TY - GEN
T1 - Using dominators to extract observable protocol contexts
AU - Subramaniam, Mahadevan
AU - Shi, Jiangfan
PY - 2005
Y1 - 2005
N2 - While verifying complex protocols, it is often fruitful to consider all protocol contexts in which an interesting set of transitions may appear. The contexts are represented as yet another protocol called observable protocol that may be further analyzed. An efficient approach based on static analysis to compute an over-approximated protocol that includes all the runs of an observable protocol is described. The approach uses dominator relations over state and message dependency graphs. An over-approximation of transitions that occur with an interesting transition in any run are produced, from which a transition relation of the over-approximated protocol is automatically generated. To facilitate systematic state space exploration of the over approximated protocol, it is shown how a series of under-approximations can be generated by identifying parallelism among the transitions using dominators. The effectiveness of the proposed approach is illustrated by model checking several examples including several coherence protocols.
AB - While verifying complex protocols, it is often fruitful to consider all protocol contexts in which an interesting set of transitions may appear. The contexts are represented as yet another protocol called observable protocol that may be further analyzed. An efficient approach based on static analysis to compute an over-approximated protocol that includes all the runs of an observable protocol is described. The approach uses dominator relations over state and message dependency graphs. An over-approximation of transitions that occur with an interesting transition in any run are produced, from which a transition relation of the over-approximated protocol is automatically generated. To facilitate systematic state space exploration of the over approximated protocol, it is shown how a series of under-approximations can be generated by identifying parallelism among the transitions using dominators. The effectiveness of the proposed approach is illustrated by model checking several examples including several coherence protocols.
UR - http://www.scopus.com/inward/record.url?scp=84883278287&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84883278287&partnerID=8YFLogxK
U2 - 10.1109/SEFM.2005.53
DO - 10.1109/SEFM.2005.53
M3 - Conference contribution
AN - SCOPUS:84883278287
SN - 0769524354
SN - 9780769524351
T3 - Proceedings - 3rd IEEE International Conference on Software Engineering and Formal Methods, SEFM 2005
SP - 96
EP - 105
BT - Proceedings - 3rd IEEE International Conference on Software Engineering and Formal Methods, SEFM 2005
T2 - 3rd IEEE International Conference on Software Engineering and Formal Methods, SEFM 2005
Y2 - 7 September 2005 through 9 September 2005
ER -