Bounded model checking and induction: From refutation to verification

被引:0
|
作者
de Moura, L
Ruess, H
Sorea, M
机构
[1] SRI Int, Comp Sci Lab, Menlo Pk, CA 94025 USA
[2] Univ Ulm, D-89069 Ulm, Germany
来源
COMPUTER AIDED VERIFICATION | 2003年 / 2725卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We explore the combination of bounded model checking and induction for proving safety properties of infinite-state systems. In particular, we define a general k-induction scheme and prove completeness thereof A main characteristic of our methodology is that strengthened invariants are generated from failed k-induction proofs. This strengthening step requires quantifier-elimination, And we propose a lazy quantifier-elimination procedure, which delays expensive computations of disjunctive normal forms when possible. The effectiveness of induction based on bounded model checking and invariant strengthening is demonstrated using infinite-state systems ranging from communication protocols to timed automata and (linear) hybrid automata.
引用
收藏
页码:14 / 26
页数:13
相关论文
共 50 条
  • [1] Verification of ACTL properties by bounded model checking
    Zhang, Wenhui
    [J]. COMPUTER AIDED SYSTEMS THEORY- EUROCAST 2007, 2007, 4739 : 556 - 563
  • [2] Automated Verification of Go Programs via Bounded Model Checking
    Dilley, Nicolas
    Lange, Julien
    [J]. 2021 36TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING ASE 2021, 2021, : 1016 - 1027
  • [3] Verification of a network ASIC component using bounded model checking
    Sun, X.
    Xie, F.
    Wu, J.
    Song, X.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONICS, 2007, 94 (02) : 183 - 196
  • [4] Disk based software verification via bounded model checking
    Brizzolari, Fernando
    Melatti, Igor
    Tronci, Enrico
    Della Penna, Giuseppe
    [J]. 14TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2007, : 358 - +
  • [5] A Bounded Model Checking Approach for the Verification of Web Services Composition
    Zahoor, Ehtesham
    Munir, Kashif
    Perrin, Olivier
    Godart, Claude
    [J]. INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH, 2013, 10 (04) : 62 - 81
  • [6] Rational Verification: From Model Checking to Equilibrium Checking
    Wooldridge, Michael
    Gutierrez, Julian
    Harrenstein, Paul
    Marchioni, Enrico
    Perelli, Giuseppe
    Toumi, Alexis
    [J]. THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2016, : 4184 - 4190
  • [7] Safety property verification using sequential SAT and bounded model checking
    Parthasarathy, G
    Iyer, MK
    Cheng, KT
    Wang, LC
    [J]. IEEE DESIGN & TEST OF COMPUTERS, 2004, 21 (02): : 132 - 143
  • [8] Automated verification of concurrent go programs via bounded model checking
    Dilley, Nicolas
    Lange, Julien
    [J]. AUTOMATED SOFTWARE ENGINEERING, 2023, 30 (02)
  • [9] Achieving completeness in the verification of action theories by Bounded Model Checking in ASP
    Giordano, Laura
    Martelli, Alberto
    Dupre, Daniele Theseider
    [J]. JOURNAL OF LOGIC AND COMPUTATION, 2015, 25 (06) : 1307 - 1330
  • [10] Application of symbolic and bounded model checking to the verification of logic control systems
    Loeis, Kingliana
    Younis, Mohammed Bani
    Frey, Georg
    [J]. ETFA 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, VOL 1, PTS 1 AND 2, PROCEEDINGS, 2005, : 247 - 250