PARAMETERIZED REACHABILITY GRAPH FOR SOFTWARE MODEL CHECKING BASED ON PDNET

被引:0
作者
Jia, Xiangyu [1 ]
Li, Shuo [1 ]
机构
[1] Tongji Univ, Dept Comp Sci & Technol, Shanghai 201804, Peoples R China
关键词
Model checking; PDNet; parameterized reachability graph; VERIFICATION; NETS;
D O I
10.31577/cai2023_4_781
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Model checking is a software automation verification technique. However, the complex execution process of concurrent software systems and the exhaustive search of state space make the model-checking technique limited by the state-explosion problem in real applications. Due to the uncertain input information (called system parameterization) in concurrent software systems, the state-explosion problem in model checking is exacerbated. To address the problem that reachability graphs of Petri net are difficult to construct and cannot be explored exhaustively due to system parameterization, this paper introduces parameterized variables into the program dependence net (a concurrent program model). Then, it proposes a parameterized reachability graph generation algorithm, including decision algorithms for verifying the properties. We implement LTL-X verification based on parameterized reachability graphs and solve the problem of difficulty constructing reachability graphs caused by uncertain inputs.
引用
收藏
页码:781 / 804
页数:24
相关论文
共 50 条
  • [21] DiVM: Model checking with LLVM and graph memory
    Rockai, Petr
    Still, Vladimir
    Cerna, Ivana
    Barnat, Jiri
    JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 143 : 1 - 13
  • [22] Directed Model Checking for Fast Abstract Reachability Analysis
    Lee, Nakwon
    Kim, Yunho
    Kim, Moonzoo
    Ryu, Duksan
    Baik, Jongmoon
    IEEE ACCESS, 2021, 9 : 158738 - 158750
  • [23] SMT-Based Reachability Checking for Bounded Time Petri Nets
    Polrola, Agata
    Cybula, Piotr
    Meski, Artur
    FUNDAMENTA INFORMATICAE, 2014, 135 (04) : 467 - 482
  • [24] Formally Analyzing Software Vulnerability Based on Model Checking
    Wang Chunlei
    Huang Minhuan
    He Ronghui
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 615 - +
  • [25] A case study in model checking software systems
    Wing, JM
    VaziriFarahani, M
    SCIENCE OF COMPUTER PROGRAMMING, 1997, 28 (2-3) : 273 - 299
  • [26] A model template for reachability-based containment checking of imprecise observations in timed automata
    Lehmann, Sascha
    Schupp, Sibylle
    SOFTWARE AND SYSTEMS MODELING, 2024, : 411 - 444
  • [27] Parameterized Model Checking of Synchronous Distributed Algorithms by Abstraction
    Aminof, Benjamin
    Rubin, Sasha
    Stoilkovska, Ilina
    Widder, Josef
    Zuleger, Florian
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION (VMCAI 2018), 2018, 10747 : 1 - 24
  • [28] CHECKING DATA-FLOW ERRORS BASED ON THE GUARD-DRIVEN REACHABILITY GRAPH OF WFD-NET
    Xiang, Dongming
    Liu, Guanjun
    COMPUTING AND INFORMATICS, 2020, 39 (1-2) : 193 - 212
  • [29] Parameterized Model Checking of Token-Passing Systems
    Aminof, Benjamin
    Jacobs, Swen
    Khalimov, Ayrat
    Rubin, Sasha
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION: (VMCAI 2014), 2014, 8318 : 262 - 281
  • [30] Parameterized Model Checking Modulo ExplicitWeak Memory Models
    Conchon, Sylvain
    Declerck, David
    Zaidi, Fatiha
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2018, (271): : 48 - 63