Parameterized Verification of Synchronized Concurrent Programs

Parameterized Verification of Synchronized Concurrent Programs
Author :
Publisher : Linköping University Electronic Press
Total Pages : 192
Release :
ISBN-10 : 9789179296971
ISBN-13 : 9179296971
Rating : 4/5 (71 Downloads)

Synopsis Parameterized Verification of Synchronized Concurrent Programs by : Zeinab Ganjei

There is currently an increasing demand for concurrent programs. Checking the correctness of concurrent programs is a complex task due to the interleavings of processes. Sometimes, violation of the correctness properties in such systems causes human or resource losses; therefore, it is crucial to check the correctness of such systems. Two main approaches to software analysis are testing and formal verification. Testing can help discover many bugs at a low cost. However, it cannot prove the correctness of a program. Formal verification, on the other hand, is the approach for proving program correctness. Model checking is a formal verification technique that is suitable for concurrent programs. It aims to automatically establish the correctness (expressed in terms of temporal properties) of a program through an exhaustive search of the behavior of the system. Model checking was initially introduced for the purpose of verifying finite‐state concurrent programs, and extending it to infinite‐state systems is an active research area. In this thesis, we focus on the formal verification of parameterized systems. That is, systems in which the number of executing processes is not bounded a priori. We provide fully-automatic and parameterized model checking techniques for establishing the correctness of safety properties for certain classes of concurrent programs. We provide an open‐source prototype for every technique and present our experimental results on several benchmarks. First, we address the problem of automatically checking safety properties for bounded as well as parameterized phaser programs. Phaser programs are concurrent programs that make use of the complex synchronization construct of Habanero Java phasers. For the bounded case, we establish the decidability of checking the violation of program assertions and the undecidability of checking deadlock‐freedom. For the parameterized case, we study different formulations of the verification problem and propose an exact procedure that is guaranteed to terminate for some reachability problems even in the presence of unbounded phases and arbitrarily many spawned processes. Second, we propose an approach for automatic verification of parameterized concurrent programs in which shared variables are manipulated by atomic transitions to count and synchronize the spawned processes. For this purpose, we introduce counting predicates that related counters that refer to the number of processes satisfying some given properties to the variables that are directly manipulated by the concurrent processes. We then combine existing works on the counter, predicate, and constrained monotonic abstraction and build a nested counterexample‐based refinement scheme to establish correctness. Third, we introduce Lazy Constrained Monotonic Abstraction for more efficient exploration of well‐structured abstractions of infinite‐state non‐monotonic systems. We propose several heuristics and assess the efficiency of the proposed technique by extensive experiments using our open‐source prototype. Lastly, we propose a sound but (in general) incomplete procedure for automatic verification of safety properties for a class of fault‐tolerant distributed protocols described in the Heard‐Of (HO for short) model. The HO model is a popular model for describing distributed protocols. We propose a verification procedure that is guaranteed to terminate even for unbounded number of the processes that execute the distributed protocol.

Verification, Model Checking, and Abstract Interpretation

Verification, Model Checking, and Abstract Interpretation
Author :
Publisher : Springer
Total Pages : 482
Release :
ISBN-10 : 9783662460818
ISBN-13 : 3662460815
Rating : 4/5 (18 Downloads)

Synopsis Verification, Model Checking, and Abstract Interpretation by : Deepak D'Souza

This book constitutes the refereed proceedings of the 16th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2015, held in Mumbai, India, in January 2015. The 24 revised full papers presented were carefully reviewed and selected from 53 submissions. The papers cover a wide range of topics including program verification, model checking, abstract interpretation, abstract domains, program synthesis, static analysis, deductive methods, program certification, error diagnosis, program transformation, and hybrid and cyberphysical systems.

PROCEEDINGS OF THE 22ND CONFERENCE ON FORMAL METHODS IN COMPUTER-AIDED DESIGN – FMCAD 2022

PROCEEDINGS OF THE 22ND CONFERENCE ON FORMAL METHODS IN COMPUTER-AIDED DESIGN – FMCAD 2022
Author :
Publisher : TU Wien Academic Press
Total Pages : 405
Release :
ISBN-10 : 9783854480532
ISBN-13 : 3854480539
Rating : 4/5 (32 Downloads)

Synopsis PROCEEDINGS OF THE 22ND CONFERENCE ON FORMAL METHODS IN COMPUTER-AIDED DESIGN – FMCAD 2022 by : Alberto Griggio

The Conference on Formal Methods in Computer-Aided Design (FMCAD) is an annual conference on the theory and applications of formal methods in hardware and system in academia and industry for presenting and discussing groundbreaking methods, technologies, theoretical results, and tools for reasoning formally about computing systems. FMCAD covers formal aspects of computer-aided system testing.

Programming Languages and Systems

Programming Languages and Systems
Author :
Publisher : Springer
Total Pages : 351
Release :
ISBN-10 : 9783540893301
ISBN-13 : 354089330X
Rating : 4/5 (01 Downloads)

Synopsis Programming Languages and Systems by : G. Ramalingam

This book constitutes the refereed proceedings of the 6th Asian Symposium on Programming Languages and Systems, APLAS 2008, held in Bangalore, India, in December 2008. The 20 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 41 submissions. The symposium is devoted to all topics ranging from foundational to practical issues in programming languages and systems. The papers cover topics such as semantics, logics, foundational theory, type systems, language design, program analysis, optimization, transformation, software security, safety, verification, compiler systems, interpreters, abstract machines, domain-specific languages and systems, as well as programming tools and environments.

Computer Aided Verification

Computer Aided Verification
Author :
Publisher : Springer
Total Pages : 558
Release :
ISBN-10 : 9783030255435
ISBN-13 : 3030255433
Rating : 4/5 (35 Downloads)

Synopsis Computer Aided Verification by : Isil Dillig

The open access two-volume set LNCS 11561 and 11562 constitutes the refereed proceedings of the 31st International Conference on Computer Aided Verification, CAV 2019, held in New York City, USA, in July 2019. The 52 full papers presented together with 13 tool papers and 2 case studies, were carefully reviewed and selected from 258 submissions. The papers were organized in the following topical sections: Part I: automata and timed systems; security and hyperproperties; synthesis; model checking; cyber-physical systems and machine learning; probabilistic systems, runtime techniques; dynamical, hybrid, and reactive systems; Part II: logics, decision procedures; and solvers; numerical programs; verification; distributed systems and networks; verification and invariants; and concurrency.

Computer Aided Verification

Computer Aided Verification
Author :
Publisher : Springer
Total Pages : 645
Release :
ISBN-10 : 9783540456575
ISBN-13 : 3540456570
Rating : 4/5 (75 Downloads)

Synopsis Computer Aided Verification by : Ed Brinksma

This volume contains the proceedings of the conference on Computer Aided V- i?cation (CAV 2002), held in Copenhagen, Denmark on July 27-31, 2002. CAV 2002 was the 14th in a series of conferences dedicated to the advancement of the theory and practice of computer-assisted formal analysis methods for software and hardware systems. The conference covers the spectrum from theoretical - sults to concrete applications, with an emphasis on practical veri?cation tools, including algorithms and techniques needed for their implementation. The c- ference has traditionally drawn contributions from researchers as well as prac- tioners in both academia and industry. This year we received 94 regular paper submissions out of which 35 were selected. Each submission received an average of 4 referee reviews. In addition, the CAV program contained 11 tool presentations selected from 16 submissions. For each tool presentation, a demo was given at the conference. The large number of tool submissions and presentations testi?es to the liveliness of the ?eld and its applied ?avor.

Computer Aided Verification

Computer Aided Verification
Author :
Publisher : Springer Nature
Total Pages : 682
Release :
ISBN-10 : 9783030532888
ISBN-13 : 3030532887
Rating : 4/5 (88 Downloads)

Synopsis Computer Aided Verification by : Shuvendu K. Lahiri

The open access two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer Aided Verification, CAV 2020, held in Los Angeles, CA, USA, in July 2020.* The 43 full papers presented together with 18 tool papers and 4 case studies, were carefully reviewed and selected from 240 submissions. The papers were organized in the following topical sections: Part I: AI verification; blockchain and Security; Concurrency; hardware verification and decision procedures; and hybrid and dynamic systems. Part II: model checking; software verification; stochastic systems; and synthesis. *The conference was held virtually due to the COVID-19 pandemic.

Handbook of Model Checking

Handbook of Model Checking
Author :
Publisher : Springer
Total Pages : 1210
Release :
ISBN-10 : 9783319105758
ISBN-13 : 3319105752
Rating : 4/5 (58 Downloads)

Synopsis Handbook of Model Checking by : Edmund M. Clarke

Model checking is a computer-assisted method for the analysis of dynamical systems that can be modeled by state-transition systems. Drawing from research traditions in mathematical logic, programming languages, hardware design, and theoretical computer science, model checking is now widely used for the verification of hardware and software in industry. The editors and authors of this handbook are among the world's leading researchers in this domain, and the 32 contributed chapters present a thorough view of the origin, theory, and application of model checking. In particular, the editors classify the advances in this domain and the chapters of the handbook in terms of two recurrent themes that have driven much of the research agenda: the algorithmic challenge, that is, designing model-checking algorithms that scale to real-life problems; and the modeling challenge, that is, extending the formalism beyond Kripke structures and temporal logic. The book will be valuable for researchers and graduate students engaged with the development of formal methods and verification tools.

Model Checking Software

Model Checking Software
Author :
Publisher : Springer
Total Pages : 271
Release :
ISBN-10 : 9783642317590
ISBN-13 : 3642317596
Rating : 4/5 (90 Downloads)

Synopsis Model Checking Software by : Alastair Donaldson

This book constitutes the thoroughly refereed proceedings of the 19th International SPIN workshop on Model Checking Software, SPIN 2012, held in Oxford, UK, in July 2012. The 11 revised full papers presented together with 5 tool papers and 4 invited talks were carefully reviewed and selected from 30 submissions. The papers are grouped in topical sections on model checking techniques; parallel model checking; case studies; model checking for concurrency; and tool demonstrations.

Beyond Recognition

Beyond Recognition
Author :
Publisher : Linköping University Electronic Press
Total Pages : 103
Release :
ISBN-10 : 9789180756761
ISBN-13 : 918075676X
Rating : 4/5 (61 Downloads)

Synopsis Beyond Recognition by : Le Minh-Ha

This thesis addresses the need to balance the use of facial recognition systems with the need to protect personal privacy in machine learning and biometric identification. As advances in deep learning accelerate their evolution, facial recognition systems enhance security capabilities, but also risk invading personal privacy. Our research identifies and addresses critical vulnerabilities inherent in facial recognition systems, and proposes innovative privacy-enhancing technologies that anonymize facial data while maintaining its utility for legitimate applications. Our investigation centers on the development of methodologies and frameworks that achieve k-anonymity in facial datasets; leverage identity disentanglement to facilitate anonymization; exploit the vulnerabilities of facial recognition systems to underscore their limitations; and implement practical defenses against unauthorized recognition systems. We introduce novel contributions such as AnonFACES, StyleID, IdDecoder, StyleAdv, and DiffPrivate, each designed to protect facial privacy through advanced adversarial machine learning techniques and generative models. These solutions not only demonstrate the feasibility of protecting facial privacy in an increasingly surveilled world, but also highlight the ongoing need for robust countermeasures against the ever-evolving capabilities of facial recognition technology. Continuous innovation in privacy-enhancing technologies is required to safeguard individuals from the pervasive reach of digital surveillance and protect their fundamental right to privacy. By providing open-source, publicly available tools, and frameworks, this thesis contributes to the collective effort to ensure that advancements in facial recognition serve the public good without compromising individual rights. Our multi-disciplinary approach bridges the gap between biometric systems, adversarial machine learning, and generative modeling to pave the way for future research in the domain and support AI innovation where technological advancement and privacy are balanced.