definition of semantics and behavioural equivalence. In general, it is rather challenging to relate executable refactoring implemen- tations with the formal semantics of the transformed language. However, in order to make refactoring tools trustworthy, we may need to provide formal guarantees on correctness. In this paper, we propose high-level abstractions for refactoring definition and we outline a generic framework which is capable of verifying and executing refactoring specifications. By separating the var- ious concerns in the transformation process, our approach enables modular and language-parametric implementation. Keywords: refactoring, domain-specific language, refactoring methodology, formal verification 1 Introduction The idea of refactoring is as old as high-level programming. A program refac- toring [7] is typically meant to improve non-functional properties, such as the in- ternal structure or the appearance, of a program without changing its observable behaviour. Tool support is necessary for refactoring in large-scale: it has to be en- sured that program changes are complete and sound, the behaviour is intact and no bugs are introduced or eliminated by the transformations. Refactoring tools may carry out extensive modifications in large projects, which are hard to be performed or comprehended by humans. ∗The research has been supported by the European Union, co-financed by the European Social Fund (EFOP-3.6.2-16-2017-00013, Thematic Fundamental Research Collaborations Grounding Innovation in Informatics and Infocommunications).
    [Show full text]