Tutorial: Parameterized Verification with Byzantine Model Checker

被引:1
|
作者
Konnov, Igor [1 ]
Lazic, Marijana [2 ]
Stoilkovska, Ilina [1 ,3 ]
Widder, Josef [1 ]
机构
[1] Informal Syst, Vienna, Austria
[2] Tech Univ Munich, Munich, Germany
[3] TU Wien, Vienna, Austria
来源
FORMAL TECHNIQUES FOR DISTRIBUTED OBJECTS, COMPONENTS, AND SYSTEMS, FORTE 2020 | 2020年 / 12136卷
基金
奥地利科学基金会; 欧洲研究理事会;
关键词
CONSENSUS; AGREEMENT; PROGRAMS; SAFETY; SMT; COMPLETENESS; LIVENESS;
D O I
10.1007/978-3-030-50086-3_11
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Threshold guards are a basic primitive of many fault-tolerant algorithms that solve classical problems of distributed computing, such as reliable broadcast, two-phase commit, and consensus. Moreover, threshold guards can be found in recent blockchain algorithms such as Tendermint consensus. In this tutorial, we give an overview of the techniques implemented in Byzantine Model Checker (ByMC). ByMC implements several techniques for automatic verification of threshold-guarded distributed algorithms. These algorithms have the following features: (1) up to t of processes may crash or behave Byzantine; (2) the correct processes count messages and make progress when they receive sufficiently many messages, e.g., at least t + 1; (3) the number n of processes in the system is a parameter, as well as t; (4) and the parameters are restricted by a resilience condition, e.g., n > 3t. Traditionally, these algorithms were implemented in distributed systems with up to ten participating processes. Nowadays, they are implemented in distributed systems that involve hundreds or thousands of processes. To make sure that these algorithms are still correct for that scale, it is imperative to verify them for all possible values of the parameters.
引用
收藏
页码:189 / 207
页数:19
相关论文
共 50 条
  • [31] Exact Byzantine Consensus on Undirected Graphs under Local Broadcast Model
    Khan, Muhammad Samir
    Naqvi, Syed Shalan
    Vaidya, Nitin H.
    PROCEEDINGS OF THE 2019 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING (PODC '19), 2019, : 327 - 336
  • [32] An Improved Byzantine Fault-Tolerant Algorithm Based on Reputation Model
    He, Feiyang
    Feng, Wenlong
    Zhang, Yu
    Liu, Jian
    ELECTRONICS, 2023, 12 (09)
  • [33] A note on width-parameterized SAT: An exact machine-model characterization
    Papakonstantinou, Periklis A.
    INFORMATION PROCESSING LETTERS, 2009, 110 (01) : 8 - 12
  • [34] Verification of BPMN Model Functional Completeness by using the Topological Functioning Model
    Nazaruka, Erika
    Ovchinnikova, Viktoria
    Alksnis, Gundars
    Sukovskis, Uldis
    ENASE: PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL SOFTWARE APPROACHES TO SOFTWARE ENGINEERING, 2016, : 349 - 358
  • [35] Design of a Three-Level Cross-Verification Coverage Model for Complex IP Verification
    Ma, Mingyuan
    Sui, Jinxue
    Zhang, Xia
    PROCEEDINGS OF 2023 7TH INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND COMPUTER ENGINEERING, EITCE 2023, 2023, : 1428 - 1434
  • [36] Formal Verification of a Hybrid IoT Operating System Model
    Guan, Yuqian
    Guo, Jian
    Li, Qin
    IEEE ACCESS, 2021, 9 (09): : 59171 - 59183
  • [37] Systematic Development and Verification of a Physiologically Based Pharmacokinetic Model of Rivaroxaban
    Cheong, Eleanor Jing Yi
    Teo, Denise Wun Xi
    Chua, Denise Xin Yi
    Chan, Eric Chun Yong
    DRUG METABOLISM AND DISPOSITION, 2019, 47 (11) : 1291 - +
  • [38] Safety Integrity Level Verification Model for IED Protection Schemes
    Torres, Esperanza Susana
    Celeita, David
    Sriramula, Srinivas
    Ramos, Gustavo
    IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS, 2020, 56 (04) : 4329 - 4336
  • [39] Ontology-based Model Driven Engineering for Safety Verification
    Mokos, Konstantinos
    Meditskos, George
    Katsaros, Panagiotis
    Bassiliades, Nick
    Vasiliades, Vangelis
    36TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS, 2010, : 47 - 54
  • [40] SMT and POR Beat Counter Abstraction: Parameterized Model Checking of Threshold-Based Distributed Algorithms
    Konnov, Igor
    Veith, Helmut
    Widder, Josef
    COMPUTER AIDED VERIFICATION, PT I, 2015, 9206 : 85 - 102