Catálogo de publicaciones - libros
Theoretical Aspects of Computing: ICTAC 2006: Third International Colloquium, Tunis, Tunisia, November 20-24, 2006. Proceedings
Kamel Barkaoui ; Ana Cavalcanti ; Antonio Cerone (eds.)
En conferencia: 3º International Colloquium on Theoretical Aspects of Computing (ICTAC) . Tunis, Tunisia . November 20, 2006 - November 24, 2006
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
No disponibles.
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2006 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-48815-6
ISBN electrónico
978-3-540-48816-3
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2006
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2006
Cobertura temática
Tabla de contenidos
doi: 10.1007/11921240_11
Handling Algebraic Properties in Automatic Analysis of Security Protocols
Y. Boichut; P. -C. Héam; O. Kouchnarenko
In this paper we extend the approximation based theoretical framework in which the security problem – secrecy preservation against an intruder – may be semi-decided through a reachability verification.
We explain how to cope with algebraic properties for an automatic approximation-based analysis of security protocols. We prove that if the initial knowledge of the intruder is a regular tree language, then the security problem may by semi-decided for protocols using cryptographic primitives with algebraic properties. More precisely, an automatically generated approximation function enables us 1) an automatic normalization of transitions, and 2) an automatic completion procedure. The main advantage of our approach is that the approximation function makes it possible to verify security protocols with an arbitrary number of sessions.
The concepts are illustrated on an example of the protocol using a cryptographic primitive with the exclusive or algebraic property.
- Model Checking | Pp. 153-167
doi: 10.1007/11921240_12
A Compositional Algorithm for Parallel Model Checking of Polygonal Hybrid Systems
Gordon Pace; Gerardo Schneider
The reachability problem as well as the computation of the phase portrait for the class of planar hybrid systems defined by constant differential inclusions (SPDI), has been shown to be decidable. The existing reachability algorithm is based on the exploitation of topological properties of the plane which are used to accelerate certain kind of cycles. The complexity of the algorithm makes the analysis of large systems generally unfeasible. In this paper we present a compositional parallel algorithm for reachability analysis of SPDIs. The parallelization is based on the qualitative information obtained from the phase portrait of an SPDI, in particular the controllability kernel.
- Model Checking | Pp. 168-182
doi: 10.1007/11921240_13
Thread-Modular Verification Is Cartesian Abstract Interpretation
Alexander Malkis; Andreas Podelski; Andrey Rybalchenko
Verification of multithreaded programs is difficult. It requires reasoning about state spaces that grow exponentially in the number of concurrent threads. Successful verification techniques based on modular composition of over-approximations of thread behaviors have been designed for this task. These techniques have been traditionally described in assume-guarantee style, which does not admit reasoning about the abstraction properties of the involved compositional argument. Flanagan and Qadeer thread-modular algorithm is a characteristic representative of such techniques. In this paper, we investigate the formalization of this algorithm in the framework of abstract interpretation. We identify the abstraction that the algorithm implements; its definition involves Cartesian products of sets. Our result provides a basis for the systematic study of similar abstractions for dealing with the state explosion problem. As a first step in this direction, our result provides a characterization of a minimal increase in the precision of the Flanagan and Qadeer algorithm that leads to the loss of its polynomial complexity.
- Model Checking | Pp. 183-197
doi: 10.1007/11921240_14
Capture-Avoiding Substitution as a Nominal Algebra
Murdoch J. Gabbay; Aad Mathijssen
Substitution is fundamental to computer science, underlying for example quantifiers in predicate logic and beta-reduction in the lambda-calculus. So is substitution something we define on syntax on a case-by-case basis, or can we turn the idea of ‘substitution’ into a mathematical object?
We exploit the new framework of Nominal Algebra to axiomatise substitution. We prove our axioms sound and complete with respect to a canonical model; this turns out to be quite hard, involving subtle use of results of rewriting and algebra.
- Formal Languages | Pp. 198-212
doi: 10.1007/11921240_15
Prime Decomposition Problem for Several Kinds of Regular Codes
Kieu Van Hung; Do Long Van
Given a class of codes. A regular code in is called prime if it cannot be decomposed as a catenation of at least two non-trivial regular codes in . The prime decomposition problem for the class of codes consists in decomposing regular codes in into prime factors in . In this paper, a general approach to this problem is proposed, by means of which solutions for the prime decomposition problem are obtained, in a unified way, for several classes of codes. These classes are all subclasses of prefix codes and can be defined by binary relations.
- Formal Languages | Pp. 213-227
doi: 10.1007/11921240_16
A New Approach to Determinisation Using Bit-Parallelism
Jan Šupol; Bořivoj Melichar
We present a new approach to the determinisation process of specified types of automata using bit-parallel algorithms. We present the determinisation of nondeterministic pattern matching automata () for approximate pattern matching and we introduce the determinisation of suffix automata. This new approach speeds the determinisation up to times, where is the length of the pattern searched by , or accepted by the suffix automaton, respectively.
- Formal Languages | Pp. 228-241
doi: 10.1007/11921240_17
Proving ATL* Properties of Infinite-State Systems
Matteo Slanina; Henny B. Sipma; Zohar Manna
Alternating temporal logic (*) was introduced to prove properties of multi-agent systems in which the agents have different objectives and may collaborate to achieve them. Examples include (distributed) controlled systems, security protocols, and contract-signing protocols. Proving * properties over finite-state systems was shown decidable by Alur et al., and a model checker for the sublanguage implemented in .
In this paper we present a sound and complete proof system for proving * properties over infinite-state systems. The proof system reduces proofs of * properties over systems to first-order verification conditions in the underlying assertion language. The verification conditions make use of predicate transformers that depend on the system structure, so that proofs over systems with a simpler structure, e.g., turn-based systems, directly result in simpler verification conditions. We illustrate the use of the proof system on a small example.
- Logic and Type Theory | Pp. 242-256
doi: 10.1007/11921240_18
Type Safety for FJ and FGJ
Shuling Wang; Quan Long; Zongyan Qiu
Mainly concerned with type safety, Featherweight Java, or FJ, is a well known minimal core for Java and Generic Java. However, in the type system of FJ, the treatment of downcast is omitted. In this paper we propose a stronger type system for FJ and FGJ. In order to deal with the cast problems, we introduce some special techniques for types, and also strengthen the types for expressions and methods in terms of the type declaration notations. Supported by the type system and our techniques, we can ensure properties stronger than the ones proved in Igarashi ’s original FJ paper. Examples making the above mentioned contributions clear are illustrated throughout this paper. Furthermore a case study on design patterns showing the advantages of our results is given.
- Logic and Type Theory | Pp. 257-271
doi: 10.1007/11921240_19
Partizan Games in Isabelle/HOLZF
Steven Obua
(PGs) were invented by John H. Conway and are described in his book . We formalize PGs in Higher Order Logic extended with ZF axioms (HOLZF) using Isabelle, a mechanical proof assistant. We show that PGs can be defined as the unique fixpoint of a function that arises naturally from Conway’s original definition. While the construction of PGs in HOLZF relies heavily on the ZF axioms, operations on PGs are defined on a game type that hides its set theoretic origins. A polymorphic type of sets that are not bigger than ZF sets facilitates this. We formalize the induction principle that Conway uses throughout his proofs about games, and prove its correctness. For these purposes we examine how the notions of well-foundedness in HOL and ZF are related in HOLZF. Finally, games (modulo equality) are added to Isabelle’s numeric types by showing that they are an instance of the axiomatic type class of partially ordered abelian groups.
- Logic and Type Theory | Pp. 272-286
doi: 10.1007/11921240_20
Proof-Producing Program Analysis
Amine Chaieb
Proof-producing program analysis augments the invariants inferred by an abstract interpreter with their correctness proofs. If these invariants are precise enough to guarantee safety, this method is an automatic verification tool. We present proof-synthesis algorithms for a simple flow chart language and domains mapping variables to abstract values and discuss some benefits for proof carrying code systems. Our work has been carried out in Isabelle/HOL and incorporated within a verified proof carrying code system.
- Logic and Type Theory | Pp. 287-301