skip to main content
article

Probabilistic model checking in practice: case studies with PRISM

Published:01 March 2005Publication History
Skip Abstract Section

Abstract

In this paper, we describe some practical applications of probabilistic model checking, a technique for the formal analysis of systems which exhibit stochastic behaviour. We give an overview of a selection of case studies carried out using the probabilistic model checking tool PRISM, demonstrating the wide range of application domains to which these methods are applicable. We also illustrate several benefits of using formal verification techniques to analyse probabilistic systems, including: (i) that they allow a wide range of numerical properties to be computed accurately; and (ii) that they perform a complete and exhaustive analysis enabling, for example, a study of best- and worst-case scenarios.

References

  1. PRISM web site. www.cs.bham.ac.uk/~dxp/prism.]]Google ScholarGoogle Scholar
  2. C. Baier, B. Haverkort, H. Hermanns, and J.-P. Katoen. Model-checking algorithms for continuous-time Markov chains. IEEE Transactions on Software Engineering, 29(6):524--541, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Duflot, L. Fribourg, T. Hérault, R. Lassaigne, F. Magniette, S. Messika, S. Peyronnet, and C. Picaronny. Probabilistic model checking of the CSMA/CD protocol using PRISM and APMC. In Proc. 4th Workshop on Automated Verification of Critical Systems (AVoCS'04). Elsevier Science, Electronic Notes in Theoretical Computer Science Science, 2004. To appear.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Duflot, M. Kwiatkowska, G. Norman, and D. Parker. A formal analysis of Bluetooth device discovery. In Proc. 1st International Symposium on Leveraging Applications of Formal Methods (ISOLA'04), 2004. To appear.]]Google ScholarGoogle Scholar
  5. S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637--647, 1985.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. W. Fokkink and J. Pang. Simplifying Itai-Rodeh leader election for anonymous rings. In Proc. 4th Workshop on Automated Verification of Critical Systems (AVoCS'04). Elsevier Science, Electronic Notes in Theoretical Computer Science Science, 2004. To appear.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Han and P. Jonker. A system architecture solution for unreliable nanoelectronic devices. IEEE Transactions on Nanotechnology, 1:201--208, 12002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. T. Herman. Probabilistic self-stabilization. Information Processing Letters, 35(2):63--67, 1990.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. H. Hermanns, J.-P. Katoen, J. Meyer-Kayser, and M. Siegle. A Markov chain model checker. In S. Graf and M. Schwartzbach, editors, Proc. 6th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'00), volume 1785 of LNCS, pages 347--362. Springer, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. B. Jeannet, P. D'Argenio, and K. Larsen. RAPTURE: A tool for verifying Markov decision processes. In I. Cerna, editor, Proc. Tools Day, affiliated to 13th Int. Conf. Concurrency Theory (CONCUR'02), Technical Report FIMU-RS-2002--05, Faculty of Informatics, Masaryk University, pages 84--98, 2002.]]Google ScholarGoogle Scholar
  11. M. Kwiatkowska and G. Norman. Verifying randomized Byzantine agreement. In D. Peled and M. Vardi, editors, Proc. Formal Techniques for Networked and Distributed Systems (FORTE'02), volume 2529 of LNCS, pages 194--209. Springer, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Kwiatkowska, G. Norman, and D. Parker. PRISM 2.0: A tool for probabilistic model checking. In Proc. 1st International Conference on Quantitative Evaluation of Systems (QEST'04), pages 322--323. IEEE Computer Society Press, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Kwiatkowska, G. Norman, D. Parker, and J. Sproston. Performance analysis of probabilistic timed automata using digital clocks. In K. Larsen and P. Niebert, editors, Proc. Formal Modeling and Analysis of Timed Systems (FORMATS'03), volume 2791 of LNCS, pages 105--120. Springer-Verlag, 2003.]]Google ScholarGoogle Scholar
  14. M. Kwiatkowska, G. Norman, and R. Segala. Automated verification of a randomized distributed consensus protocol using Cadence SMV and PRISM. In G. Berry, H. Comon, and A. Finkel, editors, Proc. 13th International Conference on Computer Aided Verification (CAV'01), volume 2102 of LNCS, pages 194--206. Springer, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Kwiatkowska, G. Norman, and J. Sproston. Probabilistic model checking of the IEEE 802.11 wireless local area network protocol. In H. Hermanns and R. Segala, editors, Proc. 2nd Joint International Workshop on Process Algebra and Probabilistic Methods, Performance Modeling and Verification (PAPM/PROBMIV'02), volume 2399 of LNCS, pages 169--187. Springer, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. Kwiatkowska, G. Norman, and J. Sproston. Probabilistic model checking of deadline properties in the IEEE 1394 FireWire root contention protocol. Special Issue of Formal Aspects of Computing, 14:295--318, 2003.]]Google ScholarGoogle ScholarCross RefCross Ref
  17. M. Kwiatkowska, G. Norman, J. Sproston and F. Wang. Symbolic model checking for probabilistic timed automata. In Y. Lakhnech and S. Yovine, editors, Joint Conference on Formal Modelling and Analysis of Timed Systems (FORMATS) and Formal Techniques in Real-Time and Fault Tolerant Systems (FTRTFT), volume 3253 of LNCS, pages 293--308. Springer, 2004.]]Google ScholarGoogle Scholar
  18. R. Lanotte, A. Maggiolo-Schettini, and A. Troina. Automatic analysis of a non-repudiation protocol. In Proc. 2nd International Workshop on Quantitative Aspects of Programming Languages (QAPL'04), 2004.]]Google ScholarGoogle Scholar
  19. P. Lecca and C. Priami. Cell cycle control in eukaryotes: A BioSpi model. In Proc. Workshop on Concurrent Models in Molecular Biology (BioConcur'03), Electronic Notes in Theoretical Computer Science, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. McIver and C. Morgan. An elementary proof that Herman's ring is θ(n2). Submitted for publication.]]Google ScholarGoogle Scholar
  21. G. Norman, D. Parker, M. Kwiatkowska, and S. Shukla. Evaluating the reliability of NAND multiplexing with PRISM. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2005. To appear.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. G. Norman, D. Parker, M. Kwiatkowska, S. Shukla, and R. Gupta. Formal analysis and validation of continuous time Markov chain based system level power management strategies. In W. Rosenstiel, editor, Proc. 7th Annual IEEE International Workshop on High Level Design Validation and Test (HLDVT'02), pages 45--50. IEEE Computer Society Press, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. G. Norman, D. Parker, M. Kwiatkowska, S. Shukla, and R. Gupta. Using probabilistic model checking for dynamic power management. In M. Leuschel, S. Gruner, and S. L. Presti, editors, Proc. 3rd Workshop on Automated Verification of Critical Systems (AVoCS'03), Technical Report DSSE-TR-2003-2. University of Southampton, pages 202--215, April 2003.]]Google ScholarGoogle Scholar
  24. G. Norman and V. Shmatikov. Analysis of probabilistic contract signing. In A. Abdallah, P. Ryan, and S. Schneider, editors, Proc. BCS-FACS Formal Aspects of Security (FASec'02), volume 2629 of LNCS, pages 81--96. Springer, 2003.]]Google ScholarGoogle Scholar
  25. G. Norman and V. Shmatikov. Analysis of probabilistic contract signing. Submitted, 2005.]]Google ScholarGoogle Scholar
  26. P. Pillai and K. Shin. Real-time dynamic voltage scaling for low-powered embedded operating systems. Operating Systems Review, 35(5):89--102, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. J. Rutten, M. Kwiatkowska, G. Norman, and D. Parker. Mathematical Techniques for Analyzing Concurrent and Probabilistic Systems, P. Panangaden and F. van Breugel (eds.), volume 23 of CRM Monograph Series. American Mathematical Society, 2004.]]Google ScholarGoogle Scholar
  28. V. Shmatikov. Probabilistic model checking of an anonymity system. Journal of Computer Security, 12(3/4):355--377, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. M. Stoelinga. Alea jacta est: Verification of probabilistic, real-time and parametric systems. PhD thesis, University of Nijmegen, 2002.]]Google ScholarGoogle Scholar
  30. J. von Neumann. Probabilistic logics and synthesis of reliable organisms from unreliable components. In C. Shannon and J. McCarthy, editors, Automata Studies, pages 43--98. Princeton University Press, 1956.]]Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Probabilistic model checking in practice: case studies with PRISM

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image ACM SIGMETRICS Performance Evaluation Review
              ACM SIGMETRICS Performance Evaluation Review  Volume 32, Issue 4
              March 2005
              45 pages
              ISSN:0163-5999
              DOI:10.1145/1059816
              Issue’s Table of Contents

              Copyright © 2005 Authors

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 March 2005

              Check for updates

              Qualifiers

              • article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader