首页 > 最新文献

2013 Formal Methods in Computer-Aided Design最新文献

英文 中文
Invariants for finite instances and beyond 有限实例及以上的不变量
Pub Date : 2013-12-11 DOI: 10.1109/FMCAD.2013.6679392
S. Conchon, A. Goel, S. Krstic, A. Mebsout, Fatiha Zaïdi
Verification of safety properties of concurrent programs with an arbitrary numbers of processes is an old challenge. In particular, complex parameterized protocols like FLASH are still out of the scope of state-of-the-art model checkers. In this paper, we describe a new algorithm, called BRAB, that is able to automatically infer invariants strong enough to prove a protocol like FLASH. BRAB computes over-approximations of backward reachable states that are checked to be unreachable in a finite instance of the system. These approximations (candidate invariants) are then model checked together with the original safety properties. Completeness of the approach is ensured by a mechanism for backtracking on spurious traces introduced by too coarse approximations.
验证具有任意数量进程的并发程序的安全特性是一个老难题。特别是,像FLASH这样复杂的参数化协议仍然超出了最先进的模型检查器的范围。在本文中,我们描述了一种名为BRAB的新算法,它能够自动推断出足够强大的不变量来证明像FLASH这样的协议。BRAB计算后向可达状态的过近似值,这些状态在系统的有限实例中被检查为不可达。然后将这些近似(候选不变量)与原始安全属性一起进行模型检查。该方法的完整性由一种机制来保证,该机制可以对过于粗糙的近似引入的虚假轨迹进行回溯。
{"title":"Invariants for finite instances and beyond","authors":"S. Conchon, A. Goel, S. Krstic, A. Mebsout, Fatiha Zaïdi","doi":"10.1109/FMCAD.2013.6679392","DOIUrl":"https://doi.org/10.1109/FMCAD.2013.6679392","url":null,"abstract":"Verification of safety properties of concurrent programs with an arbitrary numbers of processes is an old challenge. In particular, complex parameterized protocols like FLASH are still out of the scope of state-of-the-art model checkers. In this paper, we describe a new algorithm, called BRAB, that is able to automatically infer invariants strong enough to prove a protocol like FLASH. BRAB computes over-approximations of backward reachable states that are checked to be unreachable in a finite instance of the system. These approximations (candidate invariants) are then model checked together with the original safety properties. Completeness of the approach is ensured by a mechanism for backtracking on spurious traces introduced by too coarse approximations.","PeriodicalId":346097,"journal":{"name":"2013 Formal Methods in Computer-Aided Design","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133320298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Generalized counterexamples to liveness properties 活动性性质的广义反例
Pub Date : 2013-12-11 DOI: 10.1109/FMCAD.2013.6679407
Gadi Aleksandrowicz, J. Baumgartner, A. Ivrii, Ziv Nevo
We consider generalized counterexamples in the context of liveness property checking. A generalized counterexample comprises only a subset of values necessary to establish the existence of a concrete counterexample. While useful in various ways even for safety properties, the length of a generalized liveness counterexample may be exponentially shorter than that of a concrete counterexample, entailing significant potential algorithmic benefits. One application of this concept extends the k-LIVENESS proof technique of [1] to enable failure detection. The resulting algorithm is simple, and poses negligible overhead to k-LIVENESS in practice. We additionally propose dedicated algorithms to search for generalized liveness counterexamples, and to manipulate generalized counterexamples to and from concrete ones. Experiments confirm the capability of these techniques to detect failures more efficiently than existing techniques for various benchmarks.
我们在活动性检验的背景下考虑广义反例。广义反例仅包括确定具体反例存在所必需的值的子集。虽然在安全属性方面也有很多用处,但广义活性反例的长度可能比具体反例的长度要短得多,这就带来了显著的潜在算法优势。该概念的一个应用扩展了[1]的k-LIVENESS证明技术,以实现故障检测。所得到的算法简单,并且在实践中对k-LIVENESS的开销可以忽略不计。我们还提出了专门的算法来搜索广义反例,并操纵广义反例与具体反例之间的转换。实验证实了这些技术在各种基准测试中比现有技术更有效地检测故障的能力。
{"title":"Generalized counterexamples to liveness properties","authors":"Gadi Aleksandrowicz, J. Baumgartner, A. Ivrii, Ziv Nevo","doi":"10.1109/FMCAD.2013.6679407","DOIUrl":"https://doi.org/10.1109/FMCAD.2013.6679407","url":null,"abstract":"We consider generalized counterexamples in the context of liveness property checking. A generalized counterexample comprises only a subset of values necessary to establish the existence of a concrete counterexample. While useful in various ways even for safety properties, the length of a generalized liveness counterexample may be exponentially shorter than that of a concrete counterexample, entailing significant potential algorithmic benefits. One application of this concept extends the k-LIVENESS proof technique of [1] to enable failure detection. The resulting algorithm is simple, and poses negligible overhead to k-LIVENESS in practice. We additionally propose dedicated algorithms to search for generalized liveness counterexamples, and to manipulate generalized counterexamples to and from concrete ones. Experiments confirm the capability of these techniques to detect failures more efficiently than existing techniques for various benchmarks.","PeriodicalId":346097,"journal":{"name":"2013 Formal Methods in Computer-Aided Design","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133637790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Computing prime implicants 计算质数
Pub Date : 2013-12-11 DOI: 10.1109/FMCAD.2013.6679390
D. Déharbe, P. Fontaine, Daniel Le Berre, Bertrand Mazure
Model checking and counter-example guided abstraction refinement are examples of applications of SAT solving requiring the production of models for satisfiable formulas. Better than giving a truth value to every variable, one can provide an implicant, i.e. a partial assignment of the variables such that every full extension is a model for the formula. An implicant is prime if every assignment is necessary. Since prime implicants contain no literal irrelevant for the satisfiability of the formula, they are considered as highly refined information. We here propose a novel algorithm that uses data structures found in modern CDCL SAT solvers to efficiently compute prime implicants starting from an existing model. The original aspects are (1) the algorithm is based on watched literals and a form of propagation of required literals, adapted to CDCL solvers (2) the algorithm works not only on clauses, but also on generalized constraints (3) for clauses and, more generally for cardinality constraints, the algorithm complexity is linear in the size of the constraints found. We implemented and evaluated the algorithm with the Sat4j library.
模型检查和反例引导的抽象细化是SAT求解需要为可满足的公式生成模型的应用实例。比起给每个变量一个真值,我们可以提供一个隐含的,即变量的部分赋值,使得每个完全扩展都是公式的一个模型。如果每个赋值都是必要的,则隐含是素数。由于素蕴涵不包含与公式的可满足性无关的文字,它们被认为是高度精炼的信息。我们在这里提出了一种新的算法,该算法使用现代CDCL SAT求解器中的数据结构,从现有模型开始有效地计算质数蕴涵。最初的方面是(1)该算法基于观察文字和所需文字的传播形式,适用于CDCL解算器(2)该算法不仅适用于子句,还适用于广义约束(3)对于子句,更普遍的是对于基数约束,算法复杂性在发现的约束的大小上是线性的。我们使用Sat4j库实现并评估了该算法。
{"title":"Computing prime implicants","authors":"D. Déharbe, P. Fontaine, Daniel Le Berre, Bertrand Mazure","doi":"10.1109/FMCAD.2013.6679390","DOIUrl":"https://doi.org/10.1109/FMCAD.2013.6679390","url":null,"abstract":"Model checking and counter-example guided abstraction refinement are examples of applications of SAT solving requiring the production of models for satisfiable formulas. Better than giving a truth value to every variable, one can provide an implicant, i.e. a partial assignment of the variables such that every full extension is a model for the formula. An implicant is prime if every assignment is necessary. Since prime implicants contain no literal irrelevant for the satisfiability of the formula, they are considered as highly refined information. We here propose a novel algorithm that uses data structures found in modern CDCL SAT solvers to efficiently compute prime implicants starting from an existing model. The original aspects are (1) the algorithm is based on watched literals and a form of propagation of required literals, adapted to CDCL solvers (2) the algorithm works not only on clauses, but also on generalized constraints (3) for clauses and, more generally for cardinality constraints, the algorithm complexity is linear in the size of the constraints found. We implemented and evaluated the algorithm with the Sat4j library.","PeriodicalId":346097,"journal":{"name":"2013 Formal Methods in Computer-Aided Design","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131307407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Distributed synthesis for LTL fragments LTL片段的分布式合成
Pub Date : 2013-12-11 DOI: 10.1109/FMCAD.2013.6679386
K. Chatterjee, T. Henzinger, J. Otop, Andreas Pavlogiannis
We consider the distributed synthesis problem for temporal logic specifications. Traditionally, the problem has been studied for LTL, and the previous results show that the problem is decidable iff there is no information fork in the architecture. We consider the problem for fragments of LTL and our main results are as follows: (1) We show that the problem is undecidable for architectures with information forks even for the fragment of LTL with temporal operators restricted to next and eventually. (2) For specifications restricted to globally along with non-nested next operators, we establish decidability (in EXPSPACE) for star architectures where the processes receive disjoint inputs, whereas we establish undecidability for architectures containing an information fork-meet structure. (3) Finally, we consider LTL without the next operator, and establish decidability (NEXPTIME-complete) for all architectures for a fragment that consists of a set of safety assumptions, and a set of guarantees where each guarantee is a safety, reachability, or liveness condition.
考虑时序逻辑规范的分布式综合问题。传统上对LTL问题进行了研究,以往的研究结果表明,在体系结构中不存在信息分叉的情况下,问题是可判定的。我们考虑了LTL片段的问题,我们的主要结果如下:(1)我们表明,对于具有信息分叉的体系结构,即使对于具有时间算子限制为next和最终的LTL片段,问题也是不可确定的。(2)对于限制全局的规范以及非嵌套的next操作符,我们为星型架构建立了可判定性(在EXPSPACE中),其中进程接收不相交的输入,而我们为包含信息叉接结构的架构建立了不可判定性。(3)最后,我们考虑没有下一个操作符的LTL,并为片段的所有体系结构建立可判定性(NEXPTIME-complete),该片段由一组安全假设和一组保证组成,其中每个保证是一个安全、可达性或生存条件。
{"title":"Distributed synthesis for LTL fragments","authors":"K. Chatterjee, T. Henzinger, J. Otop, Andreas Pavlogiannis","doi":"10.1109/FMCAD.2013.6679386","DOIUrl":"https://doi.org/10.1109/FMCAD.2013.6679386","url":null,"abstract":"We consider the distributed synthesis problem for temporal logic specifications. Traditionally, the problem has been studied for LTL, and the previous results show that the problem is decidable iff there is no information fork in the architecture. We consider the problem for fragments of LTL and our main results are as follows: (1) We show that the problem is undecidable for architectures with information forks even for the fragment of LTL with temporal operators restricted to next and eventually. (2) For specifications restricted to globally along with non-nested next operators, we establish decidability (in EXPSPACE) for star architectures where the processes receive disjoint inputs, whereas we establish undecidability for architectures containing an information fork-meet structure. (3) Finally, we consider LTL without the next operator, and establish decidability (NEXPTIME-complete) for all architectures for a fragment that consists of a set of safety assumptions, and a set of guarantees where each guarantee is a safety, reachability, or liveness condition.","PeriodicalId":346097,"journal":{"name":"2013 Formal Methods in Computer-Aided Design","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128013119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Simplex with sum of infeasibilities for SMT SMT的不可行性和单纯形
Pub Date : 2013-12-11 DOI: 10.1109/FMCAD.2013.6679409
Tim King, Clark W. Barrett, B. Dutertre
The de facto standard for state-of-the-art real and integer linear reasoning within Satisfiability Modulo Theories (SMT) solvers is the Simplex for DPLL(T) algorithm given by Dutertre and de Moura. This algorithm works by performing a sequence of local optimization operations. While the algorithm is generally efficient in practice, its local pivoting heuristics lead to slow convergence on some problems. More traditional Simplex algorithms minimize a global criterion to determine the feasibility of the input constraints. We present a novel Simplex-based decision procedure for use in SMT that minimizes the sum of infeasibilities of the constraints. Experimental results show that this new algorithm is comparable with or outperforms Simplex for DPLL(T) on a broad set of benchmarks.
可满足模理论(SMT)解算器中最先进的实数和整数线性推理的事实标准是由duterte和de Moura给出的DPLL(T)算法的单纯形。该算法通过执行一系列局部优化操作来工作。虽然该算法在实践中是有效的,但其局部枢轴启发式导致某些问题的收敛速度较慢。更传统的单纯形算法最小化一个全局准则,以确定输入约束的可行性。我们提出了一种新的基于simplex的决策过程,用于SMT,它最小化了约束的不可行性之和。实验结果表明,在广泛的基准测试中,该算法与DPLL(T)的Simplex相当或优于Simplex。
{"title":"Simplex with sum of infeasibilities for SMT","authors":"Tim King, Clark W. Barrett, B. Dutertre","doi":"10.1109/FMCAD.2013.6679409","DOIUrl":"https://doi.org/10.1109/FMCAD.2013.6679409","url":null,"abstract":"The de facto standard for state-of-the-art real and integer linear reasoning within Satisfiability Modulo Theories (SMT) solvers is the Simplex for DPLL(T) algorithm given by Dutertre and de Moura. This algorithm works by performing a sequence of local optimization operations. While the algorithm is generally efficient in practice, its local pivoting heuristics lead to slow convergence on some problems. More traditional Simplex algorithms minimize a global criterion to determine the feasibility of the input constraints. We present a novel Simplex-based decision procedure for use in SMT that minimizes the sum of infeasibilities of the constraints. Experimental results show that this new algorithm is comparable with or outperforms Simplex for DPLL(T) on a broad set of benchmarks.","PeriodicalId":346097,"journal":{"name":"2013 Formal Methods in Computer-Aided Design","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133891382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Interpolation for synthesis on unbounded domains 无界域上的插值合成
Pub Date : 2013-12-11 DOI: 10.1109/FMCAD.2013.6679396
Viktor Kunčak, Régis Blanc
Synthesis procedures compile relational specifications into functions. In addition to bounded domains, synthesis procedures are applicable to domains such as mathematical integers, where the domain and range of relations and synthesized code is unbounded. Previous work presented synthesis procedures that generate self-contained code and do not require components as inputs. The advantage of this approach is that it requires only specifications as user input. On the other hand, in some cases it can be desirable to require that the synthesized system reuses existing components. This paper describes a technique to automatically synthesize systems from components. It is also applicable to repair scenarios where the desired sub-component of the system should be replaced to satisfy the overall specification. The technique is sound, and it is complete for constraints for which an interpolation procedure exists, which includes e.g. propositional logic, bitvectors, linear integer arithmetic, recursive structures, finite sets, and extensions of the theory of arrays.
综合程序将关系规范编译成函数。除了有界域之外,合成过程还适用于数学整数等域,其中关系和合成代码的域和范围是无界的。以前的工作介绍了生成自包含代码的合成过程,并且不需要组件作为输入。这种方法的优点是它只需要规范作为用户输入。另一方面,在某些情况下,需要合成系统重用现有组件。本文描述了一种从组件自动合成系统的技术。它也适用于需要更换系统所需的子组件以满足整体规格的维修场景。该技术是可靠的,并且对于存在插值程序的约束是完整的,其中包括命题逻辑,位向量,线性整数算法,递归结构,有限集和阵列理论的扩展。
{"title":"Interpolation for synthesis on unbounded domains","authors":"Viktor Kunčak, Régis Blanc","doi":"10.1109/FMCAD.2013.6679396","DOIUrl":"https://doi.org/10.1109/FMCAD.2013.6679396","url":null,"abstract":"Synthesis procedures compile relational specifications into functions. In addition to bounded domains, synthesis procedures are applicable to domains such as mathematical integers, where the domain and range of relations and synthesized code is unbounded. Previous work presented synthesis procedures that generate self-contained code and do not require components as inputs. The advantage of this approach is that it requires only specifications as user input. On the other hand, in some cases it can be desirable to require that the synthesized system reuses existing components. This paper describes a technique to automatically synthesize systems from components. It is also applicable to repair scenarios where the desired sub-component of the system should be replaced to satisfy the overall specification. The technique is sound, and it is complete for constraints for which an interpolation procedure exists, which includes e.g. propositional logic, bitvectors, linear integer arithmetic, recursive structures, finite sets, and extensions of the theory of arrays.","PeriodicalId":346097,"journal":{"name":"2013 Formal Methods in Computer-Aided Design","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130916983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Verifying multi-threaded software with impact 验证多线程软件的影响
Pub Date : 2013-12-11 DOI: 10.1109/FMCAD.2013.6679412
Björn Wachter, D. Kroening, J. Ouaknine
Lazy abstraction with interpolants, also known as the Impact algorithm, is en vogue as a state-of-the-art software model-checking technique for sequential programs. However, a direct extension of the Impact algorithm to concurrent programs is bound to be inefficient as it has to explore all thread interleavings, which leads to control-state explosion. To this end, we present a new algorithm that combines a new, symbolic form of partial-order reduction with Impact. Our algorithm carries out the dependence analysis on-the-fly while constructing the abstraction and is thus able to deal precisely with dynamic dependencies arising from accesses to tables or pointers - a setting where classical static partial-order reduction techniques struggle. We have implemented the algorithm in a prototype tool that analyses concurrent C program with POSIX threads and evaluated it on a number of benchmark programs. To our knowledge, this is the first application of an Impact-like algorithm to concurrent programs.
使用插值的惰性抽象,也被称为Impact算法,是一种流行的最先进的软件模型检查技术,用于顺序程序。然而,直接将Impact算法扩展到并发程序必然是低效的,因为它必须探索所有线程交错,这将导致控制状态爆炸。为此,我们提出了一种新的算法,它结合了一种新的、符号形式的部分阶约简和Impact。我们的算法在构建抽象的同时实时执行依赖性分析,因此能够精确地处理由于访问表或指针而产生的动态依赖性——这是经典的静态部分顺序约简技术难以解决的问题。我们在一个原型工具中实现了该算法,该工具分析了带有POSIX线程的并发C程序,并在许多基准程序上对其进行了评估。据我们所知,这是第一次将类似impact的算法应用于并发程序。
{"title":"Verifying multi-threaded software with impact","authors":"Björn Wachter, D. Kroening, J. Ouaknine","doi":"10.1109/FMCAD.2013.6679412","DOIUrl":"https://doi.org/10.1109/FMCAD.2013.6679412","url":null,"abstract":"Lazy abstraction with interpolants, also known as the Impact algorithm, is en vogue as a state-of-the-art software model-checking technique for sequential programs. However, a direct extension of the Impact algorithm to concurrent programs is bound to be inefficient as it has to explore all thread interleavings, which leads to control-state explosion. To this end, we present a new algorithm that combines a new, symbolic form of partial-order reduction with Impact. Our algorithm carries out the dependence analysis on-the-fly while constructing the abstraction and is thus able to deal precisely with dynamic dependencies arising from accesses to tables or pointers - a setting where classical static partial-order reduction techniques struggle. We have implemented the algorithm in a prototype tool that analyses concurrent C program with POSIX threads and evaluated it on a number of benchmark programs. To our knowledge, this is the first application of an Impact-like algorithm to concurrent programs.","PeriodicalId":346097,"journal":{"name":"2013 Formal Methods in Computer-Aided Design","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122282716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Better generalization in IC3 IC3中更好的泛化
Pub Date : 2013-12-11 DOI: 10.1109/FMCAD.2013.6679405
Zyad Hassan, Aaron R. Bradley, F. Somenzi
An improved clause generalization procedure for IC3 is presented. Whereas standard generalization extracts a relatively inductive clause from a single state, called a counterexample to induction (CTI), the new procedure also extracts such clauses from other states, called counterexamples to generalization (CTG), that interfere with the primary generalization attempt. The motivation is to enable IC3 to explore states farther from the error states than are CTIs while remaining property-focused. CTGs are strong candidates for being farther but still backward reachable. Significant reductions in the maximum depth reached by IC3's priority queue-directed explicit backward search indicate that this intention is achieved in practice. The effectiveness of the new procedure is established in two independent implementations of IC3, which demonstrate an increase of 17 and 27, respectively, in the number of solved HWMCC benchmarks.
提出了一种改进的IC3子句泛化方法。标准泛化从单个状态中提取相对归纳的子句,称为归纳反例(CTI),而新过程还从干扰初级泛化尝试的其他状态中提取此类子句,称为泛化反例(CTG)。其动机是使IC3能够探索比cti更远离错误状态的状态,同时保持以属性为中心。ctg是更远但仍然落后的候选物。IC3的优先级队列定向显式向后搜索所达到的最大深度的显著减少表明,这种意图在实践中是实现的。新程序的有效性在IC3的两个独立实现中得到了验证,分别表明解决的HWMCC基准的数量增加了17个和27个。
{"title":"Better generalization in IC3","authors":"Zyad Hassan, Aaron R. Bradley, F. Somenzi","doi":"10.1109/FMCAD.2013.6679405","DOIUrl":"https://doi.org/10.1109/FMCAD.2013.6679405","url":null,"abstract":"An improved clause generalization procedure for IC3 is presented. Whereas standard generalization extracts a relatively inductive clause from a single state, called a counterexample to induction (CTI), the new procedure also extracts such clauses from other states, called counterexamples to generalization (CTG), that interfere with the primary generalization attempt. The motivation is to enable IC3 to explore states farther from the error states than are CTIs while remaining property-focused. CTGs are strong candidates for being farther but still backward reachable. Significant reductions in the maximum depth reached by IC3's priority queue-directed explicit backward search indicate that this intention is achieved in practice. The effectiveness of the new procedure is established in two independent implementations of IC3, which demonstrate an increase of 17 and 27, respectively, in the number of solved HWMCC benchmarks.","PeriodicalId":346097,"journal":{"name":"2013 Formal Methods in Computer-Aided Design","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127041430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
Quantifier elimination via clause redundancy 通过子句冗余消除量词
Pub Date : 2013-12-11 DOI: 10.1109/FMCAD.2013.6679395
E. Goldberg, P. Manolios
We consider the problem of existential quantifier elimination for Boolean formulas in conjunctive normal form. Recently we presented a new method for solving this problem based on the machinery of Dependency sequents (D-sequents). The essence of this method is to add to the quantified formula implied clauses until all the clauses with quantified variables become redundant. A D-sequent is a record of the fact that a set of quantified variables is redundant in some subspace. In this paper, we introduce a quantifier elimination algorithm based on a new type of D-sequents called clause D-sequents that express redundancy of clauses rather than variables. Clause D-sequents significantly extend our ability to introduce and algorithmically exploit redundancy, as our experimental results show.
考虑合取范式布尔公式的存在量词消去问题。最近,我们提出了一种基于依赖序列(D-sequents)机制的新方法来解决这一问题。该方法的实质是在量化公式中加入隐含子句,直到所有带有量化变量的子句都是冗余的。d序列是一组量化变量在某一子空间中冗余的记录。在本文中,我们引入了一种基于一种新的d序列的量词消除算法,这种序列被称为子句d序列,它表示子句而不是变量的冗余。正如我们的实验结果所示,条款d序列显着扩展了我们引入和算法利用冗余的能力。
{"title":"Quantifier elimination via clause redundancy","authors":"E. Goldberg, P. Manolios","doi":"10.1109/FMCAD.2013.6679395","DOIUrl":"https://doi.org/10.1109/FMCAD.2013.6679395","url":null,"abstract":"We consider the problem of existential quantifier elimination for Boolean formulas in conjunctive normal form. Recently we presented a new method for solving this problem based on the machinery of Dependency sequents (D-sequents). The essence of this method is to add to the quantified formula implied clauses until all the clauses with quantified variables become redundant. A D-sequent is a record of the fact that a set of quantified variables is redundant in some subspace. In this paper, we introduce a quantifier elimination algorithm based on a new type of D-sequents called clause D-sequents that express redundancy of clauses rather than variables. Clause D-sequents significantly extend our ability to introduce and algorithmically exploit redundancy, as our experimental results show.","PeriodicalId":346097,"journal":{"name":"2013 Formal Methods in Computer-Aided Design","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126491992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Formal co-validation of low-level hardware/software interfaces 低级硬件/软件接口的正式共同验证
Pub Date : 2013-12-11 DOI: 10.1109/FMCAD.2013.6679400
Alex Horn, Michael Tautschnig, C. G. Val, Lihao Liang, T. Melham, J. Grundy, D. Kroening
Today's microelectronics industry is increasingly confronted with the challenge of developing and validating software that closely interacts with hardware. These interactions make it difficult to design and validate the hardware and software separately; instead, a verifiable co-design is required that takes them into account. This paper demonstrates a new approach to co-validation of hardware/software interfaces by formal, symbolic co-execution of an executable hardware model combined with the software that interacts with it. We illustrate and evaluate our technique on three realistic benchmarks in which software I/O is subject to hardware-specific protocol rules: a real-time clock, a temperature sensor on an I2C bus, and an Ethernet MAC. We provide experimental results that show our approach is both feasible as a bug-finding technique and scales to handle a significant degree of concurrency in the combined hardware/software model.
今天的微电子工业越来越多地面临着开发和验证与硬件密切交互的软件的挑战。这些交互使得单独设计和验证硬件和软件变得困难;相反,需要一个可验证的协同设计,将它们考虑在内。本文展示了一种通过形式化的、象征性的可执行硬件模型与与之交互的软件相结合的共同执行来共同验证硬件/软件接口的新方法。我们在三个实际的基准上说明和评估我们的技术,其中软件I/O受硬件特定协议规则的约束:实时时钟,I2C总线上的温度传感器和以太网MAC。我们提供的实验结果表明,我们的方法作为一种bug查找技术是可行的,并且可以在组合的硬件/软件模型中处理相当程度的并发性。
{"title":"Formal co-validation of low-level hardware/software interfaces","authors":"Alex Horn, Michael Tautschnig, C. G. Val, Lihao Liang, T. Melham, J. Grundy, D. Kroening","doi":"10.1109/FMCAD.2013.6679400","DOIUrl":"https://doi.org/10.1109/FMCAD.2013.6679400","url":null,"abstract":"Today's microelectronics industry is increasingly confronted with the challenge of developing and validating software that closely interacts with hardware. These interactions make it difficult to design and validate the hardware and software separately; instead, a verifiable co-design is required that takes them into account. This paper demonstrates a new approach to co-validation of hardware/software interfaces by formal, symbolic co-execution of an executable hardware model combined with the software that interacts with it. We illustrate and evaluate our technique on three realistic benchmarks in which software I/O is subject to hardware-specific protocol rules: a real-time clock, a temperature sensor on an I2C bus, and an Ethernet MAC. We provide experimental results that show our approach is both feasible as a bug-finding technique and scales to handle a significant degree of concurrency in the combined hardware/software model.","PeriodicalId":346097,"journal":{"name":"2013 Formal Methods in Computer-Aided Design","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123800419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
期刊
2013 Formal Methods in Computer-Aided Design
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1