A Complete Symbolic Bisimulation for Full Applied Pi Calculus

Slides:



Advertisements
Similar presentations
Tintu David Joy. Agenda Motivation Better Verification Through Symmetry-basic idea Structural Symmetry and Multiprocessor Systems Mur ϕ verification system.
Advertisements

Auto-Generation of Test Cases for Infinite States Reactive Systems Based on Symbolic Execution and Formula Rewriting Donghuo Chen School of Computer Science.
GRAPHS, REACTIVE SYSTEMS AND MOBILE AMBIENTS Giacoma Valentina Monreale Supervisor: F. Gadducci.
07/09/2014 Agay Spring School, March'02 Mobility 2 : Mobile Values Cédric Fournet Microsoft Research Cambridge (joint work with Martin Abadi)
Concurrent Operational Semantics of Safe Time Petri Nets Claude Jard European University of Brittany, ENS Cachan Bretagne, IRISA Campus de Ker-Lann,
An Introduction to the Model Verifier verds Wenhui Zhang September 15 th, 2010.
1 PROPERTIES OF A TYPE ABSTRACT INTERPRETATER. 2 MOTIVATION OF THE EXPERIMENT § a well understood case l type inference in functional programming à la.
Efficient Reachability Analysis for Verification of Asynchronous Systems Nishant Sinha.
1 Formal Models for Stability Analysis : Verifying Average Dwell Time * Sayan Mitra MIT,CSAIL Research Qualifying Exam 20 th December.
Course on Probabilistic Methods in Concurrency (Concurrent Languages for Probabilistic Asynchronous Communication) Lecture 1 The pi-calculus and the asynchronous.
Foundations of Interaction ETAPS `05 0 Ex nihilo: a reflective higher- order process calculus The  -calculus L.G. Meredith 1 & Matthias Radestock.
1 Ivan Lanese Computer Science Department University of Bologna Roberto Bruni Computer Science Department University of Pisa A mobile calculus with parametric.
On-the-fly Model Checking from Interval Logic Specifications Manuel I. Capel & Miguel J. Hornos Dept. Lenguajes y Sistemas Informáticos Universidad de.
1 Ivan Lanese Computer Science Department University of Bologna Italy Behavioural Theory for SSCC Joint work with Luis Cruz-Filipe, Francisco Martins,
Validating High-Level Synthesis Sudipta Kundu, Sorin Lerner, Rajesh Gupta Department of Computer Science and Engineering, University of California, San.
Models of Computation for Embedded System Design Alvise Bonivento.
1 Ivan Lanese Computer Science Department University of Bologna Italy Concurrent and located synchronizations in π-calculus.
ESE601: Hybrid Systems Introduction to verification Spring 2006.
1 Ivan Lanese Computer Science Department University of Bologna Italy Behavioural Theory at Work: Program Transformations in a Service-centred Calculus.
1 Formal Engineering of Reliable Software LASER 2004 school Tutorial, Lecture1 Natasha Sharygina Carnegie Mellon University.
University of South Australia CPN’05 Oct Enhancing the CES Protocol and its Verification Lin Liu 1,2 and Jonathan Billington 2 1 School of Computer.
5.3 Systems of Linear Equations in Three Variables
7.1 Graphing Linear Systems
A Decidable Recursive Logic for Weighted Transition Systems Bingtian Xue Aalborg University, DENMARK ICTAC, Sep 18, 2014 Joint work with Kim G. Larsen.
Verification of Information Flow Properties in Cyber-Physical Systems Ravi Akella, Bruce McMillin Department of Computer Science Missouri University of.
Formal Verification Lecture 9. Formal Verification Formal verification relies on Descriptions of the properties or requirements Descriptions of systems.
1 Bisimulations as a Technique for State Space Reductions.
Rewriting Logic Model of Compositional Abstraction of Aspect-Oriented Software FOAL '10Mar. 15, 2010 Yasuyuki Tahara, Akihiko Ohsuga The University of.
Abstract Processes in BPEL4WS Tony Andrews Software Architect Microsoft.
Lecture 81 Regional Automaton CS 5270 Lecture 8. Lecture 82 What We Need to Do Problem: –We need to analyze the timed behavior of a TTS. –The timed behavior.
Algorithms For Time Series Knowledge Mining Fabian Moerchen 沈奕聰.
Programming Languages and Design Lecture 3 Semantic Specifications of Programming Languages Instructor: Li Ma Department of Computer Science Texas Southern.
1 CSEP590 – Model Checking and Automated Verification Lecture outline for August 6, 2003.
Weak Bisimilarity Coalgebraically Andrei Popescu Department of Computer Science University of Illinois.
Lecture 5 1 CSP tools for verification of Sec Prot Overview of the lecture The Casper interface Refinement checking and FDR Model checking Theorem proving.
From Hoare Logic to Matching Logic Reachability Grigore Rosu and Andrei Stefanescu University of Illinois, USA.
Ukrprog Formal requirement language and its applications A.Letichevsky Glushkov Institute of Cybernetics.
Solving System of Equations that have 0, 1, and Infinite Solutions
1 Reasoning with Infinite stable models Piero A. Bonatti presented by Axel Polleres (IJCAI 2001,
On Abductive Equivalence Katsumi Inoue National Institute of Informatics Chiaki Sakama Wakayama University MBR
Model Checking Early Requirements Specifications in Tropos Presented by Chin-Yi Tsai.
Predicate Calculus CS 270 Math Foundations of Computer Science Jeremy Johnson Presentation uses material from Huth and Ryan, Logic in Computer Science:
Rewriting Nested Graphs, through Term Graphs Roberto Bruni, Andrea Corradini, Fabio Gadducci Alberto Lluch Lafuente and Ugo Montanari Dipartimento di Informatica,
Marilyn Wolf1 With contributions from:
Computer Science cpsc322, Lecture 20
Prof. Dr. Holger Schlingloff 1,2 Dr. Esteban Pavese 1
Recursive Identification of Switched ARX Hybrid Models: Exponential Convergence and Persistence of Excitation René Vidal National ICT Australia Brian D.O.Anderson.
SMT-Based Verification of Parameterized Systems
Process Algebra (2IF45) Expressiveness of BPArec
Process Calculus and Security
Hongjin Liang, Xinyu Feng & Ming Fu
SS 2018 Software Verification ML, state machines
Process Calculus.
Internet of Things A Process Calculus Approach
Multiple Aspect Modeling of the Synchronous Language Signal
Frontiers of Computer Science, 2015, 9(6):980–989
open problems Claudio Antares Mezzina
Formal Methods in software development
Presented by: Jacky Ma Date: 11 Dec 2001
Producing short counterexamples using “crucial events”
Overview of the ETSI Test Description Language
Formal Methods in software development
Computer Science cpsc322, Lecture 20
Kyoungwoo Lee, Minyoung Kim, Nikil Dutt, and Nalini Venkatasubramanian
Synthesizing Controllers for Multi-Lane Traffic Maneuvers
Introduction to verification
Dept. of Computation, UMIST
Lec00-outline May 18, 2019 Compiler Design CS416 Compiler Design.
A MODULAR LTS FOR OPEN REACTIVE SYSTEMS
Expressive Power of CCS
Presentation transcript:

A Complete Symbolic Bisimulation for Full Applied Pi Calculus Jia Liu and Huimin Lin Institute of Software, Chinese Academy of Sciences Accepted for SOFSEM2010

Outline Background Motivation Symbolic Semantics Conclusion

Applied Pi Calculus M. Abadi and C. Fournet , 2001 Description and analysis of cryptographic protocols Communication, Concurrency and Scope extrusion Primitive Functions: f, enc, dec Equational Theory:

Syntax

Active Substitution {M/x} x can be regarded as an alias of term M Floats and applies to the process coming into contact with it Partial environment knowledge Special mechanism for outputting compound messages

Structural Equivalence

Operational Semantics

Example

Labeled Bisimilarity Static Equivalence Labeled Bisimilarity Labeled bisimilarity coincides with barbed equivalence.

Problem Automated Verification Infinite number of possible behaviors of the attacker Symbolic theory: more amenable and efficient

Symbolic Theory Symbolic Theory Symbolic Transition Relation: basic idea: a variable with constraints value-passing CCS: originally proposed by M.Hennessy and H.Lin Pi-Calculus: by M.Boreale and R.De Nicola and independently by H.Lin Symbolic Transition Relation: Symbolic Bisimilarity:

Symbolic Semantics for Applied Pi Calculus Structural Equivalence Unexpectedly technically difficult general data structure mobility mechanism of alias

Related Work S. Delaune, S. Kremer and M. D. Ryan , Symbolic Bisimulation for the Applied Pi- Calculus, FSTTCS07 Intermediate Representation: Circumventing the difficulties caused by Intermediate Processes: a selected but sufficient subset Bridging the gap between symbolic semantics and concrete semantics

Deficiencies Complicated: sound but incomplete: absence of partition of constraints, informally, Finite fragment of the calculus: infinitely many name binders

Symbolic Semantics Symbolic Bisimilarity : sound and complete w.r.t Infinite Fragment of Applied Pi

Intermediate Representation

Transformation : transforming an extended process to an inter. extended process by Pulling all name binders to the top level Applying active substitutions Eliminating variable restrictions

Transformation(cont.) Recursions Infinitely many binders “on-the-fly”

Constraints Constraint

Trails Trail:

Formulas Formulas Satisfiability for formulas to ``stand alone'‘

Partition : the set of substitutions which respect and satisfy . A collection of formulas is a partition of under if

Symbolic Operational Semantics

Symbolic Operational Semantics(cont.)

Example

Updating Trails

Example

Symbolic Bisimulation

Soundness and Completeness

Example

Conclusion We have presented a general symbolic framework for the applied pi calculus in which a sound and complete notion of symbolic bisimulation is devised. Moreover, our framework accommodates recursions, hence our result is for the full applied pi-calculus.

Thanks!