FASTer acceleration of counter automata in practice

Size: px
Start display at page:

Download "FASTer acceleration of counter automata in practice"

Transcription

1 FASTer acceleration of counter automata in practice Sébastien Bardin Joint work with Jérôme Leroux and Alain Finkel LSV - CNRS & ENS de Cachan

2 Outline 1. Counter system model-checking (a) Presburger sets and automata (b) Acceleration (c) Heuristic 2. The tool FAST (a) Overview (b) Related tools (c) In practice 3. Verication of the TTP protocol with FAST (a) Presentation of the protocol (b) Verication for 1 fault and N stations (c) Polyhedral acceleration (d) Verication for 2 faults and N stations 4. Conclusion and future work

3 Counter systems model checking - 1 We focus on counter systems, which are automata extended with integer variables. Counter systems allow to model a large range of complex systems: Abstract multi-threaded java programs, Embedded systems (TTP/C), All Broadcast Protocols,...

4 Counter systems model checking - 1 We focus on counter systems, which are automata extended with integer variables. Counter systems allow to model a large range of complex systems: Abstract multi-threaded java programs, Embedded systems (TTP/C), All Broadcast Protocols,... But checking safety properties is undecidable for counter systems!!

5 Counter systems model checking - 2 To overcome this problem, we have chosen: A symbolic representation of integer vectors by automata. An acceleration technique to help convergence:

6 Notion of Acceleration acceleration to compute in one operation the iteration of a transition.

7 Notion of Acceleration acceleration to compute in one operation the iteration of a transition. If then

8 Notion of Acceleration acceleration to compute in one operation the iteration of a transition. If then With the classical algorithm

9 Notion of Acceleration acceleration to compute in one operation the iteration of a transition. If then If then With the classical algorithm.

10 Notion of Acceleration acceleration to compute in one operation the iteration of a transition. If then If then With the classical algorithm.

11 Notion of Acceleration acceleration to compute in one operation the iteration of a transition. If then If then With the classical algorithm.

12 ! Notion of Acceleration acceleration to compute in one operation the iteration of a transition. If then If then With the classical algorithm and so on!!

13 Notion of Acceleration acceleration to compute in one operation the iteration of a transition. If then With Acceleration

14 " Notion of Acceleration acceleration to compute in one operation the iteration of a transition. If then If With Acceleration then.

15 Related work FAST: Bardin, Finkel, Leroux, Petrucci [FSTTCS02], [CAV03], LASH: Boigelot, Rassart, Wolper [CAV94], [SAS95], [CAV98], [TACAS00], [CAV03], TREX: Asarin, Bouajjani, Collomb-Annichini, Lakhnech, Sighireanu, [SPIN00], [SAS01], [CAV01].

16 , dened & % $ " # Presburger sets and automata Presburger arithmetics is the rst order additive theory by 0 ) (/. ' )-' ', )' )+* ( % ( ' ( ) ( (. ) (54 )32 )1 (

17 " # )' )-' ', )' ( ) ( ( Presburger sets and automata Presburger arithmetics is the rst order additive theory by & % $, dened (/. 0 )+* ( % ( ' ) (54 )32 )1 (. This theory is decidable, and Presburger sets can be represented symbolically by automata: DFA [Boudet, Comon CAAP96], NDD [Wolper, Boigelot TACAS00], UBA [Leroux, INFINITY03].

18 " # )' )-' ', )' ( ) ( ( Presburger sets and automata Presburger arithmetics is the rst order additive theory by & % $, dened (/. 0 )+* ( % ( ' ) (54 )32 )1 (. This theory is decidable, and Presburger sets can be represented symbolically by automata: DFA [Boudet, Comon CAAP96], NDD [Wolper, Boigelot TACAS00], UBA [Leroux, INFINITY03]. This representation is closed under and : 9 are decidable. Moreover the image of a Presburger set by an afne function is still a Presburger set.

19 " # )' )-' ', )' ( ) ( ( Presburger sets and automata Presburger arithmetics is the rst order additive theory by & % $, dened (/. 0 )+* ( % ( ' ) (54 )32 )1 (. This theory is decidable, and Presburger sets can be represented symbolically by automata: DFA [Boudet, Comon CAAP96], NDD [Wolper, Boigelot TACAS00], UBA [Leroux, INFINITY03]. This representation is closed under and : 9 are decidable. Moreover the image of a Presburger set by an afne function is still a Presburger set. The automata representation provides an efcient framework to check safety properties on counter systems!!

20 @? ;? = ;? ;? = = = = Automata representation in practice - 1 in basis An automaton to < ;< = eq < ;<>= ;<>= ;< = bad

21 ;? ;? = = = = = = = = = < ;? = = < < < = = = = = = = = = = = = = = B? < B? < B? < = = = Automata representation in practice - 2 in basis An automaton to < < = ;< = ;< < < = < = <>= ;< = < <>= ;<>= < = <>= ;<>= < = ;< = C C D CED bad

22 K J F $ " : I Counter systems A Presburger-linear function is dened by where the guard is a Presburger set. I H G H G F I

23 K J F $ " : I L L L K Counter systems A Presburger-linear function is dened by where the guard is a Presburger set. I H G H G F I A counter system L is a tuple L where is a nite alphabet of actions and is a set of Presburger-linear functions. F5M P FON F5M

24 K J F $ " : I L L L K Q L K Counter systems A Presburger-linear function is dened by where the guard is a Presburger set. I H G H G F I A counter system L is a tuple L where is a nite alphabet of actions and is a set of Presburger-linear functions. F5M P FON F5M L is the multiplicative monoid generated by the set of square matrices of a counter system L. P G N

25 K J F $ " : I L L L K Q L K Counter systems A Presburger-linear function is dened by where the guard is a Presburger set. I H G H G F I A counter system L is a tuple L where is a nite alphabet of actions and is a set of Presburger-linear functions. F5M P FON F5M L is the multiplicative monoid generated by the set of square matrices of a counter system L. P G N Counter systems with a nite monoid have nice acceleration properties and appear to be well-spread in practice (transfer/reset/inhibitors Petri Nets, Broadcast protocols,... )

26 F F F R F Acceleration for counter systems Let be a function, and. TS a set, we dene the acceleration of by.

27 F F F R F F Acceleration for counter systems Let be a function, and. TS a set, we dene the acceleration of by is the relation associated with VU.

28 F F F R F F F K Acceleration for counter systems Let be a function, and. TS a set, we dene the acceleration of by is the relation associated with VU. Theorem [Finkel Leroux, FSTTCS02] For a Presburger-linear function with a nite monoid, can be computed as a Presburger formula, of the form I H G U I K Y! # [% J[ X Z Y W! - IX W ) U

29 F G Y Y Idea of the construction nite. & G # with I H G H $ \ K J $ \ ] $ \

30 F H G Y Y " NG a` NG Idea of the construction nite. & G # with I H G $ \ K J $ \ ] $ \ such that "/_ K ^ is nite, so there exists & G #

31 F H G Y Y " N N Y Y Idea of the construction nite. & G # with I H G $ \ K J $ \ ] $ \ NG a` NG such that "/_ K ^ is nite, so there exists & G # a N G b Y a èdgf $ \ K J " K Jcb Notice that

32 F H G Y Y " N N Y Y kj Y W h i m n ` N W o p W o - n b Idea of the construction nite. & G # with I H G $ \ K J $ \ ] $ \ NG a` NG such that "/_ K ^ is nite, so there exists & G # a N G b Y a èdgf $ \ K J " K Jcb Notice that $ $ _ i "/_ K W [ m a l Nl p ^ [ X [ X b. a n Y ` NG b Y. Y n n

33 F H G Y Y " N N Y Y kj Y W h i m n ` N W o p n W o - b kj F W WW - [#!! J o K Idea of the construction nite. & G # with I H G $ \ K J $ \ ] $ \ NG a` NG such that "/_ K ^ is nite, so there exists & G # a N G b Y a èdgf $ \ K J " K Jcb Notice that $ $ _ i "/_ K W [ m a l Nl p ^ [ X a n Y ` NG [ X b. b Y. Y n n [ - W U Finally we have p h WW! I K % hx K W [ [ - W is a Presburger set!! qu

34 v u u u u? v u z? v u u < x v u u? r < x? v u u u u? v u r < x u How to nd out the accelerations? < v r Wr s <>= v z Wz s w x z~ < v r Wr s w x r~ < v W us < x v r{ < v W us w x r{ u} Wz s <>= v r Wr s wyx rts Initial configuration: state=time time brake W s < = W s rts r s z s z us W us < x v < v r W s Wz s < = r s u} rts Property to check : < v r Wr s wyx z s < v W us wyx rts u}? r always holds. stop late Wz s < = W us < x v r{ < v r W s r~ u}

35 ƒ pƒ o o! ] Reduction result Theorem [reduction, Finkel Leroux FSTTCS02] Any acceleration of functions in a nite set of Presburger-linear functions can be reduced to the acceleration of functions in a reduced set, such that the cardinal of is polynomial in. p ƒ Z I 6 I m H G F m 4 I H G F I m H G F m

36 Heuristic Extension of the classic algorithm, adding cycles (meta-transitions). 2 problems: nd good cycles avoid automata explosion

37 ] Heuristic Extension of the classic algorithm, adding cycles (meta-transitions). 2 problems: nd good cycles avoid automata explosion incremental computation and reduction

38 ] ] Heuristic Extension of the classic algorithm, adding cycles (meta-transitions). 2 problems: nd good cycles avoid automata explosion incremental computation and reduction minimization step

39 ] ] 1!! % 6 1!! Š Heuristic 1. Extension of the classic algorithm, adding cycles (meta-transitions). 2 problems: nd good cycles avoid automata explosion 2. Compute ƒ Z incremental computation and reduction minimization step, the reduced set of cycles of length 3. Use the search algorithm with ˆ and 4. if a xpoint is found then return else (the stop criterion is met) do ƒ Z Œ

40 F F F Heuristic -2 The search algorithm: 2 nested greedy algorithms while there exists such that reaches new states do end while return

41 F F F # F Heuristic -2 The search algorithm: 2 nested greedy algorithms while there exists such that reaches new states do while there exists f such that ) F ) ) ) do end while end while return

42 Fast We implement our results in the tool FAST. FAST is a tool: with a powerful model, that automatically computes the reachability set in most practical cases, easy to use thanks to the GUI interface.

43 v Ž v v s s Ÿ s? Ÿ Tools with acceleration and counters acceleration auto. cycle search guards actions variable type yes yes W s Presburger FAST yes no W s convex sets LASH no W s convex sets v ž yes yes v šœš š ž TREX ž yes yes šœš šœÿ s

44 Fast architecture Machine M1 InterFAST guided edition of models and strategies control and feedback during the analysis network Machine M2 ServerFAST FAST Heuristic Acceleration Automata library

45 ( W Fast Inputs Input Model : A counter system such that each transition is: ] H 4 ] 4G ] W 4 P ] 4 ' ( P

46 ( W Fast Inputs Input Model : A counter system such that each transition is: ] H 4 ] 4G ] W 4 P ] 4 ' ( P Input Strategy : A high level query language with Automatic computation of reachability sets, Presburger solver, Modular analyzer.

47 Case Studies 80% of 40 counter systems (mainly taken from ALV, BABYLON, TREX) have been automatically analysed. In particular: Abstract multi-threaded java programs, Embedded systems (TTP/C), All Broadcast Protocols, Complex toy examples (Swimming Pool),

48 The TTP protocol - overview From car industry. Communications between embedded microprocessors (stations). Clique avoidance mechanism to prevent the partitioning of valid stations after a failure.

49 The TTP protocol - overview From car industry. Communications between embedded microprocessors (stations). Clique avoidance mechanism to prevent the partitioning of valid stations after a failure. N stations communicating through a shared bus messages are broadcast, static time slots to send and receive messages

50 The TTP protocol - overview From car industry. Communications between embedded microprocessors (stations). Clique avoidance mechanism to prevent the partitioning of valid stations after a failure. N stations communicating through a shared bus messages are broadcast, static time slots to send and receive messages Idea: a station which considers itself as faulty becomes inactive. a station which receives more invalid messages than valid ones must be faulty.

51 G [ [ The TTP protocol ƒ N a boolean matrix of size (ack) and station station ƒ U _ (fail) integer vectors of size receiving message sending from station

52 G [ o p o[ G [ The TTP protocol ƒ N a boolean matrix of size (ack) and station if else station ƒ U _ (fail) integer vectors of size receiving message correctly received then p o[ ƒ U sending p from station p o[ ƒ N

53 G [ o p o[ G [ G G The TTP protocol ƒ N a boolean matrix of size (ack) and station if else station if else ƒ U _ (fail) integer vectors of size receiving message correctly received then p o[ ƒ U sending p o[ ƒ U & p o[ ƒ N then p po[ o[ p p o[ ƒ N from station, becomes inactive, p o[ ƒ N,! p o[ ƒ U p o[

54 ª m m ª The TTP protocol - In practice stations ƒ U ƒ N ack fail inactive

55 ª m m ª The TTP protocol - In practice ack fail inactive stations ƒ U ƒ N A failure occurs while is sending.

56 ª m m ª The TTP protocol - In practice stations ƒ U ƒ N ack fail inactive

57 ª m m ª The TTP protocol - In practice stations ƒ U ƒ N ack fail inactive

58 ª m m ª The TTP protocol - In practice stations ƒ U ƒ N ack fail inactive

59 ª m m ª The TTP protocol - In practice stations ƒ U ƒ N ack fail inactive

60 ª m m ª The TTP protocol - In practice stations ƒ U ƒ N ack fail inactive

61 ª m m ª ª The TTP protocol - In practice stations ƒ U ƒ N ack fail inactive # p o ª ƒ N p o ª ƒ U then becomes inactive.

62 ª m m ª The TTP protocol - In practice stations ƒ U ƒ N ack fail inactive

63 ª m m ª The TTP protocol - In practice stations ƒ U ƒ N ack fail inactive

64 ª m m ª The TTP protocol - In practice stations ƒ U ƒ N ack fail inactive

65 ª m m ª m The TTP protocol - In practice ack fail inactive stations ƒ U ƒ N # p o m ƒ N p o m ƒ U then becomes inactive.

66 ª m m ª The TTP protocol - In practice stations ƒ U ƒ N ack fail inactive

67 ª m m ª The TTP protocol - In practice stations ƒ U ƒ N ack fail inactive Valid stations belongs to the same clique!!

68 Validation of the TTP protocol A protocol difcult to validate. Merceron and Bouajjani (FTRTFT'02):

69 Validation of the TTP protocol A protocol difcult to validate. Merceron and Bouajjani (FTRTFT'02): Manual proof of correctness (N stations, k faults). Provide a family of abstractions depending on the number of faults. Semi-automatic verication with tools LASH and ALV (N stations, 1 fault).

70 Validation of the TTP protocol A protocol difcult to validate. Merceron and Bouajjani (FTRTFT'02): Manual proof of correctness (N stations, k faults). Provide a family of abstractions depending on the number of faults. Semi-automatic verication with tools LASH and ALV (N stations, 1 fault). large parametric counter automaton (16 transitions) complex guards

71 Validation of the TTP protocol A protocol difcult to validate. Merceron and Bouajjani (FTRTFT'02): Manual proof of correctness (N stations, k faults). Provide a family of abstractions depending on the number of faults. Semi-automatic verication with tools LASH and ALV (N stations, 1 fault). large parametric counter automaton (16 transitions) complex guards Few tools are adapted.

72 Validation of the TTP protocol A protocol difcult to validate. Merceron and Bouajjani (FTRTFT'02): Manual proof of correctness (N stations, k faults). Provide a family of abstractions depending on the number of faults. Semi-automatic verication with tools LASH and ALV (N stations, 1 fault). large parametric counter automaton (16 transitions) complex guards Few tools are adapted. Interesting to test FAST on the TTP.

73 Model for the TTP, 1 fault N stations init / CF=0,CW=N,Cp=0 d=0,df=0 df<cf / df++,cp++ d<cw / d++,cp++ normal Cp=N / Cp=0,d=0,dF=0 df<cf / df++, Cp++ / C1>=0, C0>=0, C1+C0=CW, d1=1,d0=0, df=0,cp=1 d1<c1 & C1+C0 2d0>0 / d1++, Cp++ round1 d1<c1 & C1+C0 2d0<=0/ C1,dF++,CF++,Cp++ d0<c0 & C1+C0 2d1>0 / d0++, Cp++ d0<c0 & C1+C0 2d1<=0 / C0,dF++,CF++,Cp++ Cp=N / CW=C1+C0,Cp=0, d=0,df=0 df<cf / df++,cp++ Cp=N / d1=0,d0=0,df=0,cp=0 Cp=N &!(C1=0) &!(C0=0) / d1=0,d0=0,df=0,cp=0 later d1<c1 & C1>C0 / d1++,cp++ d1<c1 & C1<=C0 / C1,CF++,dF++,Cp++ d0<c0 & C0<=C1 / C0, CF++, df++,cp++ d0<c0 & C0>C1 / d0++,cp++

74 Model for the TTP, 1 fault N stations d<cw / d++,cp++ Cp=N / Cp=0,d=0,dF=0 df<cf / df++, Cp++ d1<c1 & C1+C0 2d0>0 / d1++, Cp++ d1<c1 & C1+C0 2d0<=0/ C1,dF++,CF++,Cp++ init / C1>=0, C0>=0, C1+C0=CW, d1=1,d0=0, df=0,cp=1 CF=0,CW=N,Cp=0 d=0,df=0 normal df<cf / df++,cp++ round1 d0<c0 & C1+C0 2d1>0 / d0++, Cp++ d0<c0 & C1+C0 2d1<=0 / C0,dF++,CF++,Cp++ df<cf / df++,cp++ Cp=N / d1=0,d0=0,df=0,cp=0 Cp=N &!(C1=0) &!(C0=0) / d1=0,d0=0,df=0,cp=0 later d1<c1 & C1>C0 / d1++,cp++ d1<c1 & C1<=C0 / C1,CF++,dF++,Cp++ d0<c0 & C0<=C1 / C0, CF++, df++,cp++ d0<c0 & C0>C1 / d0++,cp++

75 Verication with Fast, 1 fault A large model: 16 transitions, 9 variables easy to describe in FAST input model, full automatic verication (no intermediate property) the exact reachability set is computed the property is veried cycles of length 1, the reachability set has 27,932 nodes on a pentium 4 (2.4 GHz) with 1 Gbyte RAM, computation takes 940 sec. and 73 Mbytes.

76 Model for the TTP, 2 faults N stations t4 t6 t7 d00=0 & d11=0 & d10=0 & da00=0 & da11=0 & da10=0 & df00=0 & df11=0 & df10=0 & df=0 & Cp2=1 & Cp1=d0+d1+1 & N>=0 & CW=N & C11>=1 & C00>=1 & C10>=1 & d1<=c10 & d0<=c00 & C11+C00+C10=CW t2 t3 t25 round1 t8 t19 t18 t2 : Cp1<N & d11<c11 & CW 2d0 2d00 2d10>0/ d11++,cp1++,cp2++ t3: Cp1<N & d10<c10 d1 & CW 2d0 2d00 2d11>0/ d10++,cp1++,cp2++ t4 : Cp1<N & d00<c00 d0 & CW 2d1 2d10 2d11>0/ d00++,cp1++,cp2++ t6 : Cp1<N & d11<c11 d1 & CW 2d0 2d00 2d10<=0/ df++,cp1++,cp2++,c11 t7 : Cp1<N & d10<c10 & CW 2d0 2d00 2d11<=0/ df++,cp1++,cp2++,c10 t8 : Cp1<N &d00<c00 d0 & CW 2d1 2d10 2d11<=0/ df++,cp1++,cp2++,c00 t18 : Cp1>=N & Cp2<N & Pred1/ d11++,cp1++,cp2++,da11++ t19 : Cp1>=N & Cp2<N & Pred2/ d10++,cp1++,cp2++,da10++ t21 : Cp1>=N & Cp2<N & Pred3/d00++,Cp1++,Cp2++,dA00++ t22 : Cp1>=N & Cp2<N &!Pred1/ df++,df11++,cp1++,cp2++,c11 t23 : Cp1>=N & Cp2<N &!Pred2/ df++,df10++,cp1++,cp2++,c10 t25 : Cp1>=N & Cp2<N &!Pred3/ df++, df00++,cp1++,cp2++,c00 t33 t34 t23 later t26 t22 t27 t28 t21 t26 : Cp2=N / df=0,d11=0,d10=0,d00=0,cp2=0 t27 : Cp2<N & d11<c11 & C11 C10 C00>0 / d11++,cp2++ t28 : Cp2<N & d10<c10 & C10 C11 C00>0 / d10++,cp2++ t30 : Cp2<N & d00<c00 & C00 C10 C11>0 / d00++, Cp2++ t31 : Cp2<N & d11<c11 & C11 C10 C00<=0 / C11,Cp2++,dF++,CF++ t32 : Cp2<N & d10<c10 & C10 C11 C00<=0 / C10,Cp2++,CF++,dF++ t33 : Cp2<N & d00<c00 & C00 C10 C11<=0 / C00,Cp2++,CF++,dF++ t34 : Cp2<N & df<cf / Cp2++,dF++ t32 t30 t31 Pred1 : d1+d11 da11 df11 da10 df10 d0 d10 d00+da00+df00>0 Pred2 : d1+d10 da10 df10 da11 df11 d0 d11 d00+da00+df00>0 Pred3 : d0+d00 da00 df00 d1 d11 d10+da11+da10+df11+df10>0

77 Verication with Fast, 2 faults A very large model: 20 transitions, 18 variables Guards are very complex.

78 Verication with Fast, 2 faults A very large model: 20 transitions, 18 variables Guards are very complex. When computing the acceleration relation of transition representation exceeds its limits and FAST stops. ( «, the internal

79 Verication with Fast, 2 faults A very large model: 20 transitions, 18 variables Guards are very complex. When computing the acceleration relation of transition representation exceeds its limits and FAST stops. Intermediate automata have more than states!! ( «, the internal

80 Verication with Fast, 2 faults A very large model: 20 transitions, 18 variables Guards are very complex. When computing the acceleration relation of transition representation exceeds its limits and FAST stops. Intermediate automata have more than states!! ( «, the internal Our acceleration formula is too expensive in this case!!

81 Faster acceleration Almost all the transitions are translations over convex polyhedra

82 Faster acceleration Almost all the transitions are translations over convex polyhedra Don't need to test if all the predecessors are in the guard.

83 Faster acceleration Almost all the transitions are translations over convex polyhedra Don't need to test if all the predecessors are in the guard. We can use a simpler acceleration formula:

84 K Faster acceleration Almost all the transitions are translations over convex polyhedra Don't need to test if all the predecessors are in the guard. We can use a simpler acceleration formula: W ) U X Z Y W! - IX 1 I K Y! # [% J[

85 K Y W K! W Y Faster acceleration Almost all the transitions are translations over convex polyhedra Don't need to test if all the predecessors are in the guard. We can use a simpler acceleration formula: 1 I! # [% J[ X Z Y! - IX K W ) U I m Z l k & X Z Y! - IX K W ) U

86 K Y W K! W Y " µ ² H H Faster acceleration Almost all the transitions are translations over convex polyhedra Don't need to test if all the predecessors are in the guard. We can use a simpler acceleration formula: 1 I! # [% J[ X Z Y! - IX K W ) U I m Z l k & X Z Y! - IX K W ) U Œ ² µ ³c µ ±c² c 3 K W 4 P _ K W U

87 K Y W K! W Y " µ ² H H Faster acceleration Almost all the transitions are translations over convex polyhedra Don't need to test if all the predecessors are in the guard. We can use a simpler acceleration formula: 1 I! # [% J[ X Z Y! - IX K W ) U I m Z l k & X Z Y! - IX K W ) U Œ ² µ ³c µ ±c² c 3 K W 4 P _ K W U The polyhedral acceleration is quadratic in the size of the function while the generic formula (1) is at most elementary in the size of the function.

88 Polyhedral acceleration in practice We use the polyhedral acceleration on the TTP with 2 faults.

89 Polyhedral acceleration in practice We use the polyhedral acceleration on the TTP with 2 faults. Acceleration relations are computed.

90 Polyhedral acceleration in practice We use the polyhedral acceleration on the TTP with 2 faults. Acceleration relations are computed. For ( «it takes 18 sec, 460 Mbytes (413,447 states!!)

91 Polyhedral acceleration in practice We use the polyhedral acceleration on the TTP with 2 faults. Acceleration relations are computed. For ( «it takes 18 sec, 460 Mbytes (413,447 states!!) For a small xed number of stations (about 10), the reachability set is computed.

92 Polyhedral acceleration in practice We use the polyhedral acceleration on the TTP with 2 faults. Acceleration relations are computed. For ( «it takes 18 sec, 460 Mbytes (413,447 states!!) For a small xed number of stations (about 10), the reachability set is computed. For an arbitrary value of, the intermediate automata exceed the limit.

93 Polyhedral acceleration in practice We use the polyhedral acceleration on the TTP with 2 faults. Acceleration relations are computed. For ( «it takes 18 sec, 460 Mbytes (413,447 states!!) For a small xed number of stations (about 10), the reachability set is computed. For an arbitrary value of We have to use an overapproximation for, the intermediate automata exceed the limit..

94 Polyhedral acceleration in practice We use the polyhedral acceleration on the TTP with 2 faults. Acceleration relations are computed. For ( «it takes 18 sec, 460 Mbytes (413,447 states!!) For a small xed number of stations (about 10), the reachability set is computed. For an arbitrary value of We have to use an overapproximation for simplify some guards, remove some variables, modular analysis., the intermediate automata exceed the limit..

95 Polyhedral acceleration in practice We use the polyhedral acceleration on the TTP with 2 faults. Acceleration relations are computed. For ( «it takes 18 sec, 460 Mbytes (413,447 states!!) For a small xed number of stations (about 10), the reachability set is computed. For an arbitrary value of We have to use an overapproximation for simplify some guards, remove some variables, modular analysis., the intermediate automata exceed the limit. The protocol is veried with FAST for 2 fauts and N stations..

96 Abstraction for the TTP with 2 faults t3 t19: Cp2<N & d10<c10 / d10++,cp2++ t2 t18 : Cp2<N & d11<c11 / d11++,cp2++ t4 t21 : Cp2<N & d00<c00 / d00++,cp2++ d00=0 & d11=0 & d10=0 & Cp2=1 & N>=0 & C11>=1 & C00>=1 & C10>=1 & C00+C11+C10=N t8 t25 : Cp2<N &d00<c00 / Cp2++,C00 round1 t7 t23 : Cp2<N & d10<c10 / Cp2++,C10 t6 t22 : Cp2<N & d11<c11 / Cp2++,C11 Compute reachable states R1 t34 : Cp2<N & df<cf / Cp2++,dF++ t27 : Cp2<N & d11<c11 & C11 C10 C00>0 / d11++,cp2++ t33 : Cp2<N & d00<c00 & C00 C10 C11<=0 / C00,Cp2++,CF++,dF++ reachable states R1 later t28 : Cp2<N & d10<c10 & C10 C11 C00>0 / d10++,cp2++ t32 : Cp2<N & d10<c10 & C10 C11 C00<=0 / C10,Cp2++,dF++,CF++ t31 : Cp2<N & d11<c11 & C11 C10 C00<=0 / C11,Cp2++,dF++,CF++ t30 : Cp2<N & d00<c00 & C00 C10 C11>0 / d00++, Cp2++ Check Property P2 : Cp2=N => C11=0&C10=0&C00>0 C11=0&C10>0&C00=0 C11>0&C10=0&C00=0

97 ¹ ¹ ¹ ¹ ¹ ¹ ¹ ¹ ¹ ¹ ¹ ¹ ¹ ¹ Results Presburger acceleration polyhedral acceleration time1 memory1 time2 memory2 number of seconds Mbytes seconds Mbytes states 1 fault, N stations ,932 2 faults, 5 stations 2 faults, 10 stations 2 faults, 15 stations 2 faults, N stations ,684 12, ,427 2 faults, N stations ,036 (abstraction)

98 Conclusion and Future Works Conclusion: Polyhedral acceleration appears to be interesting in practice, But for complex systems like the TTP, we are never far from the limits of the tool. Future Works: Other specic acceleration formula, More efcient Presburger library to scale up to wider systems.

Reversal-Bounded Counter Machines

Reversal-Bounded Counter Machines Reversal-Bounded Counter Machines Stéphane Demri LSV, CNRS, ENS Cachan Workshop on Logics for Resource-Bounded Agents, Barcelona, August 2015 Overview Presburger Counter Machines Reversal-Bounded Counter

More information

FAST: Acceleration from theory to practice

FAST: Acceleration from theory to practice Software Tools for Technology Transfer manuscript No. (will be inserted by the editor) FAST: Acceleration from theory to practice Sébastien Bardin 1, Alain Finkel 2, Jérôme Leroux 3, Laure Petrucci 4 1

More information

The Affine Hull of a Binary Automaton is Computable in Polynomial Time

The Affine Hull of a Binary Automaton is Computable in Polynomial Time INFINITY 2003 Preliminary Version The Affine Hull of a Binary Automaton is Computable in Polynomial Time Jérôme Leroux 1 Laboratoire Spécification et Vérification, CNRS UMR 8643 & ENS de Cachan, 61 av.

More information

Flat acceleration in symbolic model checking

Flat acceleration in symbolic model checking Flat acceleration in symbolic model checking Sébastien Bardin 1, Alain Finkel 1, Jérôme Leroux 2, and Philippe Schnoebelen 1 1 LSV: ENS de Cachan & CNRS UMR 8643, 61, av. Pdt. Wilson, 94235 Cachan Cedex,

More information

Reversal-Bounded Counter Machines Revisited

Reversal-Bounded Counter Machines Revisited Reversal-Bounded Counter Machines Revisited Alain Finkel 1 and Arnaud Sangnier 1,2 1 LSV, ENS Cachan, CNRS & 2 EDF R&D 61 av. du pdt Wilson 94230 Cachan. France {finkel,sangnier}@lsv.ens-cachan.fr Abstract.

More information

Fast Acceleration of Ultimately Periodic Relations

Fast Acceleration of Ultimately Periodic Relations Fast Acceleration of Ultimately Periodic Relations Marius Bozga 1, Radu Iosif 1, Filip Konečný 1,2 1 VERIMAG / CNRS / University of Grenoble, France 2 Brno University of Technology, Czech Republic Fast

More information

Flat counter automata almost everywhere!

Flat counter automata almost everywhere! Flat counter automata almost everywhere! Jérôme Leroux and Grégoire Sutre Projet Vertecs, IRISA / INRIA Rennes, FRANCE Équipe MVTsi, CNRS / LABRI, FRANCE Counter-automata verification A simple counter-automata:

More information

Emmanuelle Encrenaz Alain Finkel. Automatic verification of counter systems with ranking function. Research Report LSV-07-25

Emmanuelle Encrenaz Alain Finkel. Automatic verification of counter systems with ranking function. Research Report LSV-07-25 Emmanuelle Encrenaz Alain Finkel Automatic verification of counter systems with ranking function Research Report LSV-07-25 July 2007 or with entcsmacro.sty for your meeting. Both can be found at the ENTCS

More information

Taming Past LTL and Flat Counter Systems

Taming Past LTL and Flat Counter Systems Taming Past LTL and Flat Counter Systems Stéphane Demri 2, Amit Kumar Dhar 1, Arnaud Sangnier 1 1. LIAFA, Univ Paris Diderot, Sorbonne Paris Cité, CNRS, France 2. LSV, ENS Cachan, CNRS, INRIA, France June

More information

starting from the initial states. In this paper, we therefore consider how forward verication can be carried out for lossy channel systems. For that w

starting from the initial states. In this paper, we therefore consider how forward verication can be carried out for lossy channel systems. For that w On-the-Fly Analysis of Systems with Unbounded, Lossy FIFO Channels Parosh Aziz Abdulla 1, Ahmed Bouajjani 2, and Bengt Jonsson 1 1 Dept. of Computer Systems, P.O. Box 325, S-751 05 Uppsala, Sweden, fparosh,bengtg@docs.uu.se

More information

New Complexity Results for Some Linear Counting Problems Using Minimal Solutions to Linear Diophantine Equations

New Complexity Results for Some Linear Counting Problems Using Minimal Solutions to Linear Diophantine Equations New Complexity Results for Some Linear Counting Problems Using Minimal Solutions to Linear Diophantine Equations (Extended Abstract) Gaoyan Xie, Cheng Li and Zhe Dang School of Electrical Engineering and

More information

Accelerated Data-Flow Analysis

Accelerated Data-Flow Analysis Accelerated Data-Flow Analysis Jérôme Leroux, Grégoire Sutre To cite this version: Jérôme Leroux, Grégoire Sutre. Accelerated Data-Flow Analysis. Springer Berlin. Static Analysis, 2007, Kongens Lyngby,

More information

Flat Acceleration in Symbolic Model Checking

Flat Acceleration in Symbolic Model Checking Flat Acceleration in Symbolic Model Checking Sébastien Bardin 1, Alain Finkel 1,Jérôme Leroux 2, and Philippe Schnoebelen 1 1 LSV: ENS de Cachan & CNRS UMR 8643, 61, av. Pdt. Wilson, 94235 Cachan Cedex,

More information

Reachability Analysis of Pushdown Automata with an Upper Stack

Reachability Analysis of Pushdown Automata with an Upper Stack Reachability Analysis of Pushdown Automata with an Upper Stack Adrien Pommellet 1 Marcio Diaz 1 Tayssir Touili 2 1 Université Paris-Diderot and LIPN, France 2 LIPN, CNRS, and Université Paris 13, France

More information

Taming Past LTL and Flat Counter Systems

Taming Past LTL and Flat Counter Systems Taming Past LTL and Flat Counter Systems Amit Kumar Dhar LIAFA, Univ Paris Diderot, Paris Cité Sorbonne, CNRS, France April 2, 2012 Joint work with : Stéphane Demri(LSV) and Arnaud Sangnier(LIAFA) LIAFA

More information

Extending abstract acceleration methods to data-flow programs with numerical inputs

Extending abstract acceleration methods to data-flow programs with numerical inputs Extending abstract acceleration methods to data-flow programs with numerical inputs Article (Published Version) Schrammel, Peter and Jeannet, Bertrand (200) Extending abstract acceleration methods to data-flow

More information

On-the-Fly Analysis of Systems with Unbounded, Lossy. FIFO Channels.

On-the-Fly Analysis of Systems with Unbounded, Lossy. FIFO Channels. On-the-Fly Analysis of Systems with Unbounded, Lossy FIFO Channels Parosh Aziz Abdulla 1, Ahmed Bouajjani 2, and Bengt Jonsson 1 1 Dept. of Computer Systems, P.O. Box 325, S-751 05 Uppsala, Sweden, fparosh,bengtg@docs.uu.se

More information

Semantic Equivalences and the. Verification of Infinite-State Systems 1 c 2004 Richard Mayr

Semantic Equivalences and the. Verification of Infinite-State Systems 1 c 2004 Richard Mayr Semantic Equivalences and the Verification of Infinite-State Systems Richard Mayr Department of Computer Science Albert-Ludwigs-University Freiburg Germany Verification of Infinite-State Systems 1 c 2004

More information

TUM{INFO{10-I /1.{FI Alle Rechte vorbehalten Nachdruck auch auszugsweise verboten c1998 SFB 342 Methoden und Werkzeuge fur die Nutzung parallele

TUM{INFO{10-I /1.{FI Alle Rechte vorbehalten Nachdruck auch auszugsweise verboten c1998 SFB 342 Methoden und Werkzeuge fur die Nutzung parallele TECHNISCHE UNIVERSIT AT M U N C H E N INSTITUT F UR INFORMATIK Sonderforschungsbereich 342: Methoden und Werkzeuge fur die Nutzung paralleler Rechnerarchitekturen Lossy Counter Machines Richard Mayr TUM-I9827

More information

Models for Efficient Timed Verification

Models for Efficient Timed Verification Models for Efficient Timed Verification François Laroussinie LSV / ENS de Cachan CNRS UMR 8643 Monterey Workshop - Composition of embedded systems Model checking System Properties Formalizing step? ϕ Model

More information

Advanced topic: Space complexity

Advanced topic: Space complexity Advanced topic: Space complexity CSCI 3130 Formal Languages and Automata Theory Siu On CHAN Chinese University of Hong Kong Fall 2016 1/28 Review: time complexity We have looked at how long it takes to

More information

Checking Liveness Properties of Presburger Counter Systems using Reachability Analysis

Checking Liveness Properties of Presburger Counter Systems using Reachability Analysis Checking Liveness Properties of Presburger Counter Systems using Reachability Analysis K. Vasanta Lakshmi, Aravind Acharya, and Raghavan Komondoor Indian Institute of Science, Bangalore {kvasanta,aravind.acharya,raghavan}@csa.iisc.ernet.in

More information

Robust Controller Synthesis in Timed Automata

Robust Controller Synthesis in Timed Automata Robust Controller Synthesis in Timed Automata Ocan Sankur LSV, ENS Cachan & CNRS Joint with Patricia Bouyer, Nicolas Markey, Pierre-Alain Reynier. Ocan Sankur (ENS Cachan) Robust Control in Timed Automata

More information

Verifying qualitative and quantitative properties with LTL over concrete domains

Verifying qualitative and quantitative properties with LTL over concrete domains Verifying qualitative and quantitative properties with LTL over concrete domains Régis Gascon Laboratoire Spécification et Vérification CNRS & ENS Cachan FRANCE gascon@lsv.ens-cachan.fr Abstract. We introduce

More information

CEGAR:Counterexample-Guided Abstraction Refinement

CEGAR:Counterexample-Guided Abstraction Refinement CEGAR: Counterexample-guided Abstraction Refinement Sayan Mitra ECE/CS 584: Embedded System Verification November 13, 2012 Outline Finite State Systems: Abstraction Refinement CEGAR Validation Refinment

More information

IMITATOR: A Tool for Synthesizing Constraints on Timing Bounds of Timed Automata

IMITATOR: A Tool for Synthesizing Constraints on Timing Bounds of Timed Automata ICTAC 09 IMITATOR: A Tool for Synthesizing Constraints on Timing Bounds of Timed Automata Étienne ANDRÉ Laboratoire Spécification et Vérification LSV, ENS de Cachan & CNRS Étienne ANDRÉ (LSV) ICTAC 09

More information

Computability and Complexity

Computability and Complexity Computability and Complexity Lecture 5 Reductions Undecidable problems from language theory Linear bounded automata given by Jiri Srba Lecture 5 Computability and Complexity 1/14 Reduction Informal Definition

More information

On Reducing Linearizability to State Reachability 1

On Reducing Linearizability to State Reachability 1 On Reducing Linearizability to State Reachability 1 Ahmed Bouajjani a, Michael Emmi b, Constantin Enea a, Jad Hamza a a LIAFA, Université Paris Diderot b IMDEA Software Institute, Spain Abstract Ecient

More information

Monotonic Abstraction in Parameterized Verification

Monotonic Abstraction in Parameterized Verification Monotonic Abstraction in Parameterized Verification Parosh Aziz Abdulla 1 Department of Information Technology Uppsala University Sweden Giorgio Delzanno 2 Dipartimento Informatica e Scienze dell Informazione

More information

The Power of Hybrid Acceleration

The Power of Hybrid Acceleration The Power of Hybrid Acceleration Bernard Boigelot 1 and Frédéric Herbreteau 2 1 Institut Montefiore, B28 Université de Liège B-4000 Liège, Belgium boigelot@montefiore.ulg.ac.be 2 LaBRI 351, cours de la

More information

Analysis of a Boost Converter Circuit Using Linear Hybrid Automata

Analysis of a Boost Converter Circuit Using Linear Hybrid Automata Analysis of a Boost Converter Circuit Using Linear Hybrid Automata Ulrich Kühne LSV ENS de Cachan, 94235 Cachan Cedex, France, kuehne@lsv.ens-cachan.fr 1 Introduction Boost converter circuits are an important

More information

Regular Model Checking and Verification of Cellular Automata

Regular Model Checking and Verification of Cellular Automata Aalborg University Master Thesis Regular Model Checking and Verification of Cellular Automata Authors: Joakim Byg Kenneth Yrke Jørgensen {jokke,kyrke}@cs.aau.dk Department of Computer Science Dat 6 June

More information

Representing Arithmetic Constraints with Finite Automata: An Overview

Representing Arithmetic Constraints with Finite Automata: An Overview Representing Arithmetic Constraints with Finite Automata: An Overview Bernard Boigelot Pierre Wolper Université de Liège Motivation Linear numerical constraints are a very common and useful formalism (our

More information

Model-Checking CTL* over Flat Presburger Counter Systems

Model-Checking CTL* over Flat Presburger Counter Systems Model-Checking CTL* over Flat Presburger Counter Systems Stéphane Demri * Alain Finkel * Valentin Goranko ** Govert van Drimmelen *** * LSV, ENS Cachan, CNRS, INRIA 61 av. Pdt. Wilson, 94235 Cachan Cedex,

More information

Lecture 2: Symbolic Model Checking With SAT

Lecture 2: Symbolic Model Checking With SAT Lecture 2: Symbolic Model Checking With SAT Edmund M. Clarke, Jr. School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 (Joint work over several years with: A. Biere, A. Cimatti, Y.

More information

Flat Parametric Counter Automata

Flat Parametric Counter Automata Flat Parametric Counter Automata Marius Bozga, Radu Iosif, Yassine Lakhnech To cite this version: Marius Bozga, Radu Iosif, Yassine Lakhnech. Flat Parametric Counter Automata. Bugliesi, M.; Preneel, B.;

More information

Pushdown timed automata:a binary reachability characterization and safety verication

Pushdown timed automata:a binary reachability characterization and safety verication Theoretical Computer Science 302 (2003) 93 121 www.elsevier.com/locate/tcs Pushdown timed automata:a binary reachability characterization and safety verication Zhe Dang School of Electrical Engineering

More information

Deterministic Finite Automaton (DFA)

Deterministic Finite Automaton (DFA) 1 Lecture Overview Deterministic Finite Automata (DFA) o accepting a string o defining a language Nondeterministic Finite Automata (NFA) o converting to DFA (subset construction) o constructed from a regular

More information

Fundamenta Informaticae 30 (1997) 23{41 1. Petri Nets, Commutative Context-Free Grammars,

Fundamenta Informaticae 30 (1997) 23{41 1. Petri Nets, Commutative Context-Free Grammars, Fundamenta Informaticae 30 (1997) 23{41 1 IOS Press Petri Nets, Commutative Context-Free Grammars, and Basic Parallel Processes Javier Esparza Institut fur Informatik Technische Universitat Munchen Munchen,

More information

{},{a},{a,c} {},{c} {c,d}

{},{a},{a,c} {},{c} {c,d} Modular verication of Argos Programs Agathe Merceron 1 and G. Michele Pinna 2 1 Basser Department of Computer Science, University of Sydney Madsen Building F09, NSW 2006, Australia agathe@staff.cs.su.oz.au

More information

7. Queueing Systems. 8. Petri nets vs. State Automata

7. Queueing Systems. 8. Petri nets vs. State Automata Petri Nets 1. Finite State Automata 2. Petri net notation and definition (no dynamics) 3. Introducing State: Petri net marking 4. Petri net dynamics 5. Capacity Constrained Petri nets 6. Petri net models

More information

MONOTONIC ABSTRACTION (ON EFFICIENT VERIFICATION OF PARAMETERIZED SYSTEMS)

MONOTONIC ABSTRACTION (ON EFFICIENT VERIFICATION OF PARAMETERIZED SYSTEMS) International Journal of Foundations of Computer Science Vol. 20, No. 5 (2009) 779 801 c World Scientific Publishing Company MONOTONIC ABSTRACTION (ON EFFICIENT VERIFICATION OF PARAMETERIZED SYSTEMS) PAROSH

More information

Software Verification with Abstraction-Based Methods

Software Verification with Abstraction-Based Methods Software Verification with Abstraction-Based Methods Ákos Hajdu PhD student Department of Measurement and Information Systems, Budapest University of Technology and Economics MTA-BME Lendület Cyber-Physical

More information

Software Verification

Software Verification Software Verification Grégoire Sutre LaBRI, University of Bordeaux, CNRS, France Summer School on Verification Technology, Systems & Applications September 2008 Grégoire Sutre Software Verification VTSA

More information

Optimal Metric Planning with State Sets in Automata Representation

Optimal Metric Planning with State Sets in Automata Representation Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (2008) Optimal Metric Planning with State Sets in Automata Representation Björn Ulrich Borowsky and Stefan Edelkamp Fakultät für

More information

Symbolic Verification of Hybrid Systems: An Algebraic Approach

Symbolic Verification of Hybrid Systems: An Algebraic Approach European Journal of Control (2001)71±16 # 2001 EUCA Symbolic Verification of Hybrid Systems An Algebraic Approach Martin v. Mohrenschildt Department of Computing and Software, Faculty of Engineering, McMaster

More information

A Polynomial Time Presburger Criterion and Synthesis for Number Decision Diagrams

A Polynomial Time Presburger Criterion and Synthesis for Number Decision Diagrams A Polynomial Time Presburger Criterion and Synthesis for Number Decision Diagrams Jérôme Leroux To cite this version: Jérôme Leroux. A Polynomial Time Presburger Criterion and Synthesis for Number Decision

More information

Formal Verification Techniques. Riccardo Sisto, Politecnico di Torino

Formal Verification Techniques. Riccardo Sisto, Politecnico di Torino Formal Verification Techniques Riccardo Sisto, Politecnico di Torino State exploration State Exploration and Theorem Proving Exhaustive exploration => result is certain (correctness or noncorrectness proof)

More information

FMCAD 2013 Parameter Synthesis with IC3

FMCAD 2013 Parameter Synthesis with IC3 FMCAD 2013 Parameter Synthesis with IC3 A. Cimatti, A. Griggio, S. Mover, S. Tonetta FBK, Trento, Italy Motivations and Contributions Parametric descriptions of systems arise in many domains E.g. software,

More information

Notes on State Minimization

Notes on State Minimization U.C. Berkeley CS172: Automata, Computability and Complexity Handout 1 Professor Luca Trevisan 2/3/2015 Notes on State Minimization These notes present a technique to prove a lower bound on the number of

More information

Automatic Generation of Polynomial Invariants for System Verification

Automatic Generation of Polynomial Invariants for System Verification Automatic Generation of Polynomial Invariants for System Verification Enric Rodríguez-Carbonell Technical University of Catalonia Talk at EPFL Nov. 2006 p.1/60 Plan of the Talk Introduction Need for program

More information

TESTING is one of the most important parts of the

TESTING is one of the most important parts of the IEEE TRANSACTIONS 1 Generating Complete Controllable Test Suites for Distributed Testing Robert M. Hierons, Senior Member, IEEE Abstract A test suite is m-complete for finite state machine (FSM) M if it

More information

Algorithmic Verification of Stability of Hybrid Systems

Algorithmic Verification of Stability of Hybrid Systems Algorithmic Verification of Stability of Hybrid Systems Pavithra Prabhakar Kansas State University University of Kansas February 24, 2017 1 Cyber-Physical Systems (CPS) Systems in which software "cyber"

More information

Overview. Discrete Event Systems Verification of Finite Automata. What can finite automata be used for? What can finite automata be used for?

Overview. Discrete Event Systems Verification of Finite Automata. What can finite automata be used for? What can finite automata be used for? Computer Engineering and Networks Overview Discrete Event Systems Verification of Finite Automata Lothar Thiele Introduction Binary Decision Diagrams Representation of Boolean Functions Comparing two circuits

More information

Embedded Systems 5. Synchronous Composition. Lee/Seshia Section 6.2

Embedded Systems 5. Synchronous Composition. Lee/Seshia Section 6.2 Embedded Systems 5-1 - Synchronous Composition Lee/Seshia Section 6.2 Important semantic model for concurrent composition Here: composition of actors Foundation of Statecharts, Simulink, synchronous programming

More information

Upper and Lower Bounds on the Number of Faults. a System Can Withstand Without Repairs. Cambridge, MA 02139

Upper and Lower Bounds on the Number of Faults. a System Can Withstand Without Repairs. Cambridge, MA 02139 Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs Michel Goemans y Nancy Lynch z Isaac Saias x Laboratory for Computer Science Massachusetts Institute of Technology

More information

Homework Assignment 6 Answers

Homework Assignment 6 Answers Homework Assignment 6 Answers CSCI 2670 Introduction to Theory of Computing, Fall 2016 December 2, 2016 This homework assignment is about Turing machines, decidable languages, Turing recognizable languages,

More information

Reachability analysis of multithreaded software with asynchronous communication

Reachability analysis of multithreaded software with asynchronous communication Reachability analysis of multithreaded software with asynchronous communication Ahmed Bouajjani 1, Javier Esparza 2, Stefan Schwoon 2, and Jan Strejček 2 1 LIAFA, University of Paris 7, abou@liafa.jussieu.fr

More information

Student#: CISC-462 Exam, December XY, 2017 Page 1 of 12

Student#: CISC-462 Exam, December XY, 2017 Page 1 of 12 Student#: CISC-462 Exam, December XY, 2017 Page 1 of 12 Queen s University, Faculty of Arts and Science, School of Computing CISC-462 Final Exam, December XY, 2017 (Instructor: Kai Salomaa) INSTRUCTIONS

More information

Automata-Theoretic LTL Model-Checking

Automata-Theoretic LTL Model-Checking Automata-Theoretic LTL Model-Checking Arie Gurfinkel arie@cmu.edu SEI/CMU Automata-Theoretic LTL Model-Checking p.1 LTL - Linear Time Logic (Pn 77) Determines Patterns on Infinite Traces Atomic Propositions

More information

On (Omega-)Regular Model Checking

On (Omega-)Regular Model Checking On (Omega-)Regular Model Checking Axel Legay Universié de Liège Institut Montefiore, B8 Liège, Belgium Pierre Wolper Universié de Liège Institut Montefiore, B8 Liège, Belgium Checking infinite-state systems

More information

UCLID: Deciding Combinations of Theories via Eager Translation to SAT. SAT-based Decision Procedures

UCLID: Deciding Combinations of Theories via Eager Translation to SAT. SAT-based Decision Procedures UCLID: Deciding Combinations of Theories via Eager Translation to SAT Sanjit A. Seshia SAT-based Decision Procedures Input Formula Input Formula Satisfiability-preserving Boolean Encoder Boolean Formula

More information

Flat Counter Automata Almost Everywhere!

Flat Counter Automata Almost Everywhere! Flat Counter Automata Almost Everywhere! Jérôme Leroux, Grégoire Sutre To cite this version: Jérôme Leroux, Grégoire Sutre. Flat Counter Automata Almost Everywhere!. Third International Symposium, ATVA

More information

Acceleration in Multi-Pushdown Systems

Acceleration in Multi-Pushdown Systems Acceleration in Multi-Pushdown Systems Mohamed Faouzi Atig 1 K. Narayan Kumar 2 and Prakash Saivasan 2 1 Uppsala University, Sweden /mohamed faouzi.atig@it.uu.se 2 Chennai Mathematical Institute, India

More information

cachan.fr/publis/ Accepted for publication in Theoretical Computer Science

cachan.fr/publis/ Accepted for publication in Theoretical Computer Science http://www.lsv.ens cachan.fr/publis/ Accepted for publication in Theoretical Computer Science A Polynomial -Bisimilar Normalization for Reset Petri Nets Catherine Dufourd y Alain Finkel y Abstract Reset

More information

Fall 1999 Formal Language Theory Dr. R. Boyer. 1. There are other methods of nding a regular expression equivalent to a nite automaton in

Fall 1999 Formal Language Theory Dr. R. Boyer. 1. There are other methods of nding a regular expression equivalent to a nite automaton in Fall 1999 Formal Language Theory Dr. R. Boyer Week Four: Regular Languages; Pumping Lemma 1. There are other methods of nding a regular expression equivalent to a nite automaton in addition to the ones

More information

Learning to Verify Branching Time Properties

Learning to Verify Branching Time Properties Learning to Verify Branching Time Properties Abhay Vardhan and Mahesh Viswanathan Dept. of Computer Science, Univ. of Illinois at Urbana-Champaign, USA Abstract. We present a new model checking algorithm

More information

DES. 4. Petri Nets. Introduction. Different Classes of Petri Net. Petri net properties. Analysis of Petri net models

DES. 4. Petri Nets. Introduction. Different Classes of Petri Net. Petri net properties. Analysis of Petri net models 4. Petri Nets Introduction Different Classes of Petri Net Petri net properties Analysis of Petri net models 1 Petri Nets C.A Petri, TU Darmstadt, 1962 A mathematical and graphical modeling method. Describe

More information

Reachability in Succinct and Parametric One-Counter Automata

Reachability in Succinct and Parametric One-Counter Automata Reachability in Succinct and Parametric One-Counter Automata Christoph Haase, Stephan Kreutzer, Joël Ouaknine, and James Worrell Oxford University Computing Laboratory, UK {chrh,kreutzer,joel,jbw}@comlab.ox.ac.uk

More information

Probabilistic Model Checking and Strategy Synthesis for Robot Navigation

Probabilistic Model Checking and Strategy Synthesis for Robot Navigation Probabilistic Model Checking and Strategy Synthesis for Robot Navigation Dave Parker University of Birmingham (joint work with Bruno Lacerda, Nick Hawes) AIMS CDT, Oxford, May 2015 Overview Probabilistic

More information

Scalable and Accurate Verification of Data Flow Systems. Cesare Tinelli The University of Iowa

Scalable and Accurate Verification of Data Flow Systems. Cesare Tinelli The University of Iowa Scalable and Accurate Verification of Data Flow Systems Cesare Tinelli The University of Iowa Overview AFOSR Supported Research Collaborations NYU (project partner) Chalmers University (research collaborator)

More information

PRESBURGER COUNTER MACHINES

PRESBURGER COUNTER MACHINES UNIVERSITÉ DE BORDEAUX ÉCOLE DOCTORALE DE MATHÉMATIQUES ET INFORMATIQUE DE BORDEAUX Habilitation à Diriger des Recherches Jérôme Leroux PRESBURGER COUNTER MACHINES Jury : Préparée au LaBRI, équipe MF Rapporteurs

More information

Symbolic Reachability Analysis of Lazy Linear Hybrid Automata. Susmit Jha, Bryan Brady and Sanjit A. Seshia

Symbolic Reachability Analysis of Lazy Linear Hybrid Automata. Susmit Jha, Bryan Brady and Sanjit A. Seshia Symbolic Reachability Analysis of Lazy Linear Hybrid Automata Susmit Jha, Bryan Brady and Sanjit A. Seshia Traditional Hybrid Automata Traditional Hybrid Automata do not model delay and finite precision

More information

CS6901: review of Theory of Computation and Algorithms

CS6901: review of Theory of Computation and Algorithms CS6901: review of Theory of Computation and Algorithms Any mechanically (automatically) discretely computation of problem solving contains at least three components: - problem description - computational

More information

Minimization Techniques for Symbolic Automata

Minimization Techniques for Symbolic Automata University of Connecticut OpenCommons@UConn Honors Scholar Theses Honors Scholar Program Spring 5-1-2018 Minimization Techniques for Symbolic Automata Jonathan Homburg jonhom1996@gmail.com Follow this

More information

EE249 - Fall 2012 Lecture 18: Overview of Concrete Contract Theories. Alberto Sangiovanni-Vincentelli Pierluigi Nuzzo

EE249 - Fall 2012 Lecture 18: Overview of Concrete Contract Theories. Alberto Sangiovanni-Vincentelli Pierluigi Nuzzo EE249 - Fall 2012 Lecture 18: Overview of Concrete Contract Theories 1 Alberto Sangiovanni-Vincentelli Pierluigi Nuzzo Outline: Contracts and compositional methods for system design Where and why using

More information

Hybrid systems and computer science a short tutorial

Hybrid systems and computer science a short tutorial Hybrid systems and computer science a short tutorial Eugene Asarin Université Paris 7 - LIAFA SFM 04 - RT, Bertinoro p. 1/4 Introductory equations Hybrid Systems = Discrete+Continuous SFM 04 - RT, Bertinoro

More information

Discrete abstractions of hybrid systems for verification

Discrete abstractions of hybrid systems for verification Discrete abstractions of hybrid systems for verification George J. Pappas Departments of ESE and CIS University of Pennsylvania pappasg@ee.upenn.edu http://www.seas.upenn.edu/~pappasg DISC Summer School

More information

Outline. Complexity Theory. Example. Sketch of a log-space TM for palindromes. Log-space computations. Example VU , SS 2018

Outline. Complexity Theory. Example. Sketch of a log-space TM for palindromes. Log-space computations. Example VU , SS 2018 Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 3. Logarithmic Space Reinhard Pichler Institute of Logic and Computation DBAI Group TU Wien 3. Logarithmic Space 3.1 Computational

More information

Learning cover context-free grammars from structural data

Learning cover context-free grammars from structural data Learning cover context-free grammars from structural data Mircea Marin Gabriel Istrate West University of Timişoara, Romania 11th International Colloquium on Theoretical Aspects of Computing ICTAC 2014

More information

Actively learning to verify safety for FIFO automata

Actively learning to verify safety for FIFO automata Actively learning to verify safety for FIFO automata Abhay Vardhan, Koushik Sen, Mahesh Viswanathan, Gul Agha Dept. of Computer Science, Univ. of Illinois at Urbana-Champaign, USA {vardhan,ksen,vmahesh,agha}@cs.uiuc.edu

More information

Foundations of Informatics: a Bridging Course

Foundations of Informatics: a Bridging Course Foundations of Informatics: a Bridging Course Week 3: Formal Languages and Semantics Thomas Noll Lehrstuhl für Informatik 2 RWTH Aachen University noll@cs.rwth-aachen.de http://www.b-it-center.de/wob/en/view/class211_id948.html

More information

Automated Verification of a Parametric Real-Time Program: The ABR Conformance Protocol

Automated Verification of a Parametric Real-Time Program: The ABR Conformance Protocol Automated Verification of a Parametric Real-Time Program: The ABR Conformance Protocol Béatrice Bérard and Laurent Fribourg LSV Ecole Normale Supérieure de Cachan & CNRS 61 av. Pdt. Wilson - 94235 Cachan

More information

Synthesis of Designs from Property Specifications

Synthesis of Designs from Property Specifications Synthesis of Designs from Property Specifications Amir Pnueli New York University and Weizmann Institute of Sciences FMCAD 06 San Jose, November, 2006 Joint work with Nir Piterman, Yaniv Sa ar, Research

More information

Introduction. Büchi Automata and Model Checking. Outline. Büchi Automata. The simplest computation model for infinite behaviors is the

Introduction. Büchi Automata and Model Checking. Outline. Büchi Automata. The simplest computation model for infinite behaviors is the Introduction Büchi Automata and Model Checking Yih-Kuen Tsay Department of Information Management National Taiwan University FLOLAC 2009 The simplest computation model for finite behaviors is the finite

More information

Bounded Model Checking with SAT/SMT. Edmund M. Clarke School of Computer Science Carnegie Mellon University 1/39

Bounded Model Checking with SAT/SMT. Edmund M. Clarke School of Computer Science Carnegie Mellon University 1/39 Bounded Model Checking with SAT/SMT Edmund M. Clarke School of Computer Science Carnegie Mellon University 1/39 Recap: Symbolic Model Checking with BDDs Method used by most industrial strength model checkers:

More information

Primitive recursive functions: decidability problems

Primitive recursive functions: decidability problems Primitive recursive functions: decidability problems Armando B. Matos October 24, 2014 Abstract Although every primitive recursive (PR) function is total, many problems related to PR functions are undecidable.

More information

IHS 3: Test of Digital Systems R.Ubar, A. Jutman, H-D. Wuttke

IHS 3: Test of Digital Systems R.Ubar, A. Jutman, H-D. Wuttke IHS 3: Test of Digital Systems R.Ubar, A. Jutman, H-D. Wuttke Integrierte Hard- und Softwaresysteme RT-Level Design data path and control path on RT-level RT level simulation Functional units (F1,..,F4)

More information

Reachability Analysis of Multithreaded Software with Asynchronous Communication

Reachability Analysis of Multithreaded Software with Asynchronous Communication Reachability Analysis of Multithreaded Software with Asynchronous Communication Ahmed Bouajjani 1, Javier Esparza, Stefan Schwoon, and Jan Strejček 1 LIAFA, University of Paris 7, abou@liafa.jussieu.fr

More information

3515ICT: Theory of Computation. Regular languages

3515ICT: Theory of Computation. Regular languages 3515ICT: Theory of Computation Regular languages Notation and concepts concerning alphabets, strings and languages, and identification of languages with problems (H, 1.5). Regular expressions (H, 3.1,

More information

198:538 Complexity of Computation Lecture 16 Rutgers University, Spring March 2007

198:538 Complexity of Computation Lecture 16 Rutgers University, Spring March 2007 198:538 Complexity of Computation Lecture 16 Rutgers University, Spring 2007 8 March 2007 In this lecture we discuss Shamir s theorem that PSPACE is the set of languages that have interactive proofs with

More information

Theory of Computation CS3102 Spring 2015 A tale of computers, math, problem solving, life, love and tragic death

Theory of Computation CS3102 Spring 2015 A tale of computers, math, problem solving, life, love and tragic death Theory of Computation CS3102 Spring 2015 A tale of computers, math, problem solving, life, love and tragic death Robbie Hott www.cs.virginia.edu/~jh2jf Department of Computer Science University of Virginia

More information

Work in Progress: Reachability Analysis for Time-triggered Hybrid Systems, The Platoon Benchmark

Work in Progress: Reachability Analysis for Time-triggered Hybrid Systems, The Platoon Benchmark Work in Progress: Reachability Analysis for Time-triggered Hybrid Systems, The Platoon Benchmark François Bidet LIX, École polytechnique, CNRS Université Paris-Saclay 91128 Palaiseau, France francois.bidet@polytechnique.edu

More information

3130CIT Theory of Computation

3130CIT Theory of Computation GRIFFITH UNIVERSITY School of Computing and Information Technology 3130CIT Theory of Computation Final Examination, Semester 2, 2006 Details Total marks: 120 (40% of the total marks for this subject) Perusal:

More information

A Generic Framework for Reasoning about Dynamic Networks of Infinite-State Processes

A Generic Framework for Reasoning about Dynamic Networks of Infinite-State Processes A Generic Framework for Reasoning about Dynamic Networks of Infinite-State Processes Ahmed Bouajjani, Yan Jurski, and Mihaela Sighireanu LIAFA, University of Paris 7, Case 7014, 2 place Jussieu, 75251

More information

for System Modeling, Analysis, and Optimization

for System Modeling, Analysis, and Optimization Fundamental Algorithms for System Modeling, Analysis, and Optimization Stavros Tripakis UC Berkeley EECS 144/244 Fall 2013 Copyright 2013, E. A. Lee, J. Roydhowdhury, S. A. Seshia, S. Tripakis All rights

More information

Embedded Systems Design: Optimization Challenges. Paul Pop Embedded Systems Lab (ESLAB) Linköping University, Sweden

Embedded Systems Design: Optimization Challenges. Paul Pop Embedded Systems Lab (ESLAB) Linköping University, Sweden of /4 4 Embedded Systems Design: Optimization Challenges Paul Pop Embedded Systems Lab (ESLAB) Linköping University, Sweden Outline! Embedded systems " Example area: automotive electronics " Embedded systems

More information

Recent results on Timed Systems

Recent results on Timed Systems Recent results on Timed Systems Time Petri Nets and Timed Automata Béatrice Bérard LAMSADE Université Paris-Dauphine & CNRS berard@lamsade.dauphine.fr Based on joint work with F. Cassez, S. Haddad, D.

More information

Optimal Metric Planning with State Sets in Automata Representation [3]

Optimal Metric Planning with State Sets in Automata Representation [3] Optimal Metric Planning with State Sets in Automata Representation [3] Björn Ulrich Borowsky Stefan Edelkamp Fakultät für Informatik, Technische Universität Dortmund, Germany 2008 (Slides by ) Goal and

More information

The Downward-Closure of Petri Net Languages

The Downward-Closure of Petri Net Languages The Downward-Closure of Petri Net Languages Peter Habermehl 1, Roland Meyer 1, and Harro Wimmel 2 1 LIAFA, Paris Diderot University & CNRS e-mail: {peter.habermehl,roland.meyer}@liafa.jussieu.fr 2 Department

More information