Skip to main content

Verified Over-Approximation of the Diameter of Propositionally Factored Transition Systems

  • Conference paper
  • First Online:
Interactive Theorem Proving (ITP 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9236))

Included in the following conference series:

  • 869 Accesses

Abstract

To guarantee the completeness of bounded model checking (BMC) we require a completeness threshold. The diameter of the Kripke model of the transition system is a valid completeness threshold for BMC of safety properties. The recurrence diameter gives us an upper bound on the diameter for use in practice. Transition systems are usually described using (propositionally) factored representations. Bounds for such lifted representations are calculated in a compositional way, by first identifying and bounding atomic subsystems, and then composing those results according to subsystem dependencies to arrive at a bound for the concrete system. Compositional approaches are invalid when using the diameter to bound atomic subsystems, and valid when using the recurrence diameter. We provide a novel overapproximation of the diameter, called the sublist diameter, that is tighter than the recurrence diameter. We prove that compositional approaches are valid using it to bound atomic subsystems. Those proofs are mechanised in HOL4. We also describe a novel verified compositional bounding technique which provides tighter overall bounds compared to existing bottom-up approaches.

M. Abdulaziz, C. Gretton and M. Norrish—NICTA is funded by the Australian Government through the Department of Communications and the Australian Research Council through the ICT Centre of Excellence Program.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Allowing any action to execute in any state is a deviation from standard practice. By using total functions in our formalism, much of the resulting mathematics is relatively simple.

  2. 2.

    With this definition the diameter will be one less than how it was defined in [2].

  3. 3.

    We are using the standard definition of dependency described in [5, 20].

  4. 4.

    \( \rightarrow \) has a \(\Pi \) parameter, but we use it with HOL’s ad hoc overloading ability.

  5. 5.

    top-sorted has a \(\Pi \) parameter and \({\mathcal {C}}\) has \(\Pi \) and \(G_{ vs }\) as parameters hidden with overloading.

  6. 6.

    \(\mathsf N \) has \(\Pi \) and \(G_{ vs }\) as parameters hidden with overloading.

  7. 7.

    \(\mathsf N _b\) has \(\Pi \) and \(G_{ vs }\) as parameters hidden with overloading.

  8. 8.

    The point of this experiment is to show how the computed upper bound grows with different parameters, regardless of the base case function used.

References

  1. Baumgartner, J., Kuehlmann, A., Abraham, J.: Property checking via structural analysis. In: Brinksma, E., Larsen, K.G. (eds.) CAV 2002. LNCS, vol. 2404, pp. 151–165. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  2. Biere, A., Cimatti, A., Clarke, E.M., Strichman, O., Zhu, Y.: Bounded model checking. Adv. Comput. 58, 117–148 (2003)

    Article  Google Scholar 

  3. Biere, A., Cimatti, A., Clarke, E., Zhu, Y.: Symbolic model checking without BDDs. In: Cleaveland, W.R. (ed.) TACAS 1999. LNCS, vol. 1579, pp. 193–207. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  4. Blanchette, J.C., Nipkow, T.: Nitpick: a counterexample generator for higher-order logic based on a relational model finder. In: Kaufmann, M., Paulson, L.C. (eds.) ITP 2010. LNCS, vol. 6172, pp. 131–146. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  5. Bylander, T.: The computational complexity of propositional STRIPS planning. Artif. Intell. 69(1–2), 165–204 (1994)

    Article  MATH  MathSciNet  Google Scholar 

  6. Case, M.L., Mony, H., Baumgartner, J., Kanzelman, R.: Enhanced verification by temporal decomposition. In: Proceedings of 9th International Conference on Formal Methods in Computer-Aided Design, FMCAD 2009, 15–18 November 2009, Austin, Texas, USA, pp. 17–24 (2009)

    Google Scholar 

  7. Ganai, M.K., Gupta, A.: Completeness in smt-based BMC for software programs. In: Design, Automation and Test in Europe, DATE 2008, Munich, Germany, 10–14 March 2008, pp. 831–836 (2008)

    Google Scholar 

  8. Helmert, M.: The Fast Downward planning system. J. Artif. Intell. Res. 26, 191–246 (2006)

    Article  MATH  Google Scholar 

  9. Jackson, D.: Software Abstractions: Logic, Language, and Analysis. MIT Press, Cambridge (2006)

    Google Scholar 

  10. Kautz, H.A., Selman, B.: Planning as satisfiability. In: ECAI, pp. 359–363 (1992)

    Google Scholar 

  11. Kroning, D., Strichman, O.: Efficient computation of recurrence diameters. In: Zuck, L.D., Attie, P.C., Cortesi, A., Mukhopadhyay, S. (eds.) VMCAI 2003. LNCS, vol. 2575, pp. 298–309. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  12. Mcdermott, D., Ghallab, M., Howe, A., Knoblock, C., Ram, A., Veloso, M., Weld, D., Wilkins, D.: PDDL: The planning domain definition language. Technical report, CVC TR-98-003/DCS TR-1165, Yale Center for Computational Vision and Control (1998)

    Google Scholar 

  13. Nipkow, T.: Verifying a hotel key card system. In: Barkaoui, K., Cavalcanti, A., Cerone, A. (eds.) ICTAC 2006. LNCS, vol. 4281, pp. 1–14. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  14. Rintanen, J.: Evaluation strategies for planning as satisfiability. In: Proceedings of the 16th European Conference on Artificial Intelligence, pp. 682–687. IOS Press (2004)

    Google Scholar 

  15. Rintanen, J., Gretton, C.O.: Computing upper bounds on lengths of transition sequences. In: International Joint Conference on Artificial Intelligence (2013)

    Google Scholar 

  16. Sastry, S., Widder, J.: Solvability-based comparison of failure detectors. In: 2014 IEEE 13th International Symposium on Network Computing and Applications, NCA 2014, 21–23 August 2014, Cambridge, MA, USA, pp. 269–276 (2014)

    Google Scholar 

  17. Sheeran, M., Singh, S., Stålmarck, G.: Checking safety properties using induction and a SAT-solver. In: Johnson, S.D., Hunt Jr., W.A. (eds.) FMCAD 2000. LNCS, vol. 1954, pp. 108–125. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  18. Slind, K., Norrish, M.: A brief overview of HOL4. In: Mohamed, O.A., Muñoz, C., Tahar, S. (eds.) TPHOLs 2008. LNCS, vol. 5170, pp. 28–32. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  19. Streeter, M.J., Smith, S.F.: Using decision procedures efficiently for optimization. In: Proceedings of the 17th International Conference on Automated Planning and Scheduling, pp. 312–319. AAAI Press (2007)

    Google Scholar 

  20. Williams, B.C., Nayak, P.P.: A reactive planner for a model-based executive. In: International Joint Conference on Artificial Intelligence, pp. 1178–1185. Morgan Kaufmann Publishers (1997)

    Google Scholar 

Download references

Acknowledgements

We thank Daniel Jackson for suggesting applying diameter upper bounding on the hotel key protocol verification.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Abdulaziz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Abdulaziz, M., Gretton, C., Norrish, M. (2015). Verified Over-Approximation of the Diameter of Propositionally Factored Transition Systems. In: Urban, C., Zhang, X. (eds) Interactive Theorem Proving. ITP 2015. Lecture Notes in Computer Science(), vol 9236. Springer, Cham. https://doi.org/10.1007/978-3-319-22102-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22102-1_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22101-4

  • Online ISBN: 978-3-319-22102-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics