SlideShare a Scribd company logo
1 of 29
Download to read offline
Budapest University of Technology and Economics
Departmentof Measurementand Information Systems
Extensions to the CEGAR
Approach on Petri Nets
Ákos Hajdu1, András Vörös1, Tamás Bartha2, Zoltán Mártonka1
1 Department Of Measurement and Information Systems
Budapest University of Technology and Economics, Budapest, Hungary
2 MTA SZTAKI, Budapest, Hungary
Outline of the talk
1. Introduction
2. CEGAR approach on Petri nets
3. Theoretical results
4. Algorithmic contributions
5. Evaluation
6. Conclusion
Introduction – Formal methods
 Complex, distributed, safety-critical systems
o Suitability and faultlessness is important
o Mathematically precise verification is required
o Formal modeling and analysis can provide such tools
Specification
System design
Modeling
Formal verification
Discovered faults
Requirements
Introduction – Petri nets
 Petri nets
o Widely used modeling formalism
o Asynchronous, distributed, parallel,
non-deterministic systems
 Structure
o Bipartite graph
• Places, transitions, weighted arcs, tokens
 Dynamic behavior
o State: distribution of tokens (marking)
o Firing of a transition: consumes and produces tokens
Introduction – Reachability analysis
 Reachability analysis
o Formal verification technique
o Checks, if a given state is reachable from the initial
state
o Drawback: complexity
 Complexity
o State space can be large or infinite
o Reachability is decidable, but at least EXPSPACE-hard
o A possible solution is to use abstraction
CEGAR approach
 CounterExample Guided Abstraction Refinement
o General approach
• Can handle large or infinite state space
o Works on an abstraction of the original model
• Less detailed state space
• Finite, smaller representation
o Abstraction refinement is required
• An action in the abstract model may not be realizable in the
original model
• Refine the abstraction using the information from the
explored part of the state space
CEGAR approach on Petri nets
 Abstraction of Petri nets: state equation
m0 + Cx = m1
Initial
abstraction
Reachability
problem
State
equation
Initial state Target state
Firing count
of transitions
(unknown)
Incidence matrix
Initial
abstraction
Reachability
problem
State
equation
CEGAR approach on Petri nets
 Verification of the abstract model
o Solving the state equation for the
firing count of transitions
o Integer Linear Programming problem
o Necessary, but not sufficient criterion for reachability
Verify the
abstract model
Not reachable
No solution
m0 + Cx = m1
CEGAR approach on Petri nets
 Examining the solution
o Bounded exploration of the state space
Initial
abstraction
Verify the
abstract modelReachability
problem
State
equation
Not reachable
No solution
Examine the
solution
Reachable
Solution
Realizable
CEGAR approach on Petri nets
 Abstraction refinement
o Exclude the counterexample without
losing any realizable solution
o Constraints can be added to the state equation
• The state equation may become infeasible
• A new solution can be obtained
o Traversing the solution space instead of the state space
Initial
abstraction
Verify the
abstract model
Examine the
solutionReachability
problem
State
equation
Not reachable Reachable
No solution
Solution
Realizable
Refine the
abstraction Not realizableConstraints
CEGAR approach on Petri nets
 Traversing the solution space
o Base vector + linear combination of invariants
o Constraint types:
• Jump: obtain another base vector
• Increment: obtain non-minimal
solutions
Initial
abstraction
Verify the
abstract model
Examine the
solutionReachability
problem
State
equation
Not reachable Reachable
No solution
Solution
Realizable
Refine the
abstraction Not realizableConstraints
Our work
 Examination of the algorithm
o Correctness
o Completeness
 Improving the algorithm
o Extending the set of decidable problems
o New criterion for termination
 Extending the algorithm
o Solving submarking coverability
o Handling inhibitor arcs
Correctness of the algorithm
 The CEGAR method is proved to be correct, but:
 A heuristic is used to calculate the constraints
o Uses only information from maximal firing sequences
• This information may not be enough
o The algorithm may over-estimate the
constraints
• … and give an incorrect answer
Correctness of the algorithm
 We proved the incorrectness of the heuristic by a
counterexample
 In our improved algorithm:
o We use the information of intermediate states
o Detect the over-estimation and do not give an
incorrect answer
Our work
 Examination of the algorithm
o Correctness
o Completeness
 Improving the algorithm
o Extending the set of decidable problems
o New criterion for termination
 Extending the algorithm
o Solving submarking coverability
o Handling inhibitor arcs
Completeness of the algorithm
 The algorithm is incomplete due to
its iteration strategy
o An invariant is added to the solution
which can be fired, but does not help
• The same states are reached
 the same invariant is added again
o This solution is skipped to avoid non-termination
• In some cases using another invariant would help
o We proved this by counterexamples
Our work
 Examination of the algorithm
o Correctness
o Completeness
 Improving the algorithm
o Extending the set of decidable problems
o New criterion for termination
 Extending the algorithm
o Solving submarking coverability
o Handling inhibitor arcs
Algorithmic contributions - Improvements
 When a solution is skipped...
o …the algorithm checks if any intermediate
state can lead to a realizable solution
o Not all important states are recognized, due to …
• … the ordering of the states
• … optimizations
 We defined a total ordering on the intermediate states
o Every state closer to a realizable solution
is recognized
o  Extends the set of decidable problems
Our work
 Examination of the algorithm
o Correctness
o Completeness
 Improving the algorithm
o Extending the set of decidable problems
o New criterion for termination
 Extending the algorithm
o Solving submarking coverability
o Handling inhibitor arcs
Algorithmic contributions - Improvements
 We developed a new termination criterion
o Before applying a constraint, a modified form of the
state equation is checked
o Constraints that cannot help, can be detected before
applying them
 Advantages
o Cuts the search space efficiently
o Can prevent non-termination
• We proved that no realizable solution is lost
•  Extends the set of decidable problems
Our work
 Examination of the algorithm
o Correctness
o Completeness
 Improving the algorithm
o Extending the set of decidable problems
o New criterion for termination
 Extending the algorithm
o Solving submarking coverability
o Handling inhibitor arcs
Algorithmic contributions - Extensions
 Submarking coverability problem
o Linear conditions are given (instead of the target state)
o Checks, if a state can be reached, for which the given
conditions hold
 Solving submarking coverability using CEGAR
o We transformed the conditions on the state to
conditions on transitions  ILP problem
 New types of problems can be analyzed
o Analysis of subsystems
o Reachability of infinite set of states
Our work
 Examination of the algorithm
o Correctness
o Completeness
 Improving the algorithm
o Extending the set of decidable problems
o New criterion for termination
 Extending the algorithm
o Solving submarking coverability
o Handling inhibitor arcs
Algorithmic contributions - Extensions
 Inhibitor arcs
o Petri nets extended with inhibitor
arcs are Turing complete
o The reachability problem in general is undecidable
 Handling inhibitor arcs in the CEGAR approach
o We introduced new types of constraints
o We extended the total ordering on intermediate states
o Completenes cannot be guaranteed, but we tested the
algorithm on several Petri nets
Evaluation
Evaluation
 We implemented our algorithm
o PetriDotNet framework
• Modeling and analysis of Petri nets
• Supports add-ins
 We compared our algorithm to…
o … the original implementation
• SARA tool
• Won several categories at the model checking contest 2013
o … the saturation algorithm
• Other type of reachability analysis method
• Implemented in the PetriDotNet framework
Evaluation
Model SARA tool Our algorithm
CP_NR 10 0,2 s 0,5 s
CP_NR 25 111 s 2 s
CP_NR 50 TO 16 s
Kanban 1000 0,2 s 1 s
FMS 1500 0,5 s 5 s
MAPK 0,2 s 1 s
Model Saturation Our algorithm
Kanban 1000 TO 1 s
FMS 1500 TO 5 s
SlottedRing 50 4 s 433 s
Dphil 50 0,5 s 45 s
Constant speed penalty due to the
managed environment and the overhead
of the algorithmic contributions
For certain models, the algorithmic
contributions reduce the computational
effort and our algorithm can solve
problems that SARA cannot The ILP solver can produce
results efficiently
Solving the ILP problem
dominates run-time
TO: Time out (runtime > 600 s)
Conclusion
 Theoretical results
o The iteration strategy of the CEGAR approach is
incomplete
o A heuristic in the original algorithm is incorrect
• We detect such situations
 Algorithmic contributions
o Extend the set of decidable problems
o Reduce the search space
o Solve new classes of problems
• Submarking coverability
• Petri nets with inhibitor arcs
Thank you for your attention!
Questions?

More Related Content

What's hot

Software Testing Techniques
Software Testing TechniquesSoftware Testing Techniques
Software Testing TechniquesKiran Kumar
 
Testing foundations
Testing foundationsTesting foundations
Testing foundationsNeha Singh
 
Design Test Case Technique (Equivalence partitioning And Boundary value analy...
Design Test Case Technique (Equivalence partitioning And Boundary value analy...Design Test Case Technique (Equivalence partitioning And Boundary value analy...
Design Test Case Technique (Equivalence partitioning And Boundary value analy...Ryan Tran
 
ATPG Methods and Algorithms
ATPG Methods and AlgorithmsATPG Methods and Algorithms
ATPG Methods and AlgorithmsDeiptii Das
 
Effective Java - Methods Common to All Objects
Effective Java - Methods Common to All ObjectsEffective Java - Methods Common to All Objects
Effective Java - Methods Common to All ObjectsRoshan Deniyage
 
Test design techniques
Test design techniquesTest design techniques
Test design techniquesBipul Roy Bpl
 
techniques for removing smallest Stopping sets in LDPC codes
techniques for removing smallest Stopping sets in LDPC codestechniques for removing smallest Stopping sets in LDPC codes
techniques for removing smallest Stopping sets in LDPC codesShankar Lal
 
Test design techniques
Test design techniquesTest design techniques
Test design techniquesOksana
 
Test design techniques
Test design techniquesTest design techniques
Test design techniquesPragya Rastogi
 

What's hot (10)

Software Testing Techniques
Software Testing TechniquesSoftware Testing Techniques
Software Testing Techniques
 
Testing foundations
Testing foundationsTesting foundations
Testing foundations
 
Design Test Case Technique (Equivalence partitioning And Boundary value analy...
Design Test Case Technique (Equivalence partitioning And Boundary value analy...Design Test Case Technique (Equivalence partitioning And Boundary value analy...
Design Test Case Technique (Equivalence partitioning And Boundary value analy...
 
ATPG Methods and Algorithms
ATPG Methods and AlgorithmsATPG Methods and Algorithms
ATPG Methods and Algorithms
 
Effective Java - Methods Common to All Objects
Effective Java - Methods Common to All ObjectsEffective Java - Methods Common to All Objects
Effective Java - Methods Common to All Objects
 
Sta unit 4(abimanyu)
Sta unit 4(abimanyu)Sta unit 4(abimanyu)
Sta unit 4(abimanyu)
 
Test design techniques
Test design techniquesTest design techniques
Test design techniques
 
techniques for removing smallest Stopping sets in LDPC codes
techniques for removing smallest Stopping sets in LDPC codestechniques for removing smallest Stopping sets in LDPC codes
techniques for removing smallest Stopping sets in LDPC codes
 
Test design techniques
Test design techniquesTest design techniques
Test design techniques
 
Test design techniques
Test design techniquesTest design techniques
Test design techniques
 

Viewers also liked

A modified reach ability tree approach to analysis of unbounded petrinets
A modified reach ability tree approach to analysis of unbounded petrinetsA modified reach ability tree approach to analysis of unbounded petrinets
A modified reach ability tree approach to analysis of unbounded petrinetsAnirudh Kadevari
 
Branch and bound
Branch and boundBranch and bound
Branch and boundAcad
 
Back tracking and branch and bound class 20
Back tracking and branch and bound class 20Back tracking and branch and bound class 20
Back tracking and branch and bound class 20Kumar
 
Analysis of Feature Selection Algorithms (Branch & Bound and Beam search)
Analysis of Feature Selection Algorithms (Branch & Bound and Beam search)Analysis of Feature Selection Algorithms (Branch & Bound and Beam search)
Analysis of Feature Selection Algorithms (Branch & Bound and Beam search)Parinda Rajapaksha
 
ENG3317_RehtoricalTheory_neo_aristotelian_analysis_of_karlyn_kohrs_campbell
ENG3317_RehtoricalTheory_neo_aristotelian_analysis_of_karlyn_kohrs_campbellENG3317_RehtoricalTheory_neo_aristotelian_analysis_of_karlyn_kohrs_campbell
ENG3317_RehtoricalTheory_neo_aristotelian_analysis_of_karlyn_kohrs_campbellEric Roberson
 
EMC_Mozy_Users_Guide
EMC_Mozy_Users_GuideEMC_Mozy_Users_Guide
EMC_Mozy_Users_GuideEric Roberson
 
ENG3331_Adv_Desktop_Publishing_adp_aat_catalog_assignment4
ENG3331_Adv_Desktop_Publishing_adp_aat_catalog_assignment4ENG3331_Adv_Desktop_Publishing_adp_aat_catalog_assignment4
ENG3331_Adv_Desktop_Publishing_adp_aat_catalog_assignment4Eric Roberson
 
6310_Roberson_A2_15Nov11
6310_Roberson_A2_15Nov116310_Roberson_A2_15Nov11
6310_Roberson_A2_15Nov11Eric Roberson
 
gradschool_personalstatement
gradschool_personalstatementgradschool_personalstatement
gradschool_personalstatementEric Roberson
 
Robersone5_ENG6318_FinalEssayOnLanguageUse
Robersone5_ENG6318_FinalEssayOnLanguageUseRobersone5_ENG6318_FinalEssayOnLanguageUse
Robersone5_ENG6318_FinalEssayOnLanguageUseEric Roberson
 
피터 슈라이어
피터 슈라이어피터 슈라이어
피터 슈라이어jeehwan
 
ENG3317_Public_Relations_positionpaper_lgbt_workplace_equality
ENG3317_Public_Relations_positionpaper_lgbt_workplace_equalityENG3317_Public_Relations_positionpaper_lgbt_workplace_equality
ENG3317_Public_Relations_positionpaper_lgbt_workplace_equalityEric Roberson
 
Jeevika News Brochure 2012
Jeevika News Brochure 2012Jeevika News Brochure 2012
Jeevika News Brochure 2012Namrata Narayan
 
โครงงานคอมเทอมสอง เรื่องผม
โครงงานคอมเทอมสอง เรื่องผมโครงงานคอมเทอมสอง เรื่องผม
โครงงานคอมเทอมสอง เรื่องผมsoonthareeluck tunthong
 
How To Video Transcript
How To Video TranscriptHow To Video Transcript
How To Video Transcriptcseerussell
 
Camera angles and shots
Camera angles and shotsCamera angles and shots
Camera angles and shotsMantas Bruzas
 

Viewers also liked (20)

A modified reach ability tree approach to analysis of unbounded petrinets
A modified reach ability tree approach to analysis of unbounded petrinetsA modified reach ability tree approach to analysis of unbounded petrinets
A modified reach ability tree approach to analysis of unbounded petrinets
 
Branch and bound
Branch and boundBranch and bound
Branch and bound
 
Back tracking and branch and bound class 20
Back tracking and branch and bound class 20Back tracking and branch and bound class 20
Back tracking and branch and bound class 20
 
Analysis of Feature Selection Algorithms (Branch & Bound and Beam search)
Analysis of Feature Selection Algorithms (Branch & Bound and Beam search)Analysis of Feature Selection Algorithms (Branch & Bound and Beam search)
Analysis of Feature Selection Algorithms (Branch & Bound and Beam search)
 
Desarrollo de la ciencia
Desarrollo de la ciencia Desarrollo de la ciencia
Desarrollo de la ciencia
 
ENG3317_RehtoricalTheory_neo_aristotelian_analysis_of_karlyn_kohrs_campbell
ENG3317_RehtoricalTheory_neo_aristotelian_analysis_of_karlyn_kohrs_campbellENG3317_RehtoricalTheory_neo_aristotelian_analysis_of_karlyn_kohrs_campbell
ENG3317_RehtoricalTheory_neo_aristotelian_analysis_of_karlyn_kohrs_campbell
 
Certified safety supervisor
Certified safety supervisorCertified safety supervisor
Certified safety supervisor
 
EMC_Mozy_Users_Guide
EMC_Mozy_Users_GuideEMC_Mozy_Users_Guide
EMC_Mozy_Users_Guide
 
ENG3331_Adv_Desktop_Publishing_adp_aat_catalog_assignment4
ENG3331_Adv_Desktop_Publishing_adp_aat_catalog_assignment4ENG3331_Adv_Desktop_Publishing_adp_aat_catalog_assignment4
ENG3331_Adv_Desktop_Publishing_adp_aat_catalog_assignment4
 
6310_Roberson_A2_15Nov11
6310_Roberson_A2_15Nov116310_Roberson_A2_15Nov11
6310_Roberson_A2_15Nov11
 
My curriculum
My curriculumMy curriculum
My curriculum
 
gradschool_personalstatement
gradschool_personalstatementgradschool_personalstatement
gradschool_personalstatement
 
Robersone5_ENG6318_FinalEssayOnLanguageUse
Robersone5_ENG6318_FinalEssayOnLanguageUseRobersone5_ENG6318_FinalEssayOnLanguageUse
Robersone5_ENG6318_FinalEssayOnLanguageUse
 
피터 슈라이어
피터 슈라이어피터 슈라이어
피터 슈라이어
 
ENG3317_Public_Relations_positionpaper_lgbt_workplace_equality
ENG3317_Public_Relations_positionpaper_lgbt_workplace_equalityENG3317_Public_Relations_positionpaper_lgbt_workplace_equality
ENG3317_Public_Relations_positionpaper_lgbt_workplace_equality
 
Jeevika News Brochure 2012
Jeevika News Brochure 2012Jeevika News Brochure 2012
Jeevika News Brochure 2012
 
โครงงานคอมเทอมสอง เรื่องผม
โครงงานคอมเทอมสอง เรื่องผมโครงงานคอมเทอมสอง เรื่องผม
โครงงานคอมเทอมสอง เรื่องผม
 
Garis imajiner
Garis imajiner Garis imajiner
Garis imajiner
 
How To Video Transcript
How To Video TranscriptHow To Video Transcript
How To Video Transcript
 
Camera angles and shots
Camera angles and shotsCamera angles and shots
Camera angles and shots
 

Similar to Extensions to the CEGAR Approach on Petri Nets

New Search Strategies for the Petri Net CEGAR Approach
New Search Strategies for the Petri Net CEGAR ApproachNew Search Strategies for the Petri Net CEGAR Approach
New Search Strategies for the Petri Net CEGAR ApproachAkos Hajdu
 
Methods for solving ‘or’ models
Methods for solving ‘or’ modelsMethods for solving ‘or’ models
Methods for solving ‘or’ modelsJishnu Rajan
 
Regression Analysis of SAT Scores Final
Regression Analysis of SAT Scores FinalRegression Analysis of SAT Scores Final
Regression Analysis of SAT Scores FinalJohn Michael Croft
 
Sienna 1 intro
Sienna 1 introSienna 1 intro
Sienna 1 introchidabdu
 
Analysis and Design of Algorithms
Analysis and Design of AlgorithmsAnalysis and Design of Algorithms
Analysis and Design of AlgorithmsBulbul Agrawal
 
Selection K in K-means Clustering
Selection K in K-means ClusteringSelection K in K-means Clustering
Selection K in K-means ClusteringJunghoon Kim
 
Unit III_Ch 17_Probablistic Methods.pptx
Unit III_Ch 17_Probablistic Methods.pptxUnit III_Ch 17_Probablistic Methods.pptx
Unit III_Ch 17_Probablistic Methods.pptxsmithashetty24
 
Diagnostic Tests.ppt
Diagnostic Tests.pptDiagnostic Tests.ppt
Diagnostic Tests.pptNavyaPS2
 
[ASE2014] An Empirical Study on Reducing Omission Errors in Practice
[ASE2014] An Empirical Study on Reducing Omission Errors in Practice[ASE2014] An Empirical Study on Reducing Omission Errors in Practice
[ASE2014] An Empirical Study on Reducing Omission Errors in PracticeJihun Park
 
Test suite minimization
Test suite minimizationTest suite minimization
Test suite minimizationGaurav Saxena
 
CounterFactual Explanations.pdf
CounterFactual Explanations.pdfCounterFactual Explanations.pdf
CounterFactual Explanations.pdfBong-Ho Lee
 
Machine Learning.pdf
Machine Learning.pdfMachine Learning.pdf
Machine Learning.pdfBeyaNasr1
 
Qu meeting PhD kessentini
Qu meeting PhD kessentiniQu meeting PhD kessentini
Qu meeting PhD kessentinikessentini
 
Qu meeting phd thesis kessentini
Qu meeting phd thesis kessentiniQu meeting phd thesis kessentini
Qu meeting phd thesis kessentinikessentini
 
Reporting.ppt
Reporting.pptReporting.ppt
Reporting.pptasodiatel
 
Polynomial Tensor Sketch for Element-wise Matrix Function (ICML 2020)
Polynomial Tensor Sketch for Element-wise Matrix Function (ICML 2020)Polynomial Tensor Sketch for Element-wise Matrix Function (ICML 2020)
Polynomial Tensor Sketch for Element-wise Matrix Function (ICML 2020)ALINLAB
 
Dealing with the Three Horrible Problems in Verification
Dealing with the Three Horrible Problems in VerificationDealing with the Three Horrible Problems in Verification
Dealing with the Three Horrible Problems in VerificationDVClub
 
Chapter24rev1.pptPart 6Chapter 24Boundary-Valu.docx
Chapter24rev1.pptPart 6Chapter 24Boundary-Valu.docxChapter24rev1.pptPart 6Chapter 24Boundary-Valu.docx
Chapter24rev1.pptPart 6Chapter 24Boundary-Valu.docxtiffanyd4
 

Similar to Extensions to the CEGAR Approach on Petri Nets (20)

New Search Strategies for the Petri Net CEGAR Approach
New Search Strategies for the Petri Net CEGAR ApproachNew Search Strategies for the Petri Net CEGAR Approach
New Search Strategies for the Petri Net CEGAR Approach
 
Methods for solving ‘or’ models
Methods for solving ‘or’ modelsMethods for solving ‘or’ models
Methods for solving ‘or’ models
 
Regression Analysis of SAT Scores Final
Regression Analysis of SAT Scores FinalRegression Analysis of SAT Scores Final
Regression Analysis of SAT Scores Final
 
Constraint Satisfaction.pdf
Constraint Satisfaction.pdfConstraint Satisfaction.pdf
Constraint Satisfaction.pdf
 
Sienna 1 intro
Sienna 1 introSienna 1 intro
Sienna 1 intro
 
Analysis and Design of Algorithms
Analysis and Design of AlgorithmsAnalysis and Design of Algorithms
Analysis and Design of Algorithms
 
Selection K in K-means Clustering
Selection K in K-means ClusteringSelection K in K-means Clustering
Selection K in K-means Clustering
 
Unit III_Ch 17_Probablistic Methods.pptx
Unit III_Ch 17_Probablistic Methods.pptxUnit III_Ch 17_Probablistic Methods.pptx
Unit III_Ch 17_Probablistic Methods.pptx
 
Diagnostic Tests.ppt
Diagnostic Tests.pptDiagnostic Tests.ppt
Diagnostic Tests.ppt
 
[ASE2014] An Empirical Study on Reducing Omission Errors in Practice
[ASE2014] An Empirical Study on Reducing Omission Errors in Practice[ASE2014] An Empirical Study on Reducing Omission Errors in Practice
[ASE2014] An Empirical Study on Reducing Omission Errors in Practice
 
Test suite minimization
Test suite minimizationTest suite minimization
Test suite minimization
 
CounterFactual Explanations.pdf
CounterFactual Explanations.pdfCounterFactual Explanations.pdf
CounterFactual Explanations.pdf
 
Gaur11428
Gaur11428Gaur11428
Gaur11428
 
Machine Learning.pdf
Machine Learning.pdfMachine Learning.pdf
Machine Learning.pdf
 
Qu meeting PhD kessentini
Qu meeting PhD kessentiniQu meeting PhD kessentini
Qu meeting PhD kessentini
 
Qu meeting phd thesis kessentini
Qu meeting phd thesis kessentiniQu meeting phd thesis kessentini
Qu meeting phd thesis kessentini
 
Reporting.ppt
Reporting.pptReporting.ppt
Reporting.ppt
 
Polynomial Tensor Sketch for Element-wise Matrix Function (ICML 2020)
Polynomial Tensor Sketch for Element-wise Matrix Function (ICML 2020)Polynomial Tensor Sketch for Element-wise Matrix Function (ICML 2020)
Polynomial Tensor Sketch for Element-wise Matrix Function (ICML 2020)
 
Dealing with the Three Horrible Problems in Verification
Dealing with the Three Horrible Problems in VerificationDealing with the Three Horrible Problems in Verification
Dealing with the Three Horrible Problems in Verification
 
Chapter24rev1.pptPart 6Chapter 24Boundary-Valu.docx
Chapter24rev1.pptPart 6Chapter 24Boundary-Valu.docxChapter24rev1.pptPart 6Chapter 24Boundary-Valu.docx
Chapter24rev1.pptPart 6Chapter 24Boundary-Valu.docx
 

More from Akos Hajdu

solc-verify: A Modular Verifier for Solidity Smart Contracts
solc-verify: A Modular Verifier for Solidity Smart Contractssolc-verify: A Modular Verifier for Solidity Smart Contracts
solc-verify: A Modular Verifier for Solidity Smart ContractsAkos Hajdu
 
Software Verification with Abstraction-Based Methods
Software Verification with Abstraction-Based MethodsSoftware Verification with Abstraction-Based Methods
Software Verification with Abstraction-Based MethodsAkos Hajdu
 
A Preliminary Analysis on the Effect of Randomness in a CEGAR Framework
 A Preliminary Analysis on the Effect of Randomness in a CEGAR Framework A Preliminary Analysis on the Effect of Randomness in a CEGAR Framework
A Preliminary Analysis on the Effect of Randomness in a CEGAR FrameworkAkos Hajdu
 
Theta: a Framework for Abstraction Refinement-Based Model Checking
Theta: a Framework for Abstraction Refinement-Based Model CheckingTheta: a Framework for Abstraction Refinement-Based Model Checking
Theta: a Framework for Abstraction Refinement-Based Model CheckingAkos Hajdu
 
Towards Evaluating Size Reduction Techniques for Software Model Checking
Towards Evaluating Size Reduction Techniques for Software Model CheckingTowards Evaluating Size Reduction Techniques for Software Model Checking
Towards Evaluating Size Reduction Techniques for Software Model CheckingAkos Hajdu
 
Exploiting Hierarchy in the Abstraction-Based Verification of Statecharts Usi...
Exploiting Hierarchy in the Abstraction-Based Verification of Statecharts Usi...Exploiting Hierarchy in the Abstraction-Based Verification of Statecharts Usi...
Exploiting Hierarchy in the Abstraction-Based Verification of Statecharts Usi...Akos Hajdu
 
Exploratory Analysis of the Performance of a Configurable CEGAR Framework
Exploratory Analysis of the Performance of a Configurable CEGAR FrameworkExploratory Analysis of the Performance of a Configurable CEGAR Framework
Exploratory Analysis of the Performance of a Configurable CEGAR FrameworkAkos Hajdu
 
A Configurable CEGAR Framework with Interpolation-Based Refinements
A Configurable CEGAR Framework with Interpolation-Based RefinementsA Configurable CEGAR Framework with Interpolation-Based Refinements
A Configurable CEGAR Framework with Interpolation-Based RefinementsAkos Hajdu
 
Petri Net Based Trajectory Optimization
Petri Net Based Trajectory OptimizationPetri Net Based Trajectory Optimization
Petri Net Based Trajectory OptimizationAkos Hajdu
 

More from Akos Hajdu (9)

solc-verify: A Modular Verifier for Solidity Smart Contracts
solc-verify: A Modular Verifier for Solidity Smart Contractssolc-verify: A Modular Verifier for Solidity Smart Contracts
solc-verify: A Modular Verifier for Solidity Smart Contracts
 
Software Verification with Abstraction-Based Methods
Software Verification with Abstraction-Based MethodsSoftware Verification with Abstraction-Based Methods
Software Verification with Abstraction-Based Methods
 
A Preliminary Analysis on the Effect of Randomness in a CEGAR Framework
 A Preliminary Analysis on the Effect of Randomness in a CEGAR Framework A Preliminary Analysis on the Effect of Randomness in a CEGAR Framework
A Preliminary Analysis on the Effect of Randomness in a CEGAR Framework
 
Theta: a Framework for Abstraction Refinement-Based Model Checking
Theta: a Framework for Abstraction Refinement-Based Model CheckingTheta: a Framework for Abstraction Refinement-Based Model Checking
Theta: a Framework for Abstraction Refinement-Based Model Checking
 
Towards Evaluating Size Reduction Techniques for Software Model Checking
Towards Evaluating Size Reduction Techniques for Software Model CheckingTowards Evaluating Size Reduction Techniques for Software Model Checking
Towards Evaluating Size Reduction Techniques for Software Model Checking
 
Exploiting Hierarchy in the Abstraction-Based Verification of Statecharts Usi...
Exploiting Hierarchy in the Abstraction-Based Verification of Statecharts Usi...Exploiting Hierarchy in the Abstraction-Based Verification of Statecharts Usi...
Exploiting Hierarchy in the Abstraction-Based Verification of Statecharts Usi...
 
Exploratory Analysis of the Performance of a Configurable CEGAR Framework
Exploratory Analysis of the Performance of a Configurable CEGAR FrameworkExploratory Analysis of the Performance of a Configurable CEGAR Framework
Exploratory Analysis of the Performance of a Configurable CEGAR Framework
 
A Configurable CEGAR Framework with Interpolation-Based Refinements
A Configurable CEGAR Framework with Interpolation-Based RefinementsA Configurable CEGAR Framework with Interpolation-Based Refinements
A Configurable CEGAR Framework with Interpolation-Based Refinements
 
Petri Net Based Trajectory Optimization
Petri Net Based Trajectory OptimizationPetri Net Based Trajectory Optimization
Petri Net Based Trajectory Optimization
 

Recently uploaded

Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaDashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaPraksha3
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 sciencefloriejanemacaya1
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhousejana861314
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trssuser06f238
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PPRINCE C P
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Nistarini College, Purulia (W.B) India
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physicsvishikhakeshava1
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxyaramohamed343013
 
Module 4: Mendelian Genetics and Punnett Square
Module 4:  Mendelian Genetics and Punnett SquareModule 4:  Mendelian Genetics and Punnett Square
Module 4: Mendelian Genetics and Punnett SquareIsiahStephanRadaza
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptxanandsmhk
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...jana861314
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxSwapnil Therkar
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzohaibmir069
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |aasikanpl
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 

Recently uploaded (20)

Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaDashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 science
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhouse
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 tr
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C P
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physics
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docx
 
Module 4: Mendelian Genetics and Punnett Square
Module 4:  Mendelian Genetics and Punnett SquareModule 4:  Mendelian Genetics and Punnett Square
Module 4: Mendelian Genetics and Punnett Square
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistan
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 

Extensions to the CEGAR Approach on Petri Nets

  • 1. Budapest University of Technology and Economics Departmentof Measurementand Information Systems Extensions to the CEGAR Approach on Petri Nets Ákos Hajdu1, András Vörös1, Tamás Bartha2, Zoltán Mártonka1 1 Department Of Measurement and Information Systems Budapest University of Technology and Economics, Budapest, Hungary 2 MTA SZTAKI, Budapest, Hungary
  • 2. Outline of the talk 1. Introduction 2. CEGAR approach on Petri nets 3. Theoretical results 4. Algorithmic contributions 5. Evaluation 6. Conclusion
  • 3. Introduction – Formal methods  Complex, distributed, safety-critical systems o Suitability and faultlessness is important o Mathematically precise verification is required o Formal modeling and analysis can provide such tools Specification System design Modeling Formal verification Discovered faults Requirements
  • 4. Introduction – Petri nets  Petri nets o Widely used modeling formalism o Asynchronous, distributed, parallel, non-deterministic systems  Structure o Bipartite graph • Places, transitions, weighted arcs, tokens  Dynamic behavior o State: distribution of tokens (marking) o Firing of a transition: consumes and produces tokens
  • 5. Introduction – Reachability analysis  Reachability analysis o Formal verification technique o Checks, if a given state is reachable from the initial state o Drawback: complexity  Complexity o State space can be large or infinite o Reachability is decidable, but at least EXPSPACE-hard o A possible solution is to use abstraction
  • 6. CEGAR approach  CounterExample Guided Abstraction Refinement o General approach • Can handle large or infinite state space o Works on an abstraction of the original model • Less detailed state space • Finite, smaller representation o Abstraction refinement is required • An action in the abstract model may not be realizable in the original model • Refine the abstraction using the information from the explored part of the state space
  • 7. CEGAR approach on Petri nets  Abstraction of Petri nets: state equation m0 + Cx = m1 Initial abstraction Reachability problem State equation Initial state Target state Firing count of transitions (unknown) Incidence matrix
  • 8. Initial abstraction Reachability problem State equation CEGAR approach on Petri nets  Verification of the abstract model o Solving the state equation for the firing count of transitions o Integer Linear Programming problem o Necessary, but not sufficient criterion for reachability Verify the abstract model Not reachable No solution m0 + Cx = m1
  • 9. CEGAR approach on Petri nets  Examining the solution o Bounded exploration of the state space Initial abstraction Verify the abstract modelReachability problem State equation Not reachable No solution Examine the solution Reachable Solution Realizable
  • 10. CEGAR approach on Petri nets  Abstraction refinement o Exclude the counterexample without losing any realizable solution o Constraints can be added to the state equation • The state equation may become infeasible • A new solution can be obtained o Traversing the solution space instead of the state space Initial abstraction Verify the abstract model Examine the solutionReachability problem State equation Not reachable Reachable No solution Solution Realizable Refine the abstraction Not realizableConstraints
  • 11. CEGAR approach on Petri nets  Traversing the solution space o Base vector + linear combination of invariants o Constraint types: • Jump: obtain another base vector • Increment: obtain non-minimal solutions Initial abstraction Verify the abstract model Examine the solutionReachability problem State equation Not reachable Reachable No solution Solution Realizable Refine the abstraction Not realizableConstraints
  • 12. Our work  Examination of the algorithm o Correctness o Completeness  Improving the algorithm o Extending the set of decidable problems o New criterion for termination  Extending the algorithm o Solving submarking coverability o Handling inhibitor arcs
  • 13. Correctness of the algorithm  The CEGAR method is proved to be correct, but:  A heuristic is used to calculate the constraints o Uses only information from maximal firing sequences • This information may not be enough o The algorithm may over-estimate the constraints • … and give an incorrect answer
  • 14. Correctness of the algorithm  We proved the incorrectness of the heuristic by a counterexample  In our improved algorithm: o We use the information of intermediate states o Detect the over-estimation and do not give an incorrect answer
  • 15. Our work  Examination of the algorithm o Correctness o Completeness  Improving the algorithm o Extending the set of decidable problems o New criterion for termination  Extending the algorithm o Solving submarking coverability o Handling inhibitor arcs
  • 16. Completeness of the algorithm  The algorithm is incomplete due to its iteration strategy o An invariant is added to the solution which can be fired, but does not help • The same states are reached  the same invariant is added again o This solution is skipped to avoid non-termination • In some cases using another invariant would help o We proved this by counterexamples
  • 17. Our work  Examination of the algorithm o Correctness o Completeness  Improving the algorithm o Extending the set of decidable problems o New criterion for termination  Extending the algorithm o Solving submarking coverability o Handling inhibitor arcs
  • 18. Algorithmic contributions - Improvements  When a solution is skipped... o …the algorithm checks if any intermediate state can lead to a realizable solution o Not all important states are recognized, due to … • … the ordering of the states • … optimizations  We defined a total ordering on the intermediate states o Every state closer to a realizable solution is recognized o  Extends the set of decidable problems
  • 19. Our work  Examination of the algorithm o Correctness o Completeness  Improving the algorithm o Extending the set of decidable problems o New criterion for termination  Extending the algorithm o Solving submarking coverability o Handling inhibitor arcs
  • 20. Algorithmic contributions - Improvements  We developed a new termination criterion o Before applying a constraint, a modified form of the state equation is checked o Constraints that cannot help, can be detected before applying them  Advantages o Cuts the search space efficiently o Can prevent non-termination • We proved that no realizable solution is lost •  Extends the set of decidable problems
  • 21. Our work  Examination of the algorithm o Correctness o Completeness  Improving the algorithm o Extending the set of decidable problems o New criterion for termination  Extending the algorithm o Solving submarking coverability o Handling inhibitor arcs
  • 22. Algorithmic contributions - Extensions  Submarking coverability problem o Linear conditions are given (instead of the target state) o Checks, if a state can be reached, for which the given conditions hold  Solving submarking coverability using CEGAR o We transformed the conditions on the state to conditions on transitions  ILP problem  New types of problems can be analyzed o Analysis of subsystems o Reachability of infinite set of states
  • 23. Our work  Examination of the algorithm o Correctness o Completeness  Improving the algorithm o Extending the set of decidable problems o New criterion for termination  Extending the algorithm o Solving submarking coverability o Handling inhibitor arcs
  • 24. Algorithmic contributions - Extensions  Inhibitor arcs o Petri nets extended with inhibitor arcs are Turing complete o The reachability problem in general is undecidable  Handling inhibitor arcs in the CEGAR approach o We introduced new types of constraints o We extended the total ordering on intermediate states o Completenes cannot be guaranteed, but we tested the algorithm on several Petri nets
  • 26. Evaluation  We implemented our algorithm o PetriDotNet framework • Modeling and analysis of Petri nets • Supports add-ins  We compared our algorithm to… o … the original implementation • SARA tool • Won several categories at the model checking contest 2013 o … the saturation algorithm • Other type of reachability analysis method • Implemented in the PetriDotNet framework
  • 27. Evaluation Model SARA tool Our algorithm CP_NR 10 0,2 s 0,5 s CP_NR 25 111 s 2 s CP_NR 50 TO 16 s Kanban 1000 0,2 s 1 s FMS 1500 0,5 s 5 s MAPK 0,2 s 1 s Model Saturation Our algorithm Kanban 1000 TO 1 s FMS 1500 TO 5 s SlottedRing 50 4 s 433 s Dphil 50 0,5 s 45 s Constant speed penalty due to the managed environment and the overhead of the algorithmic contributions For certain models, the algorithmic contributions reduce the computational effort and our algorithm can solve problems that SARA cannot The ILP solver can produce results efficiently Solving the ILP problem dominates run-time TO: Time out (runtime > 600 s)
  • 28. Conclusion  Theoretical results o The iteration strategy of the CEGAR approach is incomplete o A heuristic in the original algorithm is incorrect • We detect such situations  Algorithmic contributions o Extend the set of decidable problems o Reduce the search space o Solve new classes of problems • Submarking coverability • Petri nets with inhibitor arcs
  • 29. Thank you for your attention! Questions?