31.07.2015 Views

Counterexample-guided Abstraction Refinement for the Analysis of ...

Counterexample-guided Abstraction Refinement for the Analysis of ...

Counterexample-guided Abstraction Refinement for the Analysis of ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

directions. Numbers close to <strong>the</strong> nodes indicate <strong>the</strong> mapping α. The private andpublic areas are connected by <strong>the</strong> firewall (F), and initially <strong>the</strong>re is one unsafeprocesses (UP) in <strong>the</strong> public area. Only safe processes will be generated and<strong>the</strong> firewall can be crossed in one direction only. Our aim is to show that noreachable graph contains <strong>the</strong> 0-ary edge Error.UPv 1Lw 1Fw 2Lv 2Fig. 1. Initial graph <strong>of</strong> <strong>the</strong> firewall system.Create ProcessSPSP/UPCross LocationSP/UPL1 2 1 2Cross ConnectionSP/UPSP/UPC1 2 1 2LLCCreate Connected LocationL1 2LC1 2LL1 2 1 2Cross FirewallSP/UPF1 2 1 2UPF1 2ErrorUPFFSP/UPError1 2Table 1. Rules <strong>of</strong> <strong>the</strong> firewall system.In order to approximate gtss we will employ Petri nets, which, as multisetrewriting systems, can be seen as a special case <strong>of</strong> graph rewriting. Petrinets are an easier model than gts and hence more amenable to analysis. Severalalgorithms and tools are available <strong>for</strong> <strong>the</strong>ir verification. Fur<strong>the</strong>rmore, byapproximating with Petri nets we will be able to preserve nice properties <strong>of</strong><strong>the</strong> gts model, such as locality (state changes are only described locally) andconcurrency (no unnecessary interleaving <strong>of</strong> events) in <strong>the</strong> approximation.We will now introduce a notation <strong>for</strong> Petri nets. 22 By A ⊕ we denote a multiset over A and <strong>for</strong> a function f : A → B we denote byf ⊕ : A ⊕ → B ⊕ its extension to multisets. Fur<strong>the</strong>rmore <strong>for</strong> m ∈ A ⊕ and a ∈ A wedenote by m(a) <strong>the</strong> multiplicity <strong>of</strong> a in m.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!