skip to main content
10.1145/1595696.1595758acmconferencesArticle/Chapter ViewAbstractPublication PagesfseConference Proceedingsconference-collections
research-article

Behavioral automata composition for automatic topology independent verification of parameterized systems

Published:24 August 2009Publication History

ABSTRACT

Verifying correctness properties of parameterized systems is a long-standing problem. The challenge lies in the lack of guarantee that the property is satisfied for all instances of the parameterized system. Existing work on addressing this challenge aims to reduce this problem to checking the properties on smaller systems with a bound on the parameter referred to as the cut-off. A property satisfied on the system with the cut-off ensures that it is satisfied for systems with any larger parameter. The major problem with these techniques is that they only work for certain classes of systems with specific communication topology such as ring topology, thus leaving other interesting classes of systems unverified. We contribute an automated technique for finding the cut-off of the parameterized system that works for systems defined with any topology. Given the specification and the topology of the system, our technique is able to automatically generate the cut-off specific to this system. We prove the soundness of our technique and demonstrate its effectiveness and practicality by applying it to several canonical examples where in some cases, our technique obtains smaller cut-off values than those presented in the existing literature.

References

  1. P. A. Abdulla, G. Delzanno, N. B. Henda, and A. Rezine. Regular model checking without transducers (on efficient verification of parameterized systems). In TACAS, pages 721-736, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. P. A. Abdulla, B. Jonsson, M. Nilsson, and J. d'Orso. Regular model checking made simple and efficient. In CONCUR, pages 116--130, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. T. E. Anderson. The performance of spin lock alternatives for shared-memory multiprocessors. IEEE Trans. Parallel Distrib. Syst., 1(1):6--16, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. K. R. Apt and D. C. Kozen. Limits for automatic verification of finite-state concurrent systems. Inf. Process. Lett., 22(6):307--309, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. T. Arons, A. Pnueli, S. Ruah, J. Xu, and L. D. Zuck. Parameterized verification with automatically computed inductive assertions. In CAV, pages 221--234, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. P. Baldan, A. Corradini, and B. König. A framework for the verification of infinite-state graph transformation systems. Inf. Comput., 206(7):869--907, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. P. Baldan, B. König, and A. Rensink. Graph grammar verification through abstraction. In Dagstuhl Seminar Proceedings 04241, 2005.Google ScholarGoogle Scholar
  8. T. Ball, S. Chaki, and S. K. Rajamani. Parameterized verification of multithreaded software libraries. In TACAS, pages 158--173, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Basu and C. R. Ramakrishnan. Compositional analysis for verification of parameterized systems. Theor. Comput. Sci., 354(2):211--229, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Bouajjani, B. Jonsson, M. Nilsson, and T. Touili. Regular model checking. In CAV, pages 403--418, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Bouajjani, Y. Jurski, and M. Sighireanu. Reasoning about dynamic networks of infinite-state processes with global synchronization. HAL - CCSD, 2006.Google ScholarGoogle Scholar
  12. A. Bouajjani, Y. Jurski, and M. Sighireanu. A generic framework for reasoning about dynamic networks of infinite-state processes. In TACAS, pages 690--705, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. E. Clarke, M. Talupur, and H. Veith. Environment abstraction for parameterized verification. In VMCAI, 126--141, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. E. M. Clarke, O. Grumberg, and S. Jha. Verifying parameterized networks using abstraction and regular languages. In CONCUR, pages 395--407, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. E. M. Clarke, M. Talupur, and H. Veith. Proving ptolemy right: The environment abstraction framework for model checking concurrent systems. In TACAS, pages 33--47, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. E. Dijkstra. Two starvation free solutions to a general exclusion problem. EWD 625, Plataanstraat 5, 5671 AL Neunen, The Netherlands.Google ScholarGoogle Scholar
  17. E. A. Emerson and V. Kahlon. Model checking large-scale and parameterized resource allocation systems. In TACAS, pages 251--265, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. E. A. Emerson and V. Kahlon. Exact and efficient verification of parameterized cache coherence protocols. In CHARME, pages 247--262, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  19. E. A. Emerson and K. S. Namjoshi. Reasoning about rings. In POPL, pages 85--94, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. E. A. Emerson and K. S. Namjoshi. Automatic verification of parameterized synchronous systems (extended abstract). In CAV, pages 87--98, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. E. A. Emerson, R. J. Trefler, and T. Wahl. Reducing model checking of the few to the one. In ICFEM, pp. 94--113, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. D. Fisman, O. Kupferman, and Y. Lustig. On verifying fault tolerance of distributed protocols. In TACAS, 315-331, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. M. German and A. P. Sistla. Reasoning about systems with many processes. J. ACM, 39(3):675--735, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Y. Hanna, S. Basu, and H. Rajan. Behavioral automata composition for automatic topology independent verification of parameterized systems. Technical Report 09-17, Computer Sc., Iowa State U., 2009.Google ScholarGoogle Scholar
  25. C. N. Ip and D. L. Dill. Verifying systems with replicated components in murphi. In CAV, pages 147--158, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. M. Llorens and J. Oliver. Introducing structural dynamic changes in petri nets: Marked-controlled reconfigurable nets. In ATVA, pages 310--323, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  27. R. Milner. A Calculus of Communicating Systems. Springer-Verlag New York, Inc., 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. A. Pnueli, S. Ruah, and L. D. Zuck. Automatic deductive verification with invisible invariants. In TACAS '01, 92--97. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. A. Pnueli, J. Xu, and L. D. Zuck. Liveness with (0, 1, infty)-counter abstraction. In CAV, pp. 107--122, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. M. Saksena, O. Wibling, and B. Jonsson. Graph grammar modeling and verification of ad hoc routing protocols. In TACAS, pages 18--32, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. P. Wolper and V. Lovinfosse. Verifying properties of large sets of processes with network invariants. In the International Workshop on Automatic Verification Methods for Finite State Systems, pages 68--80, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Behavioral automata composition for automatic topology independent verification of parameterized systems

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ESEC/FSE '09: Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering
          August 2009
          408 pages
          ISBN:9781605580012
          DOI:10.1145/1595696

          Copyright © 2009 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 24 August 2009

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          ESEC/FSE '09 Paper Acceptance Rate32of217submissions,15%Overall Acceptance Rate112of543submissions,21%

          Upcoming Conference

          FSE '24

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader