Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1040305.1040316acmconferencesArticle/Chapter ViewAbstractPublication PagespoplConference Proceedingsconference-collections
Article

Proof-guided underapproximation-widening for multi-process systems

Published: 12 January 2005 Publication History

Abstract

This paper presents a procedure for the verification of multi-process systems based on considering a series of underapproximated models. The procedure checks models with an increasing set of allowed interleavings of the given set of processes, starting from a single interleaving. The procedure relies on SAT solvers' ability to produce proofs of unsatisfiability: from these proofs it derives information that guides the process of adding interleavings on the one hand, and determines termination on the other. The presented approach is integrated in a SAT-based Bounded Model Checking (BMC) framework. Thus, a BMC formulation of a multi-process system is introduced, which allows controlling which interleavings are considered. Preliminary experimental results demonstrate the practical impact of the presented method.

References

[1]
R. Alur, R. Brayton, T. A. Henzinger, S. Quadeer, and S. Rajamani. Partial-order reduction in symbolic state space exploration. In O. Grumberg, editor, Proc. of the 9th conference on Computer-Aided Verification (CAV'97), volume 1254 of LNCS, pages 340--351, Haifa, June 1997.]]
[2]
N. Amla and K. McMillan. Automatic abstraction without counterexamples. In H. Garavel and J. Hatcliff, editors, 9th Intl. Conf. on Tools And Algorithms For The Construction And Analysis Of Systems (TACAS'03), volume 2619 of Lect. Notes in Comp. Sci., 2003.]]
[3]
F. Balarin and A. Sangiovanni-Vinventelli. An iterative approah to language containment. In C. Courcoubetis, editor, Proc. 5th Intl. Conference on Computer Aided Verification (CAV'94), volume 697 of Lect. Notes in Comp. Sci., pages 29--40. Springer-Verlag, 1993.]]
[4]
S. Barner, D. Geist, and A. Gringauze. Symbolic localization reduction with reconstruction layering and backtr acking. In Proc. of Conference on Computer-Aided Verification (CAV), Copenhagen, Denmark, July 2002.]]
[5]
S. Barner and O. Grumberg. Combining symmetry reduction and upper-approximation for symbolic model checking. In 14th International Conference on Computer Aided Verification (CAV'02), volume 2404 of LNCS, Copenhagen, Denmark, July 2002.]]
[6]
A. Biere, A. Cimatti, E. Clarke, O. Strichman, and Y. Zue. Bounded Model Checking, volume~58 of Advances in computers. Academic Press, 2003.]]
[7]
A. Biere, A. Cimatti, E. M. Clarke, M. Fujita, and Y. Zhu. Symbolic model checking using SAT procedures instead of BDDs. In Design Automation Conference (DAC'99), 1999.]]
[8]
A. Biere, A. Cimatti, E. M. Clarke, and Y. Yhu. Symbolic model checking without BDDs. In Tools and Algorithms for Construction and Analysis of Systems, pages 193--207, 1999.]]
[9]
P. Chauhan, E. Clarke, J. Kukula, S. Sapra, H. Veith, and D. Wang. Automated abstraction refinement for model checking large state spaces using sat based conflict analysis. In A. O'Leary, editor, Fourth International Conference on Formal Methods in Computer-Aided Design (FMCAD'02), lncs, Portland, Oregon, Nov 2002.]]
[10]
E. Clarke, O. Grumberg, S. Jha, Y. Lu, and H. Veith. Counterexample-guided abstraction refinement. J. ACM, 50(5):752--794, 2003.]]
[11]
E. Clarke, A. Gupta, J. Kukula, and O. Strichman. SAT based abstraction - refinement using ILP and machine learning techniques. In E. Brinksma and K. Larsen, editors, Proc. 14th Intl. Conference on Computer Aided Verification (CAV'02), volume 2404 of LNCS, pages 265--279, Copenhagen, Denmark, July 2002. Springer-Verlag.]]
[12]
E. Clarke, D. Kroening, J. Ouaknine, and O. Strichman. Completeness and complexity of bounded model checking. In Proc. 5th Intl. Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'04), volume 2937 of Lect. Notes in Comp. Sci., pages 85--96, Venice, Italy, Jan 2004.]]
[13]
E. M. Clarke, O. Grumberg, S. Jha, Y. Lu, and H. Veith. Counterexample-guided abstraction refinement. In E. A. Emerson and A. P. Sistla, editors, Proc. 12th Intl. Conference on Computer Aided Verification (CAV'00), volume 1855 of Lect. Notes in Comp. Sci. Springer-Verlag, 2000.]]
[14]
E. W. Dijkstra. A discipline of programming. Prentice Hall, 1976.]]
[15]
E.M. Clarke, O. Grumberg, and D. Peled. Model Checking. MIT Press, Cambridge, MA, 1999.]]
[16]
M. Glusman and S. Katz. A mechanized proof environment for the convenient computations proof method. Formal Methods in System Design, 23(2):115--142, 2003.]]
[17]
P. Godefroid and P. Wolper. Using partial orders for the efficient verification of deadlock freedom and safety properties. In Workshop on Computer-Aided Verification (CAV'91), volume 575 of LNCS, pages 332--342, 1991.]]
[18]
S. Katz and D. Peled. Verification of distributed programs using representative interleaving sequences. Distributed Computing, 6(2):107--120, September 1992.]]
[19]
D. Kroening and O. Strichman. Efficient computation of recurrence diameters. In Proc. 4th Intl. Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI'03), volume 2575 of Lecture Notes in Computer Science, pages 298--309, NYU, New-York, January 2003. Springer Verlag.]]
[20]
R. Kurshan. Computer aided verification of coordinating processes. Princeton University Press, 1994.]]
[21]
R. Kurshan, V. Levin, M. Minea, and D. P. H. Yenigün. Combining software and hardware verification techniques. Formal Methos in System Design, 21(3):251--280, 2002.]]
[22]
J. Lind-Nielsen and H. Andersan. Stepwise CTL model checking of state/event systems. In N. Halbwachs and D. Peled, editors, Proc. 11th Intl. Conference on Computer Aided Verification (CAV'99), volume 1633 of Lect. Notes in Comp. Sci., pages 316--327. Springer-Verlag, 1999.]]
[23]
K. L. McMillan. Interpolation and sat-based model checking. In J. Warren A. Hunt and F. Somenzi, editors, cav03, Lect. Notes in Comp. Sci., Jul 2003.]]
[24]
D. Peled. Combining partial order reductions with on-the-fly model-checking. Journal of Formal Methods in Systems Design, 8 (1):39--64, 1996. also appeared in 6th International Conference on Computer Aided Verification 1994, Stanford CA, USA, LNCS 818, Springer-Verlag, 377--390.]]
[25]
K. Ravi and F. Somenzi. High-density reachability analysis. In Proc. Intl. Conf. on Computer-Aided Design, pages 154--158, November 1995.]]
[26]
K. Ravi and F. Somenzi. Hints to accelerate symbolic traversal. In CHARME'99, LNCS 1703, pages 250--264. Springer-Verlag, 1999.]]
[27]
M. Sheeran, S. Singh, and G. Stalmarck. Checking safety properties using induction and a sat-solver. In Hunt and Johnson, editors, Proc. Int. Conf. on Formal Methods in Computer-Aided Design (FMCAD 2000), 2000.]]
[28]
A. Valmari. A stubborn attack on state explosion. In Workshop on Computer-Aided Verification (CAV'90), volume 531 of LNCS, New Brunswick, 1990.]]

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
POPL '05: Proceedings of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages
January 2005
402 pages
ISBN:158113830X
DOI:10.1145/1040305
  • General Chair:
  • Jens Palsberg,
  • Program Chair:
  • Martín Abadi
  • cover image ACM SIGPLAN Notices
    ACM SIGPLAN Notices  Volume 40, Issue 1
    Proceedings of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages
    January 2005
    391 pages
    ISSN:0362-1340
    EISSN:1558-1160
    DOI:10.1145/1047659
    Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 January 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. SAT proofs
  2. abstraction
  3. bounded model checking
  4. software verification
  5. underapproximation-widening

Qualifiers

  • Article

Conference

POPL05

Acceptance Rates

Overall Acceptance Rate 824 of 4,130 submissions, 20%

Upcoming Conference

POPL '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)1
Reflects downloads up to 22 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Debug-localize-repair: a symbiotic construction for heap manipulationsFormal Methods in System Design10.1007/s10703-021-00387-z58:3(399-439)Online publication date: 8-Feb-2022
  • (2022)Proof-Guided Underapproximation Widening for Bounded Model CheckingComputer Aided Verification10.1007/978-3-031-13185-1_15(304-324)Online publication date: 7-Aug-2022
  • (2021)Engineering an Efficient Boolean Functional Synthesis Engine2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD)10.1109/ICCAD51958.2021.9643583(1-9)Online publication date: 1-Nov-2021
  • (2020)Interactive debugging of concurrent programs under relaxed memory modelsProceedings of the 18th ACM/IEEE International Symposium on Code Generation and Optimization10.1145/3368826.3377910(68-80)Online publication date: 22-Feb-2020
  • (2020)Manthan: A Data-Driven Approach for Boolean Function SynthesisComputer Aided Verification10.1007/978-3-030-53291-8_31(611-633)Online publication date: 14-Jul-2020
  • (2018)Stubborn Transaction ReductionNASA Formal Methods10.1007/978-3-319-77935-5_20(280-298)Online publication date: 11-Mar-2018
  • (2017)Synergistic debug-repair of heap manipulationsProceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering10.1145/3106237.3106263(163-173)Online publication date: 21-Aug-2017
  • (2017)Concurrent Program Verification with Invariant-Guided UnderapproximationAutomated Technology for Verification and Analysis10.1007/978-3-319-68167-2_17(241-248)Online publication date: 27-Sep-2017
  • (2016)Minimal unsatisfiable core extraction for SMTProceedings of the 16th Conference on Formal Methods in Computer-Aided Design10.5555/3077629.3077644(57-64)Online publication date: 3-Oct-2016
  • (2016)SMT-Based Context-Bounded Model Checking for Embedded SystemsACM SIGSOFT Software Engineering Notes10.1145/2934240.293424741:3(1-6)Online publication date: 24-Jun-2016
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media