smt based function summarization for software verification
play

SMT-based Function Summarization for Software Verification Martin - PowerPoint PPT Presentation

SMT-based Function Summarization for Software Verification Martin Blicha Leonardo Alt Sepideh Asadi USI Ethereum USI Grigory Fedyukovich Antti Hyvrinen Natasha Sharygina Princeton USI USI University of Lugano(USI), Switzerland


  1. SMT-based Function Summarization for Software Verification Martin Blicha Leonardo Alt Sepideh Asadi USI Ethereum USI Grigory Fedyukovich Antti Hyvärinen Natasha Sharygina Princeton USI USI University of Lugano(USI), Switzerland

  2. Formal Verification in Lugano, Switzerland Model checking software (HiFrog, FunFrog, eVolCheck, LoopFrog), ANSI-C programs Interpolation-based Bounded Model Checking: - Propositional and First-order Interpolation [TACAS’19],[LPAR’13],[FMCAD’17], [CAV’15] - Function summarization [TACAS’17],[ATVA’12] - Theory and Summary Refinement [SAT’17], [LPAR’18] � 2

  3. Formal Verification in Lugano, Switzerland Boolean and Theory Reasoning (SAT/SMT): Solver, OpenSMT , combines MiniSAT2 SAT-Solver with state-of-the-art decision procedures for QF EUF, LRA, LIA, BV, RDL, IDL Extensible : the SAT-to-theory interface facilitates design and plug-in of new decision procedures Incremental : suitable for incremental verification Open-source : available under MIT license Parallelized : efficient search space partitioning Efficient : competitive open-source SMT Solver according to SMT-Comp. � 3

  4. Formal Verification in Lugano, Switzerland Efficient and adoptable-to-the-task decision procedures as computational engines of verification SMT-based Gas consumption estimation for smart contracts [LPAR’18] Incremental verification, Upgrade checking [STTT’17],[FMCAD’14],[TACAS’13] Integrated dynamic and static analysis [ISSTA’14] Model checking Ethereum smart contracts and mobile programs [ongoing] More info at: www.verify.inf.usi.ch � 4 � 4

  5. The cost of poor software From https://raygun.com/ “ 11 of the most costly software errors in history ”: Bitcoin Mt. Gox Hack: In 2011, the world’s largest bitcoin exchange, after being hacked, lost over 800,000 bitcoins – worth around half a billion dollars! ‣ Testing is not sufficient to find the bug (not exhaustive!) ‣ The strongest tool to defend against hacks is formal verification. [Makerdao white paper] � 5

  6. Program correctness Can we prove some properties ALWAYS hold in the program? � 6

  7. Program correctness Can we prove some properties ALWAYS hold in the program? In general, program verification is undecidable , but … under some conditions/restrictions, it can be turned into a decidable problem! � 6

  8. Automated formal verification: Model Checking [Clarke & Emerson 1981, Queille & Sifakis 1982] Pros Cons - Computationally + Mathematical and algorithmic way to verify expensive the program - State space explosion Exhaustive search on the problem + state space + Fully automatic Can guarantee the + absence of bugs � 7

  9. Advances in model checking Hardware Software ‣ Open Challenges! ‣ Well-established techniques • Large bit-widths • Finite size model • Dynamic memory • Based on bit-precise management • Unbounded recursion encoding • Domain-specific languages • Long development history • … � 8

  10. Symbolic model checking [McMillan 1993] SAT-based Model Checking [Biere et al. 1999] Formulas Program represent states *.c Safe Boolean *.h formulas Encoder SAT-solver Not assert (x >0) Safe Safety Property � 9

  11. Symbolic model checking [McMillan 1993] SAT-based Model Checking [Biere et al. 1999] Formulas Program represent states SAT-based Model Checking *.c Safe Boolean *.h formulas Encoder SAT-solver An excellent tool for many problem domains ︎ Very efficient SAT-solvers exist Not assert (x >0) Safe Very low-level language —> large formulations Safety Property Makes search space larger EXPENSIVE Sometimes even prevent from termination � 9

  12. Abstraction-based model checking [kurshan1994, Clarke et al. 2000] ‣ Problem : High complexity of software model checking ‣ Solution: ➡ Abstraction : Removes or simplifies details of the system that are irrelevant to the property under consideration � 10

  13. The paradigm of abstract-check-refine (CEGAR) [Clarke et al. 2000] � 11

  14. The paradigm of abstract-check-refine (CEGAR) [Clarke et al. 2000] C program success, No error! Initial Verification abstraction Failure Analyze the Refinement failure No Concretization If the abstract system is not correct, based on the validity of the counterexample, either Yes Error is returned or the abstraction is refined Error found! and the system iterates. � 11

  15. SMT The focus of this talk ‣ Satisfiability Modulo Theory (SMT) ‣ Deciding the satisfiability of a first-order logic over different theories ‣ SMT can create verification engines that can reason natively at a higher level of abstraction Program *.c Safe *.h SMT formulas Encoder SMT-solver (translation) Not assert (x >0) Safe Safety � 12 Property

  16. SMT vs. SAT encoding More expressive More compact More light-weight Efficient solving procedure � 13

  17. Hierarchy of different theories ‣ Equality Logic & Uninterpreted Functions (EUF) - Example: ( f ( x, y ) 6 = f ( u, v )) ^ ( x = u ) ^ ( y = v ) � 14

  18. <latexit sha1_base64="Bf2ZlUWvcHjUC79cvXdAOMz0NG8=">ACMHicbVBbS8MwGE29znmb+uhLcAgbwmhF0BdB9EfJ7gprGWk2bcaTNOapNS9pN8afoi4IivorzLqC1wOBk3O+Q/IdP+ZMadt+tiYmp6ZnZktz5fmFxaXlyspqW0WJpNCiEY/khU8UcCagpZnmcBFLIKHP4dy/Ohr5wOQikXiTKcxeCEJBOszSrSRupXjWna7lQ6xy+Ea27iO3RvoBYBrt/v218UVEGC3QHkjlMvaIrdYJSr17uVqt2wc+C/xClIFRVodisPbi+iSQhCU06U6jh2rL2MSM0oh2HZTRTEhF6RADqGChKC8rJ84SHeNEoP9yNpjtA4V78nMhIqlYa+mQyJvlS/vZH4n9dJdH/Py5iIEw2Cjh/qJxzrCI/awz0mgWqeGkKoZOavmF4Sag2HZdNCc7vlf+S9nbDsRvO6U714LCo4TW0QaqIQftogN0gpqohSi6Q4/oBb1a9aT9Wa9j0cnrCKzhn7A+vgEcyktA=</latexit> <latexit sha1_base64="Bf2ZlUWvcHjUC79cvXdAOMz0NG8=">ACMHicbVBbS8MwGE29znmb+uhLcAgbwmhF0BdB9EfJ7gprGWk2bcaTNOapNS9pN8afoi4IivorzLqC1wOBk3O+Q/IdP+ZMadt+tiYmp6ZnZktz5fmFxaXlyspqW0WJpNCiEY/khU8UcCagpZnmcBFLIKHP4dy/Ohr5wOQikXiTKcxeCEJBOszSrSRupXjWna7lQ6xy+Ea27iO3RvoBYBrt/v218UVEGC3QHkjlMvaIrdYJSr17uVqt2wc+C/xClIFRVodisPbi+iSQhCU06U6jh2rL2MSM0oh2HZTRTEhF6RADqGChKC8rJ84SHeNEoP9yNpjtA4V78nMhIqlYa+mQyJvlS/vZH4n9dJdH/Py5iIEw2Cjh/qJxzrCI/awz0mgWqeGkKoZOavmF4Sag2HZdNCc7vlf+S9nbDsRvO6U714LCo4TW0QaqIQftogN0gpqohSi6Q4/oBb1a9aT9Wa9j0cnrCKzhn7A+vgEcyktA=</latexit> <latexit sha1_base64="Bf2ZlUWvcHjUC79cvXdAOMz0NG8=">ACMHicbVBbS8MwGE29znmb+uhLcAgbwmhF0BdB9EfJ7gprGWk2bcaTNOapNS9pN8afoi4IivorzLqC1wOBk3O+Q/IdP+ZMadt+tiYmp6ZnZktz5fmFxaXlyspqW0WJpNCiEY/khU8UcCagpZnmcBFLIKHP4dy/Ohr5wOQikXiTKcxeCEJBOszSrSRupXjWna7lQ6xy+Ea27iO3RvoBYBrt/v218UVEGC3QHkjlMvaIrdYJSr17uVqt2wc+C/xClIFRVodisPbi+iSQhCU06U6jh2rL2MSM0oh2HZTRTEhF6RADqGChKC8rJ84SHeNEoP9yNpjtA4V78nMhIqlYa+mQyJvlS/vZH4n9dJdH/Py5iIEw2Cjh/qJxzrCI/awz0mgWqeGkKoZOavmF4Sag2HZdNCc7vlf+S9nbDsRvO6U714LCo4TW0QaqIQftogN0gpqohSi6Q4/oBb1a9aT9Wa9j0cnrCKzhn7A+vgEcyktA=</latexit> <latexit sha1_base64="Bf2ZlUWvcHjUC79cvXdAOMz0NG8=">ACMHicbVBbS8MwGE29znmb+uhLcAgbwmhF0BdB9EfJ7gprGWk2bcaTNOapNS9pN8afoi4IivorzLqC1wOBk3O+Q/IdP+ZMadt+tiYmp6ZnZktz5fmFxaXlyspqW0WJpNCiEY/khU8UcCagpZnmcBFLIKHP4dy/Ohr5wOQikXiTKcxeCEJBOszSrSRupXjWna7lQ6xy+Ea27iO3RvoBYBrt/v218UVEGC3QHkjlMvaIrdYJSr17uVqt2wc+C/xClIFRVodisPbi+iSQhCU06U6jh2rL2MSM0oh2HZTRTEhF6RADqGChKC8rJ84SHeNEoP9yNpjtA4V78nMhIqlYa+mQyJvlS/vZH4n9dJdH/Py5iIEw2Cjh/qJxzrCI/awz0mgWqeGkKoZOavmF4Sag2HZdNCc7vlf+S9nbDsRvO6U714LCo4TW0QaqIQftogN0gpqohSi6Q4/oBb1a9aT9Wa9j0cnrCKzhn7A+vgEcyktA=</latexit> Hierarchy of different theories ‣ Equality Logic & Uninterpreted Functions (EUF) - Example: ( f ( x, y ) 6 = f ( u, v )) ^ ( x = u ) ^ ( y = v ) ‣ Linear Real Arithmetic (LRA) - Example: ( x + y ≤ 0) ∧ ( x = 0) ∧ ( ¬ a ∨ ( x = 1) ∨ ( y ≥ 0)) � 14

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend