Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Fuyuan Zhang is active.

Publication


Featured researches published by Fuyuan Zhang.


tools and algorithms for construction and analysis of systems | 2016

Reasoning About Information Flow Security of Separation Kernels with Channel-Based Communication

Yongwang Zhao; David Sanán; Fuyuan Zhang; Yang Liu

Assurance of information flow security by formal methods is mandated in security certification of separation kernels. As an industrial standard for separation kernels, ARINC 653 has been complied with by mainstream separation kernels. Security of functionalities defined in ARINC 653 is thus very important for the development and certification of separation kernels. This paper presents the first effort to formally specify and verify separation kernels with ARINC 653 channel-based communication. We provide a reusable formal specification and security proofs for separation kernels in Isabelle/HOL. During reasoning about information flow security, we find some security flaws in the ARINC 653 standard, which can cause information leakage, and fix them in our specification. We also validate the existence of the security flaws in two open-source ARINC 653 compliant separation kernels.


automated software engineering | 2018

DeepGauge: multi-granularity testing criteria for deep learning systems

Lei Ma; Felix Juefei-Xu; Fuyuan Zhang; Jiyuan Sun; Minhui Xue; Bo Li; Chunyang Chen; Ting Su; Li Li; Yang Liu; Jianjun Zhao; Yadong Wang

Deep learning (DL) defines a new data-driven programming paradigm that constructs the internal system logic of a crafted neuron network through a set of training data. We have seen wide adoption of DL in many safety-critical scenarios. However, a plethora of studies have shown that the state-of-the-art DL systems suffer from various vulnerabilities which can lead to severe consequences when applied to real-world applications. Currently, the testing adequacy of a DL system is usually measured by the accuracy of test data. Considering the limitation of accessible high quality test data, good accuracy performance on test data can hardly provide confidence to the testing adequacy and generality of DL systems. Unlike traditional software systems that have clear and controllable logic and functionality, the lack of interpretability in a DL system makes system analysis and defect detection difficult, which could potentially hinder its real-world deployment. In this paper, we propose DeepGauge, a set of multi-granularity testing criteria for DL systems, which aims at rendering a multi-faceted portrayal of the testbed. The in-depth evaluation of our proposed testing criteria is demonstrated on two well-known datasets, five DL systems, and with four state-of-the-art adversarial attack techniques against DL. The potential usefulness of DeepGauge sheds light on the construction of more generic and robust DL systems.


tools and algorithms for construction and analysis of systems | 2017

CSimpl: A Rely-Guarantee-Based Framework for Verifying Concurrent Programs

David Sanán; Yongwang Zhao; Zhe Hou; Fuyuan Zhang; Alwen Tiu; Yang Liu

It is essential to deal with the interference of the environment between programs in concurrent program verification. This has led to the development of concurrent program reasoning techniques such as rely-guarantee. However, the source code of the programs to be verified often involves language features such as exceptions and procedures which are not supported by the existing mechanizations of those concurrent reasoning techniques. Schirmer et al. have solved a similar problem for sequential programs by developing a verification framework in the Isabelle/HOL theorem prover called Simpl, which provides a rich sequential language that can encode most of the features in real world programming languages. However Simpl only aims to verify sequential programs, and it does not support the specification nor the verification of concurrent programs. In this paper we introduce CSimpl, an extension of Simpl with concurrency-oriented language features and verification techniques. We prove the compositionality of the CSimpl semantics and we provide inference rules for the language constructors to reason about CSimpl programs using rely-guarantee, showing that the inference rules are sound w.r.t. the language semantics. Finally, we run a case study where we use CSimpl to specify and prove functional correctness of an abstract communication model of the XtratuM partitioning separation micro-kernel.


IEEE Transactions on Industrial Informatics | 2016

Formal Specification and Analysis of Partitioning Operating Systems by Integrating Ontology and Refinement

Yongwang Zhao; David Sanán; Fuyuan Zhang; Yang Liu

Partitioning operating systems (POSs) have been widely applied in safety-critical domains from aerospace to automotive. In order to improve the safety and the certification process of POSs, the ARINC 653 standard has been developed and complied with by the mainstream POSs. Rigorous formalization of ARINC 653 can reveal hidden errors in this standard and provide a necessary foundation for formal verification of POSs and ARINC 653 applications. For the purpose of reusability and efficiency, a novel methodology by integrating ontology and refinement is proposed to formally specify and analyze POSs in this paper. An ontology of POSs is developed as an intermediate model between informal descriptions of ARINC 653 and the formal specification in Event-B. A semiautomatic translation from the ontology and ARINC 653 into Event-B is implemented, which leads to a complete Event-B specification for ARINC 653 compliant POSs. During the formal analysis, six hidden errors in ARINC 653 have been discovered and fixed in the Event-B specification. We also validate the existence of these errors in two open-source POSs, i.e., XtratuM and POK. By introducing the ontology, the degree of automatic verification of the Event-B specification reaches a higher level.


formal methods | 2018

Compositional Reasoning for Shared-variable Concurrent Programs

Fuyuan Zhang; Yongwang Zhao; David Sanán; Yang Liu; Alwen Tiu; Shang-Wei Lin; Jun Sun

Scalable and automatic formal verification for concurrent systems is always demanding. In this paper, we propose a verification framework to support automated compositional reasoning for concurrent programs with shared variables. Our framework models concurrent programs as succinct automata and supports the verification of multiple important properties. Safety verification and simulations of succinct automata are parallel compositional, and safety properties of succinct automata are preserved under refinements. We generate succinct automata from infinite state concurrent programs in an automated manner. Furthermore, we propose the first automated approach to checking rely-guarantee based simulations between infinite state concurrent programs. We have prototyped our algorithms and applied our tool to the verification of multiple refinements.


IEEE Transactions on Dependable and Secure Computing | 2017

Refinement-based Specification and Security Analysis of Separation Kernels

Yongwang Zhao; David Sanán; Fuyuan Zhang; Yang Liu

Assurance of information-flow security by formal methods is mandated in security certification of separation kernels. As an industrial standard for improving safety, ARINC 653 has been complied with by mainstream separation kernels. Due to the new trend of integrating safe and secure functionalities into one separation kernel, security analysis of ARINC 653 as well as a formal specification with security proofs are thus significant for the development and certification of ARINC 653 compliant Separation Kernels (ARINC SKs). This paper presents a specification development and security analysis method for ARINC SKs based on refinement. We propose a generic security model and a stepwise refinement framework. Two levels of functional specification are developed by the refinement. A major part of separation kernel requirements in ARINC 653 are modeled, such as kernel initialization, two-level scheduling, partition and process management, and inter-partition communication. The formal specification and its security proofs are carried out in the Isabelle/HOL theorem prover. We have reviewed the source code of one industrial and two open-source ARINC SK implementations, i.e., VxWorks 653, XtratuM, and POK, in accordance with the formal specification. During the verification and code review, six security flaws, which can cause information leakage, are found in the ARINC 653 standard and the implementations.


arXiv: Software Engineering | 2018

Combinatorial Testing for Deep Learning Systems.

Lei Ma; Fuyuan Zhang; Minhui Xue; Bo Li; Yang Liu; Jianjun Zhao; Yadong Wang


arXiv: Software Engineering | 2018

DeepGauge: Comprehensive and Multi-Granularity Testing Criteria for Gauging the Robustness of Deep Learning Systems.

Lei Ma; Felix Juefei-Xu; Jiyuan Sun; Chunyang Chen; Ting Su; Fuyuan Zhang; Minhui Xue; Bo Li; Li Li; Yang Liu; Jianjun Zhao; Yadong Wang


arXiv: Software Engineering | 2018

DeepMutation: Mutation Testing of Deep Learning Systems.

Lei Ma; Fuyuan Zhang; Jiyuan Sun; Minhui Xue; Bo Li; Felix Juefei-Xu; Chao Xie; Li Li; Yang Liu; Jianjun Zhao; Yadong Wang


arXiv: Software Engineering | 2018

An Event-based Compositional Reasoning Approach for Concurrent Reactive Systems

Yongwang Zhao; David Sanán; Fuyuan Zhang; Yang Liu

Collaboration


Dive into the Fuyuan Zhang's collaboration.

Top Co-Authors

Avatar

Yang Liu

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar

David Sanán

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Lei Ma

University of Tokyo

View shared research outputs
Top Co-Authors

Avatar

Jianjun Zhao

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Minhui Xue

East China Normal University

View shared research outputs
Top Co-Authors

Avatar

Yadong Wang

Harbin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Bo Li

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Li Li

National University of Singapore

View shared research outputs
Researchain Logo
Decentralizing Knowledge