期刊文献+

模型检测基于概率时间自动机的反例产生研究 被引量:6

Counterexample Generation for Probabilistic Timed Automata Model Checking
在线阅读 下载PDF
导出
摘要 模型检测基于概率系统的反例产生问题,在最近引起人们的关注.已有的工作主要围绕模型检测Markov链的反例产生而开展.基于概率时间自动机(PTA)是Markov链的不确定性和系统时钟的扩展.关注的是模型检测PTA的反例产生问题.首先通过在PTA上寻找概率之和恰好大于λ的k条最大概率的路径,并根据这些路径和原PTA构造原PTA的一个子图,从而快速找到违背性质的具有较少证据的反例.然后精化此结果——通过逐条加入上述各条最大概率的路径来精确地计算已加入路径所构成的PTA子图的最大概率.由于考虑到符号状态交集对概率系统的影响,可以得到证据更少的反例. Counterexample is a typical topic in model checking. Model checking probabilistic systems have bee3n studied well these years, but counterexample generation for probabilistic system model checking has just drawn some attentions recently. Current works are mainly focusing on the counterexample generation for Markov chain. Probabilistic timed automata (PTA) are the extension of Markov chain with non-determinism and system clocks, and have been used broadly on network protocol modeling and verification. The focus of this paper is on counterexample generation while model is checking PTA. Firstly, a research is made for the k most probable paths whose probability sum is just greater than λ. PTA can be regarded as discrete-time Markov chain (DTMC) in this situation. The sub-graph of PTA constructed from the above paths and the initial PTA is a counterexample which can be obtained quickly with small number of testimonies. When the maximal probability is calculated in a PTA, the contribution to probability not only comes from the contained paths, but also from the symbolic state intersections originated in the existence of system clocks. So refinement can be done as a further step By adding paths from the above one by one in order to decrease probability, and to calculate the precise maximal probability on the sub-graph of PTA constructed from the added paths and initial PTA, the counterexample occupying less testimonies can be obtained. The refinement process is accomplished through an executable and converging algorithm with high efficiency.
出处 《计算机研究与发展》 EI CSCD 北大核心 2008年第10期1638-1645,共8页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60473036)~~
关键词 模型检测 反例 基于概率时间自动机 符号状态交集 不确定性 model checking counterexample probabilistic timed automata symbolic state intersection non-determinism
  • 相关文献

参考文献17

  • 1de Alfaro L, Henzinger T A, Mang F. Detecting errors before reaching them [G] //Lecture Notes in Computer Science 2725. Berlin: Springer, 2000:186-201
  • 2Ball T, Naik M, Rajamani S K. From symptom to cause: Localizing errors in eounterexample traces[C] //Proc of POPL. New York: ACM, 2003
  • 3Jin H, Ravi K, Somenzi F. Fate and free will in error traces [J]. International Journal on Software Tools for Technology Transfer, 2004, 6(2): 102-116
  • 4周倜,李梦君,李舟军,陈火旺.基于Horn逻辑扩展模型的安全协议反例的自动构造[J].计算机研究与发展,2007,44(9):1518-1531. 被引量:4
  • 5Aljazzar H, Hermanns H, Leue S. Counterexamples for timed probabilistic reachability [G] //Lecture Notes in Computer Science 3829. Berlin: Springer, 2005:177-195
  • 6Aljazzar H, Leue S. Extended directed search for probabilistic timed reaehability [G] //Lecture Notes in Computer Science 4202. Berlin: Springer, 2006:33-51
  • 7Han T, Katoen J P. Counterexamples in probabilistic model checking [G]//Lecture Notes in Computer Science 4424. Berlin: Springer, 2007:72-86
  • 8Han T, Katoen J P. Providing evidence of likely being on time: Counterexample generation for CTMC model checking [G] //Lecture Notes in Computer Science 4762. Berlin: Springer, 2007:331-346
  • 9Kwiatkowska M, Norman G, Sproston J. Probabilistic model checking of the IEEE 802. 11 wireless local area network protocol [G] //Lecture Notes in Computer Science 2399. Berlin: Springer, 2002:169-187
  • 10Kwiatkowska M, Norman G, Sproston J. Probabilistic model checking of deadline properties in the IEEE 1394 FireWire root contention protocol[J]. Formal Aspects of Computing, 2003, 14(3): 295-318

二级参考文献12

  • 1李梦君,李舟军,陈火旺.基于进程代数安全协议验证的研究综述[J].计算机研究与发展,2004,41(7):1097-1103. 被引量:25
  • 2李梦君,李舟军,陈火旺.SPVT:一个有效的安全协议验证工具[J].软件学报,2006,17(4):898-906. 被引量:18
  • 3李梦君,李舟军,陈火旺.安全协议的扩展Horn逻辑模型及其验证方法[J].计算机学报,2006,29(9):1666-1678. 被引量:7
  • 4J Clark,J Jacob.A survey of authentication protocol literature:Version 1.0[OL].http://www.users.cs.york.ac.uk/-jac,1997
  • 5M Boreale.Symbolic trace analysis of cryptographic protocols[C].In:Proc of the 28th Int'l Conf on Automata,Language and Programming(ICALP'01),LNCS 2076.Berlin:Springer-Verlag,2001.667-681
  • 6D X Song.Athena:A new efficient automatic checker for security protocol analysis[C].The 12th IEEE Computer Security Foundation Workshop(CSFW12),Mordano,Italy,1999
  • 7M Abadi,B Blanchet.Analyzing security protocols with secrecy types and logic programs[C].In:Proc of the 29th ACM Symp on Principles of Programming Languages(POPL'02).New York:ACM Press,2002.33-44
  • 8B Blanchet.An efficient cryptographic protocol verifier based on Prolog rules[C].In:Proc of the 14th Computer Security Foundation Workshop(CSFW14).Los Alamitos,CA:IEEE Computer Society Press,2001.82-96
  • 9B Blanchet.From secrecy to authenticity in security protocols[C].In:Proc of the 9th Int'l Static Analysis Symposium(SAS'02),LNCS 2477.Berlin:Springer-Verlag,2002.242-259
  • 10Danny Dolev,Andrew C Yao.On the security of public-key protocols[C].IEEE Trans on Information Theory,1983,29(2):198-208

共引文献3

同被引文献39

  • 1陈火旺,王戟,董威.高可信软件工程技术[J].电子学报,2003,31(z1):1933-1938. 被引量:116
  • 2周颖,郑国梁,李宣东.面向模型检验的UML状态机语义[J].电子学报,2003,31(z1):2091-2095. 被引量:8
  • 3郭得科,任彦,陈洪辉,薛群威,罗雪山.一种QoS有保障的Web服务分布式发现模型[J].软件学报,2006,17(11):2324-2334. 被引量:53
  • 4Kwiatkowska M,Norman G,Parker D.Advances and Challenges of Probabilistic Model Checking[C] //Proc.48th Annual Allerton Conference on Communication,Control and Computing.Washington DC:IEEE Press,2010:1691 -1698.
  • 5Aljazzar H,Leue S.Extended directed search for probabilistic timed reachability[M].Lecture Notes in Computer Science 4202.Berlin:Springer,2006,33-51.
  • 6Han T,Katoen J P.Counterexamples in probabilistic model checking[M].Lecture Notes in Computer Science 4224.Berlin:Springer,2007,72 -86.
  • 7Han T,Katoen J P.Providing evidence of likely being on time:counterexample generation for CTMC model checking[M].Lecture Notes in Computer Science 4762.Berlin:Springer,2007:331 -346.
  • 8Damman B,Han T,Katoen J P.Regular expressions for PCTL counterexamples[C] //Proceedings of the 5th International Conference on the Quantitative Evaluation of Systems (QEST),2008:179-188.
  • 9Du D S,Ko K I.Problem solving in Automata,Languages and Complexity[M].New York:John Wiley and Sons,2001.
  • 10Kleene S C.Representation of Events in Nerve Nets and Finite Automata[M].Princeton,NJ:Princeton Univ.Press,1956:3.

引证文献6

二级引证文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部