Skip to main content
Log in

Finite Reasons for Safety

Parameterized Verification by Finite Model Finding

  • Published:
Journal of Automated Reasoning Aims and scope Submit manuscript

Abstract

In this paper we investigate to what extent a very simple and natural “reachability as deducibility” approach, originating in research on formal methods for security, is applicable to the automated verification of large classes of infinite state and parameterized systems. In this approach the verification of a safety property is reduced to the purely logical problem of finding a countermodel for a first-order formula. This task is delegated then to generic automated finite model building procedures. A finite countermodel, if found, provides with a concise representation for a system invariant sufficient to establish the safety. In this paper we first present a detailed case study on the verification of a parameterized mutual exclusion protocol. Further we establish the relative completeness of the finite countermodel finding method (FCM) for a class of parameterized linear arrays of finite automata with respect to known methods based on monotonic abstraction and symbolic backward reachability. The practical efficiency of the method is illustrated on a set of verification problems taken from the literature using Mace4 model finding procedure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Abdulla, P.A., Jonsson, B.: Verifying programs with unreliable channels. Inf. Comput. 127(2), 91–101 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  2. Abdulla, P.A., Delzanno, G., Henda, N.B., Rezine, A.: Monotonic abstraction: on efficient verification of parameterized systems. Int. J. Found. Comput. Sci. 20(5), 779–801 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  3. Abdulla, P.A., Delzanno G., Rezine, A.: Approximated context-sensitive analysis for parameterized verification. Lect. Notes Comput. Sci. 5522, 41–56 (2009)

    Article  Google Scholar 

  4. Baumgartner, P., Pelzer, B., Tinelli, C.: Model evolution with equality—revised and implemented. J. Symb. Comput. 47(9), 1011–1045 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  5. Caferra, R., Leitsch, A., Peltier, M.: Automated model building. In: Applied Logic Series, vol. 31. Kluwer (2004)

  6. Comon, H.: Inductionless induction. In: David, R. (ed.) 2nd Int. Conf. in Logic for Computer Science: Automated Deduction. Lecture Notes. Uni de Savoie, Chambery (1994)

  7. Delzanno, G.: Constraint-based verification of parametrized cache coherence protocols. Formal Methods Syst. Des. 23(3), 257–301 (2003)

    Article  MATH  Google Scholar 

  8. Enderton, H.: A Mathematical Introduction to Logic. Academic Press (1972)

  9. Fisman, D., Pnueli, A.: Beyond regular model checking. In: Proc. of FSTTCS’01. LNCS, vol. 2245 (2001)

  10. Ghilardi, S., Ranise, S.: MCMT: a model checker modulo theories. Lect. Notes Comput. Sci. 6173, 22–29 (2010)

    Article  Google Scholar 

  11. Ghilardi, S., Nikolini, E., Ranise, S., Zucchelli, D.: Towards SMT model-checking of array-based systems. In: IJCAR, LNCS (2008)

  12. Goubault-Larrecq, J.: Towards producing formally checkable security proofs, automatically. In: Computer Security Foundations (CSF), pp. 224–238 (2008)

  13. Goubault-Larrecq, J.: Finite models for formal security proofs. J. Comput. Secur. 18(6), 1247–1299 (2010)

    MathSciNet  Google Scholar 

  14. Guttman, J.: Security theorems via model theory. In: Proceedings 16th International Workshop on Expressiveness in Concurrency, EXPRESS, EPTCS, vol. 8 (2009)

  15. Habermehl, P., Vojnar, T.: Regular model checking using inference of regular languages. Electron. Notes Theor. Comput. Sci. (ENTCS) 138(3), 21–36 (2005)

    Article  MathSciNet  Google Scholar 

  16. Jurjens, J., Weber, T.: Finite models in FOL-based crypto-protocol verification. In: Degano, P., Viganò, L. (eds.) ARSPA-WITS 2009, LNCS 5511, pp. 155–172 (2009)

  17. Kapur, D., Musser, D.R.: Proof by consistency. Artif. Intell. 31, 125–157 (1987)

    Article  MathSciNet  MATH  Google Scholar 

  18. Lallement, G.: Semigroups and Combinatorial Applications. Wiley (1979)

  19. Lisitsa, A.: Verfication via countermodel finding. http://www.csc.liv.ac.uk/~alexei/countermodel

  20. Lisitsa, A.: Reachability as deducibility, finite countermodels and verification. In: Preproceedings of AVOCS 2009, Technical Report of Computer Science, Swansea University, CSR-2-2009, pp. 241–243 (2009)

  21. Lisitsa, A.: Finite countermodels as invariants. A case study in verification of parameterized mutual exclusion protocol. In: Proceedings of WING 2010, 1 pp. (2010)

  22. Lisitsa, A.: Reachability as deducibility, finite countermodels and verification. In: Proceedings of ATVA 2010. LNCS, vol. 6252, pp. 233–244 (2010)

  23. Lisitsa, A.: Finite model finding for parameterized verification. CoRR arXiv:1011.0047 (2010). Accessed 12 Feb 2013

  24. Lisitsa, A.: Finite countermodels for safety verification of parameterized tree systems. CoRR arXiv:1107.5142. Accessed 12 Feb 2013

  25. Lisitsa, A.: Finite models vs tree automata in safety verification. In: 23rd International Conference on Rewriting Techniques and Applications RTA’12, pp. 225–239 (2012)

  26. McCune, W.: Prover9 and Mace4. http://www.cs.unm.edu/~mccune/mace4. Accessed 12 Feb 2013

  27. Nilsson, M.: Regular model checking. Acta Universitatis Upsaliensis. Uppsala Dissertations from the Faculty of Science and Technology 60. 149 pp. Uppsala. ISBN 91-554-6137-9 (2005)

  28. Nonnengart, A.: Hybrid systems verification by location elimination. In: Lynch, N.A., Krogh, B.H. (eds.) Hybrid Systems: Computation and Control, Third International Workshop, HSCC 2000, LNCS, vol. 1790, pp. 352–365 (2000)

  29. Selinger, P.: Models for an adversary-centric protocol logic. Electron. Notes Theor. Comput. Sci. 55(1), 69–84 (2001)

    Article  Google Scholar 

  30. Weidenbach, C.: Towards an automatic analysis of security protocols in first-order logic. In: Ganzinger, H. (ed.): CADE-16, LNAI, vol. 1632, pp. 314–328 (1999)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexei Lisitsa.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lisitsa, A. Finite Reasons for Safety. J Autom Reasoning 51, 431–451 (2013). https://doi.org/10.1007/s10817-013-9274-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10817-013-9274-9

Keywords

Navigation