{"id":488,"date":"2024-12-09T15:26:23","date_gmt":"2024-12-09T18:26:23","guid":{"rendered":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/?p=488"},"modified":"2024-12-09T15:26:23","modified_gmt":"2024-12-09T18:26:23","slug":"aporte-a-la-confiabilidad-de-software-embebido-escrito-en-c-mediante-contratos-y-analisis-estatico-con-verifast","status":"publish","type":"post","link":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/2024\/12\/09\/aporte-a-la-confiabilidad-de-software-embebido-escrito-en-c-mediante-contratos-y-analisis-estatico-con-verifast\/","title":{"rendered":"Aporte a la confiabilidad de software embebido escrito en C mediante contratos y an\u00e1lisis est\u00e1tico con VeriFast"},"content":{"rendered":"\n<h4 class=\"wp-block-heading has-ast-global-color-8-color has-text-color has-link-color wp-elements-c691047b9104e143d44f18bdb00e2c2e\">Abstract<\/h4>\n\n\n\n<p>Los sistemas embebidos son fundamentales en la tecnolog\u00eda actual, y el lenguaje C es ampliamente utilizado para su programaci\u00f3n. No obstante, los errores en C suelen ser dif\u00edciles de detectar con pruebas convencionales debido a su naturaleza sutil y efectos impredecibles. Para mejorar la confiabilidad del software embebido, este trabajo propone una estrategia que combina la programaci\u00f3n por contratos y la verificaci\u00f3n est\u00e1tica con VeriFast. El enfoque se aplica a dos casos de c\u00f3digo en C, con especial \u00e9nfasis en software cr\u00edtico, como drivers en arquitecturas por capas, donde los fallos en producci\u00f3n pueden generar p\u00e9rdidas significativas. La metodolog\u00eda propuesta contribuye a sistematizar las pruebas de correctitud y mejorar la confiabilidad del software embebido.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.researchgate.net\/publication\/384442154_Aporte_a_la_confiabilidad_de_software_embebido_escrito_en_C_mediante_contratos_y_analisis_estatico_con_VeriFast\">Ver Publicaci\u00f3n<\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Abstract Los sistemas embebidos son fundamentales en la tecnolog\u00eda actual, y el lenguaje C es ampliamente utilizado para su programaci\u00f3n. No obstante, los errores en C suelen ser dif\u00edciles de detectar con pruebas convencionales debido a su naturaleza sutil y efectos impredecibles. Para mejorar la confiabilidad del software embebido, este trabajo propone una estrategia que [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[7],"tags":[],"class_list":["post-488","post","type-post","status-publish","format-standard","hentry","category-publicaciones"],"_links":{"self":[{"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/posts\/488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/comments?post=488"}],"version-history":[{"count":1,"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/posts\/488\/revisions"}],"predecessor-version":[{"id":489,"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/posts\/488\/revisions\/489"}],"wp:attachment":[{"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/media?parent=488"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/categories?post=488"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ingenieria.uner.edu.ar\/nucleos\/informatica_aplicada\/index.php\/wp-json\/wp\/v2\/tags?post=488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}