Abstract
Software model checking is the technique that automatically verifies whether software meets the given correctness properties. In the past decades, a large number of model checking techniques and tools have been developed, reaching a point where modern model checkers are sophisticated enough to handle large-scale software systems. However, due to the fact that the software model checkering techniques are diverse and each of them is designed and optimized for a specific type of software system, it remains a hard problem for engineers to efficiently combine them to verify the complex software systems in practice. To alleviate this problem, we propose a novel algorithm selection approach based on Random Vector Functional Link net (RVFL) for software model checking, namely Kaleidoscopic RVFL (K-RVFL). The novel design of feature hybridization and fusion enables K-RVFL to extract more diverse and multi-level features. We have also carried out a thorough experimental evaluation on a publicly available data set and compared K-RVFL with a number of neural networks, including RVFL, Extreme Learning Machine (ELM), Stochastic Configuration Network (SCN), Back Propagation algorithm (BP), and Supporting Vector Machine (SVM). The experimental results demonstrate the usefulness and effectiveness of K-RVFL.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
References
Beyer, D.: Reliable and reproducible competition results with BenchExec and witnesses (report on SV-COMP 2016). In: Chechik, M., Raskin, J.-F. (eds.) TACAS 2016. LNCS, vol. 9636, pp. 887–904. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49674-9_55
Beyer, D., Dangl, M.: Strategy selection for software verification based on Boolean features. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11245, pp. 144–159. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-03421-4_11
Cao, W., Gao, J., Ming, Z., Cai, S., Shan, Z.: Fuzziness-based online sequential extreme learning machine for classification problems. Soft Comput. 22(11), 3487–3494 (2018). https://doi.org/10.1007/s00500-018-3021-4
Cao, W., Wang, X.-Z., Ming, Z., Gao, J.: A review on neural networks with random weights. Neurocomputing 275, 09 (2017)
Cao, W., Xie, Z., Li, J., Xu, Z., Ming, Z., Wang, X.: Bidirectional stochastic configuration network for regression problems. Neural Netw. 140, 237–246 (2021)
Clarke, E.M., Henzinger, T.A., Veith, H., Bloem, R.: Handbook of Model Checking, vol. 10. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-10575-8
Czech, M., Hüllermeier, E., Jakobs, M.-C., Wehrheim, H.: Predicting rankings of software verification tools. In: Proceedings of the 3rd ACM SIGSOFT International Workshop on Software Analytics, SWAN 2017, pp. 23–26 (2017)
Demyanova, Y., Pani, T., Veith, H., Zuleger, F.: Empirical software metrics for benchmarking of verification tools. In: Kroening, D., Păsăreanu, C.S. (eds.) CAV 2015. LNCS, vol. 9206, pp. 561–579. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-21690-4_39
Demyanova, Y., Pani, T., Veith, H., Zuleger, F.: Empirical software metrics for benchmarking of verification tools. Formal Methods Syst. Des. 11, 289–316 (2017). https://doi.org/10.1007/s10703-016-0264-5
Demyanova, Y., Veith, H., Zuleger, F.: On the concept of variable roles and its use in software analysis. In: FMCAD, pp. 226–229 (2013)
Nielson, F., Nielson, H.R., Hankin, C.: Principles of Program Analysis. Springer, Cham (2015). https://doi.org/10.1007/978-3-662-03811-
Richter, C., Wehrheim, H.: PeSCo: predicting sequential combinations of verifiers. In: Beyer, D., Huisman, M., Kordon, F., Steffen, B. (eds.) TACAS 2019. LNCS, vol. 11429, pp. 229–233. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17502-3_19
Tulsian, V., Kanade, A., Kumar, R., Lal, A., Nori, A.V.: MUX: algorithm selection for software model checkers. In Proceedings of the 11th Working Conference on Mining Software Repositories, MSR 2014, pp. 132–141 (2014)
Wang, Q., Cao, W., Jiang, J., Zhao, Y., Ming, Z.: NNRW-based algorithm selection for software model checking. In: International Conference on Extreme Learning Machine (ELM) (2019)
Wang, Q., Jiang, J., Zhao, Y., Cao, W., Wang, C., Li, S.: Algorithm selection for software verification based on adversarial LSTM. In: 2021 7th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity), High Performance and Smart Computing, (HPSC) and Intelligent Data and Security (IDS), pp. 87–92 (2021)
Acknowledgements
This work was supported by National Natural Science Foundation of China (Grant No. 62106150), CAAC Key Laboratory of Civil Aviation Wide Surveillance and Safety Operation Management and Control Technology (Grant No. 202102), and CCF-NSFOCUS (Grant No. 2021001).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Cao, W., Wu, Y., Wang, Q., Zhang, J., Zhang, X., Qiu, M. (2022). A Novel RVFL-Based Algorithm Selection Approach for Software Model Checking. In: Memmi, G., Yang, B., Kong, L., Zhang, T., Qiu, M. (eds) Knowledge Science, Engineering and Management. KSEM 2022. Lecture Notes in Computer Science(), vol 13370. Springer, Cham. https://doi.org/10.1007/978-3-031-10989-8_33
Download citation
DOI: https://doi.org/10.1007/978-3-031-10989-8_33
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-10988-1
Online ISBN: 978-3-031-10989-8
eBook Packages: Computer ScienceComputer Science (R0)