Golok: Push-button Verification of Parameterized Systems

作者: David Samuelson , Samik Basu , Youssef Hanna , Hridesh Rajan Tr

DOI:

关键词:

摘要: ion techniques include counter abstraction [German and Sistla 1992; Pnueli et al. 2002] environment [Clarke 2006; 2008]. The idea behind is to abstract process identities, where every state contains an denoting the number of processes in state. Environment closest our work. It follows a similar approach as abstraction; however, counting done for satisfying given predicate. An generated reference show all possible relations this can have with its environment; which closely related technique we compute maximal behavior that induce arbitrary environment. advantage these abstraction-based they verify class ACM Journal Name, Vol. V, No. N, March 2010. Golok: Push-button Verification Parameterized Systems · 29 parameterized systems do not currently cover: whose individual are necessarily finite-state such Lamport’s Bakery algorithm [Lamport 1974] Szymanski’s [Szymanski 1988]; typically either require human guidance obtaining appropriate or applicable certain restricted and/or properties (e.g., universal path properties). 8.2 Smart representation-based Techniques Another rely on smart representation mechanism based regular language [Bouajjani 2000; Abdulla 2002; 2007; Fisman 2008] graph-based [Saksena 2008; Baldan 2005; Llorens Oliver 2004] representations state-space system. These approaches verification safety/reachabil- ity systems. Recently, petri-net has been proposed 2007] tokens used denote pa- rameter system new logic, colored markings logic (CML), developed reason about petri-nets. work provides generic framework representing rameterized identifies fragment CML satisfiability problem decidable. Similar abstraction, some allow sys- tems infinite-state processes. On other hand, most provide algorithmic focus only one two classes while (but incomplete) works several classes. We also present implementation prove applicability. 8.3 Induction-based induction use network invariants reduce parameter- ized finite model checking [Wolper Lovinfosse 1990; Arons 2001; Clarke 1995]. find invariant I preserved by computation steps Therefore, if satisfies desired property specification φ then φ. generation usually requires man- ual guidance, cut-off fully automatic. [Pnueli 2001] computed automatically once relation provided. advantadge it covers bounded-data model; type clear how may be multi-parameterized 8.4 Cut-off Computation Closest solutions computing parameter [Emerson Namjoshi 1995; Emerson Kahlon 2003; 1996; Ball Yang Li 2010; Ip Dill Bingham Hu Siirtola 2010]. This aims equivalent one, finding k objective establish satisfied any (≥ k) [EmerACM 30 Hanna, Samuelson, Basu Rajan son 1995] values different types ring topology. In contrast above techniques, automatic, does depend specific independent communication topology sound but incomplete method takes input description terms standard input/output automata establishes value. While first time bound property; considering being verified cut-off, tighter obtained. For instance, using Namjoshi’s 1995], cannot enter critical section at same, size 4; value identified (token protocol) 2. short, topology, central theme develop applied 9. CONCLUSION AND FUTURE WORK correctness important prob- lem 2006]. Considering undecidable general [Apt Kozen 1986], heuristics solving subset scenarios equally problem. To end, shown effective existing approach, behavioral-automata com- position, automatic generating system, there exists more than unbounded communicate via both single-cast broadcast. Furthermore, effectively utilizing descriptions allows us obtain system-specific 14 out 15 cases were found lower previ- ously discovered bounds. A large extent, dictates space needs explored formal technique. systematic find- ing thus foundational advance towards improved scalability techniques. implemented tool, Golok, applicability Future includes extending theoretical practical treatment behavioral- composition explore expressive protocols cap- ture infinite-domain data. would sensible extract behavioral from common programming languages Golok real-world software 31

参考文章(46)
Zohar Manna, Amir Pnueli, An exercise in the verification of multi-process programs Beauty is our business. pp. 289- 301 ,(1990) , 10.1007/978-1-4612-4476-9_34
Zohar Manna, Amir Pnueli, Verification of parameterized programs Specification and validation methods. pp. 167- 230 ,(1995)
Pierre Wolper, Vinciane Lovinfosse, Verifying Properties of Large Sets of Processes with Network Invariants computer aided verification. ,vol. 407, pp. 68- 80 ,(1990) , 10.1007/3-540-52148-8_6
Moshe Y. Vardi, Branching vs. Linear Time: Final Showdown tools and algorithms for construction and analysis of systems. pp. 1- 22 ,(2001) , 10.1007/3-540-45319-9_1
N.A. Lynch, M.R. Tuttle, An introduction to input/output automata CWI quarterly. ,vol. 2, pp. 219- 246 ,(1989)
Jim Handy, The Cache Memory Book ,(1993)
Barbara König, Arend Rensink, Paolo Baldan, Summary 2: Graph Grammar Verification through Abstraction dagstuhl seminar proceedings. pp. 0- ,(2005)
Jesse Bingham, Alan J. Hu, Empirically Efficient Verification for a Class of Infinite-State Systems Tools and Algorithms for the Construction and Analysis of Systems. pp. 77- 92 ,(2005) , 10.1007/978-3-540-31980-1_6
E. Allen Emerson, Vineet Kahlon, Exact and Efficient Verification of Parameterized Cache Coherence Protocols Lecture Notes in Computer Science. pp. 247- 262 ,(2003) , 10.1007/978-3-540-39724-3_22
Marisa Llorens, Javier Oliver, Introducing Structural Dynamic Changes in Petri Nets: Marked-Controlled Reconfigurable Nets automated technology for verification and analysis. pp. 310- 323 ,(2004) , 10.1007/978-3-540-30476-0_26