Changeset 101 for papers/FDL2012
- Timestamp:
- Jul 19, 2012, 11:44:48 AM (12 years ago)
- Location:
- papers/FDL2012
- Files:
-
- 8 edited
Legend:
- Unmodified
- Added
- Removed
-
papers/FDL2012/FDL2012.tex
r95 r101 32 32 \newcommand{\remark}[2]{\textcolor{blue}{#1: #2}} 33 33 34 34 %\vspace*{-15mm} 35 35 \title{ An efficient refinement strategy exploiting component properties in a CEGAR process} 36 %\name{Syed Hussein S. ALWI, C\'{e}cile BRAUNSTEIN and Emmanuelle ENCRENAZ}36 \name{Syed Hussein S. ALWI, C\'{e}cile BRAUNSTEIN and Emmanuelle ENCRENAZ} 37 37 % \thanks{This work was supported by...}} 38 %\address{Universit\'{e} Pierre et Marie Curie Paris 6, \\39 %LIP6-SOC (CNRS UMR 7606), \\40 %4, place Jussieu, \\41 %75005 Paris, FRANCE. }42 \name{Removed for blind review}43 \address{ }38 \address{Universit\'{e} Pierre et Marie Curie Paris 6, \\ 39 LIP6-SOC (CNRS UMR 7606), \\ 40 4, place Jussieu, \\ 41 75005 Paris, FRANCE. } 42 %\name{Removed for blind review} 43 %\address{ } 44 44 45 45 \begin{document} … … 49 49 50 50 \begin{abstract} 51 Embedded systems are usually composed of several components and in practice, these components generally have been independently verified to ensure that they respect their specifications before being integrated into a larger system. Therefore, we would like to exploit the specification (i.e. verified CTL properties) of the components in the objective of verifying a global property of the system. A complete concrete system may not be directly verifiable due to the state explosion problem, thus abstraction and eventually refinement process are required. In this paper, we propose a technique to select properties in order to generate a good abstraction and reduce refinement iterations. We have conducted several preliminary experimentations which show sthat our approach is promising in comparison to other abstraction-refinement techniques implemented in VIS \cite{ucberkeley96vis}.51 Embedded systems are usually composed of several components and in practice, these components generally have been independently verified to ensure that they respect their specifications before being integrated into a larger system. Therefore, we would like to exploit the specification (i.e. verified CTL properties) of the components in the objective of verifying a global property of the system. A complete concrete system may not be directly verifiable due to the state explosion problem, thus abstraction and eventually refinement process are required. In this paper, we propose a technique to select properties in order to generate a good abstraction and reduce refinement iterations. We have conducted several preliminary experimentations which show that our approach is promising in comparison to other abstraction-refinement techniques implemented in VIS \cite{ucberkeley96vis}. 52 52 \end{abstract} 53 53 … … 90 90 which is well adapted for compositional embedded systems. This verification 91 91 technique is compatible and suits well in the natural development process of 92 complex systems. Our preliminary experimental results show san interesting93 performance in terms of duration of abstraction generation and the number of refinement iteration. Fu thermore, this technique enables us to overcome repetitive counterexamples due to the presence of cycles in the system's graph.92 complex systems. Our preliminary experimental results show an interesting 93 performance in terms of duration of abstraction generation and the number of refinement iteration. Furthermore, this technique enables us to overcome repetitive counterexamples due to the presence of cycles in the system's graph. 94 94 95 95 Nevertheless, in order to function well, this refinement technique requires a 96 complete specification of every components of the concrete model. Futhermore,96 well constituted specification of every components of the concrete model. Furthermore, 97 97 it may be possible that none of the properties available is capable of 98 98 eliminating the counterexample which is probably due to an incomplete … … 100 100 local properties. In this case, other refinement techniques such as the 101 101 refinement by eliminating the counterexample only, or the identification of a 102 good set of local properties to be integr eted simultaneously, should be considered.102 good set of local properties to be integrated simultaneously, should be considered. 103 103 We are currently investigating other complementary techniques to overcome these particular cases. 104 A complementary approach consists in improving the specification of the 105 model~: at the component level, or for groups of components. The work of 106 Kroening \cite{pwk2009-date} could help us in this direction. 104 The work of Kroening \cite{pwk2009-date}, for example, could also help us in improving the specification of the 105 model: at the component level, or for groups of components. 107 106 108 %footnote for Table 1 109 \footnotetext[1]{Computed on a calculation server: 2x Xeon X5650, 72Go RAM} 107 %A complementary approach consists in improving the specification of the 108 %model~: at the component level, or for groups of components. The work of 109 %Kroening \cite{pwk2009-date} could help us in this direction. 110 111 112 110 113 111 114 %\begin{thebibliography} … … 118 121 %\end{thebibliography} 119 122 120 123 %footnote for Table 1 124 \footnotetext[1]{Computed on a calculation server: 2x Xeon X5650, 72Go RAM} 121 125 122 126 \end{document} -
papers/FDL2012/abstraction_refinement.tex
r93 r101 26 26 $\widehat{M}_i$ ensure item 2. Concretization can be performed by 27 27 modifying the AKS of $\widehat{M}_i$ by changing some abstract value to 28 concrete ones. However, this approach is rude 28 concrete ones. However, this approach is rude: in order to ensure item 1, 29 29 the concretization needs to be consistent with the sequences of values in the concrete system. The difficulty resides in defining the proper abstract variable to concretize, at which precise instant, and with which Boolean value. 30 30 %Another way to concretize some variables at selected instants is to compose … … 32 32 33 33 We propose to compose the abstraction with another AKS to build a good refinement 34 according to definition \ref{def:goodrefinement}.35 We have several options. The most straightforward consists in building36 an AKS representing all possible executions except the spurious counterexample ; however the AKS representation may be huge and the process is not guaranteed to converge. A second possibility is to build an AKS with additional CTL properties of the components ; the AKS remains small but item 3 is not guaranteed, hence delaying the convergence. The final proposal combines both previous ones: first local CTL properties eliminating the spurious counterexample are determined, and then the corresponding AKS is synchronized with the one of $\widehat{M}_i$.34 according to Definition \ref{def:goodrefinement}. 35 We have several options. The most straightforward method consists in building 36 an AKS representing all possible executions except the spurious counterexample; however the AKS representation may be huge and the process is not guaranteed to converge. A second possibility is to build an AKS with additional CTL properties of the components; the AKS remains small but item 3 is not guaranteed, hence delaying the convergence. The final proposal combines both previous ones: first local CTL properties eliminating the spurious counterexample are determined, and then the corresponding AKS is synchronized with the one of $\widehat{M}_i$. 37 37 38 38 … … 43 43 counterexample given by the model-checker, the variable configuration in each 44 44 state is Boolean. We name $\widehat{L_i}$ this new labeling. 45 The spurious counterexample $\sigma$ is defined such that 45 The spurious counterexample $\sigma$ is defined such that: 46 46 \begin{definition} 47 47 Let $\sigma$ be a \emph{spurious counterexample} in $\widehat{M}_i =\langle \widehat{AP}_i, \widehat{S}_i, \widehat{S}_{0i}, … … 70 70 counterexample negation} $AKS(\overline{\sigma}) = \langle \widehat{AP}_{\overline{\sigma}}, \widehat{S}_{\overline{\sigma}}, \widehat{S}_{0{\overline{\sigma}}}, 71 71 \widehat{L}_{\overline{\sigma}}, \widehat{R}_{\overline{\sigma}}, 72 \widehat{F}_{\overline{\sigma}} \rangle$ is such that 72 \widehat{F}_{\overline{\sigma}} \rangle$ is such that: 73 73 \vspace*{-2mm} 74 74 \begin{itemize} … … 98 98 The labeling function of $s_i'$ represents (concrete) configuration of state $s_i$ and state $\bar{s_i}$ represents all 99 99 configurations {\it but} the one of $s_i$. This last set may not be representable by 100 the labeling function defined in def\ref{def-aks}. State labeling is treated100 the labeling function defined in Definition \ref{def-aks}. State labeling is treated 101 101 in the second step. $s_T$ is a state where all atomic propositions are {\it unknown}. 102 102 %The size of this structure is linear with the size of the counter-example. … … 139 139 model. The strengthening of the abstraction $\widehat{M}_i$ with the 140 140 addition of AKS of already verified local CTL properties eliminates sets of 141 behaviors and guarantees the over-approximation ( property141 behaviors and guarantees the over-approximation (Property 142 142 \ref{prop:concrete_compose}) but does not guarantee the elimination of the counterexample. We present in the following section a strategy to select sets of CTL properties eliminating the spurious counterexample. 143 143 -
papers/FDL2012/exp_results.tex
r93 r101 13 13 \begin{table*} [ht] 14 14 \hspace*{15mm} 15 \small 15 %\small 16 \footnotesize 16 17 \begin{tabular}{cclcccc} 17 18 … … 46 47 \bottomrule 47 48 %\bottomrule 48 49 49 \end{tabular} 50 51 50 \caption{\label{StatsPlatform} Statistics on the VCI-PI and CAN Bus platform} 52 51 \end{table*} … … 128 127 $\phi_1$ is the type $AF((p=1)*AF(q=1))$ and $\phi_2$ is actually a stronger 129 128 version of the same formula with $AG(AF((p=1)*AF(q=1)))$. We have a total of 130 26 verif ed components properties to be selected inVCI-PI platform.129 26 verified components properties to be selected in the VCI-PI platform. 131 130 In comparison to $\phi_2$, we can see that, a better set of properties available will result in a better abstraction and less refinement iterations. 132 131 … … 139 138 to verify both global properties without refinement. 140 139 141 Globally, we can see that our technique systematically computes faster than the other two methods and interestingly in the case where the size of the platform increases by adding more connected components, in contrary to the other two methods, our computation time remains stable.140 Globally, we can see that our technique, for these examples, systematically computes faster than the other two methods and interestingly in the case where the size of the platform increases by adding more connected components, in contrary to the other two methods, our computation time remains stable. This is mainly due to the fact that for small number of properties, our abstraction is generated almost instantly and as only pertinent properties are selected, not many refinement iterations are required in order to complete the verification process. It is also important to note that the properties tested are simple and we have in our property selection list the local properties required to satisfy the global property. 142 141 143 142 -
papers/FDL2012/framework.tex
r93 r101 1 1 The model-checking technique we propose is based on the Counterexample-guided 2 2 Abstraction Refinement (CEGAR) methodology \cite{clarke00cegar}. The overall 3 description of our methodology is shown in figure \ref{cegar}.3 description of our methodology is shown in Figure \ref{cegar}. 4 4 We take into account the structure of the system as a set of synchronous components, 5 5 each of which has been previously verified and a set of CTL properties is … … 211 211 \end{itemize} 212 212 \vspace*{-2mm} 213 By property \ref{prop:concrete}, $\widehat{M}_{i+1}$ is more concrete than213 By Property \ref{prop:concrete}, $\widehat{M}_{i+1}$ is more concrete than 214 214 $\widehat{M}_i$ and by 215 215 the property of parallel composition, -
papers/FDL2012/introduction.tex
r95 r101 1 The embedded systems correspond to the integration into the same electronic circuit, a huge number of complex functionalities performed by several heterogen ous components. Current SoC (System on Chips) contain multiple processors executing numerous cooperating tasks, specialized co-processors (for particular data treatment or communication purposes), Radio-Frequency components, etc. These systems are usually submitted to safety and robustness requirements. Depending on their application domains, their failure may induce serious damages and catastrophic consequences.1 The embedded systems correspond to the integration into the same electronic circuit, a huge number of complex functionalities performed by several heterogeneous components. Current SoC (System on Chips) contain multiple processors executing numerous cooperating tasks, specialized co-processors (for particular data treatment or communication purposes), Radio-Frequency components, etc. These systems are usually submitted to safety and robustness requirements. Depending on their application domains, their failure may induce serious damages and catastrophic consequences. 2 2 3 3 … … 28 28 29 29 30 Xie and Browne have proposed a method for software verification based on composition of several components \cite{XieBrowne03composition_soft}. Their main objective is developing components that could be reused with certitude that their behaviors will always respect their specification when associated in a proper composition. Therefore, temporal properties of the software are specified, verified and packaged with the component for possible reuse. The implementation of this approach on software has been succes ful and the application of the assume-guarantee reasoning has considerably reduced the model checking complexity. A comprehensive approach to model-check component-based systems with abstraction refinement technique that uses verified properties as abstractions has been presented in \cite{LiSunXieSong08compAbsRef}.30 Xie and Browne have proposed a method for software verification based on composition of several components \cite{XieBrowne03composition_soft}. Their main objective is developing components that could be reused with certitude that their behaviors will always respect their specification when associated in a proper composition. Therefore, temporal properties of the software are specified, verified and packaged with the component for possible reuse. The implementation of this approach on software has been successful and the application of the assume-guarantee reasoning has considerably reduced the model checking complexity. A comprehensive approach to model-check component-based systems with abstraction refinement technique that uses verified properties as abstractions has been presented in \cite{LiSunXieSong08compAbsRef}. 31 31 32 32 33 In \cite{PMT02compositional_MC}, Peng, Mokhtari and Tahar have presented a possible implementation of assume-guarantee approach where the specification are in ACTL. Moreover, they managed to perform the synthetisation of the ACTL formulas into Verilog HDL behavior level program. The synthesized program can be used to check properties that the system's components must guarantee. Since, there have been other works on construction of components from interval temporal logic properties which could be used to speed up verification process \cite{SNBE06property_based} \cite{Kunz_al11ipc_abs}.33 In \cite{PMT02compositional_MC}, Peng, Mokhtari and Tahar have presented a possible implementation of assume-guarantee approach where the specifications are in ACTL. Moreover, they managed to perform the synthetisation of the ACTL formulas into Verilog HDL behavior level program. The synthesized program can be used to check properties that the system's components must guarantee. Since, there have been other works on construction of components from interval temporal logic properties which could be used to speed up verification process \cite{SNBE06property_based} \cite{Kunz_al11ipc_abs}. 34 34 35 35 %In 2006, Hans Eveking and al. introduced a technique of normalizing properties and transforming those normalized properties into an executable design description \cite{SNBE06property_based}. The generation of abstraction from PSL/Sugar specification language could then be used in the verification process to speed up the operation. This technique also allows the tests of specifications without having to build an implementation first. … … 51 51 52 52 %\subsection{Contribution} 53 \textbf{\emph{Contribution :}} In this paper we present a strategy to exploit the properties of verified component in the goal of verifying complex systems with a good initial abstraction and eventually being conclusive in minimal refinement iterations. We propose a technique to classify component properties according to their pertinency towards the global property, thus, enabling a better selection of properties for the initial abstraction generation. Fu thermore, in the case where the verification is not conclusive, we propose a technique guided by the counterexample given by the model-checker to select supplementary properties to improve the abstraction.53 \textbf{\emph{Contribution :}} In this paper we present a strategy to exploit the properties of verified component in the goal of verifying complex systems with a good initial abstraction and eventually being conclusive in minimal refinement iterations. We propose a technique to classify component properties according to their pertinency towards the global property, thus, enabling a better selection of properties for the initial abstraction generation. Furthermore, in the case where the verification is not conclusive, we propose a technique guided by the counterexample given by the model-checker to select supplementary properties to improve the abstraction. 54 54 55 55 -
papers/FDL2012/myBib.bib
r92 r101 10 10 11 11 @ARTICLE{clarke94model, 12 author = {E. M.~Clarke and O.~Grumberg and D.E.~Long},13 title = { {Model Checking and Abstraction}},12 author = {E. M.~Clarke and O.~Grumberg and D.E.~Long}, 13 title = {Model Checking and Abstraction}, 14 14 journal = {ACM Transactions on Programming Languages and Systems}, 15 year = {1994},16 15 volume = {16}, 17 16 pages = {1512--1542}, … … 21 20 issn = {0164-0925}, 22 21 keywords = {model cheking, abstraction, CTL, preservation}, 23 publisher = {ACM Press} 24 } 22 publisher = {ACM Press}, 23 year = {1994} 24 } 25 26 25 27 @PHDTHESIS{braunstein_phd07, 26 28 author = {C.~Braunstein}, … … 28 30 Méthode d'abstraction pour la Vérification de SystÚmes Intégrés sur 29 31 Puce"}, 30 school = { {Universitée Pierre et Marie Curie (Paris 6)}},32 school = {Université Pierre et Marie Curie}, 31 33 year = {2007}, 32 address = {LIP6 /SOC},34 address = {LIP6-SOC}, 33 35 owner = {cecile}, 34 36 timestamp = {2007.04.16} … … 46 48 @conference{ ClarkeEmerson81temporal_logic, 47 49 author = "E. M. Clarke and E. A. Emerson", 48 title = "Design and systhesis of synchronization 49 booktitle = " InLogic of Programs Workshop",50 title = "Design and systhesis of synchronization skeletons using branching time temporal logic", 51 booktitle = "Logic of Programs Workshop", 50 52 volume = 131, 51 53 address = "Yorktown Heights, New York", 52 year = 1981,53 54 month = May, 54 publisher = "LNCS 131, Springer " 55 publisher = "LNCS 131, Springer", 56 year = 1981 55 57 } 56 58 … … 62 64 number = 2, 63 65 pages = {244-263}, 64 year = 1986, 65 month = Apr 66 year = 1986 66 67 } 67 68 … … 69 70 author = "E. M. Clarke and O. Grumberg and S. Jha and Y. Lu and H. Veith", 70 71 title = "{Counterexample-guided Abstraction Refinement}", 71 booktitle = "C omputer Aided Verification (CAV '00)",72 booktitle = "CAV'00", 72 73 address = "Chicago, IL", 73 year = 2000,74 publisher = "LNCS"74 publisher = "LNCS", 75 year = 2000 75 76 } 76 77 … … 78 79 author = "J. P. Queille and J. Sifakis", 79 80 title = "Specification and verification of concurrent systems in CESAR", 80 booktitle = " InProceedings of the 5th International Symposium on Programming",81 booktitle = "Proceedings of the 5th International Symposium on Programming", 81 82 volume = 137, 82 83 address = "Turin, Italy", 83 year = 1982,84 84 month = April, 85 publisher = "LNCS 137, Springer " 85 publisher = "LNCS 137, Springer", 86 year = 1982 86 87 } 87 88 … … 90 91 @conference{ BCCFZ04SMC_with_SAT, 91 92 author = "A. Biere and A. Cimatti and E. Clarke and M.Fujita and Y. Zhu", 92 title = "{ 93 title = "{Symbolic Model Checking using SAT procedures instead of BDDs}", 93 94 booktitle = {Proceedings: Design Automation Conference (DAC '99)}, 94 95 pages = {317-320}, 95 year = 1999,96 96 month = February, 97 year = 1999 97 98 } 98 99 … … 101 102 author = "The VIS Group", 102 103 title = "{VIS: A system for Verification and Synthesis}", 103 journal = {Springer L ecture Notes in Computer Science},104 journal = {Springer LNCS}, 104 105 volume = 1102, 105 number = 1102,106 106 pages = {428-432}, 107 107 year = 1996 … … 114 114 booktitle = {16th Conference on Computer Aided Verification (CAV '04)}, 115 115 pages = {519-522}, 116 year = 2004,117 116 month = Jul, 118 publisher = "LNCS 3114" 117 publisher = "LNCS 3114", 118 year = 2004 119 119 } 120 120 … … 154 154 author = "C. Roux and E. Encrenaz ", 155 155 title = "{CTL} may be ambigous when model-checking {Moore Machines} ", 156 booktitle = " 156 booktitle = "IFIP WG 10.5 12th International Advance Research Working Conference on Correct Hardware Design and Verification Methods (CHARME)", 157 157 volume = 2860, 158 158 address = "Italy", 159 year = 2003,160 159 month = Nov, 161 publisher = "LNCS" 160 publisher = "LNCS", 161 year = 2003 162 162 } 163 163 … … 166 166 author = "F. Xie and J.C. Browne ", 167 167 title = "{Verified Systems by Composition from Verified Components} ", 168 booktitle = " In ESEC/FSE 2003: Proceedings of the 11th ACM SIGSOFT Symposium on Foundations of Software Engineering Conference",168 booktitle = "ESEC/FSE 2003: 11th ACM SIGSOFT Symposium on Foundations of Software Eng. Conf.", 169 169 pages = {227-286}, 170 address = " Helsinki,Finland",171 year = 2003,172 publisher = "ACM Press"170 address = "Finland", 171 publisher = "ACM Press", 172 year = 2003 173 173 } 174 174 … … 177 177 author = "J. Li and X. Sun and F. Xie and X. Song", 178 178 title = "{Component-Based Abstraction Refinement} ", 179 booktitle = " In Proc. of 10th International Conferenceon Software Reuse (ICSR)",179 booktitle = "10th Int. Conf. on Software Reuse (ICSR)", 180 180 pages = {39-51}, 181 address = " Beijing,China",182 year = 2008,183 publisher = "Springer-Verlag"181 address = "China", 182 publisher = "Springer-Verlag", 183 year = 2008 184 184 } 185 185 … … 189 189 author = "H. Peng and Y. Mokhtari and S. Tahar ", 190 190 title = "{Environment Synthesis for Compositional Model Checking} ", 191 booktitle = "I n ICCDâ02 : Proceedings of the 20th InternationalConference on Computer Design",191 booktitle = "ICCDâ02: 20th Int. Conference on Computer Design", 192 192 pages = {70-75}, 193 193 address = "Freiburg, Germany", 194 year = 2002,195 publisher = "IEEE Computer Society"194 publisher = "IEEE Computer Society", 195 year = 2002 196 196 } 197 197 … … 200 200 author = "M. Schickel and V. Nimbler and M. Braun and H. Eveking ", 201 201 title = "{On Consistency and Completeness of Property-Sets: Exploiting the Property-Based Design Process} ", 202 booktitle = " In FDLâ06: Proceedings ofForum on specification and Design Languages",202 booktitle = "FDLâ06: Forum on specification and Design Languages", 203 203 year = 2006 204 204 } … … 207 207 @conference{ CiardoLS00mdd_async, 208 208 author = "G.Ciardo and G. LÃŒttgen and R. Siminiceanu", 209 title = "{ 210 booktitle = " InProc. of ICATPN '2000",209 title = "{Efficient symbolic state-space construction for asynchronous systems} ", 210 booktitle = "Proc. of ICATPN '2000", 211 211 volume = 1825, 212 212 pages = {103-122}, 213 year = 2000,214 publisher = "LNCS, Springer Verlag"213 publisher = "LNCS, Springer Verlag", 214 year = 2000 215 215 } 216 216 217 217 @conference{ CTM05hdd, 218 218 author = "J-M. Couvreur and Y. Thierry-Mieg", 219 title = "{ 220 booktitle = " In FORTE : Proceedings of the 25th IFIP WG 6.1 International Conference on Formal Techniques for Networkedand Distributed Systems",219 title = "{Hierarchical Decision Diagrams to Exploit Model Structure} ", 220 booktitle = "FORTE: 25th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems", 221 221 volume = 3731, 222 222 pages = {443-457}, 223 223 address = "Taipei, Taiwan", 224 year = 2005,225 publisher = "LNCS, Springer"224 publisher = "LNCS, Springer", 225 year = 2005 226 226 } 227 227 … … 229 229 @conference{ HQR98assume_guarantee, 230 230 author = "T. A. Henzinger and S. Qadeer and S. K. Rajamani", 231 title = "{ You Assume, We Guarantee: Methodology and Case Studies} ",232 booktitle = "CAVâ98 : Proceedings of the 10th Int. Conference on Computer Aided Verification",231 title = "{You Assume, We Guarantee: Methodology and Case Studies} ", 232 booktitle = "CAVâ98", 233 233 volume = 1427, 234 234 pages = {440-451}, 235 address = " Vancouver,Canada",236 year = 1998,237 publisher = " LNCS, Springer-Verlag"235 address = "Canada", 236 publisher = "Springer-Verlag", 237 year = 1998 238 238 } 239 239 240 240 241 241 @conference{ GrumbergLong91assume_guarantee, 242 author = " 243 title = "{ Model Checking and Modular Verification}",244 booktitle = " In InternationalConference on Concurency Theory",242 author = "O. Grumberg and D. E. Long", 243 title = "{Model Checking and Modular Verification}", 244 booktitle = "Int. Conference on Concurency Theory", 245 245 volume = 527, 246 246 pages = {250-263}, 247 year = 1991,248 publisher = " LNCS, Springer-Verlag"247 publisher = "Springer-Verlag", 248 year = 1991 249 249 } 250 250 251 251 252 252 @conference{ GrafSaidi97abstract_construct, 253 author = " 254 title = "{ Construction of Abstract State Graphs with PVS}",255 booktitle = " In CAV â97: Proceedings of the 9th International Conference on Computer Aided Verification",253 author = "S. Graf and H. Saïdi", 254 title = "{Construction of Abstract State Graphs with PVS}", 255 booktitle = "Computer Aided Verification (CAVâ97)", 256 256 volume = 1254, 257 year = 1997,258 publisher = " LNCS, Springer"257 publisher = "LNCS, Springer", 258 year = 1997 259 259 } 260 260 … … 262 262 263 263 @conference{ PardoHachtel97autoAbsMC, 264 author = " 265 title = "{ 266 booktitle = " In CAVâ97",264 author = "S. Pardo and G. Hachtel", 265 title = "{Automatic Abstraction Technique for Propositional mu-Calculus Model Checking} ", 266 booktitle = "CAVâ97", 267 267 volume = 1254, 268 268 pages = {12-23}, 269 year = 1997,270 publisher = " LNCS, Springer-Verlag"269 publisher = "Springer-Verlag", 270 year = 1997 271 271 } 272 272 … … 274 274 @conference{ PardoHachtel98incremCTLMC, 275 275 author = " S. Pardo and G. Hachtel", 276 title = "{ 277 booktitle = " InDAC â98: 35th Design Automation Conference ",276 title = "{Incremental CTL Model Checking Using BDD Subsetting} ", 277 booktitle = "DAC â98: 35th Design Automation Conference ", 278 278 pages = {457-462}, 279 year = 1998 ,279 year = 1998 280 280 } 281 281 … … 283 283 @conference{ Burch_al91smc_part_transition, 284 284 author = " J. R. Burch and E. M. Clarke and D. E. Long", 285 title = "{ 285 title = "{Symbolic Model Checking with Partitioned Transition Relations} ", 286 286 booktitle = "Proceedings of the 1991 International Conference on VLSI", 287 287 pages = {49-58}, 288 288 month = August, 289 year = 1991 ,289 year = 1991 290 290 } 291 291 292 292 293 293 @conference{ Burch_al93smc_circuit_verif, 294 author = " 295 title = "{ 296 booktitle = " 294 author = "J. R. Burch and E. M. Clarke and D. E. Long and K. L. Mcmillan and D.L. Dilli", 295 title = "{Symbolic Model Checking for Sequential Circuit Verification} ", 296 booktitle = "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems", 297 297 volume = {13(4)}, 298 298 pages = {401-424}, 299 year = 1993 ,299 year = 1993 300 300 } 301 301 302 302 303 303 @conference{ Kroening_al07vcegar, 304 author = " H imanshu Jain and Daniel Kroening and Natasha Sharygina and EdmundClarke",305 title = "{ 306 booktitle = " In TACAS'07 ",307 year = 2007 ,304 author = " H. Jain and D. Kroening and N. Sharygina and E. Clarke", 305 title = "{VCEGAR: Verilog CounterExample Guided Abstraction Refinement} ", 306 booktitle = "TACAS'07 ", 307 year = 2007 308 308 } 309 309 310 310 311 311 @ARTICLE { Sharygina_al12PreciseApprox, 312 AUTHOR = { Natasha Sharygina and Stefano Tonetta and Aliaksei Tsitovich},313 TITLE = { {An Abstraction Refinement Approach Combining Precise and Approximated Techniques}},314 JOURNAL = { International Journal on Software Tools for Technology Transfer (STTT)},312 AUTHOR = {N. Sharygina and S. Tonetta and A. Tsitovich}, 313 TITLE = {An Abstraction Refinement Approach Combining Precise and Approximated Techniques}, 314 JOURNAL = {International Journal on Software Tools for Technology Transfer}, 315 315 VOLUME = {14}, 316 316 PAGES ={1-14}, 317 YEAR = { 2012},317 YEAR = {2012} 318 318 } 319 319 320 320 321 321 @conference{ microsoft04SLAM, 322 author = " Thomas Ball and Byron Cook and Vladimir Levin and SriramK. Rajamani",323 title = "{ 324 booktitle = " In 4th Int. Conference on Integrated Formal Methods (IFM 2004)",322 author = "T. Ball and B. Cook and V. Levin and S. K. Rajamani", 323 title = "{SLAM and Static Driver Verifier: Technology Transfer of Formal Methods inside Microsoft} ", 324 booktitle = "4th Int. Conf. on Integrated Formal Methods", 325 325 volume = 2999, 326 326 pages = {1-20}, 327 year = 2004,328 publisher = " LNCS, Springer"327 publisher = "Springer", 328 year = 2004 329 329 } 330 330 331 331 332 332 @conference{ berkeley07BLAST, 333 author = " Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and RupakMajumdar",334 title = "{ The Software Model Checker Blast: Applications to software engineering.} ",335 booktitle = " InternationalJournal on Software Tools for Technology Transfer",333 author = "D. Beyer and T. A. Henzinger and R. Jhala and R. Majumdar", 334 title = "{The Software Model Checker Blast: Applications to software engineering} ", 335 booktitle = "Int. Journal on Software Tools for Technology Transfer", 336 336 volume = {9 (5-6)}, 337 337 pages = {505-525}, 338 year = 2007 ,338 year = 2007 339 339 } 340 340 341 341 342 342 @inproceedings{pwk2009-date, 343 AUTHOR = { Mitra Purandare and Thomas Wahl and Daniel Kroening},344 TITLE = { Strengthening Properties using Abstraction Refinement},345 BOOKTITLE = { Proceedings of DATE 2009},346 YEAR = { 2009},347 P UBLISHER = { ACM},348 PAGES = { 1692-1697 },343 AUTHOR = {M. Purandare and T. Wahl and D. Kroening}, 344 TITLE = {Strengthening Properties using Abstraction Refinement}, 345 BOOKTITLE = {Proceedings of DATE 2009}, 346 PUBLISHER = {ACM}, 347 PAGES = {1692-1697}, 348 YEAR = {2009} 349 349 } 350 350 351 351 352 352 @conference{ Kunz_al11ipc_abs, 353 author = " Minh D. Nguyen and Markus Wedler and Dominik Stoffel and WolfgangKunz ",354 title = "{ 355 booktitle = " 48th Proc. Design Automation Conference (DAC'11)",353 author = "M. D. Nguyen and M. Wedler and D. Stoffel and W. Kunz ", 354 title = "{Formal Hardware/Software Co-Verification by Interval Property Checking with Abstraction}", 355 booktitle = "Design Automation Conference (DAC'11)", 356 356 address = "San Diego, USA", 357 year = 2011 ,357 year = 2011 358 358 } 359 359 … … 363 363 publisher = "Addison-Wesley", 364 364 title = "The {\TeX}book", 365 year = 1984, 366 isbn = "" 365 year = 1984 367 366 } 368 367 -
papers/FDL2012/ordering_filter_properties.tex
r94 r101 1 We propose a n1 We propose a 2 2 heuristic to order the properties depending on the structure 3 3 of each component. … … 35 35 Note that a variable may belong to more than one dependency graph, in that case 36 36 we consider the minimum depth. 37 \item Give a weight to each variable (see algorithm \ref{algo:weight}).38 \item Compute the weight of properties for each component ~: sum of the37 \item Give a weight to each variable (see Algorithm \ref{algo:weight}). 38 \item Compute the weight of properties for each component: sum of the 39 39 property variables weight. 40 40 \end{enumerate} 41 41 42 The algorithm \ref{algo:weight} gives weight according to the variable distance to the42 The Algorithm \ref{algo:weight} gives weight according to the variable distance to the 43 43 primary variable with extra weight for interface variable and primary variable. 44 44 … … 250 250 property holds then the property will not eliminate the counterexample. 251 251 Hence this property is not a good candidate for refinement. 252 Therefore the highest weighted property not satisfied in $K(\sigma)$ is cho osen to be252 Therefore the highest weighted property not satisfied in $K(\sigma)$ is chosen to be 253 253 integrated in the next refinement step. This process is iterated for each 254 254 refinement step. … … 274 274 $AKS(\varphi)$, thus $\sigma$ is not a possible path in $AKS(\varphi)$ 275 275 otherwise $AKS(\varphi)\not\models \varphi$ that is not feasible due to AKS 276 definition and the composition with $M_i$ with $AKS(\varphi)$ will eliminate 277 $\sigma$. 276 definition and the composition with $M_i$ with $AKS(\varphi)$ will eliminate $\sigma$. 278 277 \end{enumerate} 279 278 \end{proof} … … 281 280 \vspace*{-2mm} 282 281 The proposed approach ensures that the refinement excludes the counterexample 283 and respects the definition \ref{def:goodrefinement}.284 We will show in our experiments that first the time needed to build an AKS is282 and respects the Definition \ref{def:goodrefinement}. 283 We will show in our experiments that first, the time needed to build an AKS is 285 284 negligible and secondly the refinement converges rapidly. 286 285 %The property at the top of the list (not yet selected and excluding the properties
Note: See TracChangeset
for help on using the changeset viewer.