Catálogo de publicaciones - libros

Compartir en
redes sociales


Automated Technology for Verification and Analysis: 5th International Symposium, ATVA 2007 Tokyo, Japan, October 22-25, 2007 Proceedings

Kedar S. Namjoshi ; Tomohiro Yoneda ; Teruo Higashino ; Yoshio Okamura (eds.)

En conferencia: 5º International Symposium on Automated Technology for Verification and Analysis (ATVA) . Tokyo, Japan . October 22, 2007 - October 25, 2007

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-75595-1

ISBN electrónico

978-3-540-75596-8

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2007

Tabla de contenidos

A Compositional Semantics for Dynamic Fault Trees in Terms of Interactive Markov Chains

Hichem Boudali; Pepijn Crouzen; Mariëlle Stoelinga

Dynamic fault trees (DFTs) are a versatile and common formalism to model and analyze the reliability of computer-based systems. This paper presents a formal semantics of DFTs in terms of input/output interactive Markov chains (I/O-IMCs), which extend continuous-time Markov chains with discrete input, output and internal actions. This semantics provides a rigorous basis for the analysis of DFTs. Our semantics is fully compositional, that is, the semantics of a DFT is expressed in terms of the semantics of its elements (i.e. basic events and gates). This enables an efficient analysis of DFTs through compositional aggregation, which helps to alleviate the state-space explosion problem by incrementally building the DFT state space. We have implemented our methodology by developing a tool, and showed, through four case studies, the feasibility of our approach and its effectiveness in reducing the state space to be analyzed.

- Regular Papers | Pp. 441-456

3-Valued Circuit SAT for STE with Automatic Refinement

Orna Grumberg; Assaf Schuster; Avi Yadgar

Symbolic Trajectory Evaluation (STE) is a powerful technique for hardware model checking. It is based on a 3-valued symbolic simulation, using 0,1 and (”unknown”), where the is used to abstract away values of the circuit nodes.

Most STE tools are BDD-based and use a dual rail representation for the three possible values of circuit nodes. SAT-based STE tools typically use two variables for each circuit node, to comply with the dual rail representation.

In this work we present a novel 3-valued Circuit SAT-based algorithm for STE. The STE problem is translated into a Circuit SAT instance. A solution for this instance implies a contradiction between the circuit and the STE assertion. An unSAT instance implies either that the assertion holds, or that the model is too abstract to be verified. In case of a too abstract model, we propose a refinement automatically.

We implemented our 3-Valued Circuit SAT-based STE algorithm and applied it successfully to several STE examples.

- Regular Papers | Pp. 457-473

Bounded Synthesis

Sven Schewe; Bernd Finkbeiner

The bounded synthesis problem is to construct an implementation that satisfies a given temporal specification and a given bound on the number of states. We present a solution to the bounded synthesis problem for linear-time temporal logic (LTL), based on a novel emptiness-preserving translation from LTL to safety tree automata. For distributed architectures, where standard unbounded synthesis is in general undecidable, we show that bounded synthesis can be reduced to a SAT problem. As a result, we obtain an effective algorithm for the bounded synthesis from LTL specifications in arbitrary architectures. By iteratively increasing the bound, our construction can also be used as a semi-decision procedure for the unbounded synthesis problem.

- Regular Papers | Pp. 474-488

Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances

Moonzoo Kim

One of the prerequisites for information society is and communication among computing systems. Accordingly, network security appliances become key components of infrastructure, not only as security guardians, but also as reliable network components. Thus, for both fault tolerance and high network throughput, multiple security appliances are often deployed together in a group and managed via protocol.

In this paper, we present our experience of formally modeling and verifying the HA protocol used for commercial network security appliances through model checking. In addition, we applied a new debugging technique to detect bugs modifying/fixing the HA model by analyzing all counter examples. Throughout these formal analysis, we could effectively detect several design flaws.

- Short Papers | Pp. 489-500

A Brief Introduction to

Mercedes G. Merayo; Manuel Núñez; Ismael Rodríguez

In this paper we extend  (Hypotheses and Observations Testing Logic) to provide a formal framework to test timed systems. The main idea underlying  is to infer whether a set of (i.e., results of test applications) allows to claim that the IUT conforms to the specification a specific set of hypotheses is assumed. In this paper we adapt to cope with the inclusion of time issues. In addition, we show the soundness and completeness of the new framework, that we call , with respect to a general notion of timed conformance.

- Short Papers | Pp. 501-510

On-the-Fly Model Checking of Fair Non-repudiation Protocols

Guoqiang Li; Mizuhito Ogawa

A fair non-repudiation protocol should guarantee, (1) when a sender sends a message to a receiver, neither the sender nor the receiver can deny having participated in this communication; (2) no principals can obtain evidence while the other principals cannot do so. This paper extends the model in our previous work [12], and gives a sound and complete on-the-fly model checking method for fair non-repudiation protocols under the assumption of a bounded number of sessions. We also implement the method using Maude. Our experiments automatically detect flaws of several fair non-repudiation protocols.

- Short Papers | Pp. 511-522

Model Checking Bounded Prioritized Time Petri Nets

Bernard Berthomieu; Florent Peres; François Vernadat

In a companion paper [BPV06], we investigated the expressiveness of Time Petri Nets extended with Priorities and showed that it is very close to that Timed Automata, in terms of weak timed bisimilarity. As a continuation of this work we investigate here the applicability of the available state space abstractions for Bounded Time Petri Nets to Bounded Prioritized Time Petri Nets. We show in particular that a slight extension of the “strong state classes” construction of [BV03] provides a convenient state space abstraction for these nets, preserving markings, states, and formulas. Interestingly, and conversely to Timed Automata, the construction proposed does not require to compute polyhedra differences.

- Short Papers | Pp. 523-532

Using Patterns and Composite Propositions to Automate the Generation of LTL Specifications

Salamah Salamah; Ann Q. Gates; Vladik Kreinovich; Steve Roach

Property classifications and patterns, i.e., high-level abstractions that describe common behavior, have been used to assist practitioners in generating formal specifications that can be used in formal verification techniques. The Specification Pattern System (SPS) provides descriptions of a collection of patterns. Each pattern is associated with a scope that defines the extent of program execution over which a property pattern is considered. Based on a selected pattern, SPS provides a specification for each type of scope in multiple formal languages including Linear Temporal Logic (LTL). The (Prospec) tool extends SPS by introducing the notion of Composite Propositions (CP), which are classifications for defining sequential and concurrent behavior to represent pattern and scope parameters.

In this work, we provide definitions of patterns and scopes when defined using CP classes. In addition, we provide general (template) LTL formulas that can be used to generate LTL specifications for all combinations of pattern, scope, and CP classes.

- Short Papers | Pp. 533-542

Pruning State Spaces with Extended Beam Search

Mohammad Torabi Dashti; Anton J. Wijs

This paper focuses on using beam search, a heuristic search algorithm, for pruning state spaces while generating. The original beam search is adapted to the state space generation setting and two new search variants are devised. The resulting framework encompasses some known algorithms, such as . We also report on two case studies based on an implementation of beam search in CRL.

- Short Papers | Pp. 543-552

Using Counterexample Analysis to Minimize the Number of Predicates for Predicate Abstraction

Thanyapat Sakunkonchak; Satoshi Komatsu; Masahiro Fujita

Due to the success of the model checking technique in the hardware domain, over the last few years, model checking methods have been applied to the software domain which poses its own challenges, as software tends to be less structured than hardware. Predicate abstraction is widely applied to reduce the state-space by mapping an infinite state-space program to an abstract program of Boolean type. The cost for computation of abstraction and model checking depends on the number of state variables in the abstract model. In this paper, we propose a simple, yet efficient method to minimize the number of predicates for predicate abstraction. Given a spurious counterexample, at least one predicate is assigned at each program location during the refinement process. The computational cost depends proportionally to the number of assigned predicates. In this paper, instead, we search the counterexample to find the conflict predicates that caused this counterexample to be spurious. Then, we assign the necessary predicates to the abstract model. We compare the performance of our technique with the interpolation-based predicate abstraction tool like BLAST. The proposed method presents significantly better experimental results on some examples with large set of predicates.

- Short Papers | Pp. 553-563