Verification by Reduction to Functional Programs

Total Page:16

File Type:pdf, Size:1020Kb

Verification by Reduction to Functional Programs Verification by Reduction to Functional Programs THÈSE NO 7636 (2017) PRÉSENTÉE LE 25 AOÛT 2017 À LA FACULTÉ INFORMATIQUE ET COMMUNICATIONS LABORATOIRE D'ANALYSE ET DE RAISONNEMENT AUTOMATISÉS PROGRAMME DOCTORAL EN INFORMATIQUE ET COMMUNICATIONS ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE POUR L'OBTENTION DU GRADE DE DOCTEUR ÈS SCIENCES PAR Régis William BLANC acceptée sur proposition du jury: Prof. P. Ienne, président du jury Prof. V. Kuncak, directeur de thèse Prof. Ph. Rümmer, rapporteur Dr N. Bjørner, rapporteur Prof. M. Odersky, rapporteur Suisse 2017 "The best way to predict the future is to invent it." — Alan Kay To the memory of my father Acknowledgements First, I would like to thank my advisor, Viktor Kuncak, for guiding me through my PhD studies. He trusted me when I had no clue about which research direction to take, and I am grateful he let me explore projects in this way. He always showed an enthusiasm for research, which was naturally motivating. I also thank the members of my thesis jury, Nikolaj Bjørjner, Philipp Rümmer, Martin Odersky, and Paolo Ienne, for taking the time to review and judge my thesis. Their questions and constructive comments helped me improve the final version of my thesis. Although it is true that only the PhD student types in the content of this manuscript, the results presented were made possible only through the help of several co-authors. I want to thank each of my co-authors throughout my short scientific career: Etienne Kneuss, Philippe Suter, Laura Kovács, Ashutosh Gupta, Bernhard Kragl, Thibaud Hottelier, and Thomas Henzinger. In particular, Laura Kovács was my first adviser on a research project, and her guidance has was valuable in convincing me to start my PhD research. She also hosted me at TU Wien for the Summer before beginning my PhD work, which led to productive research and ultimately a publication. Philippe Suter suggested the original idea for tackling verification of imperative programming, which is the seed that led to the work presented in my thesis. Finally, although not a co-author, David Novo gave me the possibility to work on a cool and interesting research project, and I thank him for that. The LARA group has always been an enjoyable environment to work in, mostly thanks to the members’ relaxed attitude that would transpire through our irregular group meetings. I thank all the present and past members of the lab, as they helped create this nice atmosphere: Ali, Andrej, Andrew, Etienne, Eva, Filip, Georg, Giulano, Hossein, Ivan, Jad, Manos, Marco, Mikaël, Nicolas, Pierre-Emmanuel, Philippe, Ravi, Romain, Ruzica, Sumith, Tihomir. I am especially grateful to Philippe and Etienne who built most of the original infrastructure on which my research is based, to Nicolas who created a better and faster infrastructure and ported my work to it, and to Marco who seriously experimented with the language’s extensions I was building and who provided valuable feedback. I also want to thank an often forgotten member of the lab, Leon, for his hard and repetitive work, which has been essential in putting this thesis together. I also thank the members of the LAMP lab, for building this awesome language that is Scala and for being generally cool. If I was able to focus on research work, it is also due to the help of Yvette Gallay and Sylvie Jankow who, both, protected me from the complex administrative layers of EPFL. I am very thankful to them. I also thank Fabien Salvi, who shared my love for Microsoft Windows and i Acknowledgements was always able to fix unexpected issues. I thank Holly, who had the courage to read through my entire thesis and dig out each and every mistake related to my usage of English. Because EPFL would be pretty boring without people to hang out with, I want to thank the friends I met there: Alevtina, for introducing me to The Americans. Alexandre, for playing my games and for helping me distill my ideas (and for being at EPFL for a longer time than me). Alina, for organizing nice hikes. Ana, for always caring about my side projects and for the many discussions. Gilles, for chatting about hockey and playing football. Hông-Ân, for passing on her apartment to me in Zurich. Laurent, for sharing startup tips. Lucas, for cool tech discussions over lunch and coffee. Manohar, for being a fan of Roger. Marina, for hiking with me and for supporting Stan. Miji, for being always happy to visit places. Sonia, for sharing classic Swiss food and for the many nice coffee breaks. Stefan, for sharing my passion for coffee. I also thank all my friends outside EPFL, they helped me disconnect from work. In particular, I thank Mani, my long-time and dearest friend. Finalement, bien sûr, je remercie ma famille. Mon frère, qui ne m’a dérangé de mon travail que pour organiser des matchs de foot. Mon chat, qui m’a montré son affection par ses griffures et morsures dont le but était, j’en suis sûr, de me retenir vers lui. Mon père, qui m’a fait découvrir le plus beau sport du monde, sport qui m’a bien aidé pour décompresser du travail. Et surtout ma mère, qui a fait tellement de sacrifices pour me permettre d’arriver où je suis aujourd’hui. Merci. Lausanne, April 2017 R. B. ii Preface Thus, I continued development creating Pascal in 1970. From then on, my goal was to create a language that was scientifically clean, i.e. defined not in terms of a mechanism (or even a specific computer), but in terms of a mathematical structure of axioms and derivation rules. This turned out to be an elusive goal. Niklaus Wirth, 2014 The potential of software to transform our society is virtually limitless. But this potential comes at the cost of limitless complexity and the difficulty of building the software that is right. Given this complexity, the potential of software to transform our lives turns into a threat to transform our lives. We increasingly rely on software for life critical tasks to transport us to see our loved ones, to diagnose diseases and to predict critical events in the near future. Yet each of these software services might simply crash in a bizarre way and stop delivering a time-critical service, or cause us to make a wrong decision, with disastrous consequences. Astonishingly, the predominant methodology for constructing software leaves many potential errors behind. There is belief that efficiency dictates the use of low-level languages, for which the application of formal methods is difficult. Ambitious researchers have set to demonstrate that it is possible to verify low-level C code as is written. This has resulted in impressive achievements, yet the effort that was needed provides evidence that existing languages are not the most efficient way to construct software with strong correctness guarantees. On the other side of the spectrum, first-order functional programming languages have been shown suitable for reasoning about programs but tempt the developers into writing complex higher-order code for which efficient execution and reasoning can be also difficult to achieve. The thesis of Régis Blanc points in the direction of a more productive approach for constructing software with strong correctness guarantees. The approach includes a language, which is a fragment of Scala that includes both higher-order and imperative constructs, and is designed to avoid constructs that are difficult to verify. The language prevents many errors by construction: it is memory safe, and it does not automatically include null in the space of possible values of data structures. Crucially, the language also permits efficient translation into a functional iii Preface form, to which verification techniques can be applied. The translation is kept manageable thanks to the use of unique mutable fields for data structures. The translation has been used successfully to verify programs in this language. At the same time, the programs in this fragment execute using efficient in-place updates and can use the familiar syntax of mutable variables, assignments, and loops. Verifying the resulting functional code is a non-trivial task to which the thesis also contributes. It sets a high standard for formal models of code by representing machine integers correctly using bitvectors and requiring the developers to use unbounded integers in source code to obtain properties of mathematical integers. An entire range of run-time errors and undesired behaviors can be checked using the tool, including overflows, array bounds, pattern matching errors. Most interestingly, the developers can specify and verify correctness properties using preconditions, postconditions, and invariants. A crucial component in verification is the constraint solving of certain formulas describing possible executions of programs. The work of Régis shows how to keep an architecture of such tool maintainable by building a layer that communicates with multiple SMT solvers. What is more, he shows that future SMT solvers could be written in high-level languages: he writes a full-fledged SAT solver in Scala, starting from a simple version and refining it to a solver incorporating most techniques used in production quality SAT solvers. The case studies in the thesis show that the approach holds a promise for constructing verified applications, and illustrates the practical benefit of Scala that can deploy applications on a number of platforms, including JVM, JavaScript, and, most recently, native code. The thesis thus brings us a step closer towards an elusive goal of building software that we can reason about and execute efficiently. Lausanne, April 2017 Viktor Kunˇcak iv Abstract In this thesis, we explore techniques for the development and verification of programs in a high-level, expressive, and safe programming language.
Recommended publications
  • Assertions, Pre/Post- Conditions and Invariants
    9/14/12 Assertions, pre/post- conditions and invariants Section 2.1 in Walls and Mirrors Section 4.5 Rosen Programming as a contract n Specifying what each method does q Specify it in a comment before method's header n Precondition q What is assumed to be true before the method is executed q Caller obligation n Postcondition q Specifies what will happen if the preconditions are met q Method obligation 1 9/14/12 Class Invariants n A class invariant is a condition that all objects of that class must satisfy while it can be observed by clients n What about Points in Cloud? q boundaries? q center? What is an assertion? n An assertion is a statement that says something about the state of your program n Should be true if there are no mistakes in the program //n == 1 while (n < limit) { n = 2 * n; } // what could you state here? 2 9/14/12 What is an assertion? n An assertion is a statement that says something about the state of your program n Should be true if there are no mistakes in the program //n == 1 while (n < limit) { n = 2 * n; } //n >= limit //more? What is an assertion? n An assertion is a statement that says something about the state of your program n Should be true if there are no mistakes in the program //n == 1 while (n < limit) { n = 2 * n; } //n >= limit //n is the smallest power of 2 >= limit 3 9/14/12 assert Using assert: assert n == 1; while (n < limit) { n = 2 * n; } assert n >= limit; When to use Assertions n We can use assertions to guarantee the behavior.
    [Show full text]
  • Sound Invariant Checking Using Type Modifiers and Object Capabilities
    Sound Invariant Checking Using Type Modifiers and Object Capabilities. Isaac Oscar Gariano Victoria University of Wellington [email protected] Marco Servetto Victoria University of Wellington [email protected] Alex Potanin Victoria University of Wellington [email protected] Abstract In this paper we use pre existing language support for type modifiers and object capabilities to enable a system for sound runtime verification of invariants. Our system guarantees that class invariants hold for all objects involved in execution. Invariants are specified simply as methods whose execution is statically guaranteed to be deterministic and not access any externally mutable state. We automatically call such invariant methods only when objects are created or the state they refer to may have been mutated. Our design restricts the range of expressible invariants but improves upon the usability and performance of our system compared to prior work. In addition, we soundly support mutation, dynamic dispatch, exceptions, and non determinism, while requiring only a modest amount of annotation. We present a case study showing that our system requires a lower annotation burden compared to Spec#, and performs orders of magnitude less runtime invariant checks compared to the widely used ‘visible state semantics’ protocols of D, Eiffel. We also formalise our approach and prove that such pre existing type modifier and object capability support is sufficient to ensure its soundness. 2012 ACM Subject Classification Theory of computation → Invariants, Theory of computation → Program verification, Software and its engineering → Object oriented languages Keywords and phrases type modifiers, object capabilities, runtime verification, class invariants Digital Object Identifier 10.4230/LIPIcs.CVIT.2016.23 1 Introduction Object oriented programming languages provide great flexibility through subtyping and arXiv:1902.10231v1 [cs.PL] 26 Feb 2019 dynamic dispatch: they allow code to be adapted and specialised to behave differently in different contexts.
    [Show full text]
  • The Contract Pattern Permission Granted to Copy for Plop ’97 Conference
    Copyright 1997, Michel de Champlain The Contract Pattern Permission granted to copy for PLoP ’97 Conference. All other rights reserved. Michel de Champlain Department of Computer Science University of Canterbury, Christchurch, New Zealand [email protected] http://www.cosc.canterbury.ac.nz/~michel 12 August 1997 Abstract This paper describes the Contract pattern, an idiom that lets you apply assertions to guarantee pre-conditions and post-conditions of methods and invariants on the state of objects. This pattern can be used to develop reliable classes by making the Design by Contract methodology—introduced by Meyer in the specific context of the Eiffel language—available in Java and possibly other object-oriented languages. Intent Provide an implementation of the Design by contract methodology [Meyer88] for developing reliable classes and create robust objects in Java. This programming pattern lets you apply assertions to guarantee the pre-conditions and post-conditions of methods and invariants on the state of objects. Also Known As Design by contract Motivation Sometimes it’s necessary to restrict a class interface because you don’t want to provide all the possible input combinations for all collaborators. One way to achieve this goal is to make minimal and consistent methods that impose pre-conditions on input parameters. Moreover, you might want to ensure the class behavior by imposing post-conditions before methods return. You might also need to make sure that the class is always in a stable state. Such an approach can result in reliable classes to create robust objects. Consider for example a bounded counter that has both a lower and upper bound.
    [Show full text]
  • Safely Creating Correct Subclasses Without Superclass Code Clyde Dwain Ruby Iowa State University
    Iowa State University Capstones, Theses and Retrospective Theses and Dissertations Dissertations 2006 Modular subclass verification: safely creating correct subclasses without superclass code Clyde Dwain Ruby Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/rtd Part of the Computer Sciences Commons Recommended Citation Ruby, Clyde Dwain, "Modular subclass verification: safely creating correct subclasses without superclass code " (2006). Retrospective Theses and Dissertations. 1877. https://lib.dr.iastate.edu/rtd/1877 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Retrospective Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. Modular subclass verification: Safely creating correct subclasses without superclass code by Clyde Dwain Ruby A dissertation submitted to the graduate faculty in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Major: Computer Science Program of Study Committee Gary T. Leavens, Major Professor Samik Basu Clifford Bergman Shashi K. Gadia Jonathan D. H. Smith Iowa State University Ames, Iowa 2006 Copyright © Clyde Dwain Ruby, 2006. All rights reserved. UMI Number: 3243833 Copyright 2006 by Ruby, Clyde Dwain All rights reserved. UMI Microform 3243833 Copyright 2007 by ProQuest Information and Learning Company. All rights reserved. This microform edition is protected against unauthorized copying under Title 17, United States Code. ProQuest Information and Learning Company 300 North Zeeb Road P.O. Box 1346 Ann Arbor, MI 48106-1346 ii TABLE OF CONTENTS ACKNOWLEDGEMENTS .
    [Show full text]
  • 3. Design by Contract
    3. Design by Contract Oscar Nierstrasz Design by Contract Bertrand Meyer, Touch of Class — Learning to Program Well with Objects and Contracts, Springer, 2009. 2 Bertrand Meyer is a French computer scientist who was a Professor at ETH Zürich (successor of Niklaus Wirth) from 2001-2015. He is best known as the inventor of “Design by Contract”, and as the designer of the Eiffel programming language, which provides built-in for DbC. DbC was first described in a technical report by Meyer in 1986: https://en.wikipedia.org/wiki/Design_by_contract Who’s to blame? The components fit but the system does not work. Who’s to blame? The component developer or the system integrator? 3 DbC makes clear the “contract” between a supplier (an object or “component”) and its client. When something goes wrong, the contract states whose fault it is. This simplifies both design and debugging. Why DbC? > Design by Contract —documents assumptions (what do objects expect?) —simplifies code (no special actions for failure) —aids debugging (identifies who’s to blame) 4 As we shall see, DbC improves your OO design in several ways. First, contracts make explicit the assumptions under which an object (supplier) will work correctly. Second, they simplify your code, since no special action is required when things go wrong — the exception handling framework provides the necessary tools. Third, contracts help in debugging since errors are caught earlier, when contracts are violated, not when your program crashes because of an invalid state, and it is clear where to lay the blame for the violation (i.e., in the object or its client).
    [Show full text]
  • FORTH-ICS / TR 381 July 2006 'An Informal Proof on the Contradictory
    FORTH-ICS / TR 381 July 2006 ‘An Informal Proof on the Contradictory Role of Finalizers in a Garbage Collection Context’ Anthony Savidis ABSTRACT Garbage collection in OOP languages provides facilities to hook code that is executed upon object finalization. Semantically, the point in time that finalizer code is executed is not determined by the application logic, but by the garbage collection system. This fact renders a potential mismatch, since application-specific code, i.e. the finalizer implementation, normally affecting program state and control flow, is called automatically at a point in time that is indifferent to the application semantics. Although an analogous situation is observed in event-based systems, since event processors are called-back asynchronously by the underlying system, there is a fundamental difference: while event generation is essentially nondeterministic, originated from external event sources, object destruction is a semantic action that is always decided by applications. In summary, the mismatch is that although applications decide if and when destruction occurs, the garbage collector is responsible to commit the relevant code. We prove that this mismatch is due to the contradictory presence of finalizers in a garbage collection context. Page 1 Introduction Preface This technical report has been also motivated by requests from colleagues to report the informal proof for the contradictory role of finalizers in garbage collection, simply relying on informal common software engineering principles. Additionally, the reporting has been also motivated by arguments that came to my attention via personal communication that either the claim cannot be proved (I assume that “cannot prove” arguments are subject to formal proofs, so such arguments are more weak than the claim they attack), or that the claim is trivial requiring essentially no proof (intuitively true, but does not explain why Java, C#, Python, just to name a few languages, still adopt finalizers).
    [Show full text]
  • A Machine-Checked Proof for a Translation of Event-B Machines to JML
    A Machine-Checked Proof for a Translation of Event-B Machines to JML N´estorCata~no1,Camilo Rueda2, and Tim Wahls3 1 EAFIT Unviersity [email protected] 2 Camilo Rueda Pontificia Universidad Javeriana [email protected] 3 Tim Wahls Dickinson College [email protected] Abstract. We present a machine-checked soundness proof of a trans- lation of Event-B to the Java Modeling Language (JML). The transla- tion is based on an operator EB2Jml that maps Event-B events to JML method specifications, and deterministic and non-deterministic assign- ments to JML method post-conditions. This translation has previously been implemented as the EventB2Jml tool. We adopted a taking our own medicine approach in the formalisation of our proof so that Event-B as well as JML are formalised in Event-B and the proof is discharged with the Rodin platform. Hence, for any Event-B substitution (whether an event or an assignment) and for the JML method specification obtained by applying EventB2Jml to the substitution, we prove that the semantics of the JML method specification is simulated by the semantics of the sub- stitution. Therefore, the JML specification obtained as translation from the Event-B substitution is a refinement of the substitution. Our proof includes invariants and the standard Event-B initialising event, but it does not include full machines or Event-B contexts. We assume that the semantics of JML and Event-B operate both on the same initial and final states, and we justify our assumption. Keywords: Event-B, JML, EventB2Jml, Formal Proof, Translation, Rodin 1 Introduction arXiv:1309.2339v1 [cs.SE] 9 Sep 2013 In an earlier work [14], we have proposed a design methodology that combines the use of design-by-contract techniques with JML [36,29,33] and correctness-by- construction techniques with Event-B [1].
    [Show full text]
  • Verification of Object Oriented Programs Using Class Invariants
    Verification of Object Oriented Programs Using Class Invariants Kees Huizing and Ruurd Kuiper and SOOP?? Eindhoven University of Technology, PO Box 513, 5600 MB Eindhoven, The Netherlands, [email protected], [email protected] Abstract A proof system is presented for the verification and derivation of object oriented pro- grams with as main features strong typing, dynamic binding, and inheritance. The proof system is inspired on Meyer’s system of class invariants [12] and remedies its unsound- ness, which is already recognized by Meyer. Dynamic binding is treated in a flexible way: when throughout the class hierarchy overriding methods respect the pre- and post- conditions of the overridden methods, very simple proof rules for method calls suffice; more powerful proof rules are supplied for cases where one cannot or does not want to follow this restriction. The proof system is complete relative to proofs for properties of pointers and the data domain. 1 Introduction Although formal verification is not very common in the discipline of object oriented programming, the importance of formal specification is generally ac- knowledged ([12]). With the increased interest in component based develop- ment, it becomes even more important that components are specified in an un- ambiguous manner, since users or buyers of components often have no other knowledge about a component than its specification and at the same time rely heavily on its correct functioning in their framework. The specification of a class, sometimes called contract, usually contains at least pre- and postcondi- tions for the public mehtods and a class invariant. A class invariant expresses which states of the objects of the class are consis- tent, or “legal”.
    [Show full text]
  • The Fields and the Class Invariant /** B[0..Size-1] Is a Min-Heap, I.E
    Heaps with priorities We previously studied the max-heap, which implements a bag of integers with insertion of a value and extraction (polling) of a maximum value in O(log n) time for a heap of size n. Min-heaps are similar. We now extend the idea to implement a min-heap of a set of distinct values each with a priority. The priority will be a double value. The separation of value from priority is needed in several different situations. Here are two: • Consider finding the shortest route from Ithaca, NY, to Washington, D.C. A heap will contain points along the way, and the priorities will be the shortest distances found thus far from Ithaca to those points. • In a discrete event simulation, pending events can be kept in a heap, with the priority being the time at which an event is to occur. Keeping the set in a min-heap makes it easy to extract the next event to process. We will define all the methods needed, but we won’t show many of the method bodies, since they are fairly easy to write based on the earlier discussion of max- and min-heaps. Class Heap and inner class Item /** A heap of elements of type E. */ We will implement a generic min-heap with priorities. The public class Heap<E> { start of class Heap appears to the right. An object of this class implements a heap of elements of type E. For example, E could private class Item { be a point on a map or an event to be simulated.
    [Show full text]
  • Weaving Aspects Into C++ Applications for Validation of Temporal Invariants
    Weaving Aspects into C++ Applications for Validation of Temporal Invariants Tanton H. Gibbs and Brian A. Malloy Computer Science Department Clemson University Clemson, SC 29634, USA thgibbs, malloy @cs.clemson.edu f g Abstract [5]. During maintenance, invariants have proven invaluable for disclosing locations in the program In this paper, we describe temporal invariants, where the maintainer may have introduced a fault which are class invariants that are qualified by the [10]. operators eventually, always, never, or already. Tem- The problem with class invariants is that some poral invariants can capture assertions that may not important assertions about a class are initially in- be valid initially but, as the program continues, must valid, due to circular dependencies or the monoton- eventually become valid. Moreover, temporal invari- ically increasing nature of the system under con- ants can indicate references to memory that should struction [8]. For example, during compilation of eventually be deallocated. To facilitate incorporation a program, a name object is constructed to facil- of temporal invariants as a maintenance or reengi- itate name lookup. However, certain fields in the neering activity, we weave invariants into the sys- name object, such as the corresponding scope of the tem as aspects. In our case study of a C++ sys- name, may not be known until after name lookup tem, the aspects are woven into join points using has occurred [24]. Moreover, assertions about a policies. We investigate the effectiveness of tem- class may have an important impact on memory poral invariants and we compare the performance management. For example, some heap-based ob- of our aspect-oriented implementation with several jects of a class must be eventually deleted or system other approaches.
    [Show full text]
  • Modular Verification of Static Class Invariants
    Modular verification of static class invariants K. Rustan M. Leino 1 and Peter Muller¨ 2 1 Microsoft Research, Redmond, WA, USA, [email protected] 2 ETH Zurich,¨ Switzerland, [email protected] Abstract. Object invariants describe the consistency of object-oriented data struc- tures and are central to reasoning about the correctness of object-oriented soft- ware. But object invariants are not the only consistency conditions on which a program may depend. The data in object-oriented programs consists not just of object fields, but also of static fields, which hold data that is shared among ob- jects. The consistency of static fields is described by static class invariants, which are enforced at the class level. Static class invariants can also mention instance fields, describing the consistency of dynamic data structures rooted in static fields. Sometimes there are even consistency conditions that relate the instance fields of many or all objects of a class; static class invariants describe these relations, too, since they cannot be enforced by any one object in isolation. This paper presents a systematic way (a methodology) for specifying and verify- ing static class invariants in object-oriented programs. The methodology supports the three major uses of static fields and invariants in the Java library. The method- ology is amenable to static, modular verification and is sound. Keywords: Static class invariant, verification, object-oriented programming, sta- tic field 1 Introduction A central problem in reasoning about a computer program’s correctness comes down to reasoning about which program states the program can ever reach. Programmers rely on that only some states are reached, most prominently by assuming that the pro- gram’s data structures satisfy certain properties.
    [Show full text]
  • Software Engineering Concepts: Some Principles Managing Resources in a Class
    Software Engineering Concepts: Some Principles Managing Resources in a Class CS 311 Data Structures and Algorithms Lecture Slides Wednesday, September 16, 2009 Glenn G. Chappell Department of Computer Science University of Alaska Fairbanks [email protected] © 2005–2009 Glenn G. Chappell Unit Overview Advanced C++ & Software Engineering Concepts Major Topics: Advanced C++ Major Topics: S.E. Concepts The structure of a package Abstraction Parameter passing Invariants Operator overloading Testing Silently written & called Some principles functions Pointers & dynamic allocation Managing resources in a class Templates Containers & iterators Error handling Introduction to exceptions Introduction to Linked Lists 16 Sep 2009 CS 311 Fall 2009 2 Review Software Engineering Concepts: Invariants An invariant is a condition that is always true at a particular point in an algorithm. Special kinds Precondition . An invariant at the beginning of a function. The responsibility for making sure the preconditions are true rests with the calling code. What must be true for the function to execute properly. Postcondition . An invariant at the end of a function. Tells what services the function has performed for the caller. Describe the function’s effect using statements about objects & values. Class invariant . An invariant that holds whenever an object of the class exists, and execution is not in the middle of a public member function call. Statements about data members that indicate what it means for an object to be valid or usable. 16 Sep 2009 CS 311 Fall 2009 3 Review Software Engineering Concepts: Testing Recommended development process: Step 1. Get the code to compile . Write dummy versions of all modules.
    [Show full text]