Symbolic Logic
Appendix E
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-1
Symbolic Logic Appendix E Computer Security: Art and Science, 2 nd - - PowerPoint PPT Presentation
Symbolic Logic Appendix E Computer Security: Art and Science, 2 nd Edition Version 1.1 Slide E-1 Outline Propositional logic Mathematical induction Predicate logic Temporal logic systems CTL Computer Security: Art and
Appendix E
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-1
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-2
be true or false but not both
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-3
conclusion (formula) we want to establish
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-4
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-5
introduction rule)
conclude Q; then we assume q and conclude Q. Given p ∨ q and these two proofs, we can infer Q (disjunction elimination rule)
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-6
Then we can conclude p → q (implication introduction)
ponens; also implication elimination)
introduction)
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-7
negation introduction)
negation elimination)
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-8
tollens)
p→q. Then q holds. But this is impossible, so our assumption (that p is true) must be false (reductio ad absurdum or proof by contradiction)
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-9
parentheses
defined inductively
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-10
p q p ⋀ q p ⋁ q p → q ¬p T T T T T T T F F T F F F T F T T T F F F F T T
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-11
!1, . . . !n ⊢ "
hold
table values. If " evaluates to true whenever !1, . . . !n evaluate to true, this is denoted !1, . . . !n ⊨ "
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-12
Soundness Theorem: Let !1, . . . !n and " be propositional logic
premises and conclusion are semantically equivalent Completeness Theorem: Let !1, . . . !n and " be propositional logic
there is a natural deduction proof for the sequent.
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-13
We want to prove a property M(n) holds for all natural numbers n We proceed as follows:
Then M(n) is true for all natural numbers n.
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-14
!(!#$) &
. BASIS: M(1) =
$($#$) &
=
$(&) & = & & = 1, which is clearly true
INDUCTION HYPOTHESIS: For n = 1, . . ., k, M(k) is true INDUCTION STEP: Consider M(k+1) = 1 + . . . + k + (k+1) 1 + . . . + k + (k+1) =
'('#$) &
+ (k+1) induction hypothesis (continued on next slide)
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-15
1 + . . . + k + (k+1) =
!(!#$) &
+ (k+1) induction hypothesis =
!' & + ! & + &! & + & &
expanding terms =
!'#(!#& &
combining terms =
(!#$)(!#&) &
factoring the numerator =
!#$ [ !#$ #$] &
combining terms which is M(k+1), completing the proof
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-16
applies to
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-17
∀ xF(x) -> (∃ y (D(y) ∧ C(x, y))) says that “every file is contained in a directory”
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-18
t1, . . . , tn defined over the set of functions, then p(t1, . . . , tn) is a formula
formulas
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-19
replace the x in !(x) by any term t that is free in !(x)
with x a free variable, then you can derive ∀x !(x)
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-20
Introduce notion of time into logic system
universes”) Systems view time as:
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-21
“U”, until some future state
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-22
A[#U$], E[#U$], AG#, EG#, AF#, and EF# are also formulas
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-23
function, and L : S ➝ %(atoms)
& holds in state s, we write this as M,s ⊨ &, and say that state s of model M satisfies formula &.
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-24
M model, s, s1, . . . states of M, p atomic proposition of M, !, !1, !2 CTL formulas
conversely, if p not in that set, then p does not hold in state s
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-25
{both formulas, either formula} on the right
the second formula, or neither formula
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-26
implied by the original state also satisfies the formula
∀si on the path, [M, si ⊨ "]
s1 and ∀si on the path, [M, si ⊨ "]
beginning at the original state satisfies the formula
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-27
and ∃si [M, si ⊨ "]
path of transitions beginning at the original state contains at least one state that satisfies the formula
and ∃si on the path [M, si ⊨ "]
path of transitions beginning at the original state satisfies the formula
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-28
∃i [i ≥ 0 ∧ si ⊨ "2 and [∀j [0 ≤ j < i ➝ sj ⊨ "1]]
path of transitions beginning at the original state has a state satisfying the second formula and all previous states in that path satisfy the first formula
∃i [i ≥ 0 ∧ si ⊨ "2 and [∀j [0 ≤ j < i ➝ sj ⊨ "1]]
every path of transitions beginning at the original state has a state satisfying the second formula and all previous states in that path satisfy the first formula
Version 1.1 Computer Security: Art and Science, 2nd Edition Slide E-29