Verification of Initial-State Opacity in Petri Nets

Size: px
Start display at page:

Download "Verification of Initial-State Opacity in Petri Nets"

Transcription

1 Verifiction of Initil-Stte Opcity in Petri Nets Yin Tong 1, Zhiwu Li, Crl Setzu 3 nd Alessndro Giu 4 Astrct A Petri net system is sid to e initil-stte opque if its initil stte remins opque to n externl oserver (clled n intruder). In other words, the intruder is never le to scertin tht the initil stte elongs to given set of sttes (clled secret) sed on its oservtion of the system s evolution. This pper ddresses the prolem of verifying initil-stte opcity in discrete event systems (DES) modeled y leled Petri nets. An efficient pproch to verifying initil-stte opcity is proposed sed on the notion of sis rechility grph (BRG). To pper s: Y. Tong, Z.W. Li, C. Setzu, A. Giu, Verifiction of Initil-Stte Opcity in Petri Nets, 54nd IEEE Conf. on Decision nd Control (Osk, Jpn), Dec , Yin Tong is with the School of Electro-Mechnicl Engineering, Xidin University, Xi n , Chin, nd lso with DIEE, University of Cgliri, 0913 Cgliri, Itly yintong@stu.xidin.edu.cn Zhiwu Li is with the Institute of Systems Engineering, Mcu University of Science nd Technology, Tip, Mcu, Fculty of Engineering, King Adulziz University, Jeddh 1589, Sudi Ari, nd lso with the School of Electro-Mechnicl Engineering, Xidin University, Xi n , Chin zhwli@xidin.edu.cn 3 Crl Setzu is with the Deprtment of Electricl nd Electronic Engineering, University of Cgliri, 0913 Cgliri, Itly setzu@diee.unic.it 4 Alessndro Giu is with Aix Mrseille Université, CNRS, ENSAM, Université de Toulon, LSIS UMR 796, Mrseille 13397, Frnce nd lso with DIEE, University of Cgliri, Cgliri 0913, Itly lessndro.giu@lsis.org; giu@diee.unic.it

2 I. INTRODUCTION Opcity is n informtion flow property [1], [], [3], [4] which reltes to the system s ility to hide secret ehvior from n intruder [5], [6], [7], [8], [9]. In DES models, the secret is usully defined s suset of the stte spce or lnguge (susequent opcity properties re referred to s stte-sed opcity nd lnguge-sed opcity, respectively), nd the intruder is modeled s n oserver tht hs full knowledge of the system s structure ut only hs prtil oservility over the system s evolution. Bsed on its oservtion, the intruder tries to infer the secret. Initil-stte opcity is stte-sed opcity property. A system is sid to e initil-stte opque if, given set of secret sttes, y oserving the sequence of events generted y the system, the intruder will never e le to infer tht the system s evolution strted from one of the secret sttes. In recent yers, initil-stte opcity hs een extensively studied in the frmework of utomt [8], [10], [11]. It hs een proved tht the verifiction of initil-stte opcity is PSPACE-complete [11]. Soori nd Hdjicostis [10], [11] hve shown tht y constructing the initil-stte estimtor for given nondeterministic finite utomton (NFA), initil-stte opcity cn e verified with complexity O( X ), where X is the set of sttes of the utomton. An initil-stte estimtor is deterministic finite utomton (DFA) whose sttes denote the set of initil sttes where n oserved word could hve strted nd the current sttes tht it yields. As long s n initil-stte estimtor is uilt, there is no need to reconstruct it when the secret is modified. For specific secret, verifiers re introduced in [11] to study initil-stte opcity. Insted of precisely estimting the initil stte, the verifier only records if stte is rechle from secret/non-secret sttes. Therefore, the verifiction complexity is reduced to O(4 X ). Menwhile, Wu nd Lfortune [8] propose more efficient method whose complexity is O( X ). They show tht the oserver of the reverse utomton cn e used to estimte the initil stte. Bryns et l. [4] proved tht the verifiction of initil-stte opcity for ounded PNs is decidle when the initil stte is defined s finite set of initil mrkings nd the secret is suset of it. However, in PNs the initil-stte opcity prolem is very difficult in generl, nd so fr no efficient method hs een proposed yet. For ounded PNs we my construct its rechility grph (RG), which is n utomton, so tht the forementioned pproches in utomt could e pplied. Nevertheless, this pproch will inevitly suffer from the stte explosion prolem. As compct description of the RG, sis rechility grph (BRG) hs een used to solve prolems of stte estimtion, fult dignosis [1] nd current-stte opcity [13]. The dvntge of this technique is tht only prt of the rechility spce, i.e., the set of sis mrkings (see Section IV.A), hs to e enumerted, nd ll other rechle mrkings cn e chrcterized in terms of liner lger. The BRG of PN, in generl, is smller thn the RG, ut it well chrcterizes oth the rechle mrkings nd the ehvior (lnguge) of the corresponding PN. In this pper, the verifiction of initil-stte opcity in ounded leled Petri nets is ddressed. The secret is defined s suset of the rechle mrkings. A leled Petri net is initil-stte opque with respect to secret if the intruder cn never infer tht the oserved sequence origins from secret mrking. It is known tht net is initil-stte opque if nd only if the lnguge generted from secret mrkings is suset of the lnguge generted

3 from non-secret mrkings. Therefore, the initil-stte opcity prolem in ounded leled Petri nets is trnsformed into the lnguge continment prolem in its RG. Considering tht the intruder would never distinguish possile non-secret mrking tht is rechle from secret initil mrking y firing only unoservle trnsitions, we mke the following resonle ssumption: ll mrkings rechle from secret mrking y firing only unoservle trnsitions elong to the secret. Under this ssumption, we show tht initil-stte opcity of ounded net cn e verified y justifying the lnguge continment in the corresponding BRG. Therefore, compred with using RG, the pproch proposed in this work is more efficient in generl. II. PRELIMINARIES A. Automt A non-deterministic finite-stte utomton (NFA) is 4-tuple A = (X, E,, x 0 ), where X is the finite set of sttes, E = {,, } is the lphet, X E X is the trnsition reltion with E = E {}, where is the empty word descriing unoservle events, nd x 0 X is the initil stte. The trnsition reltion specifies the dynmics of the NFA: if (x, e, x ), then from stte x the occurrence of event e E yields stte x. The trnsition reltion cn e extended to X E X: (x j0, w, x jk ) if there exists sequence of events nd sttes x j0 e j1 x j1 x jk 1 e jk x jk such tht σ = e j1... e jk genertes the word w E, x ji X for i = 0, 1,..., k, nd e ji E, (x ji 1, e ji, x ji ) for i = 1,,..., k. An NFA is denoted s A = (X, E, ) in the cse where the initil stte could e ny stte from X. The generted lnguge of n utomton A = (X, E, ) from stte x X is defined s L(A, x) = {w E x X : (x, w, x ) }. Generlly, given set of sttes Y X, we define L(A, Y ) = x Y L(A, x) the lnguge generted from the sttes in Y. B. Petri nets A Petri net is structure N = (P, T, P re, P ost), where P is set of m plces represented y circles; T is set of n trnsitions represented y rs; P re : P T N nd P ost : P T N re the pre- nd post-incidence functions tht specify the rcs directed from plces to trnsitions, nd vice vers. The incidence mtrix of net is denoted y C = P ost P re. A mrking is vector M : P N tht ssigns to ech plce non-negtive integer numer of tokens, represented y lck dots. The mrking of plce p is denoted y M(p). For economy of spce, mrkings cn lso e denoted s M = p P M(p) p (see Fig.5). A Petri net system N, M 0 is net N with initil mrking M 0. A trnsition t is enled t mrking M if M P re(, t) nd my fire yielding new mrking M = M +C(, t). We write M[σ to denote tht the sequence of trnsitions σ = t j1 t jk is enled t M, nd M[σ M to denote tht the firing of σ yields M. Given sequence σ T, we cll π : T N n the function tht ssocites with σ the Prikh vector y = π(σ) N n, i.e., y(t) = k if trnsition t ppers k times in σ. 3

4 A mrking M is rechle in N, M 0 if there exists sequence σ such tht M 0 [σ M. The set of ll mrkings rechle from M 0 defines the rechility set of N, M 0 nd is denoted y R(N, M 0 ). A PN system is ounded if there exists non-negtive integer k N such tht for ny plce p P nd for ny rechle mrking M R(N, M 0 ), M(p) k holds. A leled Petri net (LPN) is 4-tuple G = (N, M 0, E, l), where N, M 0 is the PN system, E is the lphet ( set of lels) nd l : T E {} is the leling function tht ssigns to ech trnsition t T either symol from E or the empty word. Therefore, the set of trnsitions cn e prtitioned into two disjoint sets T = T o T u, where T o = {t T l(t) E} is the set of oservle trnsitions nd T u = {t T l(t) = } is the set of unoservle trnsitions. The leling function cn e extended to firing sequences l : T E, i.e., l(σt) = l(σ)l(t) with σ T nd t T. The unoservle rech of mrking M is defined s U(M) = {M N n σ u Tu : M[σ u M }, i.e., the set of mrkings rechle from M y firing unoservle trnsitions. Given n LPN G = (N, M 0, E, l) nd mrking M R(N, M 0 ), we define the lnguge generted from M s L(N, M) = {w E σ T : M[σ nd l(σ) = w}. The generted lnguge of G is L(N, M 0 ). Furthermore, given set of mrkings Y R(N, M 0 ) of G, we define L(N, Y ) = M Y L(N, M) the lnguge generted from mrkings in Y. Given n LPN G = (N, M 0, E, l) nd the set of unoservle trnsitions T u, the T u -induced sunet N = (P, T, P re, P ost ) of N, is the net tht removes ll oservle trnsitions in T o, where P re nd P ost re the restriction of P re, P ost to T u. The incidence mtrix of the T u -induced sunet is denoted y C u = P ost P re. III. INITIAL-STATE OPACITY IN PETRI NETS A. Initil-stte opcity Definition 3.1: Given n LPN G = (N, M 0, E, l), secret is set of rechle mrkings S R(N, M 0 ). A mrking M S is sid to e secret mrking. Mrkings in S = R(N, M 0 ) \ S re non-secret mrkings. Definition 3.: Let G = (N, M 0, E, l) e n LPN nd S R(N, M 0 ) e secret. G is sid to e initil-stte opque wrt S if M S, w L(N, M) M S : w L(N, M ). In simple words, PN is initil-stte opque if for ny word w tht cn e oserved strting from some secret mrkings in S, there lwys exists (t lest) one non-secret mrking from which w could lso e generted so tht the intruder cnnot estlish if the system strted its evolution from secret or non-secret mrking. B. Verifiction of initil-stte opcity using RG Bsed on the given secret, we define the secret lnguge nd the non-secret lnguge. Definition 3.3: Given n LPN G = (N, M 0, E, l) nd secret S R(N, M 0 ), its secret lnguge is defined s L(N, S) = L(N, M), M S 4

5 nd its non-secret lnguge is defined s L(N, S) = L(N, M). M S Lemm 3.4: Let G = (N, M 0, E, l) e n LPN nd S e secret. G is initil-stte opque wrt S if nd only if L(N, S) L(N, S). Proof: Follows from Definitions 3. nd 3.3. Lemm 3.4 shows tht n LPN is opque with respect to given secret if nd only if its secret lnguge is suset of the non-secret lnguge. As result, the initil-stte opcity prolem in PNs is equivlent to the lnguge continment prolem. Therefore, in the cse of ounded nets, y constructing the RG, ll methods of verifying lnguge continment in utomt cn e pplied to solving the opcity prolem. The complexity of checking lnguge continment of two NFA hving the sme numer of sttes is O(4 X ), where X is the set of sttes [14]. Therefore, the size of the RG gretly ffects the efficiency of verifying initil-stte opcity in ounded PNs. IV. VERIFYING INITIAL-STATE OPACITY USING BRG To the est of our knowledge, no lterntive method to the one in Section III-B hs een proposed to verify initilstte opcity in ounded PNs. However, such n pproch suffers from the well-known stte explosion prolem, since the RG needs to e constructed. To overcome the potentil stte explosion prolem, we propose new method sed on BRG nlysis. A. Bsis rechility grph In the work of Csino et l. [1], [15], compct wy to represent the rechility set of PN is proposed to solve the fult dignosis prolem. Under the ssumption tht the T u -induced sunet is cyclic, only prt of the rechle mrkings of the PN, clled sis mrkings, re computed, while, ll non-sis mrkings re chrcterized y set of liner equtions ssocited with ech sis mrking. Using the notion of sis mrkings, the sis rechility grph (BRG) is defined. It is n NFA in which ech stte corresponds to sis mrking nd ll events re oservle. The BRG well preserves the informtion on the rechility set, s well s on the evolution of the PN, while its structure is usully much more compct thn the RG nd the stte explosion prolem my often e voided. The BRG s proposed in [1], [15] lso includes some dignosis informtion, which re redundnt for opcity verifiction. Herein we redefine the BRG neglecting such informtion. Before providing the lgorithm for its construction, let us recll some key definitions [1]. Definition 4.1: Given mrking M nd n oservle trnsition t T o, we define Σ(M, t) = {σ Tu M[σ M, M P re(, t)} the set of explntions of t t M. Thus Σ(M, t) is the set of unoservle sequences whose firing t M enles t. Among ll the explntions, we re interested in finding the miniml ones, i.e., the ones whose firing vector is miniml. 5

6 Definition 4.: Given mrking M nd n oservle trnsition t T o, we define Σ min (M, t) = {σ Σ(M, t) σ Σ(M, t) : π(σ ) π(σ)} the set of miniml explntions of t t M nd Y min (M, t) = {y u N nu σ Σ min (M, t) : y u = π(σ)} the corresponding set of miniml e-vectors. Algorithm 1 constructs the BRG without dignoser s sttes. We denote the BRG s n NFA B = (M B, E, ), where M B is the set of sis mrkings of the LPN, nd ll events re oservle. The trnsition reltion M B E M B is determined y the following rule. From mrking M if there is n oservle trnsition t for which n explntion exists, i.e., Σ(M, t), nd the firing of t nd one of its miniml explntions led to M, then n edge from stte M to stte M leled y l(t) is dded in the BRG, i.e., (M, l(t), M ). Algorithm 1 Construction of the BRG Input: A ounded LPN G = (N, M 0, E, l) whose T u -induced sunet is cyclic. Output: The BRG B = (M B, E, ) 1: Let M B = {M 0 } nd ssign no tg to M 0 ; : while sttes with no tg exist, do 3: select stte M M B with no tg; 4: for ll t s.t. l(t) E nd Y min (M, t), do 5: for ll y u Y min (M, t), do 6: M := M + C u y u + C(, t); 7: if M / M B, then 8: M B := M B {M }; 9: ssign no tg to M ; 10: end if 11: = {(M, l(t), M )}; 1: end for 13: end for 14: tg node M s old ; 15: end while 16: Remove ll tgs. Given word w L(B, M 0 ), sed on Algorithm 1, if (M 0, w, M) then M is the mrking reched from M 0 y firing n oservle sequence σ o tht produces w nd eventully interleved with some unoservle trnsitions whose firing is necessry to enle σ o. Therefore, M B R(N, M 0 ). Notice tht to pply BRG, two ssumptions re mde: A1) the LPN G is ounded, nd 6

7 ) 5 t 4 () t 1 () t () t 3 () p 1 p p 3 p 4 t 5 () Fig. 1. An LPN whose T u-induced sunet is cyclic.. Theorem 4.3: [1] Let G = (N, M 0, E, l) e n LPN whose T u -induced sunet is cyclic nd M B e the set (M 0,1) of sis mrkings. A mrking M is rechle if nd only if there exists sis mrking M M B such tht M U(M ). Theorem 4.3 (M 1 shows,1) tht for ny rechle (M 4,1) (M (M,1),1) mrking M, we cn lwys find sis mrking from which M cn e reched y firing unoservle trnsitions. On (M the 5,1) other hnd, given sis mrking M, if M is rechle from M y firing unoservle trnsitions, it is lso rechle from M 0. Note tht the if sttement is true, even if Assumption (MA) 3,0) is removed. (M 0,0) (M 4,0) (M 4,0) As result of Theorem 4.3, considering the T u -induced sunet is cyclic mrking is rechle from M 0 if (M 5,0) (M 5,0) nd only if there exists sis mrking M such tht M = M + C u y u llows non-negtive integer solution cn lso e generted. In ddition, the lnguge generted from stte M in the BRG is superset of the lnguge (M,1) (M 0,1) (M,1) (M 0,1),(M 4,0) generted from the(mmrking 5,0) M U(M ) with M M. Exmple 4.5: Let us consider the LPN in Fig. 1. Trnsitions t 1 nd t 3 re oservle. The lels ssigned to them re nd, respectively. For this net, there re 10 rechle mrkings nd its RG is shown in Fig.. However, there (M 4,0) (M 1,1) (M 1,1) (M 4,0) (M 5,0) (M,1) (M,1) (M 5,0),0),(M 4,0),0) A) the T u -induced sunet of G is cyclic. Assumption A1) mkes sure tht the numer of sis mrkings is finite so tht Algorithm 1 cn hlt, nd Assumption A) is common technicl ssumption when prtil oservtion prolems, e.g., fult dignosis or oservility, re considered. It llows to use the stte eqution to chrcterize the set of mrkings reched from sis mrking firing unoservle trnsitions. y u N nu. Proposition 4.4: Let G = (N, M 0, E, l) e ounded LPN, nd B = (M B, E, ) e its BRG. Given sis mrking M M B nd mrking M U(M ) with M M, we hve L(N, U(M )) = L(B, M ), nd L(N, M) L(B, M ). Proof: Since M U(M ), L(N, U(M )) = L(N, M ). Therefore, L(N, U(M )) = L(B, M ). Moreover, s M U(M ), L(N, M) L(N, U(M )) holds, i.e., L(N, M) L(B, M ). According to Proposition 4.4, the BRG of PN descries the lnguge generted from rechle mrkings s well. If word cn e generted from rechle mrking, there must exist sis mrking from which the word (M 0,1),(M 4,0) (M,1) (M 5,0) 7

8 t 5() +p t 1() t () M 1 =p M 5 =p 1 +p 3 t 4 () t () t 1() t 3() t 4() t 4() t 1() M 6 =p +p 3 t 1() t () t 3() t 4() t 1() M =p 1 t+p 1 () 4 M 8 =p 1 t () t 3 () t 5() M 3 =p +p 4 t () M 7 =p 3 t 3() M 9 =p 3 +p 4 t 3() M 4 =p 4 p 1 p p 3 p 4 t 4() t 5() t 5() t 5 () Fig.. The RG of the LPN in Fig. 1. t 1 () t 1 () t 1 () t 3 () t () p 1 p p 3 MWRONG 0 =p 1 +p EXAMPLE t 1() t 3() M 1 =p M =p 1 +p 4 t 1 () t 3 () t 1 () M 3 =p +p 4 t 3 () t 1 () M 1 =p t () M =p 3 t () M =p 3 M 0,M 1,M, M 3,M 4 M 0,M 1,M 3 M 1 t 3 () t 1 () t 4 () M 4 =p 4 t 4 () t 1 () t 1 () t 1 () t 1 () t () t 3 () Fig. 3. The BRG of the LPN in Fig. 1. M 1 =p t () M 1 =p t 3 () p 1 p p 3 p 4 M =p 3 t 3 () M 3 =p 4 M 3 =p 4 re only 5 sis mrkings M B = {M 0,..., M 4 }, nd the corresponding BRG is shown in Fig. 3. It holds U(M 0 ) = {M 0, M 5, M 8 }, U(M 1 ) = {M 1, M 5, M 6, M 7, M 8 }, U(M ) = {M, M 8 }, U(M 3 ) = {M 0, M 3, M 5, M 8, M 9 } nd U(M 4 ) = {M, M 4, M 8 }. Finlly, Proposition 4.4 cn e esily verified. B. Reduction to the lnguge continment on the BRG p +p +p 3 t () t 1() +p +p 3 p 1 t 1 () t () M 1 =p 1 M =p +p 3 M 1 =p 1 In this section we show tht, when certin ssumption on the secret is stisfied, the lnguge continment p 3 t () prolem etween the secret nd non-secret lnguges cn e reduced to the corresponding prolem of the lnguge M 3 =p generted in the BRG. Nmely, initil-stte opcity of n ounded LPN cn e verified y just nlyzing the BRG. Definition 4.6: Let G = (N, M 0, E, l) e n LPN, M B e the set of sis mrkings, nd S e secret. The secret sis mrking set S B is defined s S B = M B S, nd the non-secret sis mrking set S B is defined s S B = M B S t ()

9 t 4 () t 4 () t 1 () t 1 () t 1 () t () t 3 () M 1 =p t () p 1 p p 3 p 4 M =p 3 t 3 () Fig. 4. An LPN tht is initil-stte opque wrt S = {M 0, M }. M 3 =p 4 Given n LPN G = (N, M 0, E, l), its BRG B nd the secret S, it lwys holds L(B, S B ) L(N, S) nd L(B, S B ) L(N, S), since S B S nd S B S. Therefore, L(B, S B ) L(B, S B ) does not necessrily indicte tht L(N, S) L(N, S), or vice vers. In other words, y just constructing the BRG, initil-stte opcity of the LPN cnnot e decided for ritrry secrets. In the rest of this pper we mke the following dditionl ssumption: A3) M S, t T u : M[t M nd M / S. In other words, for ll secret mrkings there does not exist n unoservle trnsition tht leds to non-secret one. This is equivlent to ssuming tht ll mrkings in the unoservle rech of secret mrking elong to the secret. Note tht this ssumption cn e relxed y considering ll unoservle trnsitions violting Assumption A3) s oservle nd then constructing the modified BRG (see [16]). However, the numer of sttes in the modified BRG will increse. We now prove tht if Assumptions A1) to A3) re stisfied, the non-secret lnguge of net coincides with the non-secret lnguge of its BRG. Proposition 4.7: Let G = (N, M 0, E, l) e n LPN nd S e secret, which stisfy Assumptions A1) to A3). Let B e the BRG nd M B e the set of sis mrkings of G, then we hve L(B, S B ) = L(N, S). Proof: We provide sketch of the complete proof tht cn e found in [17]. The continment is trivil since S B S. Now we prove lso holds: if word is generted from nonsecret mrking, there lwys exists nonsecret sis mrking from which the word cn e generted (otherwise Assumption A3 will e contrdicted). Note tht for the secret lnguge it does not necessrily hold tht L(B, S B ) = L(N, S). Exmple 4.8: Let us consider the LPN in Fig. 4. Let S = {M 0, M } tht stisfies Assumption A3). Bsed on the BRG in Fig. 5(), we hve S B = {M 0 } nd L(N, S B ) = {, n n 1}. However, L(N, S) = {, n n 0}, i.e., L(N, S B ) L(N, S). However, the following proposition shows tht under Assumptions A1) to A3) the lnguge continment etween secret nd non-secret lnguges cn e verified y just nlyzing the BRG. Proposition 4.9: Let G = (N, M 0, E, l) e n LPN nd S e secret, which stisfy Assumptions A1) to A3). 9

10 t 4 () 1() t () t 3 () t 3 () p p 3 t 4 () p 4 t 4 () t 1 () M 1 =p t () t 1 () M 1 =p t () M =p 3 t 3 () t 1 () Mt 1 () 0 =p 1 t 1 () M 1 =p t 1 () M 1 =p t 3 () t M 3 =p 4 3 () p 3 p 4 M =p 3 t 3 () () M 3 =p 4 M 3 =p 4 () M 3 =p 4 Fig. 5. The RG () nd the BRG () of the LPN in Fig. 4. p +p +p 3 Let B e the BRG nd M t B e the set of sis mrkings of G. It holds () t 1 () L(B, S t () M 1 =p M B ) L(B, S 1 =p +p B ) L(N, S) L(N, 3 MS). 1 =p 1 p 3 Proof: We provide sketch of the completet proof () tht cn e found in [17]. According to Propositions 4.4 nd M 3 =p +p +p 3 4.7, we just need to prove L(N, S B ) L(N, S) L(N, S) L(N, S). The prt is trivil since L(N, S B ) L(N, S). Now we prove prt lso holds. Since for ll secret mrkings M tht re not sis mrkings there exists secret sis mrking M such tht M is rechle from M y firing unoservle trnsitions, words generted from M cn e lso generted from M, i.e., L(N, S \ S B ) L(N, S B ) L(N, S). Therefore, under Assumptions A1) to A3), insted of nlyzing the RG, we could verify the lnguge continment in the BRG to check if given LPN is opque wrt secret. Corollry 4.10: Let G = (N, M 0, E, l) e n LPN nd S e secret, which stisfy Assumptions A1) to A3). Let B e the BRG nd M B e the set of sis mrkings. G is initil-stte opque wrt S if nd only L(B, S B ) L(B, S B ). Proof: It follows from Lemm 3.4 nd Proposition 4.9. In other words, Corollry 4.10 proves tht the initil-stte opcity prolem in PNs is equivlent to the lnguge continment prolem in the corresponding BRG. C. Verifiction of initil-stte opcity In this section we first riefly recll technique tht is used to verify initil-stte opcity in utomt [8]. Bsed on the result in the previous section, we show tht y pplying the technique to the BRG of n LPN, initil-stte opcity of the LPN cn e effectively verified. In [8] n utomton clled n initil-stte estimtor is proposed sed on the reverse utomton. Given n utomton A without specifying its initil stte, the corresponding initil-stte estimtor A e is the oserver of its reverse utomton A r, i.e., the utomton is otined y revising ll rcs in A. In A e, the stte reched y word w is the set of sttes from which the word w cn e generted in A, where w is the reverse of w. t () 10

11 Fig. 6. An utomton A ,1,,3 0, 1, () ,1,,3 0, 1,3 1 0,1,,3 0, 1,3 0 1 () Fig. 7. The reverse utomton () nd the initil-stte estimtor () of the utomton in Fig. 6. Exmple 4.11: Let us consider the utomton A in Fig. 6 presented in [10]. Its reverse utomton A r nd the corresponding oserver A e, i.e., the initil-stte estimtor, re shown in Figs. 7() nd 7(), respectively. Let w =. In the estimtor, the reched stte is {1}, which implies tht the set of sttes tht cn generte w = in A is {1}. Theorem 4.1: [8] Let A = (X, E, ) e n utomton nd A e = (X, E, e, X 0 ) e the corresponding initilstte estimtor. Given set of sttes Y X, we hve L(A, Y ) L(A, Y ) if nd only if X e X, X e Y, where Y = X \ Y. In other words, to verify the lnguge continment the oserver of the reverse utomton needs to e constructed. The verifiction of the lnguge continment L(A, Y ) L(A, Y ) hs complexity of O( X ). Furthermore, ccording to Lemm 3.4, initil-stte opcity in ounded PNs cn e verified y pplying Theorem 4.1 to the RG. Therefore, the complexity of verifying initil-stte opcity in ounded PNs is O( R(N,M0) ). However, if the PN 11

12 5 +p ) t 3 () p M =p 1 +p 4 () t 1 () t 1 () M 0,M 1,M, M 3,M 4 M 0,M 1,M 3 M 1 M 3 =p +p 4 t 3 () t 1 () M 4 =p 4 Fig. 8. The initil-stte estimtor of the BRG in Fig. 3. nd the secret stisfy Assumptions A1) to A3), Theorem 4.1 cn e directly pplied on BRG ;0' Corollry 4.13: Let G = (N, M 0, E, l) e n LPN, S e secret tht stisfy Assumptions A1) to A3), B e the BRG of G, M B e the set of sis mrkings, nd B e = (X, E, e, X 0 ) e the corresponding initil-stte estimtor of B. LPN G is initil-stte opque wrt S if nd only if X e X, X e S B, where S B = M B S. Proof: Follows from Corollry 4.10 nd Theorem 4.1. Therefore, the complexity of using BRG to verify initil-stte opcity is O( MB ). In generl, given ounded PN, it is M B R(N, M 0 ), therefore, the efficiency of using BRG to verify opcity will not e worse thn tht of using RG. In prticulr, when unoservle trnsitions re considered, the BRG will e smller thn the RG. Moreover, exhustive enumertion is not needed to compute the BRG. Therefore, BRG rings ig dvntges over RG for verifying initil-stte opcity. Exmple 4.14: Consider gin the LPN in Fig. 1. The initil-stte estimtor of its BRG is shown in Fig. 8. Let S = {M 0, M, M 5, M 8, M 9 }, then S B = {M 0, M } nd S B = {M 1, M 3, M 4 }. According to Corollry 4.13, G is initil-stte opque wrt S, since no stte of the estimtor either coincides with S B or is strictly contined in it. V. CONCLUSIONS AND FUTURE WORK In this pper we propose n efficient pproch to verifying initil-stte opcity in ounded Petri nets. We proved tht under n cceptle ssumption on the secret, the verifiction of initil-stte opcity cn e trnsformed into lnguge continment prolem in the sis rechility grph (BRG). Therefore, initil-stte opcity cn e verified using BRG nlysis rther thn rechility grph nlysis, which provides dvntges in terms of computtionl complexity. Our future reserch will e focused on relxing the ssumption on the secret nd extend the use of the BRG to the lnguge-sed opcity nlysis. 1

13 ACKNOWLEDGMENT This work ws supported in prt y the Ntionl Nturl Science Foundtion of Chin under Grnt No , , the Recruitment Progrm of Glol Experts, nd the Science nd Technology Deprtment Fund, MSAR, under Grnt No. 066/013/A, nd the Itlin Ministry of Foreign Affir nd Interntionl Coopertion (MAECI) under project Roust Decentrlised Estimtion for lrge-scle systems (RODEO)-PGR0015. REFERENCES [1] N. Busi nd R. Gorrieri. A survey on non-interference with Petri nets. In Lectures on Concurrency nd Petri Nets, pges Springer, 004. [] V. Shmtikov. Proilistic nlysis of n nonymity system. J. of Computer Security, 1(3): , 004. [3] N.B. Hdj-Aloune, S. Lfrnce, F. Lin, J. Mullins, nd M.M. Yeddes. On the verifiction of intrnsitive noninterference in mulitlevel security. IEEE Trns. on Systems, Mn, nd Cyernetics, Prt B: Cyernetics, 35(5): , 005. [4] J.W. Bryns, M. Koutny, nd P.Y. Ryn. Modelling opcity using Petri nets. Electronic Notes in Theoreticl Computer Science, 11: , 005. [5] J.W. Bryns, M. Koutny, L. Mzré, nd P.Y. Ryn. Opcity generlised to trnsition systems. Int. J. of Informtion Security, 7(6):41 435, 008. [6] A. Soori nd C.N. Hdjicostis. Notions of security nd opcity in discrete event systems. In 46th IEEE Conf. on Decision nd Control, pges , 007. [7] E. Bdouel, M. Bednrczyk, A. Borzyszkowski, B. Cillud, nd P. Drondeu. Concurrent secrets. Discrete Event Dynmic Systems, 17(4):45 446, 007. [8] Y. Wu nd S. Lfortune. Comprtive nlysis of relted notions of opcity in centrlized nd coordinted rchitectures. Discrete Event Dynmic Systems, 3(3): , 013. [9] R. Jco, J.J Lesge, nd J.M Fure. Opcity of discrete event systems: models, vlidtion nd quntifiction. In DCDS15. [10] A. Soori nd C.N. Hdjicostis. Verifiction of initil-stte opcity in security pplictions of DES. In 9th Int. Workshop on Discrete Event Systems, pges , 008. [11] A. Soori nd C.N. Hdjicostis. Verifiction of initil-stte opcity in security pplictions of discrete event systems. Informtion Sciences, 46:115 13, 013. [1] M.P. Csino, A. Giu, M. Pocci, nd C. Setzu. Discrete event dignosis using leled Petri nets. n ppliction to mnufcturing systems. Control Engineering Prctice, 19(9): , 011. [13] Y. Tong, Z.W. Li, C. Setzu, nd A. Giu. Verifiction of current-stte opcity using Petri nets. In 015 Americn Control Conf., 015. [14] C.G. Cssndrs nd S. Lfortune. Introduction to discrete event systems. Springer, 008. [15] M.P. Csino, A. Giu, nd C. Setzu. Fult detection for discrete event systems using Petri nets with unoservle trnsitions. Automtic, 46(9): , 010. [16] M.P. Csino, A. Giu, nd C. Setzu. Dignosility of discrete-event systems using leled Petri nets. IEEE Trns. on Automtion Science nd Engineering, 11(1): , 014. [17] Y. Tong, Z.W. Li, C. Setzu, nd A. Giu. Proofs. setzu/cdc15-proofs.pdf. 13

Designing finite automata II

Designing finite automata II Designing finite utomt II Prolem: Design DFA A such tht L(A) consists of ll strings of nd which re of length 3n, for n = 0, 1, 2, (1) Determine wht to rememer out the input string Assign stte to ech of

More information

Formal Languages and Automata

Formal Languages and Automata Moile Computing nd Softwre Engineering p. 1/5 Forml Lnguges nd Automt Chpter 2 Finite Automt Chun-Ming Liu cmliu@csie.ntut.edu.tw Deprtment of Computer Science nd Informtion Engineering Ntionl Tipei University

More information

Convert the NFA into DFA

Convert the NFA into DFA Convert the NF into F For ech NF we cn find F ccepting the sme lnguge. The numer of sttes of the F could e exponentil in the numer of sttes of the NF, ut in prctice this worst cse occurs rrely. lgorithm:

More information

On Decentralized Observability of Discrete Event Systems

On Decentralized Observability of Discrete Event Systems 2011 50th IEEE Conference on Decision nd Control nd Europen Control Conference (CDC-ECC) Orlndo, FL, USA, Decemer 12-15, 2011 On Decentrlized Oservility of Discrete Event Systems M.P. Csino, A. Giu, C.

More information

Model Reduction of Finite State Machines by Contraction

Model Reduction of Finite State Machines by Contraction Model Reduction of Finite Stte Mchines y Contrction Alessndro Giu Dip. di Ingegneri Elettric ed Elettronic, Università di Cgliri, Pizz d Armi, 09123 Cgliri, Itly Phone: +39-070-675-5892 Fx: +39-070-675-5900

More information

Minimal DFA. minimal DFA for L starting from any other

Minimal DFA. minimal DFA for L starting from any other Miniml DFA Among the mny DFAs ccepting the sme regulr lnguge L, there is exctly one (up to renming of sttes) which hs the smllest possile numer of sttes. Moreover, it is possile to otin tht miniml DFA

More information

Coalgebra, Lecture 15: Equations for Deterministic Automata

Coalgebra, Lecture 15: Equations for Deterministic Automata Colger, Lecture 15: Equtions for Deterministic Automt Julin Slmnc (nd Jurrin Rot) Decemer 19, 2016 In this lecture, we will study the concept of equtions for deterministic utomt. The notes re self contined

More information

Assignment 1 Automata, Languages, and Computability. 1 Finite State Automata and Regular Languages

Assignment 1 Automata, Languages, and Computability. 1 Finite State Automata and Regular Languages Deprtment of Computer Science, Austrlin Ntionl University COMP2600 Forml Methods for Softwre Engineering Semester 2, 206 Assignment Automt, Lnguges, nd Computility Smple Solutions Finite Stte Automt nd

More information

1 Nondeterministic Finite Automata

1 Nondeterministic Finite Automata 1 Nondeterministic Finite Automt Suppose in life, whenever you hd choice, you could try oth possiilities nd live your life. At the end, you would go ck nd choose the one tht worked out the est. Then you

More information

Formal languages, automata, and theory of computation

Formal languages, automata, and theory of computation Mälrdlen University TEN1 DVA337 2015 School of Innovtion, Design nd Engineering Forml lnguges, utomt, nd theory of computtion Thursdy, Novemer 5, 14:10-18:30 Techer: Dniel Hedin, phone 021-107052 The exm

More information

Nondeterminism and Nodeterministic Automata

Nondeterminism and Nodeterministic Automata Nondeterminism nd Nodeterministic Automt 61 Nondeterminism nd Nondeterministic Automt The computtionl mchine models tht we lerned in the clss re deterministic in the sense tht the next move is uniquely

More information

AUTOMATA AND LANGUAGES. Definition 1.5: Finite Automaton

AUTOMATA AND LANGUAGES. Definition 1.5: Finite Automaton 25. Finite Automt AUTOMATA AND LANGUAGES A system of computtion tht only hs finite numer of possile sttes cn e modeled using finite utomton A finite utomton is often illustrted s stte digrm d d d. d q

More information

CMPSCI 250: Introduction to Computation. Lecture #31: What DFA s Can and Can t Do David Mix Barrington 9 April 2014

CMPSCI 250: Introduction to Computation. Lecture #31: What DFA s Can and Can t Do David Mix Barrington 9 April 2014 CMPSCI 250: Introduction to Computtion Lecture #31: Wht DFA s Cn nd Cn t Do Dvid Mix Brrington 9 April 2014 Wht DFA s Cn nd Cn t Do Deterministic Finite Automt Forml Definition of DFA s Exmples of DFA

More information

CSCI 340: Computational Models. Kleene s Theorem. Department of Computer Science

CSCI 340: Computational Models. Kleene s Theorem. Department of Computer Science CSCI 340: Computtionl Models Kleene s Theorem Chpter 7 Deprtment of Computer Science Unifiction In 1954, Kleene presented (nd proved) theorem which (in our version) sttes tht if lnguge cn e defined y ny

More information

Regular expressions, Finite Automata, transition graphs are all the same!!

Regular expressions, Finite Automata, transition graphs are all the same!! CSI 3104 /Winter 2011: Introduction to Forml Lnguges Chpter 7: Kleene s Theorem Chpter 7: Kleene s Theorem Regulr expressions, Finite Automt, trnsition grphs re ll the sme!! Dr. Neji Zgui CSI3104-W11 1

More information

Automata Theory 101. Introduction. Outline. Introduction Finite Automata Regular Expressions ω-automata. Ralf Huuck.

Automata Theory 101. Introduction. Outline. Introduction Finite Automata Regular Expressions ω-automata. Ralf Huuck. Outline Automt Theory 101 Rlf Huuck Introduction Finite Automt Regulr Expressions ω-automt Session 1 2006 Rlf Huuck 1 Session 1 2006 Rlf Huuck 2 Acknowledgement Some slides re sed on Wolfgng Thoms excellent

More information

12.1 Nondeterminism Nondeterministic Finite Automata. a a b ε. CS125 Lecture 12 Fall 2016

12.1 Nondeterminism Nondeterministic Finite Automata. a a b ε. CS125 Lecture 12 Fall 2016 CS125 Lecture 12 Fll 2016 12.1 Nondeterminism The ide of nondeterministic computtions is to llow our lgorithms to mke guesses, nd only require tht they ccept when the guesses re correct. For exmple, simple

More information

80 CHAPTER 2. DFA S, NFA S, REGULAR LANGUAGES. 2.6 Finite State Automata With Output: Transducers

80 CHAPTER 2. DFA S, NFA S, REGULAR LANGUAGES. 2.6 Finite State Automata With Output: Transducers 80 CHAPTER 2. DFA S, NFA S, REGULAR LANGUAGES 2.6 Finite Stte Automt With Output: Trnsducers So fr, we hve only considered utomt tht recognize lnguges, i.e., utomt tht do not produce ny output on ny input

More information

Chapter Five: Nondeterministic Finite Automata. Formal Language, chapter 5, slide 1

Chapter Five: Nondeterministic Finite Automata. Formal Language, chapter 5, slide 1 Chpter Five: Nondeterministic Finite Automt Forml Lnguge, chpter 5, slide 1 1 A DFA hs exctly one trnsition from every stte on every symol in the lphet. By relxing this requirement we get relted ut more

More information

Revision Sheet. (a) Give a regular expression for each of the following languages:

Revision Sheet. (a) Give a regular expression for each of the following languages: Theoreticl Computer Science (Bridging Course) Dr. G. D. Tipldi F. Bonirdi Winter Semester 2014/2015 Revision Sheet University of Freiurg Deprtment of Computer Science Question 1 (Finite Automt, 8 + 6 points)

More information

The size of subsequence automaton

The size of subsequence automaton Theoreticl Computer Science 4 (005) 79 84 www.elsevier.com/locte/tcs Note The size of susequence utomton Zdeněk Troníček,, Ayumi Shinohr,c Deprtment of Computer Science nd Engineering, FEE CTU in Prgue,

More information

First Midterm Examination

First Midterm Examination Çnky University Deprtment of Computer Engineering 203-204 Fll Semester First Midterm Exmintion ) Design DFA for ll strings over the lphet Σ = {,, c} in which there is no, no nd no cc. 2) Wht lnguge does

More information

Chapter 2 Finite Automata

Chapter 2 Finite Automata Chpter 2 Finite Automt 28 2.1 Introduction Finite utomt: first model of the notion of effective procedure. (They lso hve mny other pplictions). The concept of finite utomton cn e derived y exmining wht

More information

CMSC 330: Organization of Programming Languages

CMSC 330: Organization of Programming Languages CMSC 330: Orgniztion of Progrmming Lnguges Finite Automt 2 CMSC 330 1 Types of Finite Automt Deterministic Finite Automt (DFA) Exctly one sequence of steps for ech string All exmples so fr Nondeterministic

More information

Lecture 9: LTL and Büchi Automata

Lecture 9: LTL and Büchi Automata Lecture 9: LTL nd Büchi Automt 1 LTL Property Ptterns Quite often the requirements of system follow some simple ptterns. Sometimes we wnt to specify tht property should only hold in certin context, clled

More information

Theory of Computation Regular Languages. (NTU EE) Regular Languages Fall / 38

Theory of Computation Regular Languages. (NTU EE) Regular Languages Fall / 38 Theory of Computtion Regulr Lnguges (NTU EE) Regulr Lnguges Fll 2017 1 / 38 Schemtic of Finite Automt control 0 0 1 0 1 1 1 0 Figure: Schemtic of Finite Automt A finite utomton hs finite set of control

More information

DFA minimisation using the Myhill-Nerode theorem

DFA minimisation using the Myhill-Nerode theorem DFA minimistion using the Myhill-Nerode theorem Johnn Högerg Lrs Lrsson Astrct The Myhill-Nerode theorem is n importnt chrcteristion of regulr lnguges, nd it lso hs mny prcticl implictions. In this chpter,

More information

Types of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. Comparing DFAs and NFAs (cont.) Finite Automata 2

Types of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. Comparing DFAs and NFAs (cont.) Finite Automata 2 CMSC 330: Orgniztion of Progrmming Lnguges Finite Automt 2 Types of Finite Automt Deterministic Finite Automt () Exctly one sequence of steps for ech string All exmples so fr Nondeterministic Finite Automt

More information

Compiler Design. Fall Lexical Analysis. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Fall Lexical Analysis. Sample Exercises and Solutions. Prof. Pedro C. Diniz University of Southern Cliforni Computer Science Deprtment Compiler Design Fll Lexicl Anlysis Smple Exercises nd Solutions Prof. Pedro C. Diniz USC / Informtion Sciences Institute 4676 Admirlty Wy, Suite

More information

Centrum voor Wiskunde en Informatica REPORTRAPPORT. Supervisory control for nondeterministic systems

Centrum voor Wiskunde en Informatica REPORTRAPPORT. Supervisory control for nondeterministic systems Centrum voor Wiskunde en Informtic REPORTRAPPORT Supervisory control for nondeterministic systems A. Overkmp Deprtment of Opertions Reserch, Sttistics, nd System Theory BS-R9411 1994 Supervisory Control

More information

Bases for Vector Spaces

Bases for Vector Spaces Bses for Vector Spces 2-26-25 A set is independent if, roughly speking, there is no redundncy in the set: You cn t uild ny vector in the set s liner comintion of the others A set spns if you cn uild everything

More information

Myhill-Nerode Theorem

Myhill-Nerode Theorem Overview Myhill-Nerode Theorem Correspondence etween DA s nd MN reltions Cnonicl DA for L Computing cnonicl DFA Myhill-Nerode Theorem Deepk D Souz Deprtment of Computer Science nd Automtion Indin Institute

More information

CS 275 Automata and Formal Language Theory

CS 275 Automata and Formal Language Theory CS 275 utomt nd Forml Lnguge Theory Course Notes Prt II: The Recognition Prolem (II) Chpter II.5.: Properties of Context Free Grmmrs (14) nton Setzer (Bsed on ook drft y J. V. Tucker nd K. Stephenson)

More information

p-adic Egyptian Fractions

p-adic Egyptian Fractions p-adic Egyptin Frctions Contents 1 Introduction 1 2 Trditionl Egyptin Frctions nd Greedy Algorithm 2 3 Set-up 3 4 p-greedy Algorithm 5 5 p-egyptin Trditionl 10 6 Conclusion 1 Introduction An Egyptin frction

More information

Types of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. NFA for (a b)*abb.

Types of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. NFA for (a b)*abb. CMSC 330: Orgniztion of Progrmming Lnguges Finite Automt 2 Types of Finite Automt Deterministic Finite Automt () Exctly one sequence of steps for ech string All exmples so fr Nondeterministic Finite Automt

More information

Theory of Computation Regular Languages

Theory of Computation Regular Languages Theory of Computtion Regulr Lnguges Bow-Yw Wng Acdemi Sinic Spring 2012 Bow-Yw Wng (Acdemi Sinic) Regulr Lnguges Spring 2012 1 / 38 Schemtic of Finite Automt control 0 0 1 0 1 1 1 0 Figure: Schemtic of

More information

CHAPTER 1 Regular Languages. Contents

CHAPTER 1 Regular Languages. Contents Finite Automt (FA or DFA) CHAPTE 1 egulr Lnguges Contents definitions, exmples, designing, regulr opertions Non-deterministic Finite Automt (NFA) definitions, euivlence of NFAs nd DFAs, closure under regulr

More information

More on automata. Michael George. March 24 April 7, 2014

More on automata. Michael George. March 24 April 7, 2014 More on utomt Michel George Mrch 24 April 7, 2014 1 Automt constructions Now tht we hve forml model of mchine, it is useful to mke some generl constructions. 1.1 DFA Union / Product construction Suppose

More information

3 Regular expressions

3 Regular expressions 3 Regulr expressions Given n lphet Σ lnguge is set of words L Σ. So fr we were le to descrie lnguges either y using set theory (i.e. enumertion or comprehension) or y n utomton. In this section we shll

More information

Converting Regular Expressions to Discrete Finite Automata: A Tutorial

Converting Regular Expressions to Discrete Finite Automata: A Tutorial Converting Regulr Expressions to Discrete Finite Automt: A Tutoril Dvid Christinsen 2013-01-03 This is tutoril on how to convert regulr expressions to nondeterministic finite utomt (NFA) nd how to convert

More information

On the Enforcement of a Class of Nonlinear Constraints on Petri Nets

On the Enforcement of a Class of Nonlinear Constraints on Petri Nets On the Enforcement of Clss of Nonliner Constrints on Petri Nets YuFeng Chen, ZhiWu Li, Kmel Brkoui, nd Alessndro Giu * April 14, 2015 Abstrct This pper focuses on the enforcement of nonliner constrints

More information

Tutorial Automata and formal Languages

Tutorial Automata and formal Languages Tutoril Automt nd forml Lnguges Notes for to the tutoril in the summer term 2017 Sestin Küpper, Christine Mik 8. August 2017 1 Introduction: Nottions nd sic Definitions At the eginning of the tutoril we

More information

CS415 Compilers. Lexical Analysis and. These slides are based on slides copyrighted by Keith Cooper, Ken Kennedy & Linda Torczon at Rice University

CS415 Compilers. Lexical Analysis and. These slides are based on slides copyrighted by Keith Cooper, Ken Kennedy & Linda Torczon at Rice University CS415 Compilers Lexicl Anlysis nd These slides re sed on slides copyrighted y Keith Cooper, Ken Kennedy & Lind Torczon t Rice University First Progrmming Project Instruction Scheduling Project hs een posted

More information

Lecture 08: Feb. 08, 2019

Lecture 08: Feb. 08, 2019 4CS4-6:Theory of Computtion(Closure on Reg. Lngs., regex to NDFA, DFA to regex) Prof. K.R. Chowdhry Lecture 08: Fe. 08, 2019 : Professor of CS Disclimer: These notes hve not een sujected to the usul scrutiny

More information

1. For each of the following theorems, give a two or three sentence sketch of how the proof goes or why it is not true.

1. For each of the following theorems, give a two or three sentence sketch of how the proof goes or why it is not true. York University CSE 2 Unit 3. DFA Clsses Converting etween DFA, NFA, Regulr Expressions, nd Extended Regulr Expressions Instructor: Jeff Edmonds Don t chet y looking t these nswers premturely.. For ech

More information

Harvard University Computer Science 121 Midterm October 23, 2012

Harvard University Computer Science 121 Midterm October 23, 2012 Hrvrd University Computer Science 121 Midterm Octoer 23, 2012 This is closed-ook exmintion. You my use ny result from lecture, Sipser, prolem sets, or section, s long s you quote it clerly. The lphet is

More information

CS 267: Automated Verification. Lecture 8: Automata Theoretic Model Checking. Instructor: Tevfik Bultan

CS 267: Automated Verification. Lecture 8: Automata Theoretic Model Checking. Instructor: Tevfik Bultan CS 267: Automted Verifiction Lecture 8: Automt Theoretic Model Checking Instructor: Tevfik Bultn LTL Properties Büchi utomt [Vrdi nd Wolper LICS 86] Büchi utomt: Finite stte utomt tht ccept infinite strings

More information

Homework 3 Solutions

Homework 3 Solutions CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.

More information

Supervisory Control of Petri Nets with Language Specifications

Supervisory Control of Petri Nets with Language Specifications Supervisory Control of Petri Nets with Lnguge Specifictions Alessndro Giu Dip. di Ing. Elettric ed Elettronic, Università di Cgliri, Itly Emil: giu@diee.unic.it Astrct In this chpter we discuss how Petri

More information

A negative answer to a question of Wilke on varieties of!-languages

A negative answer to a question of Wilke on varieties of!-languages A negtive nswer to question of Wilke on vrieties of!-lnguges Jen-Eric Pin () Astrct. In recent pper, Wilke sked whether the oolen comintions of!-lnguges of the form! L, for L in given +-vriety of lnguges,

More information

1.4 Nonregular Languages

1.4 Nonregular Languages 74 1.4 Nonregulr Lnguges The number of forml lnguges over ny lphbet (= decision/recognition problems) is uncountble On the other hnd, the number of regulr expressions (= strings) is countble Hence, ll

More information

Parse trees, ambiguity, and Chomsky normal form

Parse trees, ambiguity, and Chomsky normal form Prse trees, miguity, nd Chomsky norml form In this lecture we will discuss few importnt notions connected with contextfree grmmrs, including prse trees, miguity, nd specil form for context-free grmmrs

More information

Intermediate Math Circles Wednesday, November 14, 2018 Finite Automata II. Nickolas Rollick a b b. a b 4

Intermediate Math Circles Wednesday, November 14, 2018 Finite Automata II. Nickolas Rollick a b b. a b 4 Intermedite Mth Circles Wednesdy, Novemer 14, 2018 Finite Automt II Nickols Rollick nrollick@uwterloo.c Regulr Lnguges Lst time, we were introduced to the ide of DFA (deterministic finite utomton), one

More information

N 0 completions on partial matrices

N 0 completions on partial matrices N 0 completions on prtil mtrices C. Jordán C. Mendes Arújo Jun R. Torregros Instituto de Mtemátic Multidisciplinr / Centro de Mtemátic Universidd Politécnic de Vlenci / Universidde do Minho Cmino de Ver

More information

Homework 4. 0 ε 0. (00) ε 0 ε 0 (00) (11) CS 341: Foundations of Computer Science II Prof. Marvin Nakayama

Homework 4. 0 ε 0. (00) ε 0 ε 0 (00) (11) CS 341: Foundations of Computer Science II Prof. Marvin Nakayama CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 4 1. UsetheproceduredescriedinLemm1.55toconverttheregulrexpression(((00) (11)) 01) into n NFA. Answer: 0 0 1 1 00 0 0 11 1 1 01 0 1 (00)

More information

Lecture 09: Myhill-Nerode Theorem

Lecture 09: Myhill-Nerode Theorem CS 373: Theory of Computtion Mdhusudn Prthsrthy Lecture 09: Myhill-Nerode Theorem 16 Ferury 2010 In this lecture, we will see tht every lnguge hs unique miniml DFA We will see this fct from two perspectives

More information

CS 373, Spring Solutions to Mock midterm 1 (Based on first midterm in CS 273, Fall 2008.)

CS 373, Spring Solutions to Mock midterm 1 (Based on first midterm in CS 273, Fall 2008.) CS 373, Spring 29. Solutions to Mock midterm (sed on first midterm in CS 273, Fll 28.) Prolem : Short nswer (8 points) The nswers to these prolems should e short nd not complicted. () If n NF M ccepts

More information

Finite Automata. Informatics 2A: Lecture 3. John Longley. 22 September School of Informatics University of Edinburgh

Finite Automata. Informatics 2A: Lecture 3. John Longley. 22 September School of Informatics University of Edinburgh Lnguges nd Automt Finite Automt Informtics 2A: Lecture 3 John Longley School of Informtics University of Edinburgh jrl@inf.ed.c.uk 22 September 2017 1 / 30 Lnguges nd Automt 1 Lnguges nd Automt Wht is

More information

Talen en Automaten Test 1, Mon 7 th Dec, h45 17h30

Talen en Automaten Test 1, Mon 7 th Dec, h45 17h30 Tlen en Automten Test 1, Mon 7 th Dec, 2015 15h45 17h30 This test consists of four exercises over 5 pges. Explin your pproch, nd write your nswer to ech exercise on seprte pge. You cn score mximum of 100

More information

12.1 Nondeterminism Nondeterministic Finite Automata. a a b ε. CS125 Lecture 12 Fall 2014

12.1 Nondeterminism Nondeterministic Finite Automata. a a b ε. CS125 Lecture 12 Fall 2014 CS125 Lecture 12 Fll 2014 12.1 Nondeterminism The ide of nondeterministic computtions is to llow our lgorithms to mke guesses, nd only require tht they ccept when the guesses re correct. For exmple, simple

More information

Finite Automata. Informatics 2A: Lecture 3. Mary Cryan. 21 September School of Informatics University of Edinburgh

Finite Automata. Informatics 2A: Lecture 3. Mary Cryan. 21 September School of Informatics University of Edinburgh Finite Automt Informtics 2A: Lecture 3 Mry Cryn School of Informtics University of Edinburgh mcryn@inf.ed.c.uk 21 September 2018 1 / 30 Lnguges nd Automt Wht is lnguge? Finite utomt: recp Some forml definitions

More information

QUADRATURE is an old-fashioned word that refers to

QUADRATURE is an old-fashioned word that refers to World Acdemy of Science Engineering nd Technology Interntionl Journl of Mthemticl nd Computtionl Sciences Vol:5 No:7 011 A New Qudrture Rule Derived from Spline Interpoltion with Error Anlysis Hdi Tghvfrd

More information

Non-Deterministic Finite Automata. Fall 2018 Costas Busch - RPI 1

Non-Deterministic Finite Automata. Fall 2018 Costas Busch - RPI 1 Non-Deterministic Finite Automt Fll 2018 Costs Busch - RPI 1 Nondeterministic Finite Automton (NFA) Alphbet ={} q q2 1 q 0 q 3 Fll 2018 Costs Busch - RPI 2 Nondeterministic Finite Automton (NFA) Alphbet

More information

Java II Finite Automata I

Java II Finite Automata I Jv II Finite Automt I Bernd Kiefer Bernd.Kiefer@dfki.de Deutsches Forschungszentrum für künstliche Intelligenz Finite Automt I p.1/13 Processing Regulr Expressions We lredy lerned out Jv s regulr expression

More information

Fundamentals of Computer Science

Fundamentals of Computer Science Fundmentls of Computer Science Chpter 3: NFA nd DFA equivlence Regulr expressions Henrik Björklund Umeå University Jnury 23, 2014 NFA nd DFA equivlence As we shll see, it turns out tht NFA nd DFA re equivlent,

More information

The University of Nottingham SCHOOL OF COMPUTER SCIENCE A LEVEL 2 MODULE, SPRING SEMESTER LANGUAGES AND COMPUTATION ANSWERS

The University of Nottingham SCHOOL OF COMPUTER SCIENCE A LEVEL 2 MODULE, SPRING SEMESTER LANGUAGES AND COMPUTATION ANSWERS The University of Nottinghm SCHOOL OF COMPUTER SCIENCE LEVEL 2 MODULE, SPRING SEMESTER 2016 2017 LNGUGES ND COMPUTTION NSWERS Time llowed TWO hours Cndidtes my complete the front cover of their nswer ook

More information

Farey Fractions. Rickard Fernström. U.U.D.M. Project Report 2017:24. Department of Mathematics Uppsala University

Farey Fractions. Rickard Fernström. U.U.D.M. Project Report 2017:24. Department of Mathematics Uppsala University U.U.D.M. Project Report 07:4 Frey Frctions Rickrd Fernström Exmensrete i mtemtik, 5 hp Hledre: Andres Strömergsson Exmintor: Jörgen Östensson Juni 07 Deprtment of Mthemtics Uppsl University Frey Frctions

More information

FABER Formal Languages, Automata and Models of Computation

FABER Formal Languages, Automata and Models of Computation DVA337 FABER Forml Lnguges, Automt nd Models of Computtion Lecture 5 chool of Innovtion, Design nd Engineering Mälrdlen University 2015 1 Recp of lecture 4 y definition suset construction DFA NFA stte

More information

Lecture 3. In this lecture, we will discuss algorithms for solving systems of linear equations.

Lecture 3. In this lecture, we will discuss algorithms for solving systems of linear equations. Lecture 3 3 Solving liner equtions In this lecture we will discuss lgorithms for solving systems of liner equtions Multiplictive identity Let us restrict ourselves to considering squre mtrices since one

More information

5. (±±) Λ = fw j w is string of even lengthg [ 00 = f11,00g 7. (11 [ 00)± Λ = fw j w egins with either 11 or 00g 8. (0 [ ffl)1 Λ = 01 Λ [ 1 Λ 9.

5. (±±) Λ = fw j w is string of even lengthg [ 00 = f11,00g 7. (11 [ 00)± Λ = fw j w egins with either 11 or 00g 8. (0 [ ffl)1 Λ = 01 Λ [ 1 Λ 9. Regulr Expressions, Pumping Lemm, Right Liner Grmmrs Ling 106 Mrch 25, 2002 1 Regulr Expressions A regulr expression descries or genertes lnguge: it is kind of shorthnd for listing the memers of lnguge.

More information

CS 330 Formal Methods and Models

CS 330 Formal Methods and Models CS 330 Forml Methods nd Models Dn Richrds, George Mson University, Spring 2017 Quiz Solutions Quiz 1, Propositionl Logic Dte: Ferury 2 1. Prove ((( p q) q) p) is tutology () (3pts) y truth tle. p q p q

More information

Context-Free Grammars and Languages

Context-Free Grammars and Languages Context-Free Grmmrs nd Lnguges (Bsed on Hopcroft, Motwni nd Ullmn (2007) & Cohen (1997)) Introduction Consider n exmple sentence: A smll ct ets the fish English grmmr hs rules for constructing sentences;

More information

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018 Finite Automt Theory nd Forml Lnguges TMV027/DIT321 LP4 2018 Lecture 10 An Bove April 23rd 2018 Recp: Regulr Lnguges We cn convert between FA nd RE; Hence both FA nd RE ccept/generte regulr lnguges; More

More information

State Minimization for DFAs

State Minimization for DFAs Stte Minimiztion for DFAs Red K & S 2.7 Do Homework 10. Consider: Stte Minimiztion 4 5 Is this miniml mchine? Step (1): Get rid of unrechle sttes. Stte Minimiztion 6, Stte is unrechle. Step (2): Get rid

More information

NFA DFA Example 3 CMSC 330: Organization of Programming Languages. Equivalence of DFAs and NFAs. Equivalence of DFAs and NFAs (cont.

NFA DFA Example 3 CMSC 330: Organization of Programming Languages. Equivalence of DFAs and NFAs. Equivalence of DFAs and NFAs (cont. NFA DFA Exmple 3 CMSC 330: Orgniztion of Progrmming Lnguges NFA {B,D,E {A,E {C,D {E Finite Automt, con't. R = { {A,E, {B,D,E, {C,D, {E 2 Equivlence of DFAs nd NFAs Any string from {A to either {D or {CD

More information

ɛ-closure, Kleene s Theorem,

ɛ-closure, Kleene s Theorem, DEGefW5wiGH2XgYMEzUKjEmtCDUsRQ4d 1 A nice pper relevnt to this course is titled The Glory of the Pst 2 NICTA Resercher, Adjunct t the Austrlin Ntionl University nd Griffith University ɛ-closure, Kleene

More information

Grammar. Languages. Content 5/10/16. Automata and Languages. Regular Languages. Regular Languages

Grammar. Languages. Content 5/10/16. Automata and Languages. Regular Languages. Regular Languages 5//6 Grmmr Automt nd Lnguges Regulr Grmmr Context-free Grmmr Context-sensitive Grmmr Prof. Mohmed Hmd Softwre Engineering L. The University of Aizu Jpn Regulr Lnguges Context Free Lnguges Context Sensitive

More information

Resistive Network Analysis

Resistive Network Analysis C H A P T E R 3 Resistive Network Anlysis his chpter will illustrte the fundmentl techniques for the nlysis of resistive circuits. The methods introduced re sed on the circuit lws presented in Chpter 2:

More information

CM10196 Topic 4: Functions and Relations

CM10196 Topic 4: Functions and Relations CM096 Topic 4: Functions nd Reltions Guy McCusker W. Functions nd reltions Perhps the most widely used notion in ll of mthemtics is tht of function. Informlly, function is n opertion which tkes n input

More information

Closure Properties of Regular Languages

Closure Properties of Regular Languages Closure Properties of Regulr Lnguges Regulr lnguges re closed under mny set opertions. Let L 1 nd L 2 e regulr lnguges. (1) L 1 L 2 (the union) is regulr. (2) L 1 L 2 (the conctention) is regulr. (3) L

More information

Finite Automata-cont d

Finite Automata-cont d Automt Theory nd Forml Lnguges Professor Leslie Lnder Lecture # 6 Finite Automt-cont d The Pumping Lemm WEB SITE: http://ingwe.inghmton.edu/ ~lnder/cs573.html Septemer 18, 2000 Exmple 1 Consider L = {ww

More information

The Cayley-Hamilton Theorem For Finite Automata. Radu Grosu SUNY at Stony Brook

The Cayley-Hamilton Theorem For Finite Automata. Radu Grosu SUNY at Stony Brook The Cyley-Hmilton Theorem For Finite Automt Rdu Grosu SUNY t Stony Brook How did I get interested in this topic? Convergence of Theories Hyrid Systems Computtion nd Control: - convergence etween control

More information

Random subgroups of a free group

Random subgroups of a free group Rndom sugroups of free group Frédérique Bssino LIPN - Lortoire d Informtique de Pris Nord, Université Pris 13 - CNRS Joint work with Armndo Mrtino, Cyril Nicud, Enric Ventur et Pscl Weil LIX My, 2015 Introduction

More information

First Midterm Examination

First Midterm Examination 24-25 Fll Semester First Midterm Exmintion ) Give the stte digrm of DFA tht recognizes the lnguge A over lphet Σ = {, } where A = {w w contins or } 2) The following DFA recognizes the lnguge B over lphet

More information

Foundations of XML Types: Tree Automata

Foundations of XML Types: Tree Automata 1 / 43 Foundtions of XML Types: Tree Automt Pierre Genevès CNRS (slides mostly sed on slides y W. Mrtens nd T. Schwentick) University of Grenole Alpes, 2017 2018 2 / 43 Why Tree Automt? Foundtions of XML

More information

Speech Recognition Lecture 2: Finite Automata and Finite-State Transducers. Mehryar Mohri Courant Institute and Google Research

Speech Recognition Lecture 2: Finite Automata and Finite-State Transducers. Mehryar Mohri Courant Institute and Google Research Speech Recognition Lecture 2: Finite Automt nd Finite-Stte Trnsducers Mehryr Mohri Cournt Institute nd Google Reserch mohri@cims.nyu.com Preliminries Finite lphet Σ, empty string. Set of ll strings over

More information

On Binary Words Being Petri Net Solvable

On Binary Words Being Petri Net Solvable On Binry Words Being Petri Net Solvle Kmil Brylsk 1,, Eike Best 1,, Evgeny Erofeev 1, Luksz Mikulski, Mrcin Pi tkowski 1 Deprtment of Comp. Sci., Crl von Ossietzky Univ. Oldenurg, Germny {eike.est,evgeny.erofeev}@informtik.uni-oldenurg.de

More information

Thoery of Automata CS402

Thoery of Automata CS402 Thoery of Automt C402 Theory of Automt Tle of contents: Lecture N0. 1... 4 ummry... 4 Wht does utomt men?... 4 Introduction to lnguges... 4 Alphets... 4 trings... 4 Defining Lnguges... 5 Lecture N0. 2...

More information

Math 4310 Solutions to homework 1 Due 9/1/16

Math 4310 Solutions to homework 1 Due 9/1/16 Mth 4310 Solutions to homework 1 Due 9/1/16 1. Use the Eucliden lgorithm to find the following gretest common divisors. () gcd(252, 180) = 36 (b) gcd(513, 187) = 1 (c) gcd(7684, 4148) = 68 252 = 180 1

More information

CS375: Logic and Theory of Computing

CS375: Logic and Theory of Computing CS375: Logic nd Theory of Computing Fuhu (Frnk) Cheng Deprtment of Computer Science University of Kentucky 1 Tle of Contents: Week 1: Preliminries (set lger, reltions, functions) (red Chpters 1-4) Weeks

More information

Lecture 3: Equivalence Relations

Lecture 3: Equivalence Relations Mthcmp Crsh Course Instructor: Pdric Brtlett Lecture 3: Equivlence Reltions Week 1 Mthcmp 2014 In our lst three tlks of this clss, we shift the focus of our tlks from proof techniques to proof concepts

More information

Safety Controller Synthesis for Switched Systems using Multiscale Symbolic Models

Safety Controller Synthesis for Switched Systems using Multiscale Symbolic Models Sfety Controller Synthesis for Switched Systems using Multiscle Symolic Models Antoine Girrd Lortoire des Signux et Systèmes Gif sur Yvette, Frnce Workshop on switching dynmics & verifiction Pris, Jnury

More information

Regular Languages and Applications

Regular Languages and Applications Regulr Lnguges nd Applictions Yo-Su Hn Deprtment of Computer Science Yonsei University 1-1 SNU 4/14 Regulr Lnguges An old nd well-known topic in CS Kleene Theorem in 1959 FA (finite-stte utomton) constructions:

More information

Designing Information Devices and Systems I Spring 2018 Homework 7

Designing Information Devices and Systems I Spring 2018 Homework 7 EECS 16A Designing Informtion Devices nd Systems I Spring 2018 omework 7 This homework is due Mrch 12, 2018, t 23:59. Self-grdes re due Mrch 15, 2018, t 23:59. Sumission Formt Your homework sumission should

More information

Table of contents: Lecture N Summary... 3 What does automata mean?... 3 Introduction to languages... 3 Alphabets... 3 Strings...

Table of contents: Lecture N Summary... 3 What does automata mean?... 3 Introduction to languages... 3 Alphabets... 3 Strings... Tle of contents: Lecture N0.... 3 ummry... 3 Wht does utomt men?... 3 Introduction to lnguges... 3 Alphets... 3 trings... 3 Defining Lnguges... 4 Lecture N0. 2... 7 ummry... 7 Kleene tr Closure... 7 Recursive

More information

Analytically, vectors will be represented by lowercase bold-face Latin letters, e.g. a, r, q.

Analytically, vectors will be represented by lowercase bold-face Latin letters, e.g. a, r, q. 1.1 Vector Alger 1.1.1 Sclrs A physicl quntity which is completely descried y single rel numer is clled sclr. Physiclly, it is something which hs mgnitude, nd is completely descried y this mgnitude. Exmples

More information

CHAPTER 1 PROGRAM OF MATRICES

CHAPTER 1 PROGRAM OF MATRICES CHPTER PROGRM OF MTRICES -- INTRODUCTION definition of engineering is the science y which the properties of mtter nd sources of energy in nture re mde useful to mn. Thus n engineer will hve to study the

More information

1.3 Regular Expressions

1.3 Regular Expressions 56 1.3 Regulr xpressions These hve n importnt role in describing ptterns in serching for strings in mny pplictions (e.g. wk, grep, Perl,...) All regulr expressions of lphbet re 1.Ønd re regulr expressions,

More information

Advanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004

Advanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004 Advnced Clculus: MATH 410 Notes on Integrls nd Integrbility Professor Dvid Levermore 17 October 2004 1. Definite Integrls In this section we revisit the definite integrl tht you were introduced to when

More information

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS.

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS. THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS RADON ROSBOROUGH https://intuitiveexplntionscom/picrd-lindelof-theorem/ This document is proof of the existence-uniqueness theorem

More information