Protocol Veriication with Heuristic Search

نویسندگان

  • Stefan Edelkamp
  • Alberto Lluch Lafuente
  • Stefan Leue
چکیده

We present an approach to reconcile explicit state model checking and heuristic directed search. We provide experimental evidence that the model checking problem for concurrent systems, such as communications protocols, can be solved more eeciently, since nding a state violating a property can be understood as a directed search problem. In our work we combine the expressive power and implementation eeciency of the SPIN model checker with the HSF heuristic search workbench, yielding the HSF-SPIN tool that we have implemented. We start oo from the A* algorithm and some of its derivatives and deene heuristics for various system properties that guide the search so that it nds error states faster. In this paper we focus on safety properties and provide heuristics for invariant and assertion violation and deadlock detection. We provide experimental results for applying HSF-SPIN to two toy protocols and one real world protocol, the CORBA GIOP protocol.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

"Next" Heuristic for On-the-Fly Model Checking

We present a new heuristic for on-they enumerative invariant veriication. The heuristic is based on a construct for temporal scaling, called next, that compresses a sequence of transitions leading to a given target set into a single metatransition. First, we give an on-they algorithm to search a process expression built using the constructs of hiding, parallel composition, and temporal scaling....

متن کامل

\next" Heuristic for On-the--y Model Checking

We present a new heuristic for on-they enumerative invariant veriication. The heuristic is based on a construct for temporal scaling, called next, that compresses a sequence of transitions leading to a given target set into a single metatransition. First, we give an on-they algorithm to search a process expression built using the constructs of hiding, parallel composition, and temporal scaling....

متن کامل

Symbolic Verification of Communication Protocols with Infinite State Spaces Using QDDs (Extended Abstract)

We study the veriication of properties of communication protocols modeled by a nite set of nite-state machines that communicate by exchanging messages via unbounded FIFO queues. It is well-known that most interesting veriication problems, such as deadlock detection, are undecidable for this class of systems. However, in practice, these veriication problems may very well turn out to be decidable...

متن کامل

Similarities and Reuse of Proofs in Formal Software Veriication Similarities and Reuse of Proofs in Formal Software Veriication

The amount of user interaction is a prime cost factor in interactive program veriication. This paper analyzes situations in which the reuse of previous proofs can help reducing these costs. In particular , it describes a technique that reuses subproofs in the veriication of invariants of state transition systems. This technique replays decisions of generalized previous proof attempts from the s...

متن کامل

Integration of RTL and precedence graphs with a static scheduler as verifier

In this paper we present an approach to speciication and veriication of distributed hard real-time systems. By integrating RTL and precedence constraints, we combine the comprehensiveness of precedence graphs with the expressive power and proofability of RTL. Thus, our approach allows easy comprehension by the human designer and formal correctness. We propose to use a static scheduling algorith...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001