Chapter 17. Assertions State Assertion – predicate intended to express that a descriptive or prescriptive property holds in an arbitrarily chose current.

Slides:



Advertisements
Similar presentations
Quantified Invariant Generation using an Interpolating Saturation Prover Ken McMillan Cadence Research Labs TexPoint fonts used in EMF: A A A A A.
Advertisements

Completeness and Expressiveness
Auto-Generation of Test Cases for Infinite States Reactive Systems Based on Symbolic Execution and Formula Rewriting Donghuo Chen School of Computer Science.
Design by Contract.
Introduction to Formal Methods for SW and HW Development 09: SAT Based Abstraction/Refinement in Model-Checking Roberto Sebastiani Based on work and slides.
SAT Based Abstraction/Refinement in Model-Checking Based on work by E. Clarke, A. Gupta, J. Kukula, O. Strichman (CAV’02)
ICE1341 Programming Languages Spring 2005 Lecture #6 Lecture #6 In-Young Ko iko.AT. icu.ac.kr iko.AT. icu.ac.kr Information and Communications University.
Introducing Formal Methods, Module 1, Version 1.1, Oct., Formal Specification and Analytical Verification L 5.
ECE Synthesis & Verification - L271 ECE 697B (667) Spring 2006 Synthesis and Verification of Digital Systems Model Checking basics.
UIUC CS 497: Section EA Lecture #2 Reasoning in Artificial Intelligence Professor: Eyal Amir Spring Semester 2004.
Temporal Logic and the NuSMV Model Checker CS 680 Formal Methods Jeremy Johnson.
CS6133 Software Specification and Verification
Rigorous Software Development CSCI-GA Instructor: Thomas Wies Spring 2012 Lecture 11.
Model Checking Inputs: A design (in some HDL) and a property (in some temporal logic) Outputs: Decision about whether or not the property always holds.
1 Mechanical Verification of Timed Automata Myla Archer and Constance Heitmeyer Presented by Rasa Bonyadlou 24 October 2002.
ISBN Chapter 3 Describing Syntax and Semantics.
1 Semantic Description of Programming languages. 2 Static versus Dynamic Semantics n Static Semantics represents legal forms of programs that cannot be.
Formal Methods of Systems Specification Logical Specification of Hard- and Software Prof. Dr. Holger Schlingloff Institut für Informatik der.
Witness and Counterexample Li Tan Oct. 15, 2002.
Catriel Beeri Pls/Winter 2004/5 inductive-revisited 1 Inductive definitions revisited  Generated and Freely generated sets oPattern match, unification.
Witness and Counterexample Li Tan Oct. 15, 2002.
Lesson 6. Refinement of the Operator Model This page describes formally how we refine Figure 2.5 into a more detailed model so that we can connect it.
Describing Syntax and Semantics
EE1J2 - Slide 1 EE1J2 – Discrete Maths Lecture 6 Limitations of propositional logic Introduction to predicate logic Symbols, terms and formulae, Parse.
Using Abduction and Induction for Operational Requirements Elaboration Dalal Alrajeh Oliver Ray Alessandra RussoSebastian Uchitel AIAI 2007 Sept. 15 th.
Notes for Chapter 12 Logic Programming The AI War Basic Concepts of Logic Programming Prolog Review questions.
Chapter 3: Methods of Inference
A Brief Summary for Exam 1 Subject Topics Propositional Logic (sections 1.1, 1.2) –Propositions Statement, Truth value, Proposition, Propositional symbol,
Mathematical Modeling and Formal Specification Languages CIS 376 Bruce R. Maxim UM-Dearborn.
Overview of Formal Methods. Topics Introduction and terminology FM and Software Engineering Applications of FM Propositional and Predicate Logic Program.
- r r Saturation-Based Decision Procedures and Complexity Analysis Yevgeny Kazakov R. 615 Applications Add semantic markup to a.
ISBN Chapter 3 Describing Semantics -Attribute Grammars -Dynamic Semantics.
Formal Verification Lecture 9. Formal Verification Formal verification relies on Descriptions of the properties or requirements Descriptions of systems.
CIS 540 Principles of Embedded Computation Spring Instructor: Rajeev Alur
Submodule construction in logics 1 Gregor v. Bochmann, University of Ottawa Using First-Order Logic to Reason about Submodule Construction Gregor v. Bochmann.
Formal Specification of Intrusion Signatures and Detection Rules By Jean-Philippe Pouzol and Mireille Ducassé 15 th IEEE Computer Security Foundations.
Machine Learning Chapter 5. Artificial IntelligenceChapter 52 Learning 1. Rote learning rote( โรท ) n. วิถีทาง, ทางเดิน, วิธีการตามปกติ, (by rote จากความทรงจำ.
Correctness Proofs and Counter-model Generation with Authentication-Protocol Logic Koji Hasebe Mitsuhiro Okada Department of Philosophy, Keio University.
Deriving Operational Software Specification from System Goals Xin Bai EEL 5881 Course Fall, 2003.
ARTIFICIAL INTELLIGENCE [INTELLIGENT AGENTS PARADIGM] Professor Janis Grundspenkis Riga Technical University Faculty of Computer Science and Information.
Simultaneously Learning and Filtering Juan F. Mancilla-Caceres CS498EA - Fall 2011 Some slides from Connecting Learning and Logic, Eyal Amir 2006.
ISBN Chapter 3 Describing Semantics.
Programming Languages and Design Lecture 3 Semantic Specifications of Programming Languages Instructor: Li Ma Department of Computer Science Texas Southern.
Semantics In Text: Chapter 3.
1 Features as Constraints Rafael AccorsiUniv. Freiburg Carlos ArecesUniv. Amsterdam Wiet BoumaKPN Research Maarten de RijkeUniv. Amsterdam.
Automated Reasoning Early AI explored how to automated several reasoning tasks – these were solved by what we might call weak problem solving methods as.
Ch. 13 Ch. 131 jcmt CSE 3302 Programming Languages CSE3302 Programming Languages (notes?) Dr. Carter Tiernan.
Lecture 5 1 CSP tools for verification of Sec Prot Overview of the lecture The Casper interface Refinement checking and FDR Model checking Theorem proving.
Verification & Validation By: Amir Masoud Gharehbaghi
lamsweerde Chap.4: Formal Requirements Specification © 2009 John Wiley and Sons Fundamentals of RE Chapter 4 Requirements.
Formal Specification: a Roadmap Axel van Lamsweerde published on ICSE (International Conference on Software Engineering) Jing Ai 10/28/2003.
Static Techniques for V&V. Hierarchy of V&V techniques Static Analysis V&V Dynamic Techniques Model Checking Simulation Symbolic Execution Testing Informal.
CS357 Lecture 13: Symbolic model checking without BDDs Alex Aiken David Dill 1.
1 An infrastructure for context-awareness based on first order logic 송지수 ISI LAB.
From Natural Language to LTL: Difficulties Capturing Natural Language Specification in Formal Languages for Automatic Analysis Elsa L Gunter NJIT.
Requirements Engineering From System Goals to UML Models to Software Specifications Axel Van Lamsweerde.
Complexity 24-1 Complexity Andrei Bulatov Interactive Proofs.
Knowledge Repn. & Reasoning Lecture #9: Propositional Logic UIUC CS 498: Section EA Professor: Eyal Amir Fall Semester 2005.
Writing, Verifying and Exploiting Formal Specifications for Hardware Designs Chapter 3: Verifying a Specification Presenter: Scott Crosby.
Artificial Intelligence Knowledge Representation.
IS 2620: Developing Secure Systems Formal Verification/Methods Lecture 9 March 15, 2012.
6/12/20161 a.a.2015/2016 Prof. Anna Labella Formal Methods in software development.
1 Proving Properties of Recursive List Functions CS 270 Math Foundations of CS Jeremy Johnson.
Model Checking Early Requirements Specifications in Tropos Presented by Chin-Yi Tsai.
IS 2935: Developing Secure Systems
Automatic Verification of Industrial Designs
A Brief Summary for Exam 1
Computer Security: Art and Science, 2nd Edition
Program correctness Model-checking CTL
Presentation transcript:

Chapter 17

Assertions State Assertion – predicate intended to express that a descriptive or prescriptive property holds in an arbitrarily chose current state. Temporal Assertion – built from state assertions, temporal operators, logical connectives and quantifiers. Preceding state assertions should always hold in future states.

Temporal Operators Future Operators: Sooner or later Always Always until Past Operators: Some time in the past Has always been Always in the past since Always in the past back to Previous

Real-Time Temporal Constructs Relative time bounds: confines temporal distance immediately before / immediately after Example: always in the future up to deadline d; always back to at least _____

Real-Time Temporal Constructs Absolute time bounds: Uses clock function Clock must be defined Example: always in the future before clock time ct

Real-Time Temporal Constructs Variable-dependent time bounds: Bound by use of variables and clocks/relative bounds

Goal Specifications Achieve [TargetCondition] Cease [TargetCondition] Maintain [TargetCondition] Avoid [TargetCondition] Obstacles Anti-Goals

Specifying descriptive properties in the object model Initializations Domain properties and hypotheses Definitions

Specifying operationalizations in the operation model Domain pre- and post-conditions Required pre-and trigger conditions Required post-conditions Examples p. 595

Semantics: Pruning semantics and frame axioms pruning semantics – every state transition is allowed except those specifically forbidden (blacklist) generative semantics – every state transition is forbidden except the ones explicitly required by the specification (whitelist)

Chapter 18 Formal Reasoning for Specification Construction and Analysis

Checking Goal Refinements Using a theorem prover Formal refinement patterns – Exploring refinements – Hidden proofs – Realizability-driven patterns – First-order patterns

Checking Goal Refinements Using bounded SAT solvers 1. Ask the user to instantiate the formula to selected object instances (get a propositional formula) 2. Translate the result into the input format required by the selected SAT solver. 3. Ask the user to determine a maximal length to bound counterexample histories. 4. Run the SAT solver 5. Translate the output back to the level of abstraction of the graphical input model.

Deriving goal operationalizations Using bounded SAT solvers Formal operationalization patterns A catalog of operationalization patterns

Generating obstacles for risk analysis Regressing obstructions through domain properties p. 614 Using formal obstruction patterns

Generating anti-goals from security analysis Specifying security goals – Specification constructs on agent knowledge – Specification patterns for security goals – Identifying security goals and initial anti-goals 1. Instantiate security specification pattern and negate the instantiated specification 2. Check the converse of asset-related Achieve goals – Refining anti-goals

Formal Conflict Analysis Deriving boundary conditions for conflict – Regression-based derivation of boundary conditions – Formal divergence patterns

Formal Conflict Analysis Formal resolution of divergences – Avoid boundary conditions – Restore divergent goals – Anticipate conflict – Goal weakening

Formal Conflict Analysis Synthesizing behavior models for animation and model checking – Goal-driven model synthesis – Scenario-driven model synthesis Event-oriented state machines Scenarios and LTS (labeled transition system) LTS Synthesis using grammar induction Representing the input scenario collection as a PTA (prefix tree acceptor) (Figure 18.15)

Formal Conflict Analysis – Scenario-driven model synthesis through scenario questions asked by synthesizer Constraining generalization by prorogation of fluents through the PTA Constraining generalization by injecting goals and domain properties in the synthesis