111 research outputs found
Lazy Reachability Analysis in Distributed Systems
We address the problem of reachability in distributed systems, modelled as networks of finite automata and propose and prove a new algorithm to solve it efficiently in many cases. This algorithm allows to decompose the reachability objective among the components, and proceeds by constructing partial products by lazily adding new components when required. It thus constructs more and more precise over-approximations of the complete product. This permits early termination in many cases, in particular when the objective is not reachable, which often is an unfavorable case in reachability analysis. We have implemented this algorithm in an early prototype and provide some very encouraging experimental results
Formal Verification of Real-time Systems with Preemptive Scheduling
International audienceIn this paper, we propose a method for the verification of timed properties for real-time systems featuring a preemptive scheduling policy: the system, modeled as a scheduling time Petri net, is first translated into a linear hybrid automaton to which it is time-bisimilar. Timed properties can then be verified using HyTech. The efficiency of this approach leans on two major points: first, the translation features a minimization of the number of variables (clocks) of the resulting automaton, which is a critical parameter for the efficiency of the ensuing verification. Second, the translation is performed by an over-approximating algorithm, which is based on Difference Bound Matrix and therefore efficient, that nonetheless produces a time-bisimilar automaton despite the over-approximation. The proposed modeling and verification method are generic enough to account for many scheduling policies. In this paper, we specifically show how to deal with Fixed Priority and Earliest Deadline First policies, with the possibility of using Round-Robin for tasks with the same priority. We have implemented the method and give some experimental results illustrating its efficiency
Integrated Model-checking for the Design of Safe and Efficient Distributed Software Commissioning
International audienc
Parameter Synthesis for Parametric Interval Markov Chains
AELOS_HCERES2020, STR_HCERES2020Interval Markov Chains (IMCs) are the base of a classic probabilistic specification theory introduced by Larsen and Jonsson in 1991. They are also a popular abstraction for probabilistic systems. In this paper we study parameter synthesis for a parametric extension of Interval Markov Chains in which the endpoints of intervals may be replaced with parameters. In particular, we propose constructions for the synthesis of all parameter values ensuring several properties such as consistency and consistent reachability in both the existential and universal settings with respect to implementations. We also discuss how our constructions can be modified in order to synthesise all parameter values ensuring other typical properties
Dense Integer-Complete Synthesis for Bounded Parametric Timed Automata
Ensuring the correctness of critical real-time systems, involving concurrent
behaviors and timing requirements, is crucial. Timed automata extend
finite-state automata with clocks, compared in guards and invariants with
integer constants. Parametric timed automata (PTAs) extend timed automata with
timing parameters. Parameter synthesis aims at computing dense sets of
valuations for the timing parameters, guaranteeing a good behavior. However, in
most cases, the emptiness problem for reachability (i.e., whether the emptiness
of the parameter valuations set for which some location is reachable) is
undecidable for PTAs and, as a consequence, synthesis procedures do not
terminate in general, even for bounded parameters. In this paper, we introduce
a parametric extrapolation, that allows us to derive an underapproximation in
the form of linear constraints containing not only all the integer points
ensuring reachability, but also all the (non-necessarily integer) convex
combinations of these integer points, for general PTAs with a bounded parameter
domain. We also propose two further algorithms synthesizing parameter
valuations guaranteeing unavoidability, and preservation of the untimed
behavior w.r.t. a reference parameter valuation, respectively. Our algorithms
terminate and can output constraints arbitrarily close to the complete result.
We demonstrate their applicability and efficiency using the tool Rom\'eo on two
classical benchmarks.Comment: This is an extended version of the paper by the same authors
published in the proceedings of the 9th International Workshop on
Reachability Problems (RP 2015
Coverability Synthesis in Parametric Petri Nets
We study Parametric Petri Nets (PPNs), i.e., Petri nets for which some arc weights can be parameters. In that setting, we address a problem of parameter synthesis, which consists in computing the exact set of values for the parameters such that a given marking is coverable in the instantiated net.
Since the emptiness of that solution set is already undecidable for general PPNs, we address a special case where parameters are used only as input weights (preT-PPNs), and consequently for which the solution set is
downward-closed. To this end, we invoke a result for the representation of
upward closed set from Valk and Jantzen.
To use this procedure, we show we need to decide universal coverability,
that is decide if some marking is coverable for every possible values of the parameters.
We therefore provide a proof of its EXPSPACE-completeness,
thus settling the previously open problem of its decidability.
We also propose an adaptation of this reasoning to the case of
parameters used only as output weights (postT-PPNs).
In this case, the condition to use this procedure can be reduced to the decidability of the existential coverability,
that is decide if there exists values of the parameters making a given marking coverable.
This problem is known decidable but we provide here a cleaner proof, providing its EXPSPACE-completeness, by reduction to Omega Petri Nets
Configuring Timing Parameters to Ensure Execution-Time Opacity in Timed Automata
Timing information leakage occurs whenever an attacker successfully deduces
confidential internal information by observing some timed information such as
events with timestamps. Timed automata are an extension of finite-state
automata with a set of clocks evolving linearly and that can be tested or
reset, making this formalism able to reason on systems involving concurrency
and timing constraints. In this paper, we summarize a recent line of works
using timed automata as the input formalism, in which we assume that the
attacker has access (only) to the system execution time. First, we address the
following execution-time opacity problem: given a timed system modeled by a
timed automaton, given a secret location and a final location, synthesize the
execution times from the initial location to the final location for which one
cannot deduce whether the secret location was visited. This means that for any
such execution time, the system is opaque: either the final location is not
reachable, or it is reachable with that execution time for both a run visiting
and a run not visiting the secret location. We also address the full
execution-time opacity problem, asking whether the system is opaque for all
execution times; we also study a weak counterpart. Second, we add timing
parameters, which are a way to configure a system: we identify a subclass of
parametric timed automata with some decidability results. In addition, we
devise a semi-algorithm for synthesizing timing parameter valuations
guaranteeing that the resulting system is opaque. Third, we report on problems
when the secret has itself an expiration date, thus defining expiring
execution-time opacity problems. We finally show that our method can also apply
to program analysis with configurable internal timings.Comment: In Proceedings TiCSA 2023, arXiv:2310.18720. This invited paper
mainly summarizes results on opacity from two recent works published in ToSEM
(2022) and at ICECCS 2023, providing unified notations and concept names for
the sake of consistency. In addition, we prove a few original results absent
from these work
Comparison of Different Semantics for Time Petri Nets
International audienceIn this paper we study the model of Time Petri Nets (TPNs) where a time interval is associated with the firing of a transition, but we extend it by considering general intervals rather than closed ones. A key feature of timed models is the memory policy, i.e. which timing informations are kept when a transition is fired. The original model selects an \emphintermediate semantics where the transitions disabled after consuming the tokens, as well as the firing transition, are reinitialised. However this semantics is not appropriate for some applications. So we consider here two alternative semantics: the \emphatomic and the \emphpersistent atomic ones. First we present relevant patterns of discrete event systems which show the interest of these semantics. Then we compare the expressiveness of the three semantics w.r.t. the weak time bisimilarity establishing inclusion results in the general case. Furthermore we show that some inclusions are strict with unrestricted intervals even when nets are bounded. Then we focus on bounded TPNs with upper-closed intervals and we prove that the semantics are equivalent. Finally taking into account both the practical and the theoretical issues, we conclude that persistent atomic semantics should be preferred
- …