Formal Description Techniques VII pp 280-282 | Cite as
Verification Model Reduction through Abstractions
Abstract
The major problem still facing researchers in the formal verification of finite state systems is the state space explosion. This problem occurs partly because the domain of each variable of the system model contributes to the global state and verification typically involves an exhaustive search through the state space, to recognize states corresponding to wanted or unwanted system configurations. In telecommunication or hardware systems, most practical problems have a number of states that exceeds the memory capacity of our computers. New techniques of state-space compression, “on-the-fly” computing, combination of various techniques such as so-called partial order methods or symbolic computing with Binary Decision Diagrams (BDDs) have allowed us to tackle problems several orders of magnitude greater. Yet, it is clear that the “brute force” approach to verification is unlikely to ever be sufficient, and we need to develop not only new techniques but also methods to achieve further practical reduction of the state space. Recent research on this topic has shown promising results (e.g. [Loi94]).
Keywords
State Space Formal Verification Binary Decision Diagram Computer Hardware Description Language Remote Procedure CallPreview
Unable to display preview. Download preview PDF.
References
- [CFJ93]E.M. Clarke, T. Filkorn, and S. Jha. Exploiting symmetry in temporal logic model checking. In Proc. Conference on Computer Aided Verification, Lecture Notes in Computer Science, pages 450–462. Springer Verlag, 1993.CrossRefGoogle Scholar
- [Dij75]E.W. Dijkstra. Guarded commands, nondeterminacy and formal derivation of programs. Communications of the ACM, 18 (8): 453–457, 1975.MATHCrossRefMathSciNetGoogle Scholar
- [GW93]P. Godefroid and P. Wolper. Using partial orders for the efficient verification of deadlock freedom and safety properties. Formal Methods in System Design, 2 (2): 149–164, April 1993.MATHCrossRefGoogle Scholar
- [Ho189]G. Holzmann. Algorithms for automated protocol verification. AT&T Technical Journal, 68 (1): 32–44, 1989.Google Scholar
- [ID93]C-W. Norris Ip and David L. Dill. Better verification through symmetry. In International Conference on Computer Hardware Description Languages, pages 87–100, 1993.Google Scholar
- [Loi94]C. Loiseaux. Vérification symbolique de programmes réactifs à l’aide d’abstractions. PhD thesis, Université Joseph Fourier de Grenoble, Laboratoire VERIMAG, 1994.Google Scholar