25 research outputs found

    Automated Reasoning and Natural Proofs for Programs Manipulating Data Structures

    Get PDF
    We consider the problem of automatically verifying programs that manipulate a dynamic heap, maintaining complex and multiple data-structures, given modular pre-post conditions and loop invariants. We discuss specification logics for heaps, and discuss two classes of automatic procedures for reasoning with these logics. The first identifies fragments of logics that admit completely decidable reasoning. The second is a new approach called the natural proof method that builds proof procedures for very expressive logics that are automatic and sound (but incomplete), and that embody natural proof tactics learnt from manual verification

    Reachability in Concurrent Uninterpreted Programs

    Get PDF
    We study the safety verification (reachability problem) for concurrent programs with uninterpreted functions/relations. By extending the notion of coherence, recently identified for sequential programs, to concurrent programs, we show that reachability in coherent concurrent programs under various scheduling restrictions is decidable by a reduction to multistack pushdown automata, and establish precise complexity bounds for them. We also prove that the coherence restriction for these various scheduling restrictions is itself a decidable property

    Analyzing temporal role based access control models

    No full text
    Today, Role Based Access Control (RBAC) is the de facto model used for advanced access control, and is widely deployed in diverse enterprises of all sizes. Several extensions to the authorization as well as the administrative models for RBAC have been adopted in recent years. In this paper, we consider the temporal extension of RBAC (TRBAC), and develop safety analysis techniques for it. Safety analysis is essential for understanding the implications of security policies both at the stage of specification and modification. Towards this end, in this paper, we first define an administrative model for TRBAC. Our strategy for performing safety analysis is to appropriately decompose the TRBAC analysis problem into multiple subproblems similar to RBAC. Along with making the analysis simpler, this enables us to leverage and adapt existing analysis techniques developed for traditional RBAC. We have adapted and experimented with employing two state of the art analysis approaches developed for RBAC as well as tools developed for software testing. Our results show that our approach is both feasible and flexible

    A magnetic susceptibility study of spin-state transitions in rare-earth trioxocobaltates(III)

    Get PDF
    Rare-earth trioxocobaltates(III), Ln[CoO3], with Ln=Pr, Nd, Tb, Dy, and Yb exhibit low-spin to high-spin transitions of cobalt characterised by a maximum in the Δχ−1 against temperature plots where Δχ is the cobalt contribution to the magnetic susceptibility. The susceptibility behaviour is distinct from that of La[CoO3] which shows a plateau in the χ−1-T curve accompanied by a structural transition. The temperature at which the Δχ−1-T curve shows a maximum increases with the decrease in the size of the rare-earth ion. The susceptibility behaviour of solid solutions of La1−xNdxCoO3 has been investigated to see how the behaviour characteristic of Nd[CoO3] changes to that of La[CoO3]

    A Robust Class of Context-Sensitive Languages

    No full text
    We define a new class of languages defined by multi-stack automata that forms a robust subclass of context-sensitive languages, with decidable emptiness and closure under boolean operations. This class, called multi-stack visibly pushdown languages (MVPLs), is defined using multi-stack pushdown automata with two restrictions: (a) the pushdown automaton is visible, i.e. the input letter determines the operation on the stacks, and (b) any computation of the machine can be split into k stages, where in each stage, there is at most one stack that is popped. MVPLs are an extension of visibly pushdown languages that captures noncontext free behaviors, and has applications in analyzing abstractions of multithreaded recursive programs, significantly enlarging the search space that can be explored for them. We show that MVPLs are closed under boolean operations, and problems such as emptiness and inclusion are decidable. We characterize MVPLs using monadic second-order logic over appropriate structures, and exhibit a Parikh theorem for them

    Analyzing recursive programs using a fixed-point calculus

    No full text
    We show that recursive programs where variables range over finite domains can be effectively and efficiently analyzed by describing the analysis algorithm using a formula in a fixed-point calculus. In contrast with programming in traditional languages, a fixed-point calculus serves as a high-level programming language to easily, correctly, and succinctly describe model-checking algorithms While there have been declarative high-level formalisms that have been proposed earlier for analysis problems (e.g., Datalog the fixed-point calculus we propose has the salient feature that it also allows algorithmic aspects to be specified.We exhibit two classes of algorithms of symbolic (BDD-based) algorithms written using this framework-- one for checking for errors in sequential recursive Boolean programs, and the other to check for errors reachable within a bounded number of context-switches in a concurrent recursive Boolean program. Our formalization of these otherwise complex algorithms is extremely simple, and spans just a page of fixed-point formulae. Moreover, we implement these algorithms in a tool called Getafix which expresses algorithms as fixed-point formulae and evaluates them efficiently using a symbolic fixed-point solver called Mucke. The resulting model-checking tools are surprisingly efficient and are competitive in performance with mature existing tools that have been fine-tuned for these problems

    A Magnetic Susceptibility Study of Spin-state Transitions in Rare-earth TrioxocobaItates( III)

    No full text
    Rare-earth trioxocobaltates(lll), Ln[CoO,], with Ln = Pr, Nd, Tb, Dy. and Yb exhibit low-spin to high-spin transitions of cobalt characterised by a maximum in the Ax-l against temperature plots where Ax is the cobalt contribution to the magnetic susceptibility. The susceptibility behaviour is distinct from that of La[CoO,] which shows a plateau in the x-I-T curve accompanied by a structural transition. The temperature at which the AX- I-T curve shows a maximum increases with the decrease in the size of the rare-earth ion. The susceptibility behavior of solid solutions of La,,Nd,CoO, has been investigated to see how the behaviour characteristic of Nd[CoO,] changes to that of La[CoO,]
    corecore