Constraint-based automatic verification of abstract models of multithreaded programs

被引:8
作者
Delzanno, Giorgio [1 ]
机构
[1] Univ Genoa, Dipartimento Informat & Sci Informaz, I-16146 Genoa, Italy
关键词
constraints; multithreaded programs; verification; SYSTEMS; CHECKING;
D O I
10.1017/S1471068406002821
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We present a technique for the automated verification of abstract models of multithreaded programs providing fresh name generation, name mobility, and unbounded control. As high level specification language we adopt here an extension of communication finite-state machines with local variables ranging over an infinite name domain, called TDL programs. Communication machines have been proved very effective for representing communication protocols as well as for representing abstractions of multithreaded software. The verification method that we propose is based on the encoding of TDL programs into a low level language based on multiset rewriting and constraints that can be viewed as an extension of Petri Nets. By means of this encoding, the symbolic verification procedure developed for the low level language in our previous work can now be applied to TDL programs. Furthermore, the encoding allows us to isolate a decidable class of verification problems for TDL programs that still provide fresh name generation, name mobility, and unbounded control. Our syntactic restrictions are in fact defined on the internal structure of threads: In order to obtain a complete and terminating method, threads are only allowed to have at most one local variable (ranging over an infinite domain of names).
引用
收藏
页码:67 / 91
页数:25
相关论文
共 18 条
[1]   General decidability theorems for infinite-state systems [J].
Abdulla, PA ;
Cerans, K ;
Jonsson, B ;
Tsay, YK .
11TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 1996, :313-321
[2]   Model checking of systems with many identical timed processes [J].
Abdulla, PA ;
Jonsson, B .
THEORETICAL COMPUTER SCIENCE, 2003, 290 (01) :241-264
[3]   Ensuring completeness of symbolic verification methods for infinite-state systems [J].
Abdulla, PA ;
Jonsson, B .
THEORETICAL COMPUTER SCIENCE, 2001, 256 (1-2) :145-167
[4]   Better is better than well:: On efficient verification of infinite-state systems [J].
Abdulla, PA ;
Nylén, A .
15TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2000, :132-140
[5]  
[Anonymous], LNCS
[6]   Relating multiset rewriting and process algebras for security protocol analysis [J].
Bistarelli, Stefano ;
Cervesato, Iliano ;
Lenzini, Gabriele ;
Martinelli, Fabio .
JOURNAL OF COMPUTER SECURITY, 2005, 13 (01) :3-47
[7]  
BOCHMANN GV, 1978, COMPUTER NETWORKS, V2, P46
[8]  
BOUAJJANI A, 2000, LECT NOTES COMPUTER, V1855, P403, DOI DOI 10.1007/10722167_
[9]  
BOZZANO M, 2002, 14 INT C COMP AID VE, V2404
[10]  
Cerva H, 1999, ELEC SOC S, V99, P55