Model checking

被引:0
|
作者
Gerth, R [1 ]
机构
[1] EINDHOVEN UNIV TECHNOL,NL-5600 MB EINDHOVEN,NETHERLANDS
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Model checking is increasingly being perceived as the prime industrially relevant approach to (formal) system verification. This is due partly to the high level of automation it allows and partly to the ease with which it can be inserted in existing design-flows. Its natural application domain is systems that are primarily control (as opposed to data) driven and that have a high level of interaction with an only partly controllable environment. Indeed, model checking has seen most use in telecommunication and in hardware design. Moreover, companies such as Siemens and Intel have incorporated these methods into their system design-flows. Conceptually, model checking explores the space of all possible system behaviors in search for an illegal one that refutes some system requirement. Indeed, in some implementations this exploration resembles an SLD refutation with a depth-first search rule. Accordingly, a major issue is the efficiency of such searches, which entails questions of compact representation of behaviors, early pruning of the search space (e.g., automatic insertion of safe cuts) and the use of abstract interpretation. A second example is in the application of model checking to systems that have a continously varying component. Behaviors of such systems cannot be enumerated anymore and one uses a constraint system instead to describe the behavior space and searches for a refuting behavior in the solution set. This tutorial aims to give an introduction and overview of model checking; its methods, its applications, its limits. Secondly, it aims to indicate those spots where model checking and logic programming touch and where awareness of results and research directions can be mutually beneficial.
引用
收藏
页码:39 / 39
页数:1
相关论文
共 50 条
  • [1] Modular Checking with Model Checking
    Hashimoto, Yuusuke
    Nakajima, Shin
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 254 : 105 - 122
  • [2] Checking security properties by model checking
    De Francesco, N
    Lettieri, G
    SOFTWARE TESTING VERIFICATION & RELIABILITY, 2003, 13 (03): : 181 - 196
  • [3] Model checking
    Berg, T
    Raffelt, H
    MODEL-BASED TESTING OF REACTIVE SYSTEMS, 2005, 3472 : 557 - 603
  • [4] Model checking
    不详
    IEEE INTELLIGENT SYSTEMS, 2004, 19 (05) : 47 - 47
  • [5] Model checking
    不详
    PARTIAL-ORDER METHODS FOR THE VERIFICATION OF CONCURRENT SYSTEMS, 1996, 1032 : 103 - 111
  • [6] An integration of model checking with automated proof checking
    Rajan, S
    Shankar, N
    Srivas, MK
    COMPUTER AIDED VERIFICATION, 1995, 939 : 84 - 97
  • [7] Is it model checking, property checking, or language containment?
    不详
    COMPUTER DESIGN, 1996, 35 (09): : 68 - 68
  • [8] Towards Combining Model Checking and Proof Checking
    Jiang, Ying
    Liu, Jian
    Dowek, Gilles
    Ji, Kailiang
    COMPUTER JOURNAL, 2019, 62 (09): : 1365 - 1402
  • [9] Model Checking Based Approach for Compliance Checking
    Martinelli, Fabio
    Mercaldo, Francesco
    Nardone, Vittoria
    Orlando, Albina
    Santone, Antonella
    Vaglini, Gigliola
    INFORMATION TECHNOLOGY AND CONTROL, 2019, 48 (02): : 278 - 298
  • [10] Multi-valued model checking via classical model checking
    Gurfinkel, A
    Chechik, M
    CONCUR 2003 - CONCURRENCY THEORY, 2003, 2761 : 266 - 280