skip to main content
10.1145/229000.226321acmconferencesArticle/Chapter ViewAbstractPublication PagesisstaConference Proceedingsconference-collections
Article
Free Access

Compositional verification by model checking for counter-examples

Authors Info & Claims
Published:01 May 1996Publication History

ABSTRACT

Many concurrent systems are required to maintain certain safety and liveness properties. One emerging method of achieving confidence in such systems is to statically verify them using model checking. In this approach an abstract, finite-state model of the system is constructed; then an automatic check is made to ensure that the requirements are satisfied by the model. In practice, however, this method is limited by the state space explosion problem.We have developed a compositional method that directly addresses this problem in the context of multi-tasking programs. Our solution depends on three key space-saving ingredients: (1) checking for counter-examples, which leads to simpler search algorithms; (2) automatic extraction of interfaces, which allows a refinement of the finite model --- even before its communicating partners have been compiled; and (3) using propositional "strengthening assertions" for the sole purpose of reducing state space.In this paper we present our compositional approach, and describe the software tools that support it.

References

  1. 1.R. Alur, C. Courcoubetis, T. A. Henzinger, and P. Ho. Hybrid automata' an algomthmic approach to the specification and verification of hybrid systems. Proceed,rigs of the Workshop on Theory of Hybrid Systems, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.J. 1%. Burch, E. M. Clarke, K. L. McMillan, D. L Dill, and L H Hwang. Symbolic model checking: 1020 states and beyond. Proceedings of the F~fth Annual Sympos,um on Logzc ,n Computer Science, 428-439, 1990.Google ScholarGoogle Scholar
  3. 3.M. Chiodo, T. R. Shlple, A. Sangiovanni-Vmcentelli, and R.K.Brayton Automatic reduction in CTL compositional model checking Proceedings CA V'92, LNCS 663, 234-247, June 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.E M Clarke, E. A. Emerson, and A. P. Sistla. Automatic verification of finite-state concurrent systems using temporal logic spectfications. ACM Transactzons on Prograramzng Languages and Systems, 8(2):244-263, April 1986 Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.S C. Cheung and J. Kramer. Enhancing Compositional Reachabihty Analysis with Context Constraints. Proceed,rigs FSE'93, ACM SIGSOFT, 115-125, December 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.R Cleaveland Tableau-based model checking in the propomtional mu-calculus. Acta Informat,ca, 27:725-747, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.R. Cleaveland, J. Parrow, and B. Steffen. The Concurrency Workbench. Proceed,ngs of the Workshop on Automat, c Verification Methods for Finite-State Systems, LNCS 4{07, 24-37, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.E. M. Clarke, D. E. Long, and K. L McMillan. Compositional model checking. Proceedings of the Fourth Annual Symposmm on Logic in Computer Science, 464-475, June 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.E. A. Emerson and J. Y. Halpern. 'Sometimes' and 'not never' revisited, on branching versus linear time temporal logic. Journal of the A CM, 33(1):151-178, January 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.E. A. Emerson and C Lei. Efficient model checking m fragments of the propositional mu-calculus. Proceedings of Symposium on Log,c ~n Computer Science, 267-278, 1986Google ScholarGoogle Scholar
  11. 11.J. Fischer and R Gerber. Compositional Model Checking of Ada Tasking Programs Proceedings COMPASS'9~i. 1994.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.N. Halbwachs. Delay analysis in synchronous programs CAV93, LNCS 697. 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.R. J van Glabbeek. The linear time - branching time spectrum CONCUR90, LNCS ,t58, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14.R. Gerber and I Lee. A Layered Approach to Automating the Verification of 1%eat-Time Systems. IEEE Trans. on Software Eng., 18(9).768-784, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15.O. Lichtenstein and A. PnueIi Checking that finite state concurrent programs satmfy their hnear specifications. 1984.Google ScholarGoogle Scholar
  16. 16.J. S. Ostroff. Survey of formal methods for the spec~ficat,on and design of real-t,me systems. Draft for IEEE Press book "Tutorial on Specification of Time", 1992.Google ScholarGoogle Scholar
  17. 17.C. Stirling and D. Walker. CCS, hveness, and local model checking in the linear time mu-calculus. Automatic Vergficat~on Methods for F, ngte State Systems, LNCS ,107, 1989 Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18.W. J Yeh and M. Young. Compositional Reachability Analysis Using Process Algebra. Proceedings TA V4, A CM SIGSOFT, 49-59, October 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Compositional verification by model checking for counter-examples

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ISSTA '96: Proceedings of the 1996 ACM SIGSOFT international symposium on Software testing and analysis
          May 1996
          294 pages
          ISBN:0897917871
          DOI:10.1145/229000

          Copyright © 1996 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 May 1996

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate58of213submissions,27%

          Upcoming Conference

          ISSTA '24

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader