MSR 3.0: The Logical Meeting Point of Multiset Rewriting and Process Algebra Iliano Cervesato ITT Industries, NRL Washington,

Slides:



Advertisements
Similar presentations
Copyright 2001, ActiveState. XSLT and Scripting Languages or…XSLT: what is everyone so hot and bothered about?
Advertisements

Programming Languages and Paradigms
Tail Recursion. Problems with Recursion Recursion is generally favored over iteration in Scheme and many other languages – It’s elegant, minimal, can.
Recursion vs. Iteration The original Lisp language was truly a functional language: –Everything was expressed as functions –No local variables –No iteration.
Search and Recursion pt. 2 CS221 – 2/25/09. How to Implement Binary Search Take a sorted data-set to search and a key to search for Start at the mid-point.
CS 333 Introduction to Operating Systems Class 12 - Virtual Memory (2) Jonathan Walpole Computer Science Portland State University.
A Concurrent Logical Framework (Joint work with Frank Pfenning, David Walker, and Kevin Watkins) Iliano Cervesato ITT Industries,
MSR 3: One Year Later Iliano Cervesato ITT Industries, NRL Washington, DC Protocol eXchange.
December 7, 2001DIMI, Universita’ di Udine, Italy Graduate Course on Computer Security Lecture 9: Automated Verification Iliano Cervesato
Paper Analysis Implementing Multi-stage Languages Using ASTs, Gensym, and Reflection by Calcagno, Taha, Huang, and Leroy.
Outline for Today More math… Finish linear algebra: Matrix composition
Fine-Grained MSR Specifications for Quantitative Security Analysis Iliano Cervesato ITT Industries, NRL Washington, DC
Fault Tree Representation of Security Requirements0.
1 Ivan Lanese Computer Science Department University of Bologna Italy Concurrent and located synchronizations in π-calculus.
A logic for reasoning about digital rights Riccardo Pucella, Vicky Weissman Cornell University.
Fine-Grained MSR Specifications for Quantitative Security Analysis Iliano Cervesato ITT Industries, NRL Washington, DC
Functional Modeling Chapter 6.
CS 104 Introduction to Computer Science and Graphics Problems Software and Programming Language (2) Programming Languages 09/26/2008 Yang Song (Prepared.
December 6, 2001DIMI, Universita’ di Udine, Italy Graduate Course on Computer Security Lecture 8: Intruder Models Iliano Cervesato
CS 450: Computer Graphics 2D TRANSFORMATIONS
Programming Aesthetics learned from making independent games April 1, 2011.
Tail Recursion. Problems with Recursion Recursion is generally favored over iteration in Scheme and many other languages – It’s elegant, minimal, can.
Systems of Linear Equations Block 44. System of Linear Equations A system of equations is a set or collection of equations that you deal with all together.
Rational Exponents a.k.a. Fractional Exponents
MA/CSSE 473 Day 03 Asymptotics A Closer Look at Arithmetic With another student, try to write a precise, formal definition of “t(n) is in O(g(n))”
The quiz is on the next slide. The quiz will begin once everyone is seated and quiet with a blank piece of paper and something to write with. ALGEBRA.
Donna Messer is inspiring – a passionate motivator who truly walks her talk. She has addressed thousands of people on three continents, bringing with.
1 Compiler Construction (CS-636) Muhammad Bilal Bashir UIIT, Rawalpindi.
HPC User Forum Back End Compiler Panel SiCortex Perspective Kevin Harris Compiler Manager April 2009.
Advanced Computer Architecture and Parallel Processing Rabie A. Ramadan http:
Literacy Centers In-Service January 3, 2007 Facilitator: Amy Lack, Reading Coach.
Virtual Memory Lei Li CS147.
Cleaning up the CFG Eliminating useless nodes & edges C OMP 512 Rice University Houston, Texas Fall 2003 Copyright 2003, Keith D. Cooper & Linda Torczon,
1 Markov Decision Processes Infinite Horizon Problems Alan Fern * * Based in part on slides by Craig Boutilier and Daniel Weld.
Rational Exponents Evaluate rational exponents. 2.Write radicals as expressions raised to rational exponents. 3.Simplify expressions with rational.
CHAPTER 5 Probability Theory (continued) Introduction to Bayesian Networks.
Evolutionary Security CS 610: Advanced Security Gabriel Daleson.
1/32 This Lecture Substitution model An example using the substitution model Designing recursive procedures Designing iterative procedures Proving that.
Spring 2008Programming Development Techniques 1 Topic 5.5 Higher Order Procedures (This goes back and picks up section 1.3 and then sections in Chapter.
Interpreters and Higher-Order Functions CSE 413 Autumn 2008 Credit: CSE341 notes by Dan Grossman.
Which is the odd one out?. Surds Know what is meant by surd form. Understand the process of simplifying surds. To able to explain what you can multiply.
Dr. ClincyLecture Slide 1 CS Chapter 3 (3A and ) Part 2 of 8 Dr. Clincy Professor of CS.
Dividing Polynomials A-APR.6 Rewrite simple rational expressions in different forms; write a(x) / b(x) in the form q(x) + r(x) / b(x), where a(x), b(x),
Certifying and Synthesizing Membership Equational Proofs Patrick Lincoln (SRI) joint work with Steven Eker (SRI), Jose Meseguer (Urbana) and Grigore Rosu.
7/7/20161 Formal Methods in software development a.a.2015/2016 Prof.Anna Labella.
Chapter 8: Recursion Data Structures in Java: From Abstract Data Types to the Java Collections Framework by Simon Gray.
Iliano Cervesato ITT Industries, NRL Washington, DC
Introduction to Generic Programming in C++
Tail Recursion.
CS 498: Spring 2017 Amit, Elena, & Sole
Review Problems Algebra 1 11-R.
Optimization Code Optimization ©SoftMoore Consulting.
Basics of Group Analysis
ITS 145: Intro to Information Systems
Jared Davis The University of Texas at Austin April 6, 2006
Jared Davis CyberTrust Meeting March 1, 2006
Alan Mishchenko Robert Brayton UC Berkeley
Lecture 03: Linear Algebra
Hidden Markov Models Part 2: Algorithms
Math 71B 7.2 – Rational Exponents.
Using Dynamic Programming To Align Sequences
Procedural vs Functional Style
The Elements of Art 1st grade introduction.
Peter+Tony+Carl+Vincent=Sophie
Internetworking: Concepts, Architecture, and Protocols
Dr. Clincy Professor of CS
Instructor Provided Questions
1.3.7 High- and low-level languages and their translators
Testing 123 This is my first slide presentation. Inverted Stamp.
Dr. Clincy Professor of CS
Presentation transcript:

MSR 3.0: The Logical Meeting Point of Multiset Rewriting and Process Algebra Iliano Cervesato ITT Industries, NRL Washington, DC CS Department, UMBCFebruary 27-28, 2003

MSR 3.0 … 1 st slide of my CSFW’00 talk …  Since then  MSR  linear logic  strands  MSR 2.0  MSR  process algebra

MSR 3.0 MSR vs. PA MSR  NRL Prot. Analyzer, CAPSL/CIL, Paulson’s approach, … and Process Algebra  Strand spaces, spi-calculus, other process-based lang. operate in very different ways:  State transitions  Contact evolution

MSR 3.0 Representing Protocols  MSR  a i pass control/data to the next rule  PA n.n’.n’’.n’’’. ….0  Control is implicit n  a 1, n’ n’’, a 1  a 2,n’’’ …

MSR 3.0 During Translation  MSR  PA  Use a i to piece process together  Besides that, very easy  PA  MSR  Synthesize a i  Not trivial for parameters  Come up with state

MSR 3.0 What Makes Encoding Hard? Two activities  Move between formalisms  Move between paradigms Analogy: translate Lisp to C  Turn S-Expressions to structures  Turn recursion into iteration … but C supports recursion …

MSR 3.0 Extending MSR Idea: devise an extension of MSR that brings it closer to PA Benefits  Simplifies translation (a lot)  Internalizes paradigm shift  Independent from target formalism  Easier to understand  In-house optimizations

MSR 3.0  … or higher-order MSR   -multisets w ::=. | a,w | w  w  Computation u,v,(u  w)  v,w

MSR 3.0 PA to MSR 1  PA to MSR 3  MSR 3 to MSR 1  Done completely within MSR  Done once and for all  Opportunity for optimization (FO setting)  Study of memory denial-of-service a.b.c.d.0 a  b, (c  d) a  b,x x,c  d

MSR 3.0 MSR 3 to PA  Easy but not as trivial  Care is required  If we want a somewhat invertible translation

MSR 3.0 The Rest of the Story … but there is more to PA  ||, !, +,, …  There is more to MSR 3  MSR 3 is linear logic in disguise  … more radically so than MSR 1