Skip to main content

Verification by Network Decomposition

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3170))

Abstract

We describe a new method to verify networks of homogeneous processes which communicate by token passing. Given an arbitrary network graph and an indexed LTLX property, we show how to decompose the network graph into multiple constant size networks, thereby reducing one model checking call on a large network to several calls on small networks. We thus obtain cut-offs for arbitrary classes of networks, adding to previous work by Emerson and Namjoshi on the ring topology. Our results on LTLX are complemented by a negative result which precludes the existence of reductions for CTLX on general networks.

This research was sponsored by the Semiconductor Research Corporation (SRC) under contract no. 99-TJ-684, the National Science Foundation (NSF) under grants no. CCR-9803774 and CCR-0121547, the Office of Naval Research (ONR) and the Naval Research Laboratory (NRL) under contract no. N00014-01-1-0796, and the Army Research Office (ARO) under contract no. DAAD19-01-1-0485 and by the European Community Research Training Network GAMES. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of SRC, NSF, ONR, NRL, ARO, the U.S. Government or any other entity.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abdulla, P.A., Jonsson, B., Nilsson, M., d’Orso, J.: Regular model checking made simple and efficient. In: Brim, L., Jančar, P., Křetínský, M., Kucera, A. (eds.) CONCUR 2002. LNCS, vol. 2421, pp. 116–130. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  2. Apt, K., Kozen, D.: Limits for automatic verification of finite state concurrent systems. Information Processing Letters 15, 307–309 (1986)

    Article  MathSciNet  Google Scholar 

  3. Arons, T., Pnueli, A., Ruah, S., Xu, J., Zuck, L.D.: Parameterized Verification with Automatically Computed Inductive Assertions. In: Berry, G., Comon, H., Finkel, A. (eds.) CAV 2001. LNCS, vol. 2102, p. 221. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  4. Boigelot, B., Legay, A., Wolper, P.: Iterating transducers in the large. In: Hunt Jr., W.A., Somenzi, F. (eds.) CAV 2003. LNCS, vol. 2725, pp. 223–235. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  5. Bouajjani, A., Habermehl, P., Vojnar, T.: Verification of Parametric Concurrent Systems with Prioritized FIFO Resource Management. In: Amadio, R., Lugiez, D. (eds.) CONCUR 2003. LNCS, vol. 2761, pp. 174–190. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  6. Bouajjani, A., Jonsson, B., Nilsson, M., Touili, T.: Regular model checking. In: Emerson, E.A., Sistla, A.P. (eds.) CAV 2000. LNCS, vol. 1855. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  7. Bouajjani, A., Touili, T.: Extrapolating tree transformations. In: Brinksma, E., Larsen, K.G. (eds.) CAV 2002. LNCS, vol. 2404, p. 539. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  8. Browne, M.C., Clarke, E.M., Grumberg, O.: Characterizing finite kripke structures in propositional temporal logic. Theoretical Computer Science 59, 115–131 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  9. Browne, M.C., Clarke, E.M., Grumberg, O.: Reasoning about networks with many identical finite state processes. Information and Computation 81, 13–31 (1989)

    Article  MathSciNet  MATH  Google Scholar 

  10. Clarke, E.M., Filkorn, T., Jha, S.: Exploiting symmetry in temporal model checking. In: Proc. 5th Intl. Conf. Computer Aided Verification (CAV) (1993)

    Google Scholar 

  11. Courcelle, B.: Graph rewriting: An algebraic and logic approach. B, 459–492 (1990)

    Google Scholar 

  12. Emerson, A.E., Kahlon, V.: Reducing model checking of the many to the few. In: McAllester, D. (ed.) CADE 2000. LNCS, vol. 1831. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  13. Emerson, A.E., Kahlon, V.: Model checking larage-scale and parameterized resource allocation systems. In: Katoen, J.-P., Stevens, P. (eds.) ETAPS 2002 and TACAS 2002. LNCS, vol. 2280, pp. 251–265. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  14. Emerson, A.E., Kahlon, V.: Model Checking Guarded Protocols. In: Eighteenth Annual IEEE Symposium on Logic in Computer Science (LICS), pp. 361–370 (2003)

    Google Scholar 

  15. Emerson, E.A., Kahlon, V.: Rapid parameterized model checking of snoopy cache coherence protocols. In: Garavel, H., Hatcliff, J. (eds.) TACAS 2003. LNCS, vol. 2619, pp. 144–159. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  16. Emerson, E.A., Havlicek, J., Trefler, R.: Virtual symmetry. In: LICS (2000)

    Google Scholar 

  17. Emerson, E.A., Namjoshi, K.S.: Reasoning about rings. In: ACM Symposium on Principles of Programming Languages (POPL 1995) (1995)

    Google Scholar 

  18. Emerson, E.A., Sistla, A.P.: Utlizing symmetry when model-checking under fairness assumptions: An automata theoretic approach. TOPLAS 4 (1997)

    Google Scholar 

  19. Emerson, E.A., Sistla, A.P.: Symmetry and model checking. In: Courcoubetis, C. (ed.) CAV 1993. LNCS, vol. 697. Springer, Heidelberg (1993)

    Google Scholar 

  20. Emerson, E.A., Trefler, R.J.: From asymmetry to full symmetry: New techniques for symmetry reduction in model checking. In: Pierre, L., Kropf, T. (eds.) CHARME 1999. LNCS, vol. 1703, pp. 142–157. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  21. German, S.M., Sistla, A.P.: Reasoning about systems with many processes. Journal of ACM 39 (1992)

    Google Scholar 

  22. Kesten, Y., Maler, O., Marcus, M., Pnueli, A., Shahar, E.: Symbolic model checking with rich assertional languages. In: Grumberg, O. (ed.) CAV 1997. LNCS, vol. 1254, pp. 424–435. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  23. Lahiri, S.K., Bryant, R.E.: Indexed Predicate Discovery for Unbounded System Verification. In: Alur, R., Peled, D.A. (eds.) CAV 2004. LNCS, vol. 3114, pp. 135–147. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  24. Pnueli, A., Ruah, S., Zuck, L.: Automatic deductive verification with invisible invariants. In: LNCS (2001)

    Google Scholar 

  25. Suzuki, I.: Proving properties of a ring of finite state machines. Information Processing Letters 28, 213–214 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  26. Touili, T.: Widening Techniques for Regular Model Checking. In: 1st vepas workshop. Electronic Notes in Theoretical Computer Science, vol. 50 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Clarke, E., Talupur, M., Touili, T., Veith, H. (2004). Verification by Network Decomposition. In: Gardner, P., Yoshida, N. (eds) CONCUR 2004 - Concurrency Theory. CONCUR 2004. Lecture Notes in Computer Science, vol 3170. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-28644-8_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-28644-8_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22940-7

  • Online ISBN: 978-3-540-28644-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics