首页 > 最新文献

2017 Formal Methods in Computer Aided Design (FMCAD)最新文献

英文 中文
Duality-based interpolation for quantifier-free equalities and uninterpreted functions 基于对偶的无量词等式和未解释函数的插值
Pub Date : 2017-10-01 DOI: 10.23919/FMCAD.2017.8102239
Leonardo S. Alt, A. Hyvärinen, Sepideh Asadi, N. Sharygina
Interpolating, i.e., computing safe over-approximations for a system represented by a logical formula, is at the core of symbolic model-checking. One of the central tools in modeling programs is the use of the equality logic and uninterpreted functions (EUF), but certain aspects of its interpolation, such as size and the logical strength, are still relatively little studied. In this paper we present a solid framework for building compact, strength-controlled interpolants, prove its strength and size properties on EUF, implement and combine it with a propositional interpolation system and integrate the implementation into a model checker. We report encouraging results on using the interpolants both in a controlled setting and in the model checker. Based on the experimentation the presented techniques have potentially a big impact on the final interpolant size and the number of counter-example-guided refinements.
插值,即计算由逻辑公式表示的系统的安全过近似值,是符号模型检查的核心。建模程序中的核心工具之一是使用相等逻辑和未解释函数(EUF),但其插值的某些方面,如大小和逻辑强度,仍然相对较少研究。在本文中,我们提出了一个构造紧凑的、强度控制的插值器的框架,证明了它在EUF上的强度和尺寸特性,并将其与一个命题插值系统相结合,并将其集成到一个模型检查器中。我们报告了在控制设置和模型检查器中使用插值器的令人鼓舞的结果。根据实验,所提出的技术可能对最终的插值大小和反例引导的改进数量有很大的影响。
{"title":"Duality-based interpolation for quantifier-free equalities and uninterpreted functions","authors":"Leonardo S. Alt, A. Hyvärinen, Sepideh Asadi, N. Sharygina","doi":"10.23919/FMCAD.2017.8102239","DOIUrl":"https://doi.org/10.23919/FMCAD.2017.8102239","url":null,"abstract":"Interpolating, i.e., computing safe over-approximations for a system represented by a logical formula, is at the core of symbolic model-checking. One of the central tools in modeling programs is the use of the equality logic and uninterpreted functions (EUF), but certain aspects of its interpolation, such as size and the logical strength, are still relatively little studied. In this paper we present a solid framework for building compact, strength-controlled interpolants, prove its strength and size properties on EUF, implement and combine it with a propositional interpolation system and integrate the implementation into a model checker. We report encouraging results on using the interpolants both in a controlled setting and in the model checker. Based on the experimentation the presented techniques have potentially a big impact on the final interpolant size and the number of counter-example-guided refinements.","PeriodicalId":405292,"journal":{"name":"2017 Formal Methods in Computer Aided Design (FMCAD)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126322455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
goSAT: Floating-point satisfiability as global optimization 作为全局优化的浮点可满足性
Pub Date : 2017-10-01 DOI: 10.23919/FMCAD.2017.8102235
M. Ammar Ben Khadra, D. Stoffel, W. Kunz
We introduce goSAT, a fast and publicly available SMT solver for the theory of floating-point arithmetic. We build on the recently proposed XSat solver [1] which casts the satisfiability problem to a corresponding global optimization problem. Compared to XSat, goSAT is an integrated tool combining JIT compilation of SMT formulas and NLopt, a feature-rich mathematical optimization backend. We evaluate our tool using several optimization algorithms and compare it to XSat, Z3, and MathSat. Our evaluation demonstrates promising results.
我们介绍了goSAT,一个快速和公开可用的浮点算术理论的SMT求解器。我们建立在最近提出的XSat求解器[1]的基础上,它将可满足性问题转换为相应的全局优化问题。与XSat相比,goSAT是一个集成的工具,结合了SMT公式的JIT编译和NLopt,一个功能丰富的数学优化后端。我们使用几种优化算法来评估我们的工具,并将其与XSat、Z3和MathSat进行比较。我们的评估显示出有希望的结果。
{"title":"goSAT: Floating-point satisfiability as global optimization","authors":"M. Ammar Ben Khadra, D. Stoffel, W. Kunz","doi":"10.23919/FMCAD.2017.8102235","DOIUrl":"https://doi.org/10.23919/FMCAD.2017.8102235","url":null,"abstract":"We introduce goSAT, a fast and publicly available SMT solver for the theory of floating-point arithmetic. We build on the recently proposed XSat solver [1] which casts the satisfiability problem to a corresponding global optimization problem. Compared to XSat, goSAT is an integrated tool combining JIT compilation of SMT formulas and NLopt, a feature-rich mathematical optimization backend. We evaluate our tool using several optimization algorithms and compare it to XSat, Z3, and MathSat. Our evaluation demonstrates promising results.","PeriodicalId":405292,"journal":{"name":"2017 Formal Methods in Computer Aided Design (FMCAD)","volume":"16 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121003209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Symbolic security analysis using the Tamarin prover 符号安全分析使用绢毛猴证明
Pub Date : 2017-10-01 DOI: 10.23919/FMCAD.2017.8102229
C. Cremers
In this talk I will present the Tamarin Prover, an analysis tool for symbolic security analysis of systems. A prime example of systems that fall within its scope are security protocols that are executed in the presence of an active attacker. Tamarins state-of-the-art analysis of such systems requires dealing with unbounded replication of processes, loops, the prolific behaviour of the attacker, and equational theories to model cryptographic operations as accurately as possible within the symbolic model. This tutorial covers Tamarins system specification, execution model, and property specification language. I will demonstrate how Tamarin can automatically analyse systems, and how its extensive interactive mode aids in the analysis of more complex systems. Finally, I will touch upon Tamarins more advanced features and larger succesful case studies, such as the upcoming TLS 1.3 internet standard.
在这次演讲中,我将介绍Tamarin Prover,一个用于系统符号安全分析的分析工具。属于其范围的系统的一个主要示例是在活动攻击者存在的情况下执行的安全协议。Tamarins对这种系统的最新分析需要处理无界复制的过程、循环、攻击者的多产行为,以及在符号模型中尽可能准确地模拟加密操作的方程理论。本教程涵盖Tamarins系统规范、执行模型和属性规范语言。我将演示Tamarin如何自动分析系统,以及它广泛的交互模式如何帮助分析更复杂的系统。最后,我将介绍Tamarins更高级的特性和更大的成功案例研究,例如即将推出的TLS 1.3 internet标准。
{"title":"Symbolic security analysis using the Tamarin prover","authors":"C. Cremers","doi":"10.23919/FMCAD.2017.8102229","DOIUrl":"https://doi.org/10.23919/FMCAD.2017.8102229","url":null,"abstract":"In this talk I will present the Tamarin Prover, an analysis tool for symbolic security analysis of systems. A prime example of systems that fall within its scope are security protocols that are executed in the presence of an active attacker. Tamarins state-of-the-art analysis of such systems requires dealing with unbounded replication of processes, loops, the prolific behaviour of the attacker, and equational theories to model cryptographic operations as accurately as possible within the symbolic model. This tutorial covers Tamarins system specification, execution model, and property specification language. I will demonstrate how Tamarin can automatically analyse systems, and how its extensive interactive mode aids in the analysis of more complex systems. Finally, I will touch upon Tamarins more advanced features and larger succesful case studies, such as the upcoming TLS 1.3 internet standard.","PeriodicalId":405292,"journal":{"name":"2017 Formal Methods in Computer Aided Design (FMCAD)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125885833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Learning support sets in IC3 and Quip: The good, the bad, and the ugly IC3和Quip中的学习支持集:好的,坏的和丑陋的
Pub Date : 2017-10-01 DOI: 10.23919/FMCAD.2017.8102252
Ryan Berryhill, A. Ivrii, Neil Veira, A. Veneris
In recent years, IC3 has enjoyed wide adoption by academia and industry as an unbounded model checking engine. The core algorithm works by learning lemmas that, given a safe property, eventually converge to an inductive proof. As such, its runtime performance is heavily dependent upon “pushing” (or “promoting”) important lemmas, possibly by discovering additional supporting lemmas. More recently, Quip has emerged to be a complementary extension behind the reasoning capabilities of IC3 as it allows it to target particular lemmas for pushing. This also raises the following question: which lemmas should be promoted? To that end, this paper extends the reasoning capabilities of IC3 and Quip using special SAT queries to find support sets that represent fine-grained information on which lemmas are required to push other lemmas. Further, this paper presents an IC3-based algorithm called Truss (Testing Reachability Using Support Sets) that uses support sets to identify sets of lemmas that may be close to forming an inductive proof. The set is targeted for promotion as a cohesive unit. If any of the lemmas cannot be promoted, the entire set is abandoned and a new set excluding that lemma is found. In the presented framework, there are two reasons why a lemma cannot be promoted: either because it blocks a known reachable state (in which case, the lemma is permanently marked as bad), or because lemma promotion exceeds a specified amount of effort (in which case the lemma is temporarily marked as ugly). Intuitively, the proposed approach allows the algorithm to construct a proof more quickly by focusing on the important yet easily-pushed lemmas. Experiments on the HWMCC'15 benchmark set show a significant improvement against existing practices. Compared to Quip, our algorithm solves 17 more problem instances and it offers an impressive 1.77× speedup.
近年来,IC3作为一种无界模型检测引擎被学术界和工业界广泛采用。核心算法通过学习引理来工作,在给定安全性质的情况下,这些引理最终收敛于归纳证明。因此,它的运行时性能严重依赖于“推入”(或“提升”)重要的引理,可能是通过发现额外的支持引理。最近,Quip已经成为IC3推理能力背后的补充扩展,因为它允许IC3针对特定的引理进行推送。这也提出了以下问题:哪些引理应该被提升?为此,本文使用特殊的SAT查询扩展了IC3和Quip的推理能力,以找到表示细粒度信息的支持集,在这些信息上需要引理来推动其他引理。此外,本文提出了一种基于ic3的算法,称为Truss(使用支持集测试可达性),该算法使用支持集来识别可能接近形成归纳证明的引理集。该集合的目标是作为一个有凝聚力的单位进行推广。如果任何一个引理不能提升,则放弃整个集合,并找到一个不包含该引理的新集合。在提出的框架中,引理不能提升有两个原因:要么是因为它阻塞了已知的可达状态(在这种情况下,引理被永久标记为坏的),要么是因为引理提升超出了指定的工作量(在这种情况下,引理被暂时标记为丑的)。直观地说,所提出的方法允许算法通过关注重要但易于推进的引理来更快地构建证明。在HWMCC’15基准集上的实验表明,与现有实践相比,该方法有了显著的改进。与Quip相比,我们的算法多解决了17个问题实例,并提供了令人印象深刻的1.77倍加速。
{"title":"Learning support sets in IC3 and Quip: The good, the bad, and the ugly","authors":"Ryan Berryhill, A. Ivrii, Neil Veira, A. Veneris","doi":"10.23919/FMCAD.2017.8102252","DOIUrl":"https://doi.org/10.23919/FMCAD.2017.8102252","url":null,"abstract":"In recent years, IC3 has enjoyed wide adoption by academia and industry as an unbounded model checking engine. The core algorithm works by learning lemmas that, given a safe property, eventually converge to an inductive proof. As such, its runtime performance is heavily dependent upon “pushing” (or “promoting”) important lemmas, possibly by discovering additional supporting lemmas. More recently, Quip has emerged to be a complementary extension behind the reasoning capabilities of IC3 as it allows it to target particular lemmas for pushing. This also raises the following question: which lemmas should be promoted? To that end, this paper extends the reasoning capabilities of IC3 and Quip using special SAT queries to find support sets that represent fine-grained information on which lemmas are required to push other lemmas. Further, this paper presents an IC3-based algorithm called Truss (Testing Reachability Using Support Sets) that uses support sets to identify sets of lemmas that may be close to forming an inductive proof. The set is targeted for promotion as a cohesive unit. If any of the lemmas cannot be promoted, the entire set is abandoned and a new set excluding that lemma is found. In the presented framework, there are two reasons why a lemma cannot be promoted: either because it blocks a known reachable state (in which case, the lemma is permanently marked as bad), or because lemma promotion exceeds a specified amount of effort (in which case the lemma is temporarily marked as ugly). Intuitively, the proposed approach allows the algorithm to construct a proof more quickly by focusing on the important yet easily-pushed lemmas. Experiments on the HWMCC'15 benchmark set show a significant improvement against existing practices. Compared to Quip, our algorithm solves 17 more problem instances and it offers an impressive 1.77× speedup.","PeriodicalId":405292,"journal":{"name":"2017 Formal Methods in Computer Aided Design (FMCAD)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131662040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
K-induction without unrolling k感应不展开
Pub Date : 2017-10-01 DOI: 10.23919/FMCAD.2017.8102253
A. Gurfinkel, A. Ivrii
We present a flexible algorithmic framework KIC3 that combines IC3 and k-induction. The key underlying observation is that k-induction can be easily simulated by existing IC3 implementations by following a slightly different counterexample-queue management strategy.
我们提出了一个结合IC3和k归纳的灵活算法框架KIC3。关键的潜在观察是,通过遵循稍微不同的反例队列管理策略,现有的IC3实现可以很容易地模拟k归纳。
{"title":"K-induction without unrolling","authors":"A. Gurfinkel, A. Ivrii","doi":"10.23919/FMCAD.2017.8102253","DOIUrl":"https://doi.org/10.23919/FMCAD.2017.8102253","url":null,"abstract":"We present a flexible algorithmic framework KIC3 that combines IC3 and k-induction. The key underlying observation is that k-induction can be easily simulated by existing IC3 implementations by following a slightly different counterexample-queue management strategy.","PeriodicalId":405292,"journal":{"name":"2017 Formal Methods in Computer Aided Design (FMCAD)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123588595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Estimating worst-case latency of on-chip interconnects with formal simulation 片上互连的最坏情况延迟估计与形式化模拟
Pub Date : 2017-10-01 DOI: 10.23919/FMCAD.2017.8102261
Freek Verbeek, N. V. Vugt
Latency is a major issue in the design and validation of a Network-on-Chip (NoC). Various techniques for establishing latency bounds exist. Formal and mathematical methods, such as network calculus, can be used to analyze an NoC model. Simulation-based methods can be used to estimate latency bounds by exploring reachable states. Both have their advantages and disadvantages. This paper presents an approach that finds a middle ground between these two worlds. Our approach is based on simulation of high-level formal models. In contrast to traditional formal methods for worst-case latency, we do not require error-prone manual computation or the absence of cycles. In contrast to traditional simulation-based methods, we leverage the high level of abstraction to explore up to billions of states within a couple of hours. We apply our approach on an 8 core case study where a simple cache protocol runs on top of a ring-based Spidergon architecture. We show that deadlocks or starvations are easily found, and that for live networks a worst-case bound estimation can be produced within reasonable time.
延迟是片上网络(NoC)设计和验证中的一个主要问题。存在各种建立延迟边界的技术。形式和数学方法,如网络演算,可以用来分析NoC模型。基于仿真的方法可以通过探索可达状态来估计延迟边界。两者都有其优点和缺点。本文提出了一种在这两个世界之间找到中间地带的方法。我们的方法是基于高级形式模型的模拟。与传统的最坏情况延迟的正式方法相比,我们不需要容易出错的人工计算或缺乏周期。与传统的基于仿真的方法相比,我们利用高级抽象在几个小时内探索多达数十亿个状态。我们将我们的方法应用于一个8核心案例研究,其中一个简单的缓存协议运行在基于环的Spidergon架构之上。我们证明了死锁或饥饿很容易被发现,并且对于实时网络可以在合理的时间内产生最坏情况界估计。
{"title":"Estimating worst-case latency of on-chip interconnects with formal simulation","authors":"Freek Verbeek, N. V. Vugt","doi":"10.23919/FMCAD.2017.8102261","DOIUrl":"https://doi.org/10.23919/FMCAD.2017.8102261","url":null,"abstract":"Latency is a major issue in the design and validation of a Network-on-Chip (NoC). Various techniques for establishing latency bounds exist. Formal and mathematical methods, such as network calculus, can be used to analyze an NoC model. Simulation-based methods can be used to estimate latency bounds by exploring reachable states. Both have their advantages and disadvantages. This paper presents an approach that finds a middle ground between these two worlds. Our approach is based on simulation of high-level formal models. In contrast to traditional formal methods for worst-case latency, we do not require error-prone manual computation or the absence of cycles. In contrast to traditional simulation-based methods, we leverage the high level of abstraction to explore up to billions of states within a couple of hours. We apply our approach on an 8 core case study where a simple cache protocol runs on top of a ring-based Spidergon architecture. We show that deadlocks or starvations are easily found, and that for live networks a worst-case bound estimation can be produced within reasonable time.","PeriodicalId":405292,"journal":{"name":"2017 Formal Methods in Computer Aided Design (FMCAD)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130269095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
FuseIC3: An algorithm for checking large design spaces FuseIC3:用于检查大型设计空间的算法
Pub Date : 2017-10-01 DOI: 10.23919/FMCAD.2017.8102255
Rohit Dureja, Kristin Yvonne Rozier
The design of safety-critical systems often requires design space exploration: comparing several system models that differ in terms of design choices, capabilities, and implementations. Model checking can compare different models in such a set, however, it is continuously challenged by the state space explosion problem. Therefore, learning and reusing information from solving related models becomes very important for future checking efforts. For example, reusing variable ordering in BDD-based model checking leads to substantial performance improvement. In this paper, we present a SAT-based algorithm for checking a set of models. Our algorithm, FuseIC3, extends IC3 to minimize time spent in exploring the common state space between related models. Specifically, FuseIC3 accumulates artifacts from the sequence of over-approximated reachable states, called frames, from earlier runs when checking new models, albeit, after careful repair. It uses bidirectional reachability; forward reachability to repair frames, and IC3-type backward reachability to block predecessors to bad states. We extensively evaluate FuseIC3 over a large collection of challenging benchmarks. FuseIC3 is on-average up to 5.48× (median 1.75× ) faster than checking each model individually, and up to 3.67× (median 1.72×) faster than the state-of-the-art incremental IC3 algorithm.
安全关键系统的设计通常需要设计空间探索:比较在设计选择、功能和实现方面不同的几个系统模型。模型校核可以对这样一个集合中的不同模型进行比较,但状态空间爆炸问题不断给模型校核带来挑战。因此,从求解相关模型中学习和重用信息对于未来的检查工作变得非常重要。例如,在基于bdd的模型检查中重用变量排序可以显著提高性能。在本文中,我们提出了一种基于sat的算法来检查一组模型。我们的算法FuseIC3扩展了IC3,以最小化在相关模型之间探索公共状态空间所花费的时间。具体来说,FuseIC3在检查新模型时(尽管经过仔细修复)从早期运行的过度逼近的可达状态序列(称为帧)中积累工件。它使用双向可达性;前向可达性用于修复帧,ic3类型的后向可达性用于阻止先前的坏状态。我们在大量具有挑战性的基准测试中广泛评估了FuseIC3。平均而言,FuseIC3比单独检查每个模型快5.48倍(中值1.75倍),比最先进的增量IC3算法快3.67倍(中值1.72倍)。
{"title":"FuseIC3: An algorithm for checking large design spaces","authors":"Rohit Dureja, Kristin Yvonne Rozier","doi":"10.23919/FMCAD.2017.8102255","DOIUrl":"https://doi.org/10.23919/FMCAD.2017.8102255","url":null,"abstract":"The design of safety-critical systems often requires design space exploration: comparing several system models that differ in terms of design choices, capabilities, and implementations. Model checking can compare different models in such a set, however, it is continuously challenged by the state space explosion problem. Therefore, learning and reusing information from solving related models becomes very important for future checking efforts. For example, reusing variable ordering in BDD-based model checking leads to substantial performance improvement. In this paper, we present a SAT-based algorithm for checking a set of models. Our algorithm, FuseIC3, extends IC3 to minimize time spent in exploring the common state space between related models. Specifically, FuseIC3 accumulates artifacts from the sequence of over-approximated reachable states, called frames, from earlier runs when checking new models, albeit, after careful repair. It uses bidirectional reachability; forward reachability to repair frames, and IC3-type backward reachability to block predecessors to bad states. We extensively evaluate FuseIC3 over a large collection of challenging benchmarks. FuseIC3 is on-average up to 5.48× (median 1.75× ) faster than checking each model individually, and up to 3.67× (median 1.72×) faster than the state-of-the-art incremental IC3 algorithm.","PeriodicalId":405292,"journal":{"name":"2017 Formal Methods in Computer Aided Design (FMCAD)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122892459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Formal methods in industrial dependable systems design — The TTTech example 工业可靠系统设计中的形式化方法- TTTech的例子
Pub Date : 2017-10-01 DOI: 10.23919/FMCAD.2017.8102232
W. Steiner
Over the last decades the field of dependable computer systems has gained tremendous significance in our modern society. We rely on the dependability of automobiles, railways, airplanes, medical devices, critical infrastructures, like the electrical grid or industrial production facilities, and many more. These dependable systems frequently implement non-trivial mechanisms, for example, to coordinate between redundant components, and a guarantee of correctness of these mechanisms is therefore crucial to avoid catastrophic incidents. Consequently, formal methods are frequently used in industrial dependable system design and in this talk I will discuss the various aspects in which formal methods are and have been deployed for specification, verification, and configuration at TTTech for critical networking products.
在过去的几十年里,可靠的计算机系统领域在我们的现代社会中获得了巨大的意义。我们依赖于汽车、铁路、飞机、医疗设备、关键基础设施(如电网或工业生产设施)等等的可靠性。这些可靠的系统经常实现重要的机制,例如,在冗余组件之间进行协调,因此保证这些机制的正确性对于避免灾难性事件至关重要。因此,形式化方法经常用于工业可靠的系统设计,在这次演讲中,我将讨论形式化方法在TTTech用于关键网络产品的规范、验证和配置的各个方面。
{"title":"Formal methods in industrial dependable systems design — The TTTech example","authors":"W. Steiner","doi":"10.23919/FMCAD.2017.8102232","DOIUrl":"https://doi.org/10.23919/FMCAD.2017.8102232","url":null,"abstract":"Over the last decades the field of dependable computer systems has gained tremendous significance in our modern society. We rely on the dependability of automobiles, railways, airplanes, medical devices, critical infrastructures, like the electrical grid or industrial production facilities, and many more. These dependable systems frequently implement non-trivial mechanisms, for example, to coordinate between redundant components, and a guarantee of correctness of these mechanisms is therefore crucial to avoid catastrophic incidents. Consequently, formal methods are frequently used in industrial dependable system design and in this talk I will discuss the various aspects in which formal methods are and have been deployed for specification, verification, and configuration at TTTech for critical networking products.","PeriodicalId":405292,"journal":{"name":"2017 Formal Methods in Computer Aided Design (FMCAD)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122576847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Designing parallel PDR 设计并行PDR
Pub Date : 2017-10-01 DOI: 10.23919/FMCAD.2017.8102254
Matteo Marescotti, A. Gurfinkel, A. Hyvärinen, N. Sharygina
Property Directed Reachability (PDR) is an efficient model checking technique. However, the intrinsic high computational complexity prevents PDR from meeting the challenges of real world verification. To address this problem, this paper introduces the parallel algorithm P3 based on: 1) partitioning of the input problem, 2) exchanging of learned reachability information, and 3) using algorithm portfolios. The generic nature of the proposed techniques makes them immediately suitable for software verification. This paper investigates the benefits of these techniques while taken individually and when combined together, implemented using distributed computing environment on top of the SMT-based software model checker Spacer. In our experiments over SV-COMP benchmarks we observe up to an order of magnitude speedup with respect to the sequential implementation with twice as many instances solved within a timeout.
属性定向可达性(PDR)是一种有效的模型检测技术。然而,固有的高计算复杂度使PDR无法满足现实世界验证的挑战。为了解决这一问题,本文介绍了基于输入问题划分、学习可达性信息交换和算法组合使用的并行算法P3。所建议的技术的通用性使它们立即适合于软件验证。本文研究了这些技术在单独使用和组合使用时的好处,并在基于smt的软件模型检查器Spacer之上使用分布式计算环境实现这些技术。在我们对SV-COMP基准测试的实验中,我们观察到相对于顺序实现而言,在超时内解决的实例数量增加了一倍,速度提高了一个数量级。
{"title":"Designing parallel PDR","authors":"Matteo Marescotti, A. Gurfinkel, A. Hyvärinen, N. Sharygina","doi":"10.23919/FMCAD.2017.8102254","DOIUrl":"https://doi.org/10.23919/FMCAD.2017.8102254","url":null,"abstract":"Property Directed Reachability (PDR) is an efficient model checking technique. However, the intrinsic high computational complexity prevents PDR from meeting the challenges of real world verification. To address this problem, this paper introduces the parallel algorithm P3 based on: 1) partitioning of the input problem, 2) exchanging of learned reachability information, and 3) using algorithm portfolios. The generic nature of the proposed techniques makes them immediately suitable for software verification. This paper investigates the benefits of these techniques while taken individually and when combined together, implemented using distributed computing environment on top of the SMT-based software model checker Spacer. In our experiments over SV-COMP benchmarks we observe up to an order of magnitude speedup with respect to the sequential implementation with twice as many instances solved within a timeout.","PeriodicalId":405292,"journal":{"name":"2017 Formal Methods in Computer Aided Design (FMCAD)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132925757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Coalition, intrigue, ambush, destruction and pride: Herding cats can be challenging 联盟,阴谋,伏击,破坏和骄傲:放牧猫是具有挑战性的
Pub Date : 2017-10-01 DOI: 10.23919/FMCAD.2017.8102230
J. Alglave
Herding cats can lead to coalition (of cheetahs), intrigue (of kittens), ambush (of tigers), destruction (of wild cats) or pride (of lions). In this tutorial, I will present the cat language to write consistency models as a set of constraints on the executions of concurrent programs. A cat model can be executed within the herd tool [3], which I will use during the tutorial.
放牧猫会导致猎豹的联合、小猫的阴谋、老虎的伏击、野猫的毁灭或狮子的骄傲。在本教程中,我将介绍将一致性模型编写为并发程序执行的一组约束的cat语言。可以在羊群工具[3]中执行猫模型,我将在教程中使用该工具。
{"title":"Coalition, intrigue, ambush, destruction and pride: Herding cats can be challenging","authors":"J. Alglave","doi":"10.23919/FMCAD.2017.8102230","DOIUrl":"https://doi.org/10.23919/FMCAD.2017.8102230","url":null,"abstract":"Herding cats can lead to coalition (of cheetahs), intrigue (of kittens), ambush (of tigers), destruction (of wild cats) or pride (of lions). In this tutorial, I will present the cat language to write consistency models as a set of constraints on the executions of concurrent programs. A cat model can be executed within the herd tool [3], which I will use during the tutorial.","PeriodicalId":405292,"journal":{"name":"2017 Formal Methods in Computer Aided Design (FMCAD)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132927337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 Formal Methods in Computer Aided Design (FMCAD)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1