# A stubborn attack on state explosion

- 236 Downloads
- 93 Citations

## Abstract

This article presents the*LTL-preserving stubborn set method* for reducing the amount of work needed in the automatic verification of concurrent systems with respect to linear-time temporal logic specifications. The method facilitates the generation of*reduced state spaces* such that the truth values of linear temporal logic formulas are the same in the ordinary and reduced state spaces. The only restrictions posed by the method are 1) the formulas must be known before the reduced state-space generation is commenced; 2) the use of the temporal operator “next state” is prohibited; and 3) the (reduced) state space of the system must be finite. The method cuts down the number of states by utilizing the fact that in concurrent systems the net result of the occurrence of two events is often independent of the order of occurrence.

## Keywords

temporal logic verification state-space reduction## Preview

Unable to display preview. Download preview PDF.

## References

- [1]E.M.Clarke, E.A.Emerson, and A.P.Sistla. Automatic verification of finite-state concurrent systems using temporal logic specifications.
*ACM Transactions on Programming Languages and Systems*, 8 (2): 244–263, 1986.Google Scholar - [2]O. Lichtenstein and A. Pnueli. Checking that finite state concurrent programs satisfy their linear specification. Proceedings of the Twelfth ACM Symposium on the Principles of Programming Languages, New Orleans, LA, January 1985, pp. 97–107.Google Scholar
- [3]A. Pnueli. Applications of temporal logic to the specification and verification of reactive systems: A survey of current trends. In
*Current Trends in Concurrency, Lecture Notes in Computer Science*, 224: 510–584, 1986.Google Scholar - [4]A. Valmari.
*State Space Generation: Efficiency and Practicality*. Ph.D. thesis, Tampere University of Technology Publications 55, Tampere, Finland, 1988.Google Scholar - [5]W.T. Overman.
*Verification of Concurrent Systems: Function and Timing*. Ph.D. dissertation, University of California Los Angeles, 1981.Google Scholar - [6]A. Valmari. Error detection by reduced reachability graph generation. Proceedings of the Ninth European Workshop on Application and theory of Petri Nets, Venice, Italy, pp. 95–112, 1988.Google Scholar
- [7]A. Valmari. Heuristics for lazy state generation speeds up analysis of concurrent systems. Proceedings of the Finnish Artificial Intelligence Symposium STeP-88, Helsinki, Vol. 2, pp. 640–650, 1988.Google Scholar
- [8]A.Valmari. Eliminating redundant interleavings during concurrent program verification. Proceedings of Parallel Architectures and Languages Europe '89, Eindhoven, The Netherlands, June 1989, Vol. 2.
*Lecture Notes in Computer Science*, 366: 89–103, 1989.Google Scholar - [9]A.Valmari. Stubborn sets for reduced state space generation.
*Advances in Petri Nets 1990. Lecture Notes in Computer Science*, 483: 491–515, 1991. (An earlier version appeared in Proceedings of the Tenth International Conference on Application and Theory of Petri Nets, Bonn, FRG, Vol. II, pp. 1–22, 1989.)Google Scholar - [10]A. Valmari. Stubborn sets of coloured Petri nets. Proceedings of the 12th International Conference on Application and Theory of Petri Nets, Gjern, Denmark, pp. 102–121, 1991.Google Scholar
- [11]A. Valmari and M. Clegg. Reduced labelled transition systems save verification effort.
*Proceedings of CONCUR '91*, Amsterdam, The Netherlands, August 1991.*Lecture Notes in Computer Science*, 527: 526–540, 1991.Google Scholar - [12]A. Valmari. A stubborn attack on state explosion. Computer-Aided Verification '90, New Brunswick, NJ (proceedings of a workshop).
*AMS-ACM DIMACS Series in Discrete Mathematics and Theoretical Computer Science*, Vol. 3, pp. 25–41. American Mathematical Society, 1991. (An abbreviated version appeared in Computer-Aided Verification, 2nd International Conference,*Lecture Notes in Computer Science*, 531: 156–165, 1991.)Google Scholar - [13]P. Godefroid. Using partial orders to improve automatic verification methods. Computer-Aided Verification '90, New Brunswick, NJ (proceedings of a workshop).
*AMS-ACM DIMACS Series in Discrete Mathematics and Theoretical Computer Science*, Vol. 3. American Mathematical Society, 1991, pp. 321–340.Google Scholar - [14]P.Godefroid and P.Wolper. Using partial orders for the efficient verification of deadlock-freedom and safety properties. Proceedings of Computer-Aided Verification '91, Aalborg, Denmark, July 1991.
*Lecture Notes in Computer Science*575: 332–342, 1992.Google Scholar - [15]P. Godefroid and P. Wolper. A partial approach to model checking. Proceedings of the 6th Symposium on Logic in Computer Science, Amsterdam, The Netherlands, pp. 406–415, July 1991.Google Scholar
- [16]M.Itoh and H.Ichikawa. Protocol verification algorithm using reduced reachability analysis.
*Transactions of the IECE of Japan*, E66(2): 88–93, 1983.Google Scholar - [17]R. Janicki and M. Koutny. On some implementation of optimal simulations. Computer-Aided Verification '90, New Brunswick, NJ, (proceedings of a workshop).
*AMS-ACM DIMACS Series in Discrete Mathematics and Theoretical Computer Science*, Vol. 3. American Mathematical Society, 1991, pp. 231–250.Google Scholar - [18]J.Quemada. Compressed state space representation in LOTOS with the interleaved expansion.
*Protocol Specification, Testing and Verification XI*(Proceedings of the 11th International IFIP WG 6.1 Symposium, Stockholm, Sweden, June 1991). North-Holland, Amsterdam, 1991, pp. 19–35.Google Scholar - [19]S.Katz and D.Peled. Interleaving set temporal logic.
*Theoretical Computer Science*, 75: 263–287, 1990.Google Scholar - [20]L. Lamport. What good is temporal logic? Information Processing '83,
*Proceedings of the IFIP 9th World Computer Congress*. North-Holland, Amsterdam, pp. 657–668.Google Scholar - [21]A.V.Aho, J.E.Hopcroft and J.D.Ullman.
*The Design and Analysis of Computer Algorithms*. Addison-Wesley, Reading, MA, 1974.Google Scholar - [22]G.R. Wheeler, A. Valmari, and J. Billington, Baby Toras eats philosophers but thinks about solitaire. Proceedings of the Fifth Australian Software Engineering Conference, Sydney, NSW, Australia 1990, pp. 283–288.Google Scholar
- [23]J. Kemppainen, M. Levanto, A. Valmari, and M. Clegg. “ARA” puts advanced reachability analysis methods together. Tampere University of Technology, Software Systems Laboratory Report 14: Proceedings of the Fifth Nordic Workshop on Programming Environment Research, Tampere, Finland, January 1992.Google Scholar
- [24]S.D.Brookes, C.A.R.Hoare, and A.W.Roscoe. A theory of communicating sequential processes.
*Journal of the ACM*, 31 (3): 560–599, 1984.Google Scholar - [25]A.Valmari and M.Tienari. An improved failures equivalence for finite-state systems with a reduction algorithm.
*Protocol Specification, Testing and Verification XI*(Proceedings of the 11th International IFIP WG 6.1 Symposium, Stockholm, Sweden, June 1991). North-Holland, Amsterdam, 1991, pp. 3–18.Google Scholar - [26]S. Graf and B. Steffen. Compositional minimization of finite-state processes. Computer-Aided Verification '90, New Brunswick, NJ, (proceedings of a workshop).
*AMS-ACM DIMACS Series in Discrete Mathematics and Theoretical Computer Science*, Vol. 3. American Mathematical Society, 1991, pp. 57–73.Google Scholar