Counterexample classification

被引:0
|
作者
Vick, Cole [1 ]
Kang, Eunsuk [2 ]
Tripakis, Stavros [3 ]
机构
[1] Univ Texas Austin, Austin, TX 78712 USA
[2] Carnegie Mellon Univ, Pittsburgh, PA USA
[3] Northeastern Univ, Boston, MA USA
来源
SOFTWARE AND SYSTEMS MODELING | 2024年 / 23卷 / 02期
基金
美国国家科学基金会;
关键词
Model checking; Formal modelling; debugging; AUTHENTICATION;
D O I
10.1007/s10270-023-01118-0
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In model checking, when a model fails to satisfy the desired specification, a typical model checker provides a counterexample that illustrates how the violation occurs. In general, there exist many diverse counterexamples that exhibit distinct violating behaviors, which the user may wish to examine before deciding how to repair the model. Unfortunately, (1) the number of counterexamples may be too large to enumerate one by one, and (2) many of these counterexamples are redundant, in that they describe the same type of violating behavior. In this paper, we propose a technique called counterexample classification. The goal of classification is to cover the space of all counterexamples into a finite set of counterexample classes, each of which describes a distinct type of violating behavior for the given specification. These classes are then presented as a summary of possible violating behaviors in the system, freeing the user from manually having to inspect or analyze numerous counterexamples to extract the same information. We have implemented a prototype of our technique on top of an existing formal modeling and verification tool, the Alloy Analyzer, and evaluated the effectiveness of the technique on case studies involving the well-known Needham-Schroeder and TCP protocols with promising results.
引用
收藏
页码:455 / 472
页数:18
相关论文
共 50 条