model checking of high level specifications the lfp
play

Model Checking of High Level Specifications : The LfP Experience - PowerPoint PPT Presentation

Model Checking of High Level Specifications : The LfP Experience Frdric GILLIERS, Franois Brant, Denis Poitrenaud, Fabrice Kordon Introduction MOCA04 Aarhus 2 Laboratoire d'informatique de Paris 6 - UPMC Goal :


  1. Model Checking of High Level Specifications : The LfP Experience Frédéric GILLIERS, François Bréant, Denis Poitrenaud, Fabrice Kordon ���

  2. Introduction MOCA’04 Aarhus 2 Laboratoire d'informatique de Paris 6 - UPMC • Goal : develop reliable distributed systems • Distributed => asynchronous • Reliable => well defined, predictable behavior • Our proposal : • A specification language : L f P (Language For Protyping) • An associated model based methodology • This work is part of the MORSE project • Industry / academic cooperation project

  3. Development methodology MOCA’04 Aarhus 3 Laboratoire d'informatique de Paris 6 - UPMC • Separation of control and computational aspects • We focus on the control aspect

  4. LfP Main characteristics MOCA’04 Aarhus 4 Laboratoire d'informatique de Paris 6 - UPMC • Structured • Based on hierarchical automata • Component types (media / classes) • Instruction set dedicated to modeling protocols • Transparent to distribution • The specification’s behavior does not rely on the deployment • Three kinds of diagrams • Architecture diagram • Static aspect => components declaration • Behavioral diagram • Dynamic aspect => components behavior • Property diagram

  5. A simple LfP example (1) MOCA’04 Aarhus 5 Laboratoire d'informatique de Paris 6 - UPMC

  6. A simple LfP example (2): the class SERVER MOCA’04 Aarhus 6 Laboratoire d'informatique de Paris 6 - UPMC • One method “handle_request” • Formal parameter : numn value updated on method return (copy restore) • Infinite loop : • Wait for method call, execute method, back to initial state • One method : handle_request -> increments the actual parameter

  7. A simple LfP Example (3): The class CLIENT MOCA’04 Aarhus 7 Laboratoire d'informatique de Paris 6 - UPMC • Creates the communication media instance • Calls handle_request until the parameter is greater than 5

  8. A simple LfP example (4): The media RPC MOCA’04 Aarhus 8 Laboratoire d'informatique de Paris 6 - UPMC • Communication between client and server • Read activation message in the client’s binder • Send it to the server • Read the corresponding return message (among other messages) • Send it back to the client

  9. DDD: Data Decision Diagrams MOCA’04 Aarhus 9 Laboratoire d'informatique de Paris 6 - UPMC • Shared decision tree a • A priori unbounded integer domain for variables 1 4 • No variable ordering constraint • Variables may be repeated a • Three terminals : 2 1 • 0 (unaccepted) : not represented unless empty set b c • T (top: approximation): introduced to resolve variable ordering conflicts 1 3 3 • 1 (accepted) : all paths in a well-defined DDD lead to 1 1 T • Usual set theoretic operations offered

  10. DDD Operations: Inductive Homomorphisms MOCA’04 Aarhus 10 Laboratoire d'informatique de Paris 6 - UPMC • Algebraic properties : union : h+h', intersection: h*h', concatenation h.h', composition h o h' • Defined by : • Evaluation on terminal 1 -> constant DDD • Evaluation on a <variable,value> pair, i.e. an arc of the structure -> homomorphism to apply on son • By definition : • h(T) = T • h(0) = 0 • h(node) = sum of evaluation on all arcs • An Example :

  11. Set Constant Homomorphism Example (1/2) MOCA’04 Aarhus 11 Laboratoire d'informatique de Paris 6 - UPMC SetCst(a,1,2) + + DDD(a,1) DDD(a,2) DDD(a,1) DDD(a,2) a SetCst(a,1,2) SetCst(a,1,2) DDD(b,2) SetCst(a,1,2) 1 SetCst(a,1,2) b b b b a 2 2 2 2 a a a 3 a 1 3 3 3 3 1 1 1 1

  12. Set Constant Homomorphism Example (2/2) MOCA’04 Aarhus 12 Laboratoire d'informatique de Paris 6 - UPMC + DDD(a,1) + DDD(a,1) DDD(a,2) DDD(a,2) a DDD(b,2) SetCst(a,1,2) DDD(b,2) SetCst(a,1,2) 1 2 b b a + b DDD(a,1) DDD(a,2) 2 2 1 2 SetCst(a,1,2) SetCst(a,1,2) 2 a a 1 1 1 a 3 3 Cache Hit 1 2 1 1 1

  13. Verifying LfP Specifications MOCA’04 Aarhus 13 Laboratoire d'informatique de Paris 6 - UPMC • Verification requires : • Coding LfP States as DDDs => canonical representation • Coding LfP instruction as inductive homomophisms • Canonical representation of states • Unique representation of a given state • Avoids incompatibilities and allows fast comparison of states Global variables Shared binders Component Instances End Of State Begin Instance Instance marker Local variables Program Counter End Of Instance

  14. Computing the reachable states MOCA’04 Aarhus 14 Laboratoire d'informatique de Paris 6 - UPMC • Define an homomorphism for every LfP instruction • LfP transitions are implemented as composition of these homomorphisms • Fire a transition => apply the corresponding homomorphism • computation of the reachable states: • A specific homomorphism : MarkFireable • Marks all instances of a selected transition that can be fired • Every state reached by firing an instance of the selected transition are found • When all transitions have been tested, all states reachable from the current state have been computed • Deadlocks are easily detected (no fireable transition found) • Invariants /accessibility properties can be verified

  15. Conclusion And Future Work MOCA’04 Aarhus 15 Laboratoire d'informatique de Paris 6 - UPMC • We have achieved reachable state computation of LfP Specification • First step to CTL model checking • Due to the constrained environment, there’s a need for detailed models (for code generation) • There is a need for scalability • Hierarchical DDDs improve data sharing • There is a need for abstraction to reduce the complexity of the verification • Observation graph (only track states relevant to the property under verification) • Related work (MORSE project) • Java code generator (prototype) • UML2 profile suitable for automatic generation of LfP specifications

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend