Semantic guidance for unbounded symbolic reachability Martin Suda - - PowerPoint PPT Presentation

semantic guidance for unbounded symbolic reachability
SMART_READER_LITE
LIVE PREVIEW

Semantic guidance for unbounded symbolic reachability Martin Suda - - PowerPoint PPT Presentation

Semantic guidance for unbounded symbolic reachability Martin Suda Max Planck Institute fr Informatik VTSA 2012 b b b b b b b b b b b b Symbolic reachability The algorithm Conclusion Transition system ? G I Reachability Does


slide-1
SLIDE 1

Semantic guidance for unbounded symbolic reachability

Martin Suda

Max Planck Institute für Informatik

VTSA 2012

slide-2
SLIDE 2

Symbolic reachability The algorithm Conclusion

Transition system

b b b b b b b b b

I G

b b b

?

Reachability

Does there exist a finite path from an I-state to a G-state?

VTSA 2012 1/6

slide-3
SLIDE 3

Symbolic reachability The algorithm Conclusion

Symbolically represented transition system

b b b b b b b b b

I G

b

→ = {(s, s′) | (s, s′) | = τ}

b b

? I = {s | s | = ϕ} G = {s | s | = ψ} S = (Σ, ϕ, τ, ψ) Σ ...prop. signature ϕ ...fla over Σ ψ ...fla over Σ τ ...fla over Σ ∪ Σ′

Reachability

Does there exist a finite path from an I-state to a G-state?

VTSA 2012 1/6

slide-4
SLIDE 4

Symbolic reachability The algorithm Conclusion

Fixed length reachability via SAT

Does there exist a path from an I-state to a G-state of length k? We can use a SAT-solver to answer such question:

VTSA 2012 2/6

slide-5
SLIDE 5

Symbolic reachability The algorithm Conclusion

Fixed length reachability via SAT

Does there exist a path from an I-state to a G-state of length k? We can use a SAT-solver to answer such question:

Σ Σ′ Σ(2) Σ(k) ...

VTSA 2012 2/6

slide-6
SLIDE 6

Symbolic reachability The algorithm Conclusion

Fixed length reachability via SAT

Does there exist a path from an I-state to a G-state of length k? We can use a SAT-solver to answer such question:

Σ Σ′ Σ(2) Σ(k) ... τ

VTSA 2012 2/6

slide-7
SLIDE 7

Symbolic reachability The algorithm Conclusion

Fixed length reachability via SAT

Does there exist a path from an I-state to a G-state of length k? We can use a SAT-solver to answer such question:

Σ Σ′ Σ(2) Σ(k) ... τ τ τ τ τ τ τ τ τ

VTSA 2012 2/6

slide-8
SLIDE 8

Symbolic reachability The algorithm Conclusion

Fixed length reachability via SAT

Does there exist a path from an I-state to a G-state of length k? We can use a SAT-solver to answer such question:

Σ Σ′ Σ(2) Σ(k) ... τ τ τ τ τ τ τ τ τ ϕ ψ

VTSA 2012 2/6

slide-9
SLIDE 9

Symbolic reachability The algorithm Conclusion

Fixed length reachability via SAT

Does there exist a path from an I-state to a G-state of length k? We can use a SAT-solver to answer such question:

Σ Σ′ Σ(2) Σ(k) ... τ τ τ τ τ τ τ τ τ ϕ ψ

Now just run the solver: A push button technology!

VTSA 2012 2/6

slide-10
SLIDE 10

Symbolic reachability The algorithm Conclusion

Fixed length reachability via SAT

Does there exist a path from an I-state to a G-state of length k? We can use a SAT-solver to answer such question:

Σ Σ′ Σ(2) Σ(k) ... τ τ τ τ τ τ τ τ τ ϕ ψ

Now just run the solver: A push button technology!

Bounded model checking

Iterate the above for increasing values of k = 0, 1, 2, . . . If one of them is SAT, we have an answer! But how do we know when to terminate in the other case?

VTSA 2012 2/6

slide-11
SLIDE 11

Symbolic reachability The algorithm Conclusion

Opening the blackbox

We need more control over what’s happening inside the solver Let’s control the way the model is constructed:

τ τ τ τ τ τ τ τ τ ϕ ψ

b b b b b

VTSA 2012 3/6

slide-12
SLIDE 12

Symbolic reachability The algorithm Conclusion

Opening the blackbox

We need more control over what’s happening inside the solver Let’s control the way the model is constructed:

τ τ τ τ τ τ τ τ τ ϕ ψ

b b b b b

VTSA 2012 3/6

slide-13
SLIDE 13

Symbolic reachability The algorithm Conclusion

Opening the blackbox

We need more control over what’s happening inside the solver Let’s control the way the model is constructed:

τ τ τ τ τ τ τ τ τ ϕ ψ

b b b b b

VTSA 2012 3/6

slide-14
SLIDE 14

Symbolic reachability The algorithm Conclusion

Opening the blackbox

We need more control over what’s happening inside the solver Let’s control the way the model is constructed:

τ τ τ τ τ τ τ τ τ ϕ ψ

b b b b b

VTSA 2012 3/6

slide-15
SLIDE 15

Symbolic reachability The algorithm Conclusion

Opening the blackbox

We need more control over what’s happening inside the solver Let’s control the way the model is constructed:

τ τ τ τ τ τ τ τ τ ϕ ψ

b b b b b

VTSA 2012 3/6

slide-16
SLIDE 16

Symbolic reachability The algorithm Conclusion

Opening the blackbox

We need more control over what’s happening inside the solver Let’s control the way the model is constructed:

τ τ τ τ τ τ τ τ τ ϕ ψ

b b b b b

?

b b

VTSA 2012 3/6

slide-17
SLIDE 17

Symbolic reachability The algorithm Conclusion

Opening the blackbox

We need more control over what’s happening inside the solver Let’s control the way the model is constructed:

τ τ τ τ τ τ τ τ τ ϕ ψ

b b b b b

{C}

If the model cannot be extended, a conflict clause is derived,

VTSA 2012 3/6

slide-18
SLIDE 18

Symbolic reachability The algorithm Conclusion

Opening the blackbox

We need more control over what’s happening inside the solver Let’s control the way the model is constructed:

τ τ τ τ τ τ τ τ τ ϕ ψ

b b b b b

{C}

If the model cannot be extended, a conflict clause is derived, which forces the search to take a different path.

VTSA 2012 3/6

slide-19
SLIDE 19

Symbolic reachability The algorithm Conclusion

Opening the blackbox

We need more control over what’s happening inside the solver Let’s control the way the model is constructed:

τ τ τ τ τ τ τ τ τ ϕ ψ

b b b b b

{C}

b b b b b

If the model cannot be extended, a conflict clause is derived, which forces the search to take a different path. As with BMC we either finish with the full model,

VTSA 2012 3/6

slide-20
SLIDE 20

Symbolic reachability The algorithm Conclusion

Opening the blackbox

We need more control over what’s happening inside the solver Let’s control the way the model is constructed:

... {D, E} τ τ τ τ τ τ τ τ τ ϕ ψ

b b b b b

{C} {⊥} ...

If the model cannot be extended, a conflict clause is derived, which forces the search to take a different path. As with BMC we either finish with the full model,

  • r discover inconsistency in a form of the empty clause ⊥.

VTSA 2012 3/6

slide-21
SLIDE 21

Symbolic reachability The algorithm Conclusion

Dependency

We say that a conflict clause C depends on another clause D if D was used as an assumption in the proof of C.

VTSA 2012 4/6

slide-22
SLIDE 22

Symbolic reachability The algorithm Conclusion

Dependency

We say that a conflict clause C depends on another clause D if D was used as an assumption in the proof of C.

Dependency in action

Typically, the empty clause depends both on ϕ and ψ in our runs,

  • therwise we can directly terminate with UNSAT:

VTSA 2012 4/6

slide-23
SLIDE 23

Symbolic reachability The algorithm Conclusion

Dependency

We say that a conflict clause C depends on another clause D if D was used as an assumption in the proof of C.

Dependency in action

Typically, the empty clause depends both on ϕ and ψ in our runs,

  • therwise we can directly terminate with UNSAT:

Empty clause depending only on ϕ: there is no path of length k starting in a ϕ-state. Empty clause depending only on ψ: there is no path of length k ending in a ψ-state. Empty clause depending on neither: there is no path of lenght k.

VTSA 2012 4/6

slide-24
SLIDE 24

Symbolic reachability The algorithm Conclusion

Defining layers

Let Li be the set of clauses that depend on ψ and were inserted j steps before the goal formula ψ.

τ τ τ τ τ τ τ τ τ ϕ ψ L0 L1 L2 Lk . . .

VTSA 2012 5/6

slide-25
SLIDE 25

Symbolic reachability The algorithm Conclusion

Defining layers

Let Li be the set of clauses that depend on ψ and were inserted j steps before the goal formula ψ.

τ τ τ τ τ τ τ τ τ ϕ ψ L0 L1 L2 Lk . . .

Properties of layers

(Li)′ ∧ τ | = Li+1 (The way they get derived.) Li ∧ ϕ | = ⊥ (That’s how it ended when k = i.) Once Li = Lj for i = j, the whole instance is UNSAT. (Cut and paste argmument over the proof.)

VTSA 2012 5/6

slide-26
SLIDE 26

Symbolic reachability The algorithm Conclusion

Summary of the method

SAT-solver builds a model path for left to right Failure to proceed is recorded as a clause at that position Repeating pattern of such clauses entails overall UNSAT

VTSA 2012 6/6

slide-27
SLIDE 27

Symbolic reachability The algorithm Conclusion

Summary of the method

SAT-solver builds a model path for left to right Failure to proceed is recorded as a clause at that position Repeating pattern of such clauses entails overall UNSAT

Related work

BMC [Biere, Cimatti, Clarke, Zhu 1999] k-induction [Sheeran, Singh, Stålmarck 2000] Interpolation [McMillan 2003] IC3/PDR [Bradley 2011]

VTSA 2012 6/6

slide-28
SLIDE 28

Symbolic reachability The algorithm Conclusion

Summary of the method

SAT-solver builds a model path for left to right Failure to proceed is recorded as a clause at that position Repeating pattern of such clauses entails overall UNSAT

Related work

BMC [Biere, Cimatti, Clarke, Zhu 1999] k-induction [Sheeran, Singh, Stålmarck 2000] Interpolation [McMillan 2003] IC3/PDR [Bradley 2011]

Thank you for attention

Comments? Questions? Suggestions?

VTSA 2012 6/6