Bounded model checking using satisfiability solving

被引:391
|
作者
Clarke, E
Biere, A
Raimi, R
Zhu, Y
机构
[1] Carnegie Mellon Univ, Dept Comp Sci, Pittsburgh, PA 15213 USA
[2] Swiss Fed Inst Technol, Inst Comp Syst, CH-8092 Zurich, Switzerland
[3] TriMedia Technol Inc, Austin, TX 78704 USA
[4] Synopsys Inc, Mountain View, CA 94043 USA
基金
美国国家科学基金会;
关键词
model checking; processor verification; satisfiability; bounded model checking; cone of influence reduction;
D O I
10.1023/A:1011276507260
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The phrase model checking refers to algorithms for exploring the state space of a transition system to determine if it obeys a specification of its intended behavior. These algorithms can perform exhaustive verification in a highly automatic manner, and, thus, have attracted much interest in industry. Model checking programs are now being commercially marketed. However, model checking has been held back by the state explosion problem, which is the problem that the number of states in a system grows exponentially in the number of system components. Much research has been devoted to ameliorating this problem. In this tutorial, we first give a brief overview of the history of model checking to date, and then focus on recent techniques that combine model checking with satisfiability solving. These techniques, known as bounded model checking, do a very fast exploration of the state space, and for some types of problems seem to offer large performance improvements over previous approaches. We review experiments with bounded model checking on both public domain and industrial designs, and propose a methodology for applying the technique in industry for invariance checking. We then summarize the pros and cons of this new technology and discuss future research efforts to extend its capabilities.
引用
收藏
页码:7 / 34
页数:28
相关论文
共 50 条
  • [31] Bounded model checking with QBF
    Dershowitz, N
    Hanna, Z
    Katz, J
    THEORY AND APPLICATIONS OF SATISFIABILITY TESTING, PROCEEDINGS, 2005, 3569 : 408 - 414
  • [32] Bounded model checking of CTL
    Tao, Zhi-Hong
    Zhou, Cong-Hua
    Chen, Zhong
    Wang, Li-Fu
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) : 39 - 43
  • [33] Abstraction refinement in symbolic model checking using satisfiability as the only decision procedure
    Li B.
    Wang C.
    Somenzi F.
    International Journal on Software Tools for Technology Transfer, 2005, 7 (2) : 143 - 155
  • [34] Bounded Model Checking of CTL
    Zhi-Hong Tao
    Cong-Hua Zhou
    Zhong Chen
    Li-Fu Wang
    Journal of Computer Science and Technology, 2007, 22 : 39 - 43
  • [35] Distributed bounded model checking
    Chatterjee, Prantik
    Roy, Subhajit
    Diep, Bui Phi
    Lal, Akash
    FORMAL METHODS IN SYSTEM DESIGN, 2022, 64 (1) : 50 - 72
  • [36] Revising Specifications with CTL Properties Using Bounded Model Checking
    Finger, Marcelo
    Wassermann, Renata
    ADVANCES IN ARTIFICIAL INTELLIGENCE - SBIA 2008, PROCEEDINGS, 2008, 5249 : 157 - 166
  • [37] LTL satisfiability checking
    Rozier, Kristin Y.
    Vardi, Moshe Y.
    MODEL CHECKING SOFTWARE, PROCEEDINGS, 2007, 4595 : 149 - +
  • [38] Accelerated Bounded Model Checking Using Interpolation Based Summaries
    Solanki, Mayank
    Chatterjee, Prantik
    Lal, Akash
    Roy, Subhajit
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PT II, TACAS 2024, 2024, 14571 : 155 - 174
  • [39] Towards Bounded Model Checking using Nonlinear Programming Solver
    Nishi, Masataka
    2016 31ST IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2016, : 560 - 565
  • [40] Verification of a network ASIC component using bounded model checking
    Sun, X.
    Xie, F.
    Wu, J.
    Song, X.
    INTERNATIONAL JOURNAL OF ELECTRONICS, 2007, 94 (02) : 183 - 196