bdd model checking
play

BDD MODEL CHECKING B I N A R Y D E C I S I O N D I A G R A M S - PowerPoint PPT Presentation

BDD MODEL CHECKING B I N A R Y D E C I S I O N D I A G R A M S Loc Massin University of Oslo INF5140 / Spring 2017 1 B ASIC M ODEL C HECKING P ROBLEM System describe by states. Basic approach : represent each state individually.


  1. BDD MODEL CHECKING B I N A R Y D E C I S I O N D I A G R A M S Loïc Massin University of Oslo INF5140 / Spring 2017 1

  2. B ASIC M ODEL C HECKING P ROBLEM System describe by states. Basic approach : represent each state individually.  Problem, size of the state space increases exponentially.  State Space Explosion.  Need too much memory;  Need too much time. 2

  3. O NE SOLUTION Symbolic model checking :  Idea: represent set of states by Boolean formula over Boolean variables. f : Bool n → Bool  Need efficient representation and manipulation for state sets and transition relation.  Use Binary Decision Diagrams 3

  4. B INARY D ECISION T REES  Directed acyclic graphs.  One or two Terminal nodes / Leaves: labelled with 0 or 1;  Set of variables nodes u of out-degree two:  Non-Terminal nodes: each are labelled with a variable var(u);  Branches / Children: low(v) / high(v), correspond to assignment of 0 or 1 for the variable in the node 4

  5. E XAMPLE OF BDT a b b c c c c 0 0 0 0 1 1 0 1 a ∧ (¬b ∨ c) Dashed lines denote low-branches, solid lines high-branches 5

  6. P ROBLEMS  Still exponential;  Several BDT can verify the same formula. a a ∧ (¬b ∨ c) b b c c c c a 0 0 0 0 1 1 0 1 b c c c b b 0 0 0 0 1 0 1 1 6

  7. B ASICS BDD PROPERTIES To move from BDT to BDD:  Merge terminal nodes; Ordered BDD (OBDD):  Define a variable ordering: on all paths from root to leafs, variables appear in same order, without repetitions (there exists a global ordering of variables). 7

  8. E XAMPLE OF OBDD a b b c c c c 0 0 0 0 0 1 1 1 a ∧ (¬b ∨ c) with ordering a < b < c 8

  9. R EDUCED O RDERED BDD (1) Uniqueness: no two distinct nodes v and w have the same variable name and low- and high- children.  Merge isomorphic subgraphs; Non-redundant tests : No variable node v has identical low- and high- children.  Remove redundancy. 9

  10. M ERGE ISOMORPHIC SUBGRAPHS a b b c c c c 0 0 0 0 0 1 1 1 a ∧ (¬b ∨ c) 10

  11. R EMOVE REDUNDANCY a b c 0 0 0 0 0 1 1 1 a ∧ (¬b ∨ c) 11

  12. ROBDD (2) Canonical (unique) representation of a Boolean formula for a particular variable order: For every function f : Bool n → Bool and variable ordering x 1 < x 2 < · · · < x n , there exists exactly one ROBDD representing this function. Equivalence checking in linear time, and satisfiability checking in constant time. Most of time, we will refer to ROBDD simply as BDDs. 12

  13. S ENSITIVITY TO V ARIABLE O RDERING (1) a1 a1 a2 a2 b1 a2 a3 a3 a3 a3 b2 b1 b1 b1 b1 a3 b2 b2 b3 b3 0 1 0 1 (a1 ∧ b1) ∨ (a2 ∧ b2) ∨ (a3 ∧ b3) 13

  14. S ENSITIVITY TO V ARIABLE O RDERING (2)  Two different variable ordering lead to tow different ROBDD.  Crucial importance in practice, determine the efficiency of ROBDD-based model checking.  Finding the best variable ordering is NP-hard . It exists several heuristics to approach the problem. 14

  15. T HE ALGORITHM APPLY (1)  If B f and B y are two OBDDs, the call apply(op, B f , B y ) computes the OBBD of the formula f op y.  Operates recursively on the structure of the two OBDDs:  We start at the root and follow parallel paths on the two OBDDs to the leaves;  Once we arrive at the leaves, we apply the given boolean operation to the boolean constants 0 and 1 to form the result for that particular path. 15

  16. T HE ALGORITHM APPLY (2) a a b b b 0 1 0 1 f(a,b) = a f(a,b) = b with a>b with a>b 16

  17. T HE ALGORITHM APPLY (2) a a b b b 0 1 0 1 a f(a,b) = a ∨ b b with a>b 0 17

  18. T HE ALGORITHM APPLY (2) a a b b b 0 1 0 1 a f(a,b) = a ∨ b b with a>b 0 1 18

  19. T HE ALGORITHM APPLY (2) a a b b b 0 1 0 1 a f(a,b) = a ∨ b b b with a>b 0 1 19

  20. T HE ALGORITHM APPLY (2) a a b b b 0 1 0 1 a f(a,b) = a ∨ b b b with a>b 0 1 20

  21. T HE ALGORITHM RESTRICT (1)  If B f is a OBDD, the call restrict(0, x, B f ) (respectively restrict(1, x, B f )) the OBDD for f [0/x] (respectively f [1/x]).  restrict(0, x, B f )  For each node v labeled with x:  Incoming edges are redirected to low(v);  Node v is removed.  restrict(1, x, B f )  As above but redirected to high(v). 21

  22. T HE ALGORITHM RESTRICT (1) a1 a1 a1 b1 b1 b1 a2 a2 a2 b2 b2 b2 a3 b3 b3 0 1 0 1 0 1 B f restrict(0, a3, B f) restrict(1, a3, B f) 22

  23. R EFERENCES  Henrik Reif Andersen, An Introduction to Binary Decision Diagrams. The IT University of Copenhagen, Fall 1999  Alessandro Artale, Formal Methods Lecture VI, Binary Decision Diagrams. http://www.inf.unibz.it/~artale/FM/slide7.pdf (visited on 05.17.2017)  A. Pnueli, Symbolic Model Checking. http://www.cs.nyu.edu/courses/spring07/G22.3033- 002/lecture6_h4.pdf (visited on 05.17.2017) 23

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend