Parallelizing the Mur' Veriier
نویسندگان
چکیده
With the use of state and memory reduction techniques in veri cation by explicit state enumeration, runtime becomes a major limiting factor. We describe a parallel version of the explicit state enumeration veri er Mur' for distributed memory multiprocessors and networks of workstations that is based on the message passing paradigm. In experiments with three complex cache coherence protocols, parallel Mur' shows close to linear speedups, which are largely insensitive to communication latency and bandwidth. There is some slowdown with increasing communication overhead, for which a simple yet relatively accurate approximation formula is given. Techniques to reduce overhead and required bandwidth and to allow heterogeneity and dynamically changing load in the parallel machine are discussed, which we expect will allow good speedups when using conventional networks of workstations.
منابع مشابه
Using Magnetic Disk Instead of Main Memory in the Mur' Veriier
In veriication by explicit state enumeration a randomly accessed state table is maintained. In practice, the total main memory available for this state table is a major limiting factor in veriication. We describe a version of the explicit state enumeration veriier Mur' that allows using magnetic disk instead of main memory for storing almost all of the state table. The algorithm avoids costly r...
متن کاملProtocol Verification as a Hardware Design Aid
The role of automatic formal protocol veriica-tion in hardware design is considered. Principles are identiied that maximize the beneets of protocol veriication while minimizing the labor and computation required. A new protocol description language and veriier (both called Mur') are described , along with experiences in applying them to two industrial protocols that were developed as part of ha...
متن کاملEecient Finite-state Analysis for Large Security Protocols
We describe two state reduction techniques for nite-state models of security protocols. The techniques exploit certain protocol properties that we have identiied as characteristic of security protocols. We prove the soundness of the techniques by demonstrating that any violation of protocol invariants is preserved in the reduced state graph. In addition, we describe an optimization method for e...
متن کاملEfficient Finite-State Analysis for Large Security Protocols
We describe two state reduction techniques for nite-state models of security protocols. The techniques exploit certain protocol properties that we have identiied as characteristic of security protocols. We prove the soundness of the techniques by demonstrating that any violation of protocol invariants is preserved in the reduced state graph. In addition, we describe an optimization method for e...
متن کاملBetter Veri cation Through Symmetry 1
We address the state explosion problem in automatic veriication of nite-state systems by exploiting symmetries in the system description. We make symmetries easy to detect by introducing a new data type scalarset, a nite and unordered set, to our description language. The set of operations on scalarsets are restricted so that states are guaranteed to have the same future behavior, up to permuta...
متن کامل