skip to main content
article

Symmetry in temporal logic model checking

Published: 30 September 2006 Publication History

Abstract

Temporal logic model checking involves checking the state-space of a model of a system to determine whether errors can occur in the system. Often this involves checking symmetrically equivalent areas of the state-space. The use of symmetry reduction to increase the efficiency of model checking has inspired a wealth of activity in the area of model checking research. We provide a survey of the associated literature.

References

[1]
Ajami, K., Haddad, S., and Ilie, J. 1998. Exploiting symmetry in linear time temporal logic model checking: One step beyond. In Proceedings of the 4th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS '98), B. Steffen, Ed. Lisbon, Portugal. Lecture Notes in Computer Science, vol. 1384. Springer-Verlag, 52--67.]]
[2]
Alur, R., Courcoubetis, G., and Dill, D. 1990. Model-Checking for real-time systems. In Proceedings of the 5th Annual IEEE Symposium on Logic in Computer Science. Philadelphia, PA. IEEE Computer Society Press, 414--425.]]
[3]
Alur, R. and Dill, D. 1993. A theory of timed automata. Inf. Comput. 194, 2--34.]]
[4]
Alur, R. and Henzinger, T. 1992. Logics and models of real time: A survey. In Proceedings of the REX Workshop on Real-Time: Theory and Practice. Mook, the Netherlands. Lecture Notes in Computer Science, vol. 600. Springer-Verlag, 74--106.]]
[5]
Alur, R. and Kurshan, R. 1995. Timing analysis in COSPAN. In Proceedings of the 3rd DIMACS/SYCON Workshop on Hybrid Systems: Verification and Control, R. Alur et al., Eds. Lecture Notes in Computer Science, vol. 1066. New Brunswick, NJ. Springer-Verlag, 220--231.]]
[6]
Ball, T., Cook, B., Levin, V., and Rajamani, K. 2004. SLAM and static driver verifier: Technology transfer of formal methods inside Microsoft. In Proceedings of the 4th International Conference on Integrated Formal Methods (IFM 2004), E. Boiten et al. Eds. Canterbury, UK. Lecture Notes in Computer Science, vol. 2999. Springer-Verlag, 1--20.]]
[7]
Ball, T. and Rajamani, S., Eds. 2003. Model Checking Software: Proceedings of the 10th International SPIN Workshop (SPIN 2003). Portland, OR. Lecture Notes in Computer Science, vol. 2648. Springer-Verlag.]]
[8]
Barner, S. and Grumberg, O. 2002. Combining symmetry reduction and under-approximation for symbolic model checking. In Proceedings of the 14th International Conference on Computer Aided Verification (CAV 2002). Copenhagen, Denmark. Lecture Notes in Computer Science, vol. 2404. Springer-Verlag, 93--106.]]
[9]
Barrett, G. 1995. Model checking in practice: The t9000 virtual channel processor. IEEE Trans. Softw. Eng. 21, 2, 69--78.]]
[10]
Beer, I., Ben-David, S., Eisner, C., and Landver, A. 1996. Rulebase: An industry-oriented formal verification tool. In Proceedings of the 33rd Conference on Design Automation (DAC '96). Las Vegas, NV. ACM Press, 655--660.]]
[11]
Ben-David, S. and Heyman, T. 2000. Scalable distributed on-the-fly symbolic model checking. In Proceedings of the 3rd International Conference on Formal Methods in Computer-Aided Design (FMCAD 2000), W. A. Hunt Jr. and S. D. Johnson, Eds. Austin, TX. Lecture Notes in Computer Science, vol. 1954. Springer-Verlag, 390--404.]]
[12]
Best, B. and Grahlmann, B. 1996. PEP---More than a Petri net tool. In Proceedings of the 2nd International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS '96), T. Margaria and B. Steffen, Eds. Passau, Germany. Lecture Notes in Computer Science, vol. 1055. Springer-Verlag, 397--401.]]
[13]
Best, B. and Koutny, M. 1995. A refined view of the box calculus. In Proceedings of the 16th International Conference on the Application and Theory of Petri Nets (ATPN '95), G. De Michelis and M. Diaz, Eds. Turin, Italy. Lecture Notes in Computer Science, vol. 935. Springer-Verlag, 103--118.]]
[14]
Bhat, G., Cleaveland, R., and Grumberg, O. 1995. Efficient on-the-fly model checking for CTL*. In Proceedings of the 10th Annual IEEE Symposium on Logic in Computer Science. San Diego, CA. IEEE Computer Society Press, 388--397.]]
[15]
Bollig, B. and Wegener, I. 1996. Improving the variable ordering of OBDDs is NP-complete. IEEE Trans. Comput. 45, 9, 993--1002.]]
[16]
Bolognesi, T. and Brinksma, E. 1987. Introduction to the ISO specificaiton language LOTOS. Comput. Netw. ISDN Syst. 14, 1, 25--59.]]
[17]
Bosnacki, D. 2002. A nested depth-first search algorithm for model checking with symmetry reduction. In Proceedings of the 22nd International Conference on Formal Technigues for Networked and Distributed System (FORTE 2002). Houston, TX. Lecture Notes in Computer Science, vol. 2529. Springer-Verlag, 40--56.]]
[18]
Bosnacki, D. 2003. A light-weight algorithm for model checking with symmetry reduction and weak fairness. In Model Checking Software: Proceedings of the 10th International SPIN Workshop (SPIN 2003). T. Ball and S. Rajamani, Eds. Portland, OR. Lecture Notes in Computer Science, vol. 2648. Springer-Verlag, 89--103.]]
[19]
Bosnacki, D., Dams, D., and Holenderski, L. 2000. Symmetric Spin. In Proceedings of the 7th SPIN Workshop (SPIN 2000), K. Havelund et al., Eds. Stanford, CA. Lecture Notes in Computer Science, vol. 1885. Springer-Verlag, 1--19.]]
[20]
Bosnacki, D., Dams, D., and Holenderski, L. 2001. A heuristic for symmetry reductions with scalarsets. In Proceedings of the International Symposium of Formal Methods Europe (FME 2001), J. N. Oliveira and Z. Pamela, Eds. Berlin, Germany. Lecture Notes in Computer Science, vol. 2021. Springer-Verlag, 518--533.]]
[21]
Bosnacki, D., Dams, D., and Holenderski, L. 2002. Symmetric Spin. Int. J. Soft. Tools Technol. Transfer 4, 1, 65--80.]]
[22]
Brinksma, E. and Larsen, K., Eds. 2002. In Proceedings of the 14th International Conference on Computer Aided Verification (CAV 2002). Copenhagen, Denmark. Lecture Notes in Computer Science, vol. 2404. Springer-Verlag.]]
[23]
Bryant, R. 1992. Symbolic Boolean manipulation with ordered binary decision diagrams. ACM Comput. Surv. 24, 3, 293--318.]]
[24]
Burch, J., Clarke, E., McMillan, K., Dill, D., and Hwang, L. 1992. Symbolic model checking: 1020 states and beyond. Inf. Comput. 98, 2, 142--170.]]
[25]
Calder, M. and Miller, A. 2001. Using SPIN for feature interaction analysis---A case study. In Proceedings of the 8th International SPIN Workshop (SPIN 2001), M. Dwyer, Ed. Toronto, Canada. Lecture Notes in Computer Science, vol. 2057. Springer-Verlag, 143--162.]]
[26]
Calder, M. and Miller, A. 2003. Generalizing feature interactions in email. In Feature Interactions in Telecommunications and Software Systems VII, D. Amyot and L. Logrippo, Eds. IOS Press, Ottawa, Canada, 187--205.]]
[27]
Cattel, T. 1994. Modeling and verification of a multiprocessor real-time OS kernel. In Proceedings of the 7th WG6.1 International Conference on Formal Description Technigues (FORTE '94), D. Hogrefe and S. Leue. Eds. Berne, Switzerland. International Federation for Information Processing, vol. 6. Chapman and Hall, London, UK, 55--70.]]
[28]
Choueka, Y. 1974. Theories of automata on ω-tapes: A simplified approach. J. Comput. Sys. Sci. 8, 117--141.]]
[29]
Cimatti, A., Clarke, E., Giunchiglia, E., Giunchiglia, F., Pistore, M., Roveri, M., Sebastiani, R., and Tacchella, A. 2002. NuSMV2: A new OpenSource tool for symbolic model checking. In Proceedings of the 14th International Conference on Computer-Aided Verification (CAV 2002), E. Brinksma and K. Larsen, Eds. Copenhagen, Denmark. Lecture Notes in Computer Science, vol. 2404. Springer-Verlag, 359--364.]]
[30]
Cimatti, A., Clarke, E., Giunchiglia, F., and Roveri, M. 1999. NuSMV: A new symbolic model verifier. In Proceedings of the 11th International Conference on Computer-Aided Verification (CAV '99), N. Halbwachs and D. Peled, Eds. Trento, Italy. Lecture Notes in Computer Science, vol. 1633. Springer-Verlag, 495--499.]]
[31]
Cimatti, A., Giunchiglia, F., Mingardi, G., Romano, D., Torielli, F., and Traverso, P. 1997. Model checking safety critical software with SPIN: An application to a railway interlocking system. In Proceedings of the 3rd SPIN Workshop (SPIN '97), R. Langerak, Ed. Twente University, The Netherlands, 5--17.]]
[32]
Clarke, E., Emerson, E., Jha, S., and Sistla, A. 1998. Symmetry reductions in model-checking. In Proceedings of the 10th International Conference on Computer Aided Verification (CAV '98), A. Hu and M. Vardi, Eds. Vancouver, BC, 147--158.]]
[33]
Clarke, E., Emerson, E., and Sistla, A. 1986. Automatic verification of finite-state concurrent systems using temporal logic specifications. ACM Trans. Program. Lang. Syst. 8, 2, 244--263.]]
[34]
Clarke, E., Enders, R., Filkhorn, T., and Jha, S. 1996. Exploiting symmetry in temporal logic model checking. Formal Methods Syst. Desi. 9, 1--2, 77--104.]]
[35]
Clarke, E., Grumberg, O., and Long, D. 1994. Model checking and abstraction. ACM Trans. Program. Lang. Syst. 16, 5, 1512--1542.]]
[36]
Clarke, E., Grumberg, O., and Peled, D. 1999. Model Checking. MIT Press, Cambridge, MA.]]
[37]
Clarke, E. and Wing, J. M. 1996. Formal methods: State-of-the-art and future directions. ACM Comput. Surv. 28, 4, 626--643. Report by the Working Group on Formal Methods for the ACM Workshop on Strategic Directions in Computing Research.]]
[38]
Clayberg, E. and Rubel, D. 2004. Eclipse: Building Commercial-Quality Plug-Ins. Addison Wesley, Reading, MA.]]
[39]
Corbett, J., Dwyer, M., Hatcliff, J., Laubach, S., Păsrăeanu, C., Robby, and Zheng, H. 2000. Bandera: Extracting finite-state models from Java source code. In Proceedings of the 22nd International Conference on Software Engineering (ICSE 2000). Limerick, Ireland. ACM Press, New York, 439--448.]]
[40]
Courcoubetis, C., Vardi, M., Wolper, P., and Yannakakis, M. 1992. Memory-Efficient algorithms for the verification of temporal properties. Formal Methods in Syst. Des. 1, 275--288. Also appeared in Proceedings of the 2nd International Workshop on Computer-Aided Verification (CAV '90), 207--218.]]
[41]
Dams, D., Gerth, R., Leue, S., and Massink, M. Eds. 1999. In Proceedings of the 5th and 6th International SPIN Workshops. Trento, Italy and Toulouse, France. Lecture Notes in Computer Science, vol. 1680. Springer-Verlag.]]
[42]
Danjani-Brown, S., Cofer, D., Hartmann, G., and Pratt, S. 2003. Formal modeling and analysis of an avionics triplex sensor voter. In Model Checking Software: Proceedings of the 10th International SPIN Workshop (SPIN 2003), T. Ball and S. Rajamani, eds, Portland, OR. Lecture Notes in Computer Science, vol. 2648. Springer-Verlag. 34--48.]]
[43]
Darga, P., Liffiton, M., Sakallah, K., and Markov, I. 2004. Exploiting structure in symmetry detection for CNF. In Proceedings of the 41st Annual Conference on Design Automation. San Diego. CA. ACM Press, New York, 530--534.]]
[44]
de Bakker, J. W., Huizing, C., de Roever, W., and Rozenberg, G., Eds. 1992. In Proceedings of the REX Workshop on Real-Time: Theory and Practice. Mook, the Netherlands. Lecture Notes in Computer Science, vol. 600. Springer-Verlag,]]
[45]
Demartini, C., Iosif, R., and Sisto, R. 1999. A deadlock detection tool for concurrent Java programs. Softw. Pract. Exper. 29, 7, 577--603.]]
[46]
Derepas, F. and Gastin, P. 2001. Model checking systems of replicated processes with Spin. In Proceedings of the 8th International SPIN Workshop (SPIN 2001), M. Dwyer, Ed. Toronto, Canada. Lecture Notes in Computer Science, vol. 2057. Springer-Verlag, 235--251.]]
[47]
Dijkstra, E. 1976. A Discipline of Programming. Prentice-Hall Series in Automatic Computation. Prentice-Hall, Englewood Cliffs, NJ.]]
[48]
Dill, D. 1996. The Mur&phis; verification system. In Proceedings of the 8th International Conference on Computer Aided Verification (CAV '96), R. Alur and T. Henzinger, Eds. New Brunswick, NJ. Lecture Notes in Computer Science, vol. 1102. Springer-Verlag, 390--393.]]
[49]
Dill, D., Drexler, A., Hu, A., and Yang, C. H. 1992. Protocol verification as a hardware design aid. In Proceedings of the 1992 IEEE International Conference on Computer Design: VLSI in Computer and Processors (ICCD'92), Cambridge, MA, IEEE Computer Society, 522--525.]]
[50]
Donaldson, A. and Miller, A. 2005. Automatic symmetry detection for model checking using computational group theory. In Proceedings of the 13th International Symposium on Formal Methods (FM 2005), J. Fitzgerald et al., Eds. Newcastle, UK. Lecture Notes in Computer Science, vol. 3582. Springer-Verlag, 481--496.]]
[51]
Donaldson, A., Miller, A., and Calder, M. 2005a. Finding symmetry in models of concurrent systems by static channel diagram analysis. Electron. Notes Theoretical Comput. Sci. 128, 6, 161--177.]]
[52]
Donaldson, A., Miller, A., and Calder, M. 2005b. SPIN-to-GRAPE: A tool for analysing symmetry in Promela models. Electron. Notes Theoretical Comput. Sci. 139, 1, 3--23.]]
[53]
Dwyer, M., Ed. 2001. In Proceedings of the 8th International SPIN Workshop (SPIN 2001). Toronto, Canada. Lecture Notes in Computer Science, vol. 2057. Springer-Verlag.]]
[54]
Emerson, E. 1992. Real time and the μ-calculus. In Proceedings of the REX Workshop on Real-Time: Theory and Practice, I. W. de Bakker et al., Eds. Mook, the Netherlands. Lecture Notes in Computer Science, vol. 600. Springer-Verlag, 176--194.]]
[55]
Emerson, E. 2000. Model checking: Theory into practice. In Proceedings of the 20th International Conference on Foundations of Software Technology and Theoretical Computer Science, S. Kapoor and S. Prasad, Eds. New Delhi, India. Lecture Notes in Computer Science, vol. 1974. Springer-Verlag, 1--10.]]
[56]
Emerson, E., Havlicek, J., and Trefler, R. 2000. Virtual symmetry reduction. In Proceedings of the 15th Annual IEEE Symposium on Logic in Computer Science. Santa Barbara, CA. IEEE Computer Society Press, 121--131.]]
[57]
Emerson, E., Jha, S., and Peled, D. 1997. Combining partial order and symmetry reductions. In Proceedings of the 3rd International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS '97), E. Brinksma, Ed. Enschede, the Netherlands. Lecture Notes in Computer Science, vol. 1217. Springer-Verlag, 19--34.]]
[58]
Emerson, E. and Lei, C. 1987. Modalities for model checking: Branching time logic strikes back. Sci. Comput. Program. 8, 3, 275--306.]]
[59]
Emerson, E. and Sistla, A. 1996. Symmetry and model checking. Formal Methods Syst. Des. 9, 1--2, 105--131.]]
[60]
Emerson, E. and Sistla, A. 1997. Utilizing symmetry when model-checking under fairness assumptions: An automata-theoretic approach. ACM Trans. Program. Lang. Syst. 19, 4, 617--638.]]
[61]
Emerson, E. and Trefler, R. 1999. From asymmetry to full symmetry: New techniques for symmetry reduction in model checking. In Proceedings of the 10th IFIP WG 10.5 Advanced Research Working Conference on Correct Hardware Design and Verification Methods (CHARME '99), L. Pierre and T. Kropf, Eds. Bad Herrenalp, Germany. Lecture Notes in Computer Science, vol. 1703. Springer-Verlag, 142--156.]]
[62]
Emerson, E. and Wahl, T. 2003. On combining symmetry reduction and symbolic representation for efficient model checking. In Proceedings of the 12th IFIP WG 10.5 Advanced Research Working Conference on Correct Hardware Design and Verification Methods (CHARME 2003), D. Geist and E. Tronci, Eds. L'Aquila, Italy. Lecture Notes in Computer Science, vol. 2860. Springer-Verlag, 216--230.]]
[63]
Emerson, E. and Wahl, T. 2005a. Dynamic symmetry reduction. In Proceedings of the 11th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS 2005). Held as part of the Joint European Conference on Theory and Practice of Software (ETAPS 2005), N. Halbwachs and L. Zuck, Eds. Edinburgh, UK. Lecture Notes in Computer Science, vol. 3440. Springer-Verlag, 382--396.]]
[64]
Emerson, E. and Wahl, T. 2005b. Efficient reduction techniques for systems with many components. Electron. Notes Theoretical Comput. Sci. 130, 379--399.]]
[65]
Gap Group. 1999. GAP---Groups Algorithms and Programming, Version 4.2. Aachen, St. Andrews. http://www-gap.dcs.st-and.ac.uk/gap.]]
[66]
Garavel, H. and Sifakis, J. 1990. Compilation and verification of LOTOS specifications. In Proceedings of the IFIP WG6.1 10th International Symposium on Protocol Specification, Testing and Verification (PSTV '90), L. Logrippo et al., Eds. Ottawa, Canada. 379--394.]]
[67]
Girault, C. and Valk, R., Eds. 2003. Petri Nets for Systems Engineering: A Guide to Modeling, Verification, and Applications. Springer-Verlag, New York.]]
[68]
Godefroid, P. 1996a. On the costs and benefits of using partial-order methods for the verification of concurrent systems. In Proceedings of the DIMACS Workshop on Partial-Order Methods, in Verification (POMIV '96), D. Peled et al., Eds. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 29. American Mathematical Society, Boston, MA. 289--303.]]
[69]
Godefroid, P. 1996b. Partial Order Methods for the Verification of Concurrent Systems. Lecture Notes in Computer Science, vol. 1032. Springer-Verlag, Berlin.]]
[70]
Godefroid, P. 1997. Model checking for programming languages using VeriSoft. In Proceedings of the 24th Symposium on Principles of Programming Languages (POPL '97). Paris, France. ACM Press, New York, 174--186.]]
[71]
Godefroid, P. 1999. Exploiting symmetry when model-checking software (extended abstract). In Proceedings of the Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols and Protocol Specification, Testing and Verification (FORTE/PSTV '99), J. Wu et al., Eds. Beijing, China. International Federation for Information Processing, vol. 156. Kluwer, 257--275.]]
[72]
Gregoire, J.-C., Holzmann, G., and Peled, D., Eds. 1996. Proceedings of the 2nd Workshop on the SPIN Verification System. Rutgers University, NJ. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 32. American Mathematical Society, Boston, MA.]]
[73]
Gyuris, V. and Sistla, A. 1999. On-the-fly model checking under fairness that exploits symmetry. Formal Methods. Syst. Des. 15, 3, 217--238.]]
[74]
Haddad, S., Ilie, J., and Ajami, K. 2000. A model checking method for partially symmetric systems. In Proceedings of the 20th IFIP International Conference on Formal Description Techniques/Protocol Specification, Testing, and Verification (FORTE/PSTV 2000). Pisa, Italy. International Federation For Information Processing. Kluwer, 121--136.]]
[75]
Havelund, K. and Pressburger, T. 2000. Model checking JAVA programs using JAVA PathFinder. Inte. J. Softw. Tools Technol. Transfer 2, 4, 366--381.]]
[76]
Hendriks, M., Behrmann, G., Larsen, K., Niebert, P., and Vaandrager, F. 2003. Adding symmetry reduction to UPPAAL. In Proceedings of the 1st International Workshop on Formal Modeling and Analysis of Timed Systems (FORMATS 2003), K. Larson and P. Niebert, Eds. Merseille, France. Lecture Notes in Computer Science, vol. 2791. Springer-Verlag, 46--59.]]
[77]
Henzinger, T., Ho, P., and Wong-Toi, H. 1997. HyTech: A model checker for hybrid systems. Int. J. Softw. Tools Technol. Transfer 1, 1/2 (December), 110--122.]]
[78]
Henzinger, T., Jhala, R., Majumdar, R., and Sutre, G. 2003. Software verification with BLAST. In Model Checking Software: Proceedings of the 10th International SPIN Workshop (SPIN 2003), T. Ball and S. Rajamani, Eds. Portland, OR. Lecture Notes in Computer Science, vol. 2648. Springer-Verlag. 235--239.]]
[79]
Hillston, J. 1996. A Compositional Approach to Performance Modeling. Distinguished Dissertations in Computer Science. Cambridge University Press, Cambridge, UK.]]
[80]
Hoffman, C. 1982. Group Theoretic Algorithms and Graph Isomorphism. Lecture Notes in Computer Science, vol. 136. Springer-Verlag, Berlin.]]
[81]
Hogrefe, D. and Leue, S., Eds. 1994. In Proceedings of the 7th WG6.1 International Conference on Formal Description Techniques (FORTE '94). Berne, Switzerland. International Federation for Information Processing, vol. 6. Chapman and Hall, London, UK.]]
[82]
Holzmann, G. 1998. An analysis of bitstate hashing. Formal Methods Syst. Des. 13, 3, 289--307.]]
[83]
Holzmann, G. 1999. The engineering of a model checker: The Gnu i-protocol case study revisited. In Proceedings of the 5th and 6th International SPIN Workshops. D. Dams et al., Eds. Trento, Italy and Toulouse, France. Lecture Notes in Computer Science, vol. 1680. Springer-Verlag. 232--244.]]
[84]
Holzmann, G. 2003. The SPIN Model Checker: Primer and Reference Manual. Addison Wesley, Boston, MA.]]
[85]
Holzmann, G. and Joshi, R. 2004. Model-Driven software verification. In Proceedings of the 11th International SPIN Workshop (SPIN 2004), S. Graf and L. Mounier, Eds. Barcelona, Spain. Lecture Notes in Computer Science, vol. 2989. Springer-Verlag, 76--91.]]
[86]
Holzmann, G. and Peled, D. 1994. An improvement in formal verification. In Proceedings of the 7th WG6.1 International Conference on Formal Description Techniques (FORTE '94), D. Hogrefe and S. Leue, Eds. Berne, Switzerland. International Federation for Information Processing, vol. 6. Chapman and Hall, London, UK. 197--211.]]
[87]
Holzmann, G., Peled, D., and Yannakakis, M. 1996. On nested depth first search. In Proceedings of the 2nd Workshop on the SPIN Verification System, J.-C. Gregoire et al., Eds. Rutgers University, NJ. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 32. American Mathematical Society, Boston, MA. 23--32.]]
[88]
Holzmann, G. and Smith, M. 1999a. A practical method for the verification of event-driven software. In Proceedings of the 21st International Conference on Software engineering (ICSE '99). Los Angeles, CA. ACM Press, New York, 597--607.]]
[89]
Holzmann, G. and Smith, M. 1999b. Software model checking---Extracting verification models from source code. In Proceedings of the Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols and Protocol Specification, Testing and Verification (FORTE/PSTV '99), J. Wu et al., Eds. Beijing, China. International Federation for Information Processing, vol. 156. Kluwer, 481--497.]]
[90]
Hu, A. and Vardi, M., Eds. 1998. Proceedings of the 10th International Conference on Computer-Aided Verification (CAV '98). Vancouver, BC. Lecture Notes in Computer Science, vol. 1427. Springer-Verlag.]]
[91]
Huber, P., Jenson, A., Jepson, L., and Jenson, K. 1984. Towards reachability trees for high-level Petri nets. In Proceedings of the European Workshop on Applications and Theory in Petri Nets. G. Rozenberg et al., Eds. Aarhus, Denmark. Lecture Notes in Computer Science, vol. 188. Springer-Verlag, 215--233.]]
[92]
IEEE-1394. 1995. IEEE Standard for a High Performance Serial Bus Std 1394--1995. Institute of Electrical and Electronic Engineers.]]
[93]
IEEE-896.1. 1992. IEEE Standard for Futurebus+---Logical Protocol Specification Std 896.1-1991. Institute of Electrical and Electronic Engineers.]]
[94]
Iosif, R. 2002. Symmetry reduction criteria for software model checking. In Proceedings of the 9th International SPIN Workshop (SPIN 2002), D. Bosnacki and S. Leue, Eds. Grenoble, France. Lecture Notes in Computer Science, vol. 2318. Springer-Verlag, 22--41.]]
[95]
Iosif, R. 2004. Symmetry reductions for model checking of concurrent dynamic software. Int. J. Softw. Tools Technol. Transfer 6, 4, 302--319.]]
[96]
Iosif, R. and Sisto, R. 1999. dSPIN: A dynamic extension of SPIN. In Proceedings of the 5th and 6th International SPIN Workshops. D. Dams et al., Eds. Trento, Italy and Toulouse, France. Lecture Notes in Computer Science, vol. 1680. Springer-Verlag. 20--33.]]
[97]
Ip, C. and Dill, D. 1996. Better verification through symmetry. Formal Methods in Syst. Des. 9, 41--75.]]
[98]
Ip, C. N. 1996. State reduction methods for automatic formal verification. Ph.D. thesis, Department of Computer Science, Stanford University.]]
[99]
Ip, C. N. and Dill, D. L. 1993. Better verification through symmetry. Comput. Hardw. Description Lang. Appl. A-32, 97--111.]]
[100]
Jackson, D., Jha, S., and Damon, C. 1998. Isomorph-Free model enumeration: A new method for checking relational specifications. ACM Trans. Program. Lang. Syst. 20, 2, 302--343.]]
[101]
Jha, S. 1996. Symmetry and induction in model checking. Ph.D. thesis, School of Computer Science, Carnegie Mellon University.]]
[102]
Juntilla, T. 2004. New orbit algorithms for data symmetries. In Proceedings of the 4th International Conference on Application of Concurrency to System Design (ACSD 2004). Ontario, Canada. IEEE Computer Society, 175--184.]]
[103]
Kumar, S. and Li, K. 2002. Using model checking to debug device firmware. In Proceedings of the 5th Symposium on Operating System Design and Implementation (OSDI 2002). USENIX, Boston, MA.]]
[104]
Kurshan, R. 1995. Computer-Aided Verification of Coordinating Processes: The Automata-Theoretic Approach. Princeton Series in Computer Science. Princeton University Press, Princeton, NJ.]]
[105]
Kwiatkowska, M., Norman, G., and Parker, D. 2002. Probabilistic symbolic model checking with PRISM. In Proceedings of the 8th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS 2002). Held as part of the Joint European Conference on Theory and Practice of Software (ETAPS 2002), J. Katoen and P. Stevens, Eds. Grenoble, France. Lecture Notes in Computer Science, vol. 2280. Springer-Verlag, 52--66.]]
[106]
Larson, K., Pettersson, P., and Yi, W. 1995. Model-checking for real-time systems. In Proceedings of the 10th International Symposium on the Fundamentals of Computation Theory (FCT '95), H. Reichel Ed. Dresden, Germany. Lecture Notes in Computer Science, vol. 965. Springer-Verlag, 62--88.]]
[107]
Larson, K., Pettersson, P., and Yi, W. 1997. UPPAAL in a nutshell. Int. J. Softw. Tools. Technol. Transfer 1, 1/2, 134--152.]]
[108]
Lenoski, D., Laudon, J., Gharachorloo, K., Weber, W.-D., Gupta, A., Hennessey, J., Horowitz, M., and Lam, M. 1992. The directory-based cache coherence protocol for the DASH multiprocessor. IEEE Comput. 25, 3, 63--79.]]
[109]
Léonard, L. and Leduc, G. 1997. An introduction to ET-LOTOS for the description of time-sensitive systems. Comput. Netw. ISDN Syst. 29, 3, 271--292.]]
[110]
Léonard, L. and Leduc, G. 1998. A formal definition of time in LOTOS. Formal Aspects Comput. 10, 3, 248--266.]]
[111]
Lerda, F. and Visser, W. 2001. Addressing dynamic issues of program model checking. In Proceedings of the 8th International SPIN Workshop (SPIN 2001), M. Dwyer, Ed. Toronto, Canada. Lecture Notes in Computer Science, vol. 2057. Springer-Verlag, 80--102.]]
[112]
Lichtenstein, O. and Pnueli, A. 1985. Checking that finite state concurrent programs satisfy their linear specification. In Conference Record of the 12th Annual ACM Symposium on Principles of Programming Languages (POPL '85). New Orleans, LA. ACM Press, New York, 97--107.]]
[113]
Luks, E. 1991. Permutation groups and polynomial-time computation. In Groups and Computation, L. Finkelstein and W. Kantor, Eds. DIMACS series in Discrete Mathematics and Theoretical Computer Science, vol. 11. American Mathematical Society, Boston, MA, 139--176.]]
[114]
Manku, G., Hojati, R., and Brayton, R. 1998. Structural symmetry and model checking. In Proceedings of the 10th International Conference on Computer-Aided Verification (CAV '2002), A. Hu and M. Vardi, Eds. Vancouver, BC. Lecture Notes in Computer Science, vol. 1427. Springer-Verlag, 159--171.]]
[115]
Mateescu, R. 2003. On-the-Fly verification using CADP. In Proceedings of the 8th International Workshop on Formal Methods for Industrial Critical Systems (FMICS 2003), T. Arts and W. Fokkink, Eds. Trondheim, Norway. Electronic Notes in Theoretical Computer Science, vol. 80. Elsevier, 1--5.]]
[116]
Mateescu, R. and Garavel, H. 1998. XTL: A metalanguage and tool for temporal logic model-checking. In Proceedings of the International Workshop on Software Tools for Technology Transfer (STTT '98), T. Margaria and B. Steffen, Eds. Aalborg, Denmark.]]
[117]
McKay, B. D. 1981. Practical graph isomorphism. Congressus Numerantium 30, 45--87.]]
[118]
McMillan, K. 1993. Symbolic Model Checking. Kluwer Academic, Hingham, MA.]]
[119]
McMillan, K. 2000. A methodology for hardware verification using compositional model checking. Sci. Comput. Program. 37, 1--3, 279--309.]]
[120]
McMillan, K. L. and Schwalbe, J. 1992. Formal specification of the Gigamax cache consistency protocols. In Proceedings of the 1991 International Symposium on Shared Memory Multiprocessors, N. Suzuki, Ed. Tokyo. Information Processing Society of Japan. MIT Press, 242--251.]]
[121]
Merz, S. 2000. Model checking: A tutorial overview. In Modeling and Verification of Parallel Processes, 4th Summer School (MOVEP 2000), F. Cassez et al., Eds. Nantes, France. Lecture Notes in Computer Science, vol. 2067. Springer-Verlag, 3--38.]]
[122]
Mitchell, J., Mitchell, M., and Stern, U. 1997. Automated analysis of cryptographic protocols using Mur&phis;. In Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA. IEEE Computer Society, 141--151.]]
[123]
Müller-Olm, M., Schmidt, D., and Steffen, B. 1999. Model-Checking: A tutorial introduction. In Proceedings of the 6th International Static Analysis Symposium (SAS '99), A. Cortesi and G. File, Eds. Venice, Italy. Lecture Notes in Computer Science, vol. 1694. Springer-Verlag, 330--354.]]
[124]
Nalumasu, R. and Gopalakrishnan, G. 1995. Explicit-Enumeration-Based verification made memory-efficient. In Proceedings of the 12th IFIP International Conference on Computer Hardware Description Languages and Their Applications (CHDL '95), S. D. Johnston, Ed. Chiba, Japan. Elsevier Science, 617--622.]]
[125]
Nicollin, X. and Sifakis, J. 1994. ATP: Theory and application. Inf. Comput. 114, 131--178.]]
[126]
Peled, D. 1996a. Combining partial order reductions with on-the-fly model checking. Formal Methods Syst. Des. 8, 39--64.]]
[127]
Peled, D. 1996b. Partial order reduction: Linear and branching temporal logics and process algebras. In Proceedings of the DIMACS Workshop on Partial-Order Methods in Verification (POMIV '96), D. Peled et al., Eds. Princeton, NJ. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 29. American Mathematical Society, Boston, MA. 233--257.]]
[128]
Peled, D., Pratt, V., and Holzmann, G., Eds. 1996. Proceedings of the DIMACS Workshop on Partial-Order Methods in Verification (POMIV '96). Princeton, NJ. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 29. American Mathematical Society, Boston, MA.]]
[129]
Peled, D. and Vardi, M., Eds. 2002. Proceedings of the 22nd International Conference on Formal Techniques for Networked and Distributed Systems (FORTE 2002). Houston, TX. Lecture Notes in Computer Science, vol. 2529. Springer-Verlag.]]
[130]
Peterson, G. 1981. Myths about the mutual exclusion problem. Inf. Process. Lett. 12, 3, 115--116.]]
[131]
Pnuelli, A. 1981. The temporal semantics of concurrent programs. Theoretical Comput. Sci. 13, 45--60.]]
[132]
Quielle, J. and Sifakis, J. 1982. Specification and verification of concurrent systems in CÆSAR. In Proceedings of the 5th International Symposium on Programming, M. Dezani-Ciancaglini and U. Montanari, Eds. Torino, Italy. Lecture Notes in Computer Science, vol. 137. Springer-Verlag, 195--220.]]
[133]
Robby, Dwyer, M., and Hatcliff, J. 2003. Bogor: An extensible and highly-modular model checking framework. In Proceedings of the 10th ACM SIGSOFT Symposium on Foundations of Software Engineering. Held jointly with the 9th European Software Engineering Conference (ESEC/FSE 2003). Helsinki, Finland. ACM Press, New York, 267--276.]]
[134]
Robby, Dwyer, M., Hatcliff, J., and Iosef, R. 2003. Space-Reduction strategies for model checking dynamic software. Electron. Notes Theoretical Comput. Sci. 89, 3, 499--517.]]
[135]
Rutten, J., Kwaitowska, M., Norman, G., and Parker, D. 2004. Mathematical Techniques for Analysing Concurrent and Probabilisitic Systems. CRM Monograph Series, vol. 23. American Mathematical Society, Centre de Recherches Mathématiques, Université de Montréal.]]
[136]
Schneider, K. 2003. Verification of Reactive Systems. Springer-Verlag, Berlin.]]
[137]
Sistla, A. 2004. Employing symmetry reductions in model checking. Comput. Lang. Syst. Structures 3, 99--137.]]
[138]
Sistla, A. and Godefroid, P. 2004. Symmetry and reduced symmetry in model checking. ACM Trans. Program. Lang. Syst. 25, 4, 702--734.]]
[139]
Sistla, A., Gyuris, V., and Emerson, E. 2000. SMC: A symmetry-based model checker for verification of safety and liveness properties. ACM Trans. Softw. Eng. Methodol 9, 133--166.]]
[140]
Sistla, A., Wang, X., and Zhou, M. 2004. Checking extended CTL properties using guarded quotient structures. In Proceedings of the 2nd IEEE International Conference on Software Engineering and Formal Methods. IEEE Computer Society, 87--94.]]
[141]
Starke, P. H. 1991. Reachability analysis of Petri nets using symmetries. Syst. Anal. Model. Simul. 8, 4/5, 293--303.]]
[142]
Tarjan, R. 1972. Depth-first search and linear graph algorithms. SIAM J. Comput. 1, 2, 146--160.]]
[143]
Valmari, A. 1989. Stubborn sets for reduced state space generation. In Proceedings of the 10th International Conference on Application and Theory of Petri Nets. Bonn, Denmark. Lecture Notes in Computer Science, vol. 483. Springer-Verlag, 491--515.]]
[144]
Valmari, A. 1992. A stubborn attack on state explosion. Formal Methods Syst. Des. 1, 297--322.]]
[145]
Vardi, M. and Wolper, P. 1986. An automata-theoretic approach to automatic program verification (preliminary report). In Proceedings of the 1st Annual IEEE Symposium on Logic in Computer Science. Cambridge, MA. IEEE Computer Society Press, 332--344.]]
[146]
Vardi, M. and Wolper, P. 1994. Reasoning about infinite computations. Inf. Comput. 115, 1--37.]]
[147]
Varpaaniemi, K., Halme, J., Hiekkanen, K., and Pyssysalo, T. 1995. PROD reference manual. Tech. Rep. B13, Helsinki University of Technology, Digital Systems Laboratory, Espoo, Finland.]]
[148]
Vergauwen, B. and Lewi, J. 1993. A linear local model checking algorithm for CTL. In Proceedings of the 4th International Conference on Concurrency Theory (CONCUR '93), E. Best, Ed. Hildesheim, Germany. Lecture Notes in Computer Science, vol. 715. Springer-Verlag, 447--461.]]
[149]
Visser, W. and Barringer, H. 1996. Memory efficient state storage in SPIN. In Proceedings of the 2nd Workshop on the SPIN Verification System, J.-C. Gregoire et al., Eds. Rutgers University, NJ. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 32. American Mathematical Society, Boston, MA. 185--203.]]
[150]
Visser, W., Havelund, K., Brat, G., and Park, S. 2000. Model checking programs. In Proceedings of the 15th IEEE Conference on Automated Software Engineering (ASE-2000), P. Alexander and P. Flener, Eds. Grenoble, France. IEEE Computer Society Press, 3--12.]]
[151]
Wang, F. and Schmidt, K. 2002. Symmetric symbolic safety-analysis of concurrent software with pointer data structures. In Proceedings of the 22nd International Conference on Formal Techniques for Networked and Distributed System (FORTE 2002), D. Peled and M. Vardi, Eds. Houston, TX. Lecture Notes in Computer Science, vol. 2529. Springer-Verlag, 50--64.]]
[152]
Wei, O., Gurfinkel, A., and Chechik, M. 2005. Identification and counter abstraction for full virtual symmetry. In Proceedings of the 13th IFIP WG 10.5 Advanced Research Working Conference on Correct Hardware Design and Verification Methods (CHARME '05), D. Borrione and W. J. Paul, Eds. Saarbrücken, Germany. Lecture Notes in Computer Science, vol. 3725. Springer-Verlag, 285--300.]]
[153]
Wolper, P. 1986. Expressing interesting properties of programs in propositional temporal logic. In Proceedings of the Conference Record of the 13th Annual ACM Symposium on Principles of Programming Languages (POPL '86). St. Petersburg Beach, FL. ACM Press, New York, 184--193.]]
[154]
Wolper, P. and Leroy, D. 1993. Reliable hashing without collision detection. In Proceedings of the 5th International Conference on Computer Aided Verification (CAV '93), C. Courcoubetis, Ed. Elounda, Greece. Lecture Notes in Computer Science, vol. 697. Springer-Verlag, 59--70.]]
[155]
Wolper, P., Vardi, M., and Sistla, A. 1983. Reasoning about infinite computation paths. In Proceedings of the 4th IEEE Symposium on Foundations of Computer Science. Tucson, AZ. IEEE Computer Society, 185--194.]]
[156]
Wu, J., Chanson, S., and Gao, Q., Eds. 1999. Proceedings of the Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols and Protocol Specification, Testing and Verification (FORTE/PSTV '99). Beijing, China. International Federation for Information Processing, vol. 156. Kluwer.]]
[157]
Yi, W., Pettersson, P., and Daniels, M. 1994. Automatic verification of real-time communicating systems by constraint-solving. In Proceedings of the 7th WG6.1 International Conference on Formal Description Techniques (FORTE '94), D. Hogrefe and S. Leue, Eds. Berne, Switzerland. International Federation for Information Processing, vol. 6. Chapman and Hall, London, UK, 243--258.]]
[158]
Yovine, S. 1997. Kronos: A verification tool for real-time systems. Int. J. Softw. Tools Technol. Transfer 1, 1/2, 123--133.]]
[159]
Yuen, C. and Tjioe. 2001. Modeling and verifying a price model for congestion control in computer networks using Promela/SPIN. In Proceedings of the 8th International SPIN Workshop (SPIN 2001), M. Dwyer, Ed. Toronto, Canada. Lecture Notes in Computer Science, vol. 2057. Springer-Verlag, 272--287.]]

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Computing Surveys
ACM Computing Surveys  Volume 38, Issue 3
2006
129 pages
ISSN:0360-0300
EISSN:1557-7341
DOI:10.1145/1132960
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 September 2006
Published in CSUR Volume 38, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Model checking
  2. quotient graph
  3. symmetry

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)27
  • Downloads (Last 6 weeks)2
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Analysing futex-based synchronisation primitives using model checkingInternational Journal on Software Tools for Technology Transfer10.1007/s10009-025-00783-4Online publication date: 13-Feb-2025
  • (2024)Synchronisation in Language-Level Symmetry Reduction for Probabilistic Model CheckingModel Checking Software10.1007/978-3-031-66149-5_3(49-66)Online publication date: 10-Apr-2024
  • (2022)A three-valued model abstraction framework for PCTL* stochastic model checkingAutomated Software Engineering10.1007/s10515-022-00327-z29:1Online publication date: 2-Mar-2022
  • (2020)A Model Checking Method for Secure Routing Protocols by SPIN with State Space Reduction2020 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)10.1109/IPDPSW50202.2020.00105(627-635)Online publication date: May-2020
  • (2020)Exploiting Symmetry in Dependency Graphs for Model Reduction in Supervisor Synthesis2020 IEEE 16th International Conference on Automation Science and Engineering (CASE)10.1109/CASE48305.2020.9216953(659-666)Online publication date: Aug-2020
  • (2020)Model checking safety and liveness via k-induction and witness refinement with constraint generationScience of Computer Programming10.1016/j.scico.2020.102532200(102532)Online publication date: Dec-2020
  • (2020)Efficient Validation of Supervisory Controllers using Symmetry ReductionIFAC-PapersOnLine10.1016/j.ifacol.2021.04.07453:4(288-295)Online publication date: 2020
  • (2020)Gameplay Analysis of Multiplayer Games with Verified Action-CostsThe Computer Games Journal10.1007/s40869-020-00121-5Online publication date: 23-Dec-2020
  • (2020)Using formal verification to evaluate the execution time of Spark applicationsFormal Aspects of Computing10.1007/s00165-020-00505-432:1(33-70)Online publication date: 5-Feb-2020
  • (2019)A State Space Reduction Method for Model Checking of Wireless Multi-Hop Network Routing Protocols Focusing on Topologies2019 Seventh International Symposium on Computing and Networking Workshops (CANDARW)10.1109/CANDARW.2019.00010(14-20)Online publication date: Nov-2019
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media