首页 > 最新文献

2008 Formal Methods in Computer-Aided Design最新文献

英文 中文
A Theory-Based Decision Heuristic for DPLL(T) 基于理论的DPLL(T)决策启发式算法
Pub Date : 2008-11-17 DOI: 10.1109/FMCAD.2008.ECP.17
Dan Goldwasser, O. Strichman, S. Fine
We study the decision problem of disjunctive linear arithmetic over the reals from the perspective of computational geometry. We show that traversing the linear arrangement induced by the formula's predicates, rather than the DPLL(T) method of traversing the Boolean space, may have an advantage when the number of variables is smaller than the number of predicates (as it is indeed the case in the standard SMT-Lib benchmarks). We then continue by showing a branching heuristic that is based on approximating T-implications, based on a geometric analysis. We achieve modest improvement in run time comparing to the commonly used heuristic used by competitive solvers.
从计算几何的角度研究了实数上的析取线性算法的判定问题。我们展示了遍历由公式的谓词引起的线性排列,而不是遍历布尔空间的DPLL(T)方法,当变量的数量小于谓词的数量时可能具有优势(正如标准SMT-Lib基准测试中的情况一样)。然后,我们继续展示一个分支启发式,它基于近似t含义,基于几何分析。与竞争求解器常用的启发式算法相比,我们在运行时间上取得了适度的改进。
{"title":"A Theory-Based Decision Heuristic for DPLL(T)","authors":"Dan Goldwasser, O. Strichman, S. Fine","doi":"10.1109/FMCAD.2008.ECP.17","DOIUrl":"https://doi.org/10.1109/FMCAD.2008.ECP.17","url":null,"abstract":"We study the decision problem of disjunctive linear arithmetic over the reals from the perspective of computational geometry. We show that traversing the linear arrangement induced by the formula's predicates, rather than the DPLL(T) method of traversing the Boolean space, may have an advantage when the number of variables is smaller than the number of predicates (as it is indeed the case in the standard SMT-Lib benchmarks). We then continue by showing a branching heuristic that is based on approximating T-implications, based on a geometric analysis. We achieve modest improvement in run time comparing to the commonly used heuristic used by competitive solvers.","PeriodicalId":399042,"journal":{"name":"2008 Formal Methods in Computer-Aided Design","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132810419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Model Checking Nash Equilibria in MAD Distributed Systems MAD分布式系统中纳什均衡的模型检验
Pub Date : 2008-11-17 DOI: 10.1109/FMCAD.2008.ECP.16
F. Mari, I. Melatti, Ivano Salvo, E. Tronci, L. Alvisi, Allen Clement, Harry C. Li
We present a symbolic model checking algorithm for verification of Nash equilibria in finite state mechanisms modeling multiple administrative domains (MAD) distributed systems. Given a finite state mechanism, a proposed protocol for each agent and an indifference threshold for rewards, our model checker returns PASS if the proposed protocol is a Nash equilibrium (up to the given indifference threshold) for the given mechanism, FAIL otherwise. We implemented our model checking algorithm inside the NuSMV model checker and present experimental results showing its effectiveness for moderate size mechanisms.
提出了一种用于多管理域(MAD)分布式系统有限状态机制中纳什均衡验证的符号模型检验算法。给定有限状态机制,每个代理的提议协议和奖励的无差异阈值,如果提议的协议是给定机制的纳什均衡(达到给定的无差异阈值),我们的模型检查器返回PASS,否则返回FAIL。我们在NuSMV模型检查器中实现了我们的模型检查算法,并给出了实验结果,表明它对中等大小的机制是有效的。
{"title":"Model Checking Nash Equilibria in MAD Distributed Systems","authors":"F. Mari, I. Melatti, Ivano Salvo, E. Tronci, L. Alvisi, Allen Clement, Harry C. Li","doi":"10.1109/FMCAD.2008.ECP.16","DOIUrl":"https://doi.org/10.1109/FMCAD.2008.ECP.16","url":null,"abstract":"We present a symbolic model checking algorithm for verification of Nash equilibria in finite state mechanisms modeling multiple administrative domains (MAD) distributed systems. Given a finite state mechanism, a proposed protocol for each agent and an indifference threshold for rewards, our model checker returns PASS if the proposed protocol is a Nash equilibrium (up to the given indifference threshold) for the given mechanism, FAIL otherwise. We implemented our model checking algorithm inside the NuSMV model checker and present experimental results showing its effectiveness for moderate size mechanisms.","PeriodicalId":399042,"journal":{"name":"2008 Formal Methods in Computer-Aided Design","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129906831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Scaling Up the Formal Verification of Lustre Programs with SMT-Based Techniques 利用基于smt的技术扩大光泽程序的形式化验证
Pub Date : 2008-11-17 DOI: 10.1109/FMCAD.2008.ECP.19
G. Hagen, C. Tinelli
We present a general approach for verifying safety properties of Lustre programs automatically. Key aspects of the approach are the choice of an expressive first-order logic in which Lustre's semantics is modeled very naturally, the tailoring to this logic of SAT-based k-induction and abstraction techniques, and the use of SMT solvers to reason efficiently in this logic. We discuss initial experimental results showing that our implementation of the approach is highly competitive with existing verification solutions for Lustre.
提出了一种自动验证Lustre程序安全特性的通用方法。该方法的关键方面是选择表达性一阶逻辑,其中Lustre的语义非常自然地建模,对基于sat的k归纳和抽象技术的该逻辑进行剪裁,以及使用SMT求解器在该逻辑中进行有效推理。我们讨论了初步的实验结果,表明我们的方法的实现与现有的Lustre验证解决方案具有很强的竞争力。
{"title":"Scaling Up the Formal Verification of Lustre Programs with SMT-Based Techniques","authors":"G. Hagen, C. Tinelli","doi":"10.1109/FMCAD.2008.ECP.19","DOIUrl":"https://doi.org/10.1109/FMCAD.2008.ECP.19","url":null,"abstract":"We present a general approach for verifying safety properties of Lustre programs automatically. Key aspects of the approach are the choice of an expressive first-order logic in which Lustre's semantics is modeled very naturally, the tailoring to this logic of SAT-based k-induction and abstraction techniques, and the use of SMT solvers to reason efficiently in this logic. We discuss initial experimental results showing that our implementation of the approach is highly competitive with existing verification solutions for Lustre.","PeriodicalId":399042,"journal":{"name":"2008 Formal Methods in Computer-Aided Design","volume":"7 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120863539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 106
Mechanized Information Flow Analysis through Inductive Assertions 基于归纳断言的机械化信息流分析
Pub Date : 2008-11-17 DOI: 10.1109/FMCAD.2008.ECP.33
W. Hunt, R. Krug, S. Ray, W. D. Young
We present a method for verifying information flow properties of software programs using inductive assertions and theorem proving. Given a program annotated with information flow assertions at cutpoints, the method uses a theorem prover and operational semantics to generate and discharge verification conditions. This obviates the need to develop a verification condition generator (VCG) or a customized logic for information flow properties. The method is compositional: a subroutine needs to be analyzed once, rather than at each call site. The method is being mechanized in the ACL2 theorem prover, and we discuss initial results demonstrating its applicability.
提出了一种利用归纳断言和定理证明验证软件程序信息流性质的方法。给定一个在断点处标注了信息流断言的程序,该方法使用定理证明器和操作语义来生成和释放验证条件。这就避免了为信息流属性开发验证条件生成器(VCG)或定制逻辑的需要。该方法是组合的:子例程只需要分析一次,而不是在每次调用时都分析一次。该方法在ACL2定理证明中被机械化,我们讨论了证明其适用性的初步结果。
{"title":"Mechanized Information Flow Analysis through Inductive Assertions","authors":"W. Hunt, R. Krug, S. Ray, W. D. Young","doi":"10.1109/FMCAD.2008.ECP.33","DOIUrl":"https://doi.org/10.1109/FMCAD.2008.ECP.33","url":null,"abstract":"We present a method for verifying information flow properties of software programs using inductive assertions and theorem proving. Given a program annotated with information flow assertions at cutpoints, the method uses a theorem prover and operational semantics to generate and discharge verification conditions. This obviates the need to develop a verification condition generator (VCG) or a customized logic for information flow properties. The method is compositional: a subroutine needs to be analyzed once, rather than at each call site. The method is being mechanized in the ACL2 theorem prover, and we discuss initial results demonstrating its applicability.","PeriodicalId":399042,"journal":{"name":"2008 Formal Methods in Computer-Aided Design","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127511300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Formal Verification of Hardware Support for Advanced Encryption Standard 高级加密标准硬件支持的正式验证
Pub Date : 2008-11-17 DOI: 10.1109/FMCAD.2008.ECP.12
A. Slobodová
The advanced encryption standard (AES), approved by National Institute of Standards and Technology, specifies a cryptographic algorithm that can be used to protect electronic data. The next generation of Intel micro-processor introduces a set of instructions known as AES-NI, that promises multi-folded acceleration of the AES encryption and decryption process. In this paper, we report about the formal verification of hardware support for these new instructions. The verification is based on use of symbolic trajectory evaluation that lies at the base of formal verification methodology used by Intel Corporation. To our knowledge, this is the first formal verification of AES hardware support.
高级加密标准(AES)是由美国国家标准与技术研究院(National Institute of Standards and Technology)批准的,它规定了一种可用于保护电子数据的加密算法。下一代英特尔微处理器引入了一组被称为AES- ni的指令,它承诺对AES加密和解密过程进行多重加速。在本文中,我们报告了对这些新指令的硬件支持的形式化验证。验证是基于英特尔公司使用的形式化验证方法的基础上使用的符号轨迹评估。据我们所知,这是AES硬件支持的第一次正式验证。
{"title":"Formal Verification of Hardware Support for Advanced Encryption Standard","authors":"A. Slobodová","doi":"10.1109/FMCAD.2008.ECP.12","DOIUrl":"https://doi.org/10.1109/FMCAD.2008.ECP.12","url":null,"abstract":"The advanced encryption standard (AES), approved by National Institute of Standards and Technology, specifies a cryptographic algorithm that can be used to protect electronic data. The next generation of Intel micro-processor introduces a set of instructions known as AES-NI, that promises multi-folded acceleration of the AES encryption and decryption process. In this paper, we report about the formal verification of hardware support for these new instructions. The verification is based on use of symbolic trajectory evaluation that lies at the base of formal verification methodology used by Intel Corporation. To our knowledge, this is the first formal verification of AES hardware support.","PeriodicalId":399042,"journal":{"name":"2008 Formal Methods in Computer-Aided Design","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133333854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Consistency Checking of All Different Constraints over Bit-Vectors within a SAT Solver SAT求解器中位向量上所有不同约束的一致性检验
Pub Date : 2008-11-17 DOI: 10.1109/FMCAD.2008.ECP.32
Armin Biere, Robert Brummayer
This paper shows how all different constraints (ADCs) over bit-vectors can be handled within a SAT solver. It also contains encouraging experimental results in applying this technique to encode simple path constraints in bounded model checking. Finally, we present a new compact encoding of equalities and inequalities over bit-vectors in CNF.
本文展示了如何在SAT求解器中处理位向量上的所有不同约束(adc)。它还包含了将该技术应用于有界模型检查中对简单路径约束进行编码的令人鼓舞的实验结果。最后,我们提出了一种新的压缩CNF中位向量上的等式和不等式的编码方法。
{"title":"Consistency Checking of All Different Constraints over Bit-Vectors within a SAT Solver","authors":"Armin Biere, Robert Brummayer","doi":"10.1109/FMCAD.2008.ECP.32","DOIUrl":"https://doi.org/10.1109/FMCAD.2008.ECP.32","url":null,"abstract":"This paper shows how all different constraints (ADCs) over bit-vectors can be handled within a SAT solver. It also contains encouraging experimental results in applying this technique to encode simple path constraints in bounded model checking. Finally, we present a new compact encoding of equalities and inequalities over bit-vectors in CNF.","PeriodicalId":399042,"journal":{"name":"2008 Formal Methods in Computer-Aided Design","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129396114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Word-Level Sequential Memory Abstraction for Model Checking 用于模型检查的字级顺序内存抽象
Pub Date : 2008-11-17 DOI: 10.1109/FMCAD.2008.ECP.20
Per Bjesse
Many designs intermingle large memories with wide data paths and nontrivial control. Verifying such systems is challenging, and users often get little traction when applying model checking to decide full or partial end-to-end correctness of such designs. Interestingly, a subclass of these systems can be proven correct by reasoning only about a small number of the memory entries at a limited number of time points. In this paper, we leverage this fact to abstract certain memories in a sound way, and we demonstrate how our memory abstraction coupled with an abstraction refinement algorithm can be used to prove correctness properties for three challenging designs from industry and academia. Key features of our approach are that we operate on standard safety property verification problems, that we proceed completely automatically without any need for abstraction hints, that we can use any bit-level model checker as a back-end decision procedure, and that our algorithms fit seamlessly into a standard transformational verification paradigm.
许多设计将大内存与宽数据路径和非平凡控制混合在一起。验证这样的系统是具有挑战性的,并且当应用模型检查来决定这种设计的全部或部分端到端正确性时,用户通常很少得到牵引力。有趣的是,这些系统的一个子类可以通过在有限的时间点上对少量内存条目进行推理来证明是正确的。在本文中,我们利用这一事实以一种合理的方式抽象某些记忆,并演示了我们的记忆抽象与抽象优化算法如何用于证明来自工业界和学术界的三个具有挑战性的设计的正确性。我们方法的主要特点是我们在标准的安全属性验证问题上操作,我们完全自动地进行而不需要任何抽象提示,我们可以使用任何位级模型检查器作为后端决策过程,并且我们的算法无缝地适合标准的转换验证范例。
{"title":"Word-Level Sequential Memory Abstraction for Model Checking","authors":"Per Bjesse","doi":"10.1109/FMCAD.2008.ECP.20","DOIUrl":"https://doi.org/10.1109/FMCAD.2008.ECP.20","url":null,"abstract":"Many designs intermingle large memories with wide data paths and nontrivial control. Verifying such systems is challenging, and users often get little traction when applying model checking to decide full or partial end-to-end correctness of such designs. Interestingly, a subclass of these systems can be proven correct by reasoning only about a small number of the memory entries at a limited number of time points. In this paper, we leverage this fact to abstract certain memories in a sound way, and we demonstrate how our memory abstraction coupled with an abstraction refinement algorithm can be used to prove correctness properties for three challenging designs from industry and academia. Key features of our approach are that we operate on standard safety property verification problems, that we proceed completely automatically without any need for abstraction hints, that we can use any bit-level model checker as a back-end decision procedure, and that our algorithms fit seamlessly into a standard transformational verification paradigm.","PeriodicalId":399042,"journal":{"name":"2008 Formal Methods in Computer-Aided Design","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131616154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Invariant-Strengthened Elimination of Dependent State Elements 依赖状态元素的不变量强化消除
Pub Date : 2008-11-17 DOI: 10.1109/FMCAD.2008.ECP.6
Michael L. Case, A. Mishchenko, R. Brayton, J. Baumgartner, Hari Mony
This work presents a technology-independent synthesis optimization that is effective in reducing the total number of state elements of a design. It works by identifying and eliminating dependent state elements which may be expressed as functions of other registers. For scalability, we rely exclusively on SAT- based analysis in this process. To enable optimal identification of all dependent state elements, we integrate an inductive invariant generation framework. We introduce numerous techniques to heuristically enhance the reduction potential of our method, and experiments confirm that our approach is scalable and is able to reduce state element count by 12% on average in large industrial designs, even after other aggressive optimizations such as min- register retiming have been applied. The method is effective in simplifying later verification efforts.
这项工作提出了一种技术独立的综合优化,可以有效地减少设计的状态元素总数。它的工作原理是识别和消除可能表示为其他寄存器的函数的依赖状态元素。对于可扩展性,我们在此过程中完全依赖基于SAT的分析。为了实现所有依赖状态元素的最优识别,我们集成了一个归纳不变生成框架。我们引入了许多技术来启发式地增强我们方法的减少潜力,实验证实我们的方法是可扩展的,并且能够在大型工业设计中平均减少12%的状态元素计数,即使在应用了其他积极的优化(如最小寄存器重定时)之后。该方法有效地简化了后期的验证工作。
{"title":"Invariant-Strengthened Elimination of Dependent State Elements","authors":"Michael L. Case, A. Mishchenko, R. Brayton, J. Baumgartner, Hari Mony","doi":"10.1109/FMCAD.2008.ECP.6","DOIUrl":"https://doi.org/10.1109/FMCAD.2008.ECP.6","url":null,"abstract":"This work presents a technology-independent synthesis optimization that is effective in reducing the total number of state elements of a design. It works by identifying and eliminating dependent state elements which may be expressed as functions of other registers. For scalability, we rely exclusively on SAT- based analysis in this process. To enable optimal identification of all dependent state elements, we integrate an inductive invariant generation framework. We introduce numerous techniques to heuristically enhance the reduction potential of our method, and experiments confirm that our approach is scalable and is able to reduce state element count by 12% on average in large industrial designs, even after other aggressive optimizations such as min- register retiming have been applied. The method is effective in simplifying later verification efforts.","PeriodicalId":399042,"journal":{"name":"2008 Formal Methods in Computer-Aided Design","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125193189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Augmenting a Regular Expression-Based Temporal Logic with Local Variables 用局部变量扩充基于正则表达式的时间逻辑
Pub Date : 2008-11-17 DOI: 10.1109/FMCAD.2008.ECP.27
C. Eisner, D. Fisman
The semantics of temporal logic is usually defined with respect to a word representing a computation path over a set of atomic propositions. A temporal logic formula does not control the behavior of the atomic propositions, it merely observes their behavior. Local variables are a twist on this approach, in which the user can declare variables local to the formula and control their behavior from within the formula itself. Local variables were introduced in 2002, and a formal semantics was given to them in the context of SVA, the assertion language of SystemVerilog, in 2004. That semantics suffers from several drawbacks. In particular, it breaks distributivity of the operators corresponding to intersection and union. In this paper we present a formal semantics for local variables that solves that problem and others, and compare it to the previous solution.
时间逻辑的语义通常是根据在一组原子命题上表示计算路径的单词来定义的。时间逻辑公式并不控制原子命题的行为,它只是观察它们的行为。局部变量是这种方法的一个变种,用户可以在公式中声明局部变量,并在公式本身中控制它们的行为。局部变量于2002年引入,并于2004年在SystemVerilog的断言语言SVA上下文中给出了它们的形式化语义。这种语义有几个缺点。特别地,它打破了交和并对应算子的分布性。在本文中,我们提出了一个局部变量的形式化语义,解决了这个问题和其他问题,并将其与之前的解决方案进行了比较。
{"title":"Augmenting a Regular Expression-Based Temporal Logic with Local Variables","authors":"C. Eisner, D. Fisman","doi":"10.1109/FMCAD.2008.ECP.27","DOIUrl":"https://doi.org/10.1109/FMCAD.2008.ECP.27","url":null,"abstract":"The semantics of temporal logic is usually defined with respect to a word representing a computation path over a set of atomic propositions. A temporal logic formula does not control the behavior of the atomic propositions, it merely observes their behavior. Local variables are a twist on this approach, in which the user can declare variables local to the formula and control their behavior from within the formula itself. Local variables were introduced in 2002, and a formal semantics was given to them in the context of SVA, the assertion language of SystemVerilog, in 2004. That semantics suffers from several drawbacks. In particular, it breaks distributivity of the operators corresponding to intersection and union. In this paper we present a formal semantics for local variables that solves that problem and others, and compare it to the previous solution.","PeriodicalId":399042,"journal":{"name":"2008 Formal Methods in Computer-Aided Design","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115465099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Theory of Mutations with Applications to Vacuity, Coverage, and Fault Tolerance 突变理论及其在真空、覆盖和容错方面的应用
Pub Date : 2008-11-17 DOI: 10.1109/FMCAD.2008.ECP.29
O. Kupferman, Wenchao Li, S. Seshia
The quality of formal specifications and the circuits they are written for can be evaluated through checks such as vacuity and coverage. Both checks involve mutations to the specification or the circuit implementation. In this context, we study and prove properties of mutations to finite-state systems. Since faults can be viewed as mutations, our theory of mutations can also be used in a formal approach to fault injection. We demonstrate theoretically and with experimental results how relations and orders amongst mutations can be used to improve specifications and reason about coverage of fault tolerant circuits.
正式规范的质量和它们所编写的电路的质量可以通过检查来评估,例如空洞和覆盖。这两种检查都涉及规范或电路实现的变化。在此背景下,我们研究并证明了有限状态系统的突变性质。由于故障可以看作是突变,我们的突变理论也可以用于故障注入的形式化方法。我们从理论上和实验上证明了如何利用突变之间的关系和顺序来改进容错电路的规格和覆盖原因。
{"title":"A Theory of Mutations with Applications to Vacuity, Coverage, and Fault Tolerance","authors":"O. Kupferman, Wenchao Li, S. Seshia","doi":"10.1109/FMCAD.2008.ECP.29","DOIUrl":"https://doi.org/10.1109/FMCAD.2008.ECP.29","url":null,"abstract":"The quality of formal specifications and the circuits they are written for can be evaluated through checks such as vacuity and coverage. Both checks involve mutations to the specification or the circuit implementation. In this context, we study and prove properties of mutations to finite-state systems. Since faults can be viewed as mutations, our theory of mutations can also be used in a formal approach to fault injection. We demonstrate theoretically and with experimental results how relations and orders amongst mutations can be used to improve specifications and reason about coverage of fault tolerant circuits.","PeriodicalId":399042,"journal":{"name":"2008 Formal Methods in Computer-Aided Design","volume":"237-240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130731151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
期刊
2008 Formal Methods in Computer-Aided Design
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1