共查询到20条相似文献,搜索用时 0 毫秒
1.
In this article we present the parallelisation of an explicit-state CTL* model checking algorithm for a virtual shared-memory high-performance parallel machine architecture. The algorithm uses a combination of private and shared data structures for implicit and dynamic load balancing with minimal synchronisation overhead. The performance of the algorithm and the impact that different design decisions have on the performance are analysed using both mathematical cost models and experimental results. The analysis shows not only the practicality and effective speedup of the algorithm, but also the main pitfalls of parallelising model checking for shared-memory architectures.
相似文献
Cornelia P. InggsEmail: |
2.
This paper proposes an automatic attack construction algorithm in order to find potential attacks on ecurity protocols.It is based on a dynamic strand space model,which enhances the original strand space model by introducing active nodes on strands so as to characterize the dynamic procedure of protocol execution.With exact causal dependency relations between messages considered in the model,this algorithm can avoid state space explo-sion caused by asynchronous composition.In order to get a finite state space,a new method called strand-added on demand is exploited,which extends a bundle in an incremental manner without requiring explicit configuration of protocol execution parameters.A finer granularity model of term structure is also introduced, in which subterms are divided into check subterms and data subterms .Moreover,data subterms can be further classified based on the compatible data subterm relation to obtain automatically the finite set of valid acceptable terms for an honest principal.In this algorithm,terms core is designed to represent the intruder‘s knowledge compactly,and forward search technology is used to simulate attack patterns easily.Using this algorithm,a new attack on the Dolve-Yao protocol can be found,which is even more harmful beeause the secret is revealed before the session terminates. 相似文献
3.
Rachid Hadjidj Hanifa Boucheneb 《International Journal on Software Tools for Technology Transfer (STTT)》2008,10(2):167-184
The state space explosion is still one of the most challenging problems in formal verification using enumerative techniques.
The challenge is even greater for real time systems whose state spaces are generally infinite due to time density. To use
enumerative techniques with these systems, their state spaces need to be contracted into finite structures that preserve properties
of interest. We propose in this paper an efficient approach to construct a contraction of the time Petri net model state space, which preserves its CTL* properties. 相似文献
4.
Mark Reynolds 《Formal Aspects of Computing》2011,23(6):739-779
We present a sound, complete and implementable tableau method for deciding satisfiability of formulas in the propositional
version of computation tree logic CTL*. This is the first such tableau. CTL* is an exceptionally important temporal logic
with applications from hardware design to agent reasoning, but there is no easily automated reasoning approach to CTL*. The
tableau here is a traditional tree-shaped or top-down style tableau, and affords the possibility of reasonably quick decisions
on the satisfiability of medium-sized formulas and construction of small models for them. A straightforward subroutine is
given for determining when looping allows successful branch termination, but much needed further development is left as future
work. In particular, a more general repetition prevention mechanism is needed to speed up the task of tableau construction. 相似文献
5.
Caseiro D. Trancoso I. 《IEEE transactions on audio, speech, and language processing》2006,14(4):1281-1291
This paper presents an algorithm for the composition of weighted finite-state transducers which is specially tailored to speech recognition applications: it composes the lexicon with the language model while simultaneously optimizing the resulting transducer. Furthermore, it performs these computations "on-the-fly" to allow easier management of the tradeoff between offline and online computation and memory. The algorithm is exact for local knowledge integration and optimization operations such as composition and determinization. Minimization and pushing operations are approximated. Our results have confirmed the efficiency of these approximations. 相似文献
6.
7.
8.
随着系统复杂性的增加,系统中的不确定信息亟待处理,状态爆炸问题也越来越严峻,现有的模型检测技术已不能完全适用于复杂系统的验证。
对可能性测度下CTL符号化模型检测进行了研究。首先用多终端二值决策图和布尔公式分别描述系统模型和待验证性质,然后再对系统模型进行归一化和简化,最后利用不动点计算完成系统验证。该研究是对可能性测度下的模型检测技术和符号化模型检测技术的整合,不但能处理系统的不确定信息,而且保持了符号化模型检测对计算时空要求低的优点,对于复杂系统模型检测具有重要意义。 相似文献
9.
Roberto Lucchi Mario Bravetti Roberto Gorrieri 《Electronic Notes in Theoretical Computer Science》2003,85(3):54-70
SecSpaces is a Linda-like coordination model whose aim is to provide a support for secure coordination in Open System applications. Substantially it provides a methodology to restrict the access to the objects stored in the shared dataspace. In this paper we introduce a formal language for representing systems interacting via SecSpaces primitives and its operational semantics. Moreover in this context we consider a notion of observational equivalence, namely testing equivalence. In order to evaluate the adequacy of the model for limiting the access to the shared dataspace, we present some examples of interaction protocols that can be used to obtain some security properties (e.g., authentication or privacy of a datum). 相似文献
10.
OFMC: A symbolic model checker for security protocols 总被引:5,自引:0,他引:5
David Basin Sebastian Mödersheim Luca Viganò 《International Journal of Information Security》2005,4(3):181-208
We present the on-the-fly model checker OFMC, a tool that combines two ideas for analyzing security protocols based on lazy, demand-driven search. The first is the use of lazy data types as a simple way of building efficient on-the-fly model checkers for protocols with very large, or even infinite, state spaces. The second is the integration of symbolic techniques and optimizations for modeling a lazy Dolev–Yao intruder whose actions are generated in a demand-driven way. We present both techniques, along with optimizations and proofs of correctness and completeness.Our tool is state of the art in terms of both coverage and performance. For example, it finds all known attacks and discovers a new one in a test suite of 38 protocols from the Clark/Jacob library in a few seconds of CPU time for the entire suite. We also give examples demonstrating how our tool scales to, and finds errors in, large industrial-strength protocols. 相似文献
11.
12.
Ranise Silvio Truong Anh Traverso Riccardo 《International Journal on Software Tools for Technology Transfer (STTT)》2016,18(5):559-573
International Journal on Software Tools for Technology Transfer - We explain how a parameterized model checking technique can be exploited to mechanize the analysis of access control policies. The... 相似文献
13.
14.
15.
Most of the timed automaton model checking algorithms explore state spaces by enumeration of time zones. The data structure called Difference Bound Matrix (DBM) is widely adopted to represent time zones because of its efficiency and simplicity. In this paper, we first present a quadratic-time algorithm to compute the canonical form of the conjunction of a canonical DBM and a time guard or a location invariant. Based on this algorithm, we present a quadratic-time DBM-based successor algorithm for timed automaton model checking. 相似文献
16.
17.
18.
19.
由于Blanchet安全协议一阶逻辑模型不能够给出易于理解的攻击序列,基于该安全协议一阶逻辑模型,对逻辑推理中的规则及合一化操作进行了分类,给出了操作置换规则,明确了改进系统中的一些关键性概念和命题。最后,以化简的Needham-Schroeder协议为例,对秘密性进行形式化验证,结果表明改进的系统能够给出易于理解的攻击序列。 相似文献