skip to main content
10.1145/566172.566198acmconferencesArticle/Chapter ViewAbstractPublication PagesisstaConference Proceedingsconference-collections
Article

Refactoring design models for inductive verification

Published:01 July 2002Publication History

ABSTRACT

Systems composed of many identical processes can sometimes be verified inductively using a network invariant, but systems whose component processes vary in some systematic way are not amenable to direct application of that method. We describe how variations in behavior can be "factored out" into additional processes, thus enabling induction over the number of processes. The process is semi-automatic: The designer must choose from among a set of idiomatic transformations, but each transformation is applied and checked automatically.

References

  1. K. R. Apt and D. C. Kozen. Limits for automatic verification of finite-state concurrent systems. Information Processing Letters, pages 207-309, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. C. Cheung and J. Kramer. Checking safety properties using compositional reachability analysis. ACM Transactions on Software Engineering and Methodology, 8:49-78, January 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Hennessy. Algebraic Theory of Processes. MIT Press Series in the Foundations of Computing. The MIT Press, Cambridge, Massachusetts, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. C. A. R. Hoare. Communicating sequential processes. Communications of the ACM, 21(8):666-677, August 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. P. Kurshan and K. L. McMillan. A structural induction theorem for processes. Information and Computation, 117:1-11, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. E. M. Clarke, O. Grumberg, and S. Jha. Verifying parameterized networks. In ACM Transactions on Programming Languages and Systems, volume 19, pages 726-750, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. B. Sanden. Entity-life modeling and structured analysis in real-time software design---a comparison. Communications of the ACM, 32(12):1458-1466, December 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Valmari and I. Kokkarinen. Unbounded verification results by finite-state compositional techniques: 10any states and beyond. In International Conference on Application of Concurrency to System Design, Proceedings, pages 75-85, Aizu-Wakamatsu, Fukushima, Japan, March 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. P. Wolper and V. Lovinfosse. Verifying properties of large sets of processes with network invariants. In Automatic Verification Methods for Finite State Systems, Volumne 407 Lecture Notes in Computer Science, pages 68-80. Springer-Verlag, June 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. W. J. Yeh and M. Young. Re-designing tasking structure of ada programs for analysis:a case study. Software Testing, Verification, and Reliability, 4:223-253, 1994.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    ISSTA '02: Proceedings of the 2002 ACM SIGSOFT international symposium on Software testing and analysis
    July 2002
    248 pages
    ISBN:1581135629
    DOI:10.1145/566172
    • cover image ACM SIGSOFT Software Engineering Notes
      ACM SIGSOFT Software Engineering Notes  Volume 27, Issue 4
      July 2002
      242 pages
      ISSN:0163-5948
      DOI:10.1145/566171
      Issue’s Table of Contents

    Copyright © 2002 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 1 July 2002

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • Article

    Acceptance Rates

    ISSTA '02 Paper Acceptance Rate26of97submissions,27%Overall Acceptance Rate58of213submissions,27%

    Upcoming Conference

    ISSTA '24

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader