DEPARTMENT OF COMPUTER SCIENCE TARI ROROHIKO Control and Automation Robi Malik Department of Computer Science The University of Waikato

Slides:



Advertisements
Similar presentations
1 Verification by Model Checking. 2 Part 1 : Motivation.
Advertisements

The Quest for Correctness Joseph Sifakis VERIMAG Laboratory 2nd Sogeti Testing Academy April 29th 2009.
Auto-Generation of Test Cases for Infinite States Reactive Systems Based on Symbolic Execution and Formula Rewriting Donghuo Chen School of Computer Science.
DEPARTMENT OF COMPUTER SCIENCE TARI ROROHIKO CZT Support For Z Extensions Tim Miller University of Liverpool, UK Leo Freitas University of York, UK Petra.
CS 267: Automated Verification Lecture 2: Linear vs. Branching time. Temporal Logics: CTL, CTL*. CTL model checking algorithm. Counter-example generation.
M ODEL CHECKING -Vasvi Kakkad University of Sydney.
Algorithmic Software Verification VII. Computation tree logic and bisimulations.
Introducing Formal Methods, Module 1, Version 1.1, Oct., Formal Specification and Analytical Verification L 5.
1 Model checking. 2 And now... the system How do we model a reactive system with an automaton ? It is convenient to model systems with Transition systems.
Automatic Verification Book: Chapter 6. What is verification? Traditionally, verification means proof of correctness automatic: model checking deductive:
ECE Synthesis & Verification - L271 ECE 697B (667) Spring 2006 Synthesis and Verification of Digital Systems Model Checking basics.
Temporal Logic and the NuSMV Model Checker CS 680 Formal Methods Jeremy Johnson.
Introduction to Embedded Systems Chapter 14 Reachability Analysis (14.1, – ) Hao Zheng U of South Florida.
Verification of Hybrid Systems An Assessment of Current Techniques Holly Bowen.
Model Checking Inputs: A design (in some HDL) and a property (in some temporal logic) Outputs: Decision about whether or not the property always holds.
Chair of Software Engineering Software Verification Stephan van Staden Lecture 10: Model Checking.
CIS 540 Principles of Embedded Computation Spring Instructor: Rajeev Alur
The Software Model Checker BLAST by Dirk Beyer, Thomas A. Henzinger, Ranjit Jhala and Rupak Majumdar Presented by Yunho Kim Provable Software Lab, KAIST.
EECE Hybrid and Embedded Systems: Computation T. John Koo, Ph.D. Institute for Software Integrated Systems Department of Electrical Engineering and.
Lecture 4&5: Model Checking: A quick introduction Professor Aditya Ghose Director, Decision Systems Lab School of IT and Computer Science University of.
Tomorrow’s Software Today ® HCMDSS Panel Presentation: Software and Systems Engineering for Medical Devices W. Rance Cleaveland II, PhD CEO, Reactive Systems.
Systems with small trusted computing bases (TCBs) open possibility for automated security verification of systems Example: SecVisor - a 3kLOC security.
EECE Hybrid and Embedded Systems: Computation
Review of the automata-theoretic approach to model-checking.
Embedded Systems Laboratory Department of Computer and Information Science Linköping University Sweden Formal Verification and Model Checking Traian Pop.
Composing Security Policies on Java Cards Michael McDougall with Rajeev Alur and Carl A. Gunter University of Pennsylvania April 26, 2004.
Automata and Formal Lanugages Büchi Automata and Model Checking Ralf Möller based on slides by Chang-Beom Choi Provable Software Lab, KAIST.
1 Carnegie Mellon UniversitySPINFlavio Lerda Bug Catching SPIN An explicit state model checker.
Verification technique on SA applications using Incremental Model Checking 컴퓨터학과 신영주.
© Siemens AG, CT SE 1, Dr. A. Ulrich C O R P O R A T E T E C H N O L O G Y Research at Siemens CT SE Software & Engineering Development Techniques.
Course Overview CS 680: Formal Methods for Verification of Computer Systems Jeremy Johnson Drexel University.
On the relation between software development and control function development in automotive embedded systems Stefan Kowalewski Embedded Software Laboratory.
Institute for Applied Information Processing and Communications 1 Karin Greimel Semmering, Open Implication.
ECE 720T5 Winter 2014 Cyber-Physical Systems Rodolfo Pellizzoni.
Parallel and Distributed Computing in Model Checking Diana DUBU (UVT) Dana PETCU (IeAT, UVT)
Department of Mechanical Engineering The University of Strathclyde, Glasgow Hybrid Systems: Modelling, Analysis and Control Yan Pang Department of Mechanical.
Author: Graham Hughes, Tevfik Bultan Computer Science Department, University of California, Santa Barbara, CA 93106, USA Source: International Journal.
CEFRIEL Consorzio per la Formazione e la Ricerca in Ingegneria dell’Informazione Politecnico di Milano Model Checking UML Specifications of Real Time Software.
B. Fernández, D. Darvas, E. Blanco Formal methods appliedto PLC code verification Automation seminar CERN – IFAC (CEA) 02/06/2014.
Framework for the Development and Testing of Dependable and Safety-Critical Systems IKTA 065/ Supported by the Information and Communication.
1 Probabilistic Model Checking of Systems with a Large State Space: A Stratified Approach Shou-pon Lin Advisor: Nicholas F. Maxemchuk Department of Electrical.
1) Occupation 1a) Academic level If student 2) Institution and department.
© Andrew IrelandDependable Systems Group On the Scalability of Proof Carrying Code for Software Certification Andrew Ireland School of Mathematical & Computer.
Dynamic software reconfiguration using control supervisors Ugo Buy 13 June 2005.
More on Correctness. Prime Factorization Problem: Write a program that computes all the prime factors of a given number Solution (Idea): Factors are less.
Xiaosong Lu Togashi Laboratory Department of Computer Science Shizuoka University April 1999 Specification and Verification of Hierarchical Reactive Systems.
Verification & Validation By: Amir Masoud Gharehbaghi
HACNet Simulation-based Validation of Security Protocols Vinay Venkataraghavan Advisors: S.Nair, P.-M. Seidel HACNet Lab Computer Science and Engineering.
1) Occupation 1a) Academic level If student 2) Institution and department.
DEPARTMENT OF COMPUTER SCIENCE TARI ROROHIKO Formal Methods at Waikato The University of Waikato Department of Computer Science Formal Methods Group
Model Checking for Simple Java Programs Taehoon Lee, Gihwon Kwon Department of Computer Science Kyonggi University, Korea IWFST, Shanghai, China,
What is Computer Control? A set of instructions programmed into a machine, which will cause it to operate in a predetermined manner. e.g the traffic.
The Alloy Analyzer June 14 th Alloy small modelling notation that can express a useful range of structural properties is easy to read and write.
Automated Composition and Analysis. Web Services: Design and Analysis2 Automated Composition Given a specification of the composite service, find individual.
1 CSEP590 – Model Checking and Automated Verification Lecture outline for July 9, 2003.
ECE/CS 584: Verification of Embedded Computing Systems Model Checking Timed Automata Sayan Mitra Lecture 09.
Model Checking Lecture 1. Model checking, narrowly interpreted: Decision procedures for checking if a given Kripke structure is a model for a given formula.
CIS 540 Principles of Embedded Computation Spring Instructor: Rajeev Alur
Bourbaki Design Automation Miodrag Potkonjak Computer Science Department UCLA Design Automation Perspective Challenge 2015.
On Concurrency Idioms and their Effect on Program Analysis Weizmann Institute of Science Guy Katz and David Harel.
CIS 540 Principles of Embedded Computation Spring Instructor: Rajeev Alur
Foundations of Engineering and Technology Careers in Engineering.
CS5270 Lecture 41 Timed Automata I CS 5270 Lecture 4.
 Creates machines, robots, and tools etc..  Designs these things using mechanics, thermodynamics, materials science etc..
4/11/2005 Applied Logic & Computation for System Design - An introductory invitation Jie-Hong R. Jiang 江介宏 National Taiwan University.
Sandeep Patil, Sayantan Bhadra, Valeriy Vyatkin
Hardware Acceleration of A Boolean Satisfiability Solver
Formal Methods in software development
An explicit state model checker
Translating Linear Temporal Logic into Büchi Automata
Presentation transcript:

DEPARTMENT OF COMPUTER SCIENCE TARI ROROHIKO Control and Automation Robi Malik Department of Computer Science The University of Waikato Analysis and Synthesis of Finite-State Systems

15 June 2005 © THE UNIVERSITY OF WAIKATO TE WHARE WANANGA O WAIKATO 2 Control Systems Technical devices  Household equipment  Automotive electronics  Industrial plants All these are …  often safety-critical  reactive systems

15 June 2005 © THE UNIVERSITY OF WAIKATO TE WHARE WANANGA O WAIKATO 3 Model Checkers Real-world system Never blow up! Desired property AG  blow_up Logic formula Finite-state model Model checker Yes or  No

15 June 2005 © THE UNIVERSITY OF WAIKATO TE WHARE WANANGA O WAIKATO 4 Central Locking System Model:  Finite-state machines  Composed by strict synchronisation timer wsptime

15 June 2005 © THE UNIVERSITY OF WAIKATO TE WHARE WANANGA O WAIKATO 5 Model Checking Large Systems Central Locking System  51 automata  7.5  10 8 reachable states Conflicting ! timer wsptime

15 June 2005 © THE UNIVERSITY OF WAIKATO TE WHARE WANANGA O WAIKATO 6 Verification vs. Synthesis Verification  Check whether a given system satisfies desired properties  Find bugs Synthesis  Automatically construct a system from its desired properties Real-world system Never blow up! Desired property

15 June 2005 © THE UNIVERSITY OF WAIKATO TE WHARE WANANGA O WAIKATO 7 Example of Using Synthesis ?

15 June 2005 © THE UNIVERSITY OF WAIKATO TE WHARE WANANGA O WAIKATO 8 Control Systems at Waikato Using and developing tools to …  edit finite-state models,  check properties,  synthesise controllers,  using new methods to do this in a smart way.