Skip to main content

Watchdog Transformations for Property-Oriented Model-Checking

  • Conference paper
  • First Online:
FME 2003: Formal Methods (FME 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2805))

Included in the following conference series:

Abstract

We discuss how to transform a CSP refinement, \(S \sqsubseteq I\), to enable all its events to be hidden; this is useful because many of the state space compression functions provided by the model-checker FDR are effective only when events are hidden [1]. In an earlier paper [2] we described a suitable transformation for the case where the refinement is in the traces semantics of CSP. This paper extends the approach to the more difficult case of the stable-failures semantics. In both cases, a watchdog transformation is applied to the specification S, resulting in a watchdog processWD S, which is then composed in parallel with I, or with I in a simple context. The watchdog process monitors I and somehow indicates whether it can behave in a way that is incompatible with refinement of S. All events of the original assertion can be hidden in the transformed assertion. We also discuss the design of compression strategies that try to hide as many events as possible in the component processes of I and WD S, and compress the composition as it is being built up. We describe our implementation of the watchdog transformations and some simple compression strategies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Roscoe, A.W.: The Theory and Practice of Concurrency. Prentice-Hall, Englewood Cliffs (1998)

    Google Scholar 

  2. Zakiuddin, I., Moffat, N., Goldsmith, M., Whitworth, T.: Property Based Compression Strategies. In: Proceedings of Second Workshop on Automated Verification of Critical Systems (AVoCS 2002), April 15-16, University of Birmingham (2002)

    Google Scholar 

  3. de Roever, W.P., de Boer, F., Hannemann, U., Hooman, J., Lakhnech, Y., Poel, M., Zwiers, J.: Concurrency Verification: Introduction to Compositional and Noncompositional Proof Methods. Cambridge Tracts in Theoretical Computer Science 54 (2001)

    Google Scholar 

  4. Clarke, E.M., Grumberg, O.: Model Checking and Abstraction. ACM Transactions on Programming Languages and Systems. ACM Press, New York, 1512–1542 (1992)

    Google Scholar 

  5. Clarke, E., Filkorn, T., Jha, S.: Exploiting symmetry in temporal logic model checking. In: Proceedings of 5th International Conference on Computer Aided Verification (1993)

    Google Scholar 

  6. Ip, C.N., Dill, D.L.: Better Verification Through Symmetry. Computer Hardware Description Languages and their Applications. Elsevier Science Publishers B.V, Amsterdam (1996)

    Google Scholar 

  7. Emerson, E.A., Sistla, A.P.: Symmetry and Model Checking. Formal Methods in System Design: An International Journal, 105–131. Kluwer Academic Publishers (1994)

    Google Scholar 

  8. Valmari, A.: A stubborn attack on state explosion. In: 2nd Workshop on Computer Aided Verification, New Brunswick, NJ. LNCS, vol. 531, pp. 156–165. Springer, Heidelberg (1987)

    Chapter  Google Scholar 

  9. Peled, D., Pnueli, A.: Proving partial order properties. Theoretical Computer Science 126, 143–182 (1994)

    Article  MathSciNet  Google Scholar 

  10. Godefroid, P.: Partial-order Methods for the Verification of Concurrent Systems. Springer, Heidelberg (1996)

    Book  Google Scholar 

  11. McMillan, K.L.: Symbolic Model Checking. Kluver Academic Press, London (1993)

    Book  Google Scholar 

  12. Formal Systems (Europe) Ltd.: FDR User Manual, 1992-99

    Google Scholar 

  13. Roscoe, A.W., Goldsmith, M., Gardiner, P.H.B., Jackson, D., Scattergood, B., Hulance, J.: Hierarchical Compression for Model-Checking CSP, or How to Check 1020 Dining Philosophers for Deadlock. In: Brinksma, E., Steffen, B., Cleaveland, W.R., Larsen, K.G., Margaria, T. (eds.) TACAS 1995. LNCS, vol. 1019. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  14. Scattergood, J.B.: Tools for CSP and Timed CSP. Oxford University D.Phil. thesis (1998)

    Google Scholar 

  15. Valmari, A., Kervinen, A.: Alphabet-Based Synchronisation is Exponentially Cheaper. In: Brim, L., Jančar, P., Křetínský, M., Kucera, A. (eds.) CONCUR 2002. LNCS, vol. 2421, p. 161. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Goldsmith, M., Moffat, N., Roscoe, B., Whitworth, T., Zakiuddin, I. (2003). Watchdog Transformations for Property-Oriented Model-Checking. In: Araki, K., Gnesi, S., Mandrioli, D. (eds) FME 2003: Formal Methods. FME 2003. Lecture Notes in Computer Science, vol 2805. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45236-2_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-45236-2_33

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40828-4

  • Online ISBN: 978-3-540-45236-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics