Games-Based Model Checking of Protocols: counting doesn't count
نویسندگان
چکیده
We introduce a technique that can be used to model the behaviour of protocols. In our model each process within a protocol belongs to a particular class. A set of rules governs the behaviour of a process within a process class. The rules give rise to a transition system that models the behaviour of the protocol. By exploiting the homogeneous behavior of a process within a particular class it is possible to model the behaviour of an unbounded number of processes in a way that results in a finite (and in most cases small) transition system. We demonstrate this technique by modeling the popular two-phase commit protocol. CTL properties can be model checked in the resulting transition system using a games based model checking algorithm. This technique has the advantage that the entire transition system need not always be generated. Furthermore, it provides evidence to verify or refute the property being checked. Using the twophase commit example, we check some elementary properties.
منابع مشابه
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملModel Checking Agent Communication
Model checking is a formal and automatic technique used to verify computational systems (e.g. communication protocols) against given properties. The purpose of this chapter is to describe a model checking algorithm to verify communication protocols used by autonomous agents interacting using dialogue games, which are governed by a set of logical rules. We use a variant of Extended Computation T...
متن کاملA Game-Based Verification of Non-repudiation and Fair Exchange Protocols
In this paper, we report on a recent work for the verification of non-repudiation protocols. We propose a verification method based on the idea that non-repudiation protocols are best modeled as games. To formalize this idea, we use alternating transition systems, a game based model, to model protocols and alternating temporal logic, a game based logic, to express requirements that the protocol...
متن کاملCounting in Team Semantics
We explore several counting constructs for logics with team semantics. Counting is an important task in numerous applications, but with a somewhat delicate relationship to logic. Team semantics on the other side is the mathematical basis of modern logics of dependence and independence, in which formulae are evaluated not for a single assignment of values to variables, but for a set of such assi...
متن کاملVerifying Reference Counting Implementations
Reference counting is a widely-used resource management idiom which maintains a count of references to each resource by incrementing the count upon an acquisition, and decrementing upon a release; resources whose counts fall to zero may be recycled. We present an algorithm to verify the correctness of reference counting with minimal user interaction. Our algorithm performs compositional verific...
متن کامل