
In
computer science, model checking or property checking is a method for checking whether a
finite-state model of a system meets a given
specification (also known as
correctness). This is typically associated with
hardware or
software systems, where the specification contains liveness requirements (such as avoidance of
livelock) as well as safety requirements (such as avoidance of states representing a
system crash
''System Crash'' is a Canadian youth sketch comedy television series, which aired on YTV from March 14, 1999 to December 9, 2001.
The series centred on a group of students in a junior high school media club, telling the events of their ficti ...
).
In order to solve such a problem
algorithmically, both the model of the system and its specification are formulated in some precise mathematical language. To this end, the problem is formulated as a task in
logic, namely to check whether a
structure
A structure is an arrangement and organization of interrelated elements in a material object or system, or the object or system so organized. Material structures include man-made objects such as buildings and machines and natural objects such as ...
satisfies a given logical formula. This general concept applies to many kinds of logic and many kinds of structures. A simple model-checking problem consists of verifying whether a formula in the
propositional logic is satisfied by a given structure.
Overview
Property checking is used for
verification when two descriptions are not equivalent. During
refinement, the specification is complemented with details that are
unnecessary in the higher-level specification. There is no need to verify the newly introduced properties against the original specification since this is not possible. Therefore, the strict bi-directional equivalence check is relaxed to a one-way property check. The implementation or design is regarded as a model of the system, whereas the specifications are properties that the model must satisfy.
An important class of model-checking methods has been developed for checking models of
hardware and
software designs where the specification is given by a
temporal logic formula. Pioneering work in temporal logic specification was done by
Amir Pnueli
Amir Pnueli ( he, אמיר פנואלי; April 22, 1941 – November 2, 2009) was an Israeli computer scientist and the 1996 Turing Award recipient.
Biography
Pnueli was born in Nahalal, in the British Mandate of Palestine (now in Israel) and rec ...
, who received the 1996 Turing award for "seminal work introducing temporal logic into computing science". Model checking began with the pioneering work of
E. M. Clarke
Edmund Melson Clarke, Jr. (July 27, 1945 – December 22, 2020) was an American computer scientist and academic noted for developing model checking, a method for formally verifying hardware and software designs. He was the FORE Systems Professor ...
,
E. A. Emerson
Ernest Allen Emerson II (born June 2, 1954), better known as E. Allen Emerson, is an American computer scientist and winner of the 2007 Turing Award. He is Professor and Regents Chair Emeritus at the University of Texas at Austin, United States. ...
,
[Edmund M. Clarke, E. Allen Emerson]
"Design and Synthesis of Synchronization Skeletons Using Branching-Time Temporal Logic"
Logic of Programs 1981: 52-71. by J. P. Queille, and
J. Sifakis
Joseph Sifakis ( Greek: Ιωσήφ Σηφάκης) is a Greek-French computer scientist. He received the 2007 Turing Award, along with Edmund M. Clarke and E. Allen Emerson, for his work on model checking.
Biography
Joseph Sifakis was born in H ...
.
Clarke, Emerson, and Sifakis shared the 2007
Turing Award for their seminal work founding and developing the field of model checking.
Model checking is most often applied to hardware designs. For software, because of undecidability (see
computability theory
Computability theory, also known as recursion theory, is a branch of mathematical logic, computer science, and the theory of computation that originated in the 1930s with the study of computable functions and Turing degrees. The field has since e ...
) the approach cannot be fully algorithmic, apply to all systems, and always give an answer; in the general case, it may fail to prove or disprove a given property. In
embedded-systems hardware, it is possible to validate a specification delivered, e.g., by means of
UML activity diagrams or control-interpreted
Petri nets.
The structure is usually given as a source code description in an industrial
hardware description language or a special-purpose language. Such a program corresponds to a
finite state machine (FSM), i.e., a
directed graph consisting of nodes (or
vertices) and
edges
Edge or EDGE may refer to:
Technology Computing
* Edge computing, a network load-balancing system
* Edge device, an entry point to a computer network
* Adobe Edge, a graphical development application
* Microsoft Edge, a web browser developed by ...
. A set of atomic propositions is associated with each node, typically stating which memory elements are one. The
nodes represent states of a system, the edges represent possible transitions that may alter the state, while the atomic propositions represent the basic properties that hold at a point of execution.
Formally, the problem can be stated as follows: given a desired property, expressed as a temporal logic formula
, and a structure
with initial state
, decide if
. If
is finite, as it is in hardware, model checking reduces to a
graph search
In computer science, graph traversal (also known as graph search) refers to the process of visiting (checking and/or updating) each vertex in a graph. Such traversals are classified by the order in which the vertices are visited. Tree traversal ...
.
Symbolic model checking
Instead of enumerating reachable states one at a time, the state space can sometimes be traversed more efficiently by considering large numbers of states at a single step. When such state-space traversal is based on representations of a set of states and transition relations as logical formulas,
binary decision diagrams
In computer science, a binary decision diagram (BDD) or branching program is a data structure that is used to represent a Boolean function. On a more abstract level, BDDs can be considered as a compressed representation of sets or relations. Un ...
(BDD) or other related data structures, the model-checking method is ''symbolic''.
Historically, the first symbolic methods used
BDDs. After the success of
propositional satisfiability
In logic and computer science, the Boolean satisfiability problem (sometimes called propositional satisfiability problem and abbreviated SATISFIABILITY, SAT or B-SAT) is the problem of determining if there exists an interpretation that satisfi ...
in solving the
planning
Planning is the process of thinking regarding the activities required to achieve a desired goal. Planning is based on foresight, the fundamental capacity for mental time travel. The evolution of forethought, the capacity to think ahead, is consi ...
problem in
artificial intelligence (see
satplan) in 1996, the same approach was generalized to model checking for
linear temporal logic In logic, linear temporal logic or linear-time temporal logic (LTL) is a modal temporal logic with modalities referring to time. In LTL, one can encode formulae about the future of paths, e.g., a condition will eventually be true, a condition will ...
(LTL): the planning problem corresponds to model checking for safety properties. This method is known as bounded model checking. The success of
Boolean satisfiability solvers in bounded model checking led to the widespread use of satisfiability solvers in symbolic model checking.
Example
One example of such a system requirement:
''Between the time an elevator is called at a floor and the time it opens its doors at that floor, the elevator can arrive at that floor at most twice''. The authors of "Patterns in Property Specification for Finite-State Verification" translate this requirement into the following LTL formula:
:
Here,
should be read as "always",
as "eventually",
as "until" and the other symbols are standard logical symbols,
for "or",
for "and" and
for "not".
Techniques
Model-checking tools face a combinatorial blow up of the state-space, commonly known as the
state explosion problem, that must be addressed to solve most real-world problems. There are several approaches to combat this problem.
# Symbolic algorithms avoid ever explicitly constructing the graph for the finite state machines (FSM); instead, they represent the graph implicitly using a formula in quantified propositional logic. The use of binary decision diagrams (BDDs) was made popular by the work of Ken McMillan and the development of open-source BDD manipulation libraries such as CUDD and BuDDy.
# Bounded model-checking algorithms unroll the FSM for a fixed number of steps,
, and check whether a property violation can occur in
or fewer steps. This typically involves encoding the restricted model as an instance of
SAT. The process can be repeated with larger and larger values of
until all possible violations have been ruled out (cf.
Iterative deepening depth-first search).
#
Abstraction attempts to prove properties of a system by first simplifying it. The simplified system usually does not satisfy exactly the same properties as the original one so that a process of refinement may be necessary. Generally, one requires the abstraction to be ''sound'' (the properties proved on the abstraction are true of the original system); however, sometimes the abstraction is not ''complete'' (not all true properties of the original system are true of the abstraction). An example of abstraction is to ignore the values of non-boolean variables and to only consider boolean variables and the control flow of the program; such an abstraction, though it may appear coarse, may, in fact, be sufficient to prove e.g. properties of
mutual exclusion.
# Counterexample-guided abstraction refinement (CEGAR) begins checking with a coarse (i.e. imprecise) abstraction and iteratively refines it. When a violation (i.e.
counterexample) is found, the tool analyzes it for feasibility (i.e., is the violation genuine or the result of an incomplete abstraction?). If the violation is feasible, it is reported to the user. If it is not, the proof of infeasibility is used to refine the abstraction and checking begins again.
Model-checking tools were initially developed to reason about the logical correctness of
discrete state systems, but have since been extended to deal with real-time and limited forms of
hybrid systems.
First-order logic
Model checking is also studied in the field of
computational complexity theory. Specifically, a
first-order logical formula is fixed without
free variables and the following
decision problem is considered:
''Given a finite
interpretation
Interpretation may refer to:
Culture
* Aesthetic interpretation, an explanation of the meaning of a work of art
* Allegorical interpretation, an approach that assumes a text should not be interpreted literally
* Dramatic Interpretation, an event ...
, for instance, one described as a
relational database
A relational database is a (most commonly digital) database based on the relational model of data, as proposed by E. F. Codd in 1970. A system used to maintain relational databases is a relational database management system (RDBMS). Many relatio ...
, decide whether the interpretation is a model of the formula.''
This problem is in the
circuit class
In theoretical computer science, circuit complexity is a branch of computational complexity theory in which Boolean functions are classified according to the size or depth of the Boolean circuits that compute them. A related notion is the circ ...
AC0. It is
tractable when imposing some restrictions on the input structure: for instance, requiring that it has
treewidth bounded by a constant (which more generally implies the tractability of model checking for
monadic second-order logic), bounding the
degree
Degree may refer to:
As a unit of measurement
* Degree (angle), a unit of angle measurement
** Degree of geographical latitude
** Degree of geographical longitude
* Degree symbol (°), a notation used in science, engineering, and mathemati ...
of every domain element, and more general conditions such as
bounded expansion
In graph theory, a family of graphs is said to have bounded expansion if all of its shallow minors are sparse graphs. Many natural families of sparse graphs have bounded expansion. A closely related but stronger property, polynomial expansion, ...
, locally bounded expansion, and nowhere-dense structures. These results have been extended to the task of
enumerating all solutions to a first-order formula with free variables.
Tools
Here is a list of significant model-checking tools:
*
Alloy (Alloy Analyzer)
*
BLAST (Berkeley Lazy Abstraction Software Verification Tool)
*
CADP (Construction and Analysis of Distributed Processes) a toolbox for the design of communication protocols and distributed systems
*
CPAchecker
CPAchecker is a framework and tool for formal software verification, and program analysis, of C programs. Some of its ideas and concepts, for example lazy abstraction, were inherited from the software model checker BLAST.
CPAchecker is based on ...
: an open-source software model checker for C programs, based on the CPA framework
*
ECLAIR: a platform for the automatic analysis, verification, testing, and transformation of C and C++ programs
*
FDR2
FDR (Failures-Divergences Refinement) and subsequently FDR2, FDR3 and FDR4 are Refinement (computing), refinement checking software tools, designed to check formal models expressed in Communicating sequential processes (CSP). The tools were origi ...
: a model checker for verifying real-time systems modelled and specified as
CSP
CSP may refer to:
Education
* College Student Personnel, an academic discipline
* Commonwealth Supported Place, a category in Australian education
* Concordia University (Saint Paul, Minnesota), US
Organizations
* Caledonian Steam Packet Compa ...
Processes
*
ISP code level verifier for
MPI
MPI or Mpi may refer to:
Science and technology Biology and medicine
* Magnetic particle imaging, an emerging non-invasive tomographic technique
* Myocardial perfusion imaging, a nuclear medicine procedure that illustrates the function of the hear ...
programs
*
Java Pathfinder: an open-source model checker for Java programs
*
Libdmc
Libdmc is a library designed at the LIP6 laboratory. Its goal is to ease the distribution of existing model checkers. It has also been designed to provide the most generic interfaces, without sacrificing performance, thanks to the C++ language.
...
: a framework for distributed model checking
*
mCRL2 Toolset,
Boost Software License
Boost is a set of libraries for the C++ programming language that provides support for tasks and structures such as linear algebra, pseudorandom number generation, multithreading, image processing, regular expressions, and unit testing. It conta ...
, Based on
ACP
*
NuSMV: a new symbolic model checker
*
PAT: an enhanced simulator, model checker and refinement checker for concurrent and real-time systems
*
Prism: a probabilistic symbolic model checker
*
Roméo: an integrated tool environment for modelling, simulation, and verification of real-time systems modelled as parametric, time, and stopwatch Petri nets
*
SPIN
Spin or spinning most often refers to:
* Spinning (textiles), the creation of yarn or thread by twisting fibers together, traditionally by hand spinning
* Spin, the rotation of an object around a central axis
* Spin (propaganda), an intentionally b ...
: a general tool for verifying the correctness of distributed software models in a rigorous and mostly automated fashion
*
TAPAs: a tool for the analysis of process algebra
*
TAPAAL: an integrated tool environment for modelling, validation, and verification of Timed-Arc
Petri Nets
*
TLA+ model checker by
Leslie Lamport
*
UPPAAL
UPPAAL is an integrated tool environment for modeling, validation and verification of real-time systems modeled as networks of timed automata, extended with data types (bounded integers, arrays etc.).
It has been used in at least 17 case studie ...
: an integrated tool environment for modelling, validation, and verification of real-time systems modelled as networks of timed automata
*
ZingZing
/ref> – experimental tool from Microsoft to validate state models of software at various levels: high-level protocol descriptions, work-flow specifications, web services, device drivers, and protocols in the core of the operating system. Zing is currently being used for developing drivers for Windows.
See also
References
Further reading
*
*
*
*
*
*. JA Bergstra, A. Ponse and SA Smolka, editors." ().
*
*
*
*
*
*
* (this is also a very good introduction and overview of model checking)
{{DEFAULTSORT:Model Checking