Skip to main content
Log in

Exploiting resolution proofs to speed up LTL vacuity detection for BMC

  • Regular Paper
  • Published:
International Journal on Software Tools for Technology Transfer Aims and scope Submit manuscript

Abstract

When model-checking reports that a property holds on a model, vacuity detection increases user confidence in this result by checking that the property is satisfied in the intended way. While vacuity detection is effective, it is a relatively expensive technique requiring many additional model-checking runs. We address the problem of efficient vacuity detection for Bounded Model Checking (BMC) of linear temporal logic properties, presenting three partial vacuity detection methods based on the efficient analysis of the resolution proof produced by a successful BMC run. In particular, we define a characteristic of resolution proofs— peripherality—and prove that if a variable is a source of vacuity, then there exists a resolution proof in which this variable is peripheral. Our vacuity detection tool, VaqTree, uses these methods to detect vacuous variables, decreasing the total number of model-checking runs required to detect all sources of vacuity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Armoni, R., Fix, L., Flaisher, A., Grumberg, O., Piterman, N., Tiemeyer, A., Vardi, M.: Enhanced vacuity detection in linear temporal logic. In: Proceedings of the 15th International Conference on Computer Aided Verification (CAV’03). Lecture Notes in Computer Science, vol. 2725, pp. 368–380 (2003)

  2. Beer, I., Ben-David, S., Eisner, C., Rodeh, Y.: Efficient detection of vacuity in ACTL formulas. In: Proceedings of the 9th International Conference on Computer Aided Verification (CAV’97). Lecture Notes in Computer Science, vol. 1254, pp. 279–290 (1997)

  3. Beer I., Ben-David S., Eisner C., Rodeh Y.: Efficient detection of vacuity in temporal model checking. Formal Methods Syst. Des. (FMSD) 18(2), 141–163 (2001)

    Article  MATH  Google Scholar 

  4. Biere, A., Cimatti, A., Clarke, E.M., Zhu, Y.: Symbolic model checking without BDDs. In: Proceedings of the 5th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS’99). Lecture Notes in Computer Science, vol. 1579 (1999)

  5. Cimatti, A., Clarke, E.M., Giunchiglia, E., Giunchiglia, F., Pistore, M., Roveri, M., Sebastiani, R., Tacchella, A.: NuSMV 2: an OpenSource tool for symbolic model checking. In: Proceedings of the 14th International Conference on Computer Aided Verification (CAV’02). Lecture Notes in Computer Science, vol. 2404, pp. 359–364 (2002)

  6. Cimatti, A., Pistore, M., Roveri, M., Sebastiani, R.: Improving the encoding of LTL model checking into SAT. In: Proceedings of the 3rd International Workshop on Verification, Model Checking, and Abstract Interpretation (VMCAI’02). Lecture Notes in Computer Science, vol. 2294, pp. 196–207 (2002)

  7. Clarke E., Grumberg O., Peled D.: Model Checking. MIT Press, Cambridge (1999)

    Google Scholar 

  8. Craig W.: Linear reasoning. A new form of the Herbrand–Gentzen theorem. J. Symb. Logic (JSL) 22(3), 250–268 (1957)

    Article  MATH  MathSciNet  Google Scholar 

  9. Dong, Y., Sarna-Starosta, B., Ramakrishnan, C.R., Smolka, S.A.: Vacuity checking in the modal Mu-Calculus. In: Proceedings of the 9th International Conference on Algebraic Methodology and Software Technology (AMAST’02). Lecture Notes in Computer Science, vol. 2422, pp. 147–162. Springer, Berlin (2002)

  10. Een, N., Sörensson, N.: The MiniSat Page. http://www.cs.chalmers.se/Cs/Research/FormalMethods/MiniSat/Main.html. April (2006)

  11. Gershman, R., Koifman, M., Strichman, O.: Deriving small unsatisfiable cores with dominators. In: Proceedings of the 18th International Conference on Computer Aided Verification (CAV’06). Lecture Notes in Computer Science, vol. 4144, pp. 109–122 (2006)

  12. Gurfinkel, A., Chechik, M.: Extending extended vacuity. In: Proceedings of the 5th International Conference on Formal Methods in Computer-Aided Design (FMCAD’04). Lecture Notes in Computer Science, vol. 3312, pp. 306–321 (2004)

  13. Gurfinkel, A., Chechik, M.: How vacuous is vacuous? In: Proceedings of the 10th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS’04). Lecture Notes in Computer Science, vol. 2988, pp. 451–466 (2004)

  14. IBM Haifa.: CNF Benchmarks from IBM Formal Verification Benchmarks Library (2007)

  15. Heimdahl, M., Rayadurgam, S. Visser, W., Devaraj, G., Gao, J.: Auto-generating test sequences using model checkers: a case study. In: Proceedings of the Third International Workshop on Formal Approaches to Testing of Software (FATES’03). Lecture Notes in Computer Science, vol. 2931, pp. 42–59 (2003)

  16. Henzinger, T., Jhala, R., Majumdar, R., McMillan, K.: Abstractions from proofs. In: Proceedings of the 31st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Langauges (POPL’04), pp. 232–244 (2004)

  17. Jackson D.: Alloy: a lightweight object modelling notation. ACM Trans. Softw. Eng. Methodol. (TOSEM) 11(2), 256–290 (2002)

    Article  Google Scholar 

  18. Kupferman, O., Vardi, M.: Vacuity detection in temporal model checking. In: Proceedings of the 8th advanced research working conference on correct hardware design and verification methods (CHARME’99). Lecture Notes in Computer Science, vol. 1703, pp. 82–96 (1999)

  19. McMillan, K.: Interpolation and SAT-based model checking. In: Proceedings of the 15th International Conference on Computer Aided Verification (CAV’03). Lecture Notes in Computer Science, vol. 2725, pp. 1–13 (2003)

  20. Namjoshi, K.: An efficiently checkable, proof-based formulation of vacuity in model checking. In: Proceedings of the 16th International Conference on Computer Aided Verification (CAV’04). Lecture Notes in Computer Science, vol. 3114, pp. 57–69 (2004)

  21. Purandare, M., Somenzi, F.: Vacuum cleaning CTL formulae. In: Proceedings of the 14th International Conference on Computer Aided Verification (CAV’02). Lecture Notes in Computer Science, vol. 2404, pp. 485–499 (2002)

  22. Selman B., Mitchell D., Levesque H.: Generating hard satisfiability problems. Artif. Intell. 81(1–2), 17–29 (1996)

    Article  MathSciNet  Google Scholar 

  23. Shlyakhter, I., Seater, R., Jackson, D., Sridharan, M., Taghdiri, M.: Debugging overconstrained declarative models using unsatisfiable cores. In: Proceedings of the 18th International Conference on Automated Software Engineering (ASE’03), pp. 94–105, October (2003)

  24. Simmonds, J., Davies, J., Gurinkel, A., Chechik, M.: Exploiting resolution proofs to speed up LTL vacuity detection for BMC. In: Proceedings of the 7th International Conference on Formal Methods in Computer-Aided Design (FMCAD’07) (2007)

  25. Spivey J.M.: The Z Notation: A Reference Manual. Prentice-Hall, Englewood Cliffs (1992)

    Google Scholar 

  26. Zarpas, E.: Benchmarking SAT solvers for bounded model checking. In: Proceedings of the 8th International Symposium on the Theory and Applications of Satisfiability Testing (SAT’05). Lecture Notes in Computer Science, vol. 3569, pp. 340–354 (2005)

  27. Zhang, L., Fu, Z.: Boolean Satisfiability Research Group at Princeton. http://www.princeton.edu/~chaff/, September (2006)

  28. Zhang, L., Malik, S.: Validating SAT solvers using an independent resolution-based checker: practical implementations and other applications. In: Proceedings of the International Conference and Exposition on Design, Automation and Test in Europe (DATE’03), pp. 10880–10885 (2003)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jocelyn Simmonds.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Simmonds, J., Davies, J., Gurfinkel, A. et al. Exploiting resolution proofs to speed up LTL vacuity detection for BMC. Int J Softw Tools Technol Transfer 12, 319–335 (2010). https://doi.org/10.1007/s10009-009-0134-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10009-009-0134-1

Keywords

Navigation