Sebastian Biewer, Rayna Dimitrova, M. Fries, Maciej Gazda, Thomas S. Heinze, H. Hermanns, M. Mousavi
{"title":"Conformance Relations and Hyperproperties for Doping Detection in Time and Space","authors":"Sebastian Biewer, Rayna Dimitrova, M. Fries, Maciej Gazda, Thomas S. Heinze, H. Hermanns, M. Mousavi","doi":"10.46298/lmcs-18(1:14)2022","DOIUrl":"https://doi.org/10.46298/lmcs-18(1:14)2022","url":null,"abstract":"We present a novel and generalised notion of doping cleanness for\u0000cyber-physical systems that allows for perturbing the inputs and observing the\u0000perturbed outputs both in the time- and value-domains. We instantiate our\u0000definition using existing notions of conformance for cyber-physical systems. As\u0000a formal basis for monitoring conformance-based cleanness, we develop the\u0000temporal logic HyperSTL*, an extension of Signal Temporal Logics with trace\u0000quantifiers and a freeze operator. We show that our generalised definitions are\u0000essential in a data-driven method for doping detection and apply our\u0000definitions to a case study concerning diesel emission tests.","PeriodicalId":314387,"journal":{"name":"Log. Methods Comput. Sci.","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128973263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coalgebraic Semantics for Probabilistic Logic Programming","authors":"Tao Gu, F. Zanasi","doi":"10.23638/LMCS-17(2:2)2021","DOIUrl":"https://doi.org/10.23638/LMCS-17(2:2)2021","url":null,"abstract":"Probabilistic logic programming is increasingly important in artificial intelligence and related fields as a formalism to reason about uncertainty. It generalises logic programming with the possibility of annotating clauses with probabilities. This paper proposes a coalgebraic semantics on probabilistic logic programming. Programs are modelled as coalgebras for a certain functor F, and two semantics are given in terms of cofree coalgebras. First, the F-coalgebra yields a semantics in terms of derivation trees. Second, by embedding F into another type G, as cofree G-coalgebra we obtain a `possible worlds' interpretation of programs, from which one may recover the usual distribution semantics of probabilistic logic programming. Furthermore, we show that a similar approach can be used to provide a coalgebraic semantics to weighted logic programming.","PeriodicalId":314387,"journal":{"name":"Log. Methods Comput. Sci.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132872081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pushdown Automata and Context-Free Grammars in Bisimulation Semantics","authors":"J. Baeten, C. Carissimo, B. Luttik","doi":"10.46298/lmcs-19(1:15)2023","DOIUrl":"https://doi.org/10.46298/lmcs-19(1:15)2023","url":null,"abstract":"The Turing machine models an old-fashioned computer, that does not interact\u0000with the user or with other computers, and only does batch processing.\u0000Therefore, we came up with a Reactive Turing Machine that does not have these\u0000shortcomings. In the Reactive Turing Machine, transitions have labels to give a\u0000notion of interactivity. In the resulting process graph, we use bisimilarity\u0000instead of language equivalence.\u0000 Subsequently, we considered other classical theorems and notions from\u0000automata theory and formal languages theory. In this paper, we consider the\u0000classical theorem of the correspondence between pushdown automata and\u0000context-free grammars. By changing the process operator of sequential\u0000composition to a sequencing operator with intermediate acceptance, we get a\u0000better correspondence in our setting. We find that the missing ingredient to\u0000recover the full correspondence is the addition of a notion of state awareness.","PeriodicalId":314387,"journal":{"name":"Log. Methods Comput. Sci.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125250084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mahsa Zarneshan, F. Ghassemi, E. Khamespanah, M. Sirjani, J. Hatcliff
{"title":"Specification and Verification of Timing Properties in Interoperable Medical Systems","authors":"Mahsa Zarneshan, F. Ghassemi, E. Khamespanah, M. Sirjani, J. Hatcliff","doi":"10.46298/lmcs-18(2:13)2022","DOIUrl":"https://doi.org/10.46298/lmcs-18(2:13)2022","url":null,"abstract":"To support the dynamic composition of various devices/apps into a medical system at point-of-care, a set of communication patterns to describe the communication needs of devices has been proposed. To address timing requirements, each pattern breaks common timing properties into finer ones that can be enforced locally by the components. Common timing requirements for the underlying communication substrate are derived from these local properties. The local properties of devices are assured by the vendors at the development time. Although organizations procure devices that are compatible in terms of their local properties and middleware, they may not operate as desired. The latency of the organization network interacts with the local properties of devices. To validate the interaction among the timing properties of components and the network, we formally specify such systems in Timed Rebeca. We use model checking to verify the derived timing requirements of the communication substrate in terms of the network and device models. We provide a set of templates as a guideline to specify medical systems in terms of the formal model of patterns. A composite medical system using several devices is subject to state-space explosion. We extend the reduction technique of Timed Rebeca based on the static properties of patterns. We prove that our reduction is sound and show the applicability of our approach in reducing the state space by modeling two clinical scenarios made of several instances of patterns.","PeriodicalId":314387,"journal":{"name":"Log. Methods Comput. Sci.","volume":"31 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125705612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Konnov, Marijana Lazi'c, Ilina Stoilkovska, Josef Widder
{"title":"Survey on Parameterized Verification with Threshold Automata and the Byzantine Model Checker","authors":"I. Konnov, Marijana Lazi'c, Ilina Stoilkovska, Josef Widder","doi":"10.46298/lmcs-19(1:5)2023","DOIUrl":"https://doi.org/10.46298/lmcs-19(1:5)2023","url":null,"abstract":"Threshold guards are a basic primitive of many fault-tolerant algorithms that\u0000solve classical problems in distributed computing, such as reliable broadcast,\u0000two-phase commit, and consensus. Moreover, threshold guards can be found in\u0000recent blockchain algorithms such as, e.g., Tendermint consensus. In this\u0000article, we give an overview of techniques for automated verification of\u0000threshold-guarded fault-tolerant distributed algorithms, implemented in the\u0000Byzantine Model Checker (ByMC). These threshold-guarded algorithms have the\u0000following features: (1) up to $t$ of processes may crash or behave Byzantine;\u0000(2) the correct processes count messages and make progress when they receive\u0000sufficiently many messages, e.g., at least $t+1$; (3) the number $n$ of\u0000processes in the system is a parameter, as well as the number $t$ of faults;\u0000and (4) the parameters are restricted by a resilience condition, e.g., $n >\u00003t$. Traditionally, these algorithms were implemented in distributed systems\u0000with up to ten participating processes. Nowadays, they are implemented in\u0000distributed systems that involve hundreds or thousands of processes. To make\u0000sure that these algorithms are still correct for that scale, it is imperative\u0000to verify them for all possible values of the parameters.","PeriodicalId":314387,"journal":{"name":"Log. Methods Comput. Sci.","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122897176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new operational representation of dependencies in Event Structures","authors":"G. Pinna","doi":"10.46298/lmcs-17(4:16)2021","DOIUrl":"https://doi.org/10.46298/lmcs-17(4:16)2021","url":null,"abstract":"The execution of an event in a complex and distributed system where the\u0000dependencies vary during the evolution of the system can be represented in many\u0000ways, and one of them is to use Context-Dependent Event structures. Event\u0000structures are related to Petri nets. The aim of this paper is to propose what\u0000can be the appropriate kind of Petri net corresponding to Context-Dependent\u0000Event structures, giving an operational flavour to the dependencies represented\u0000in a Context/Dependent Event structure. Dependencies are often operationally\u0000represented, in Petri nets, by tokens produced by activities and consumed by\u0000others. Here we shift the perspective using contextual arcs to characterize\u0000what has happened so far and in this way to describe the dependencies among the\u0000various activities.","PeriodicalId":314387,"journal":{"name":"Log. Methods Comput. Sci.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116787063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Massimo Bartoletti, Stefano Lande, Maurizio Murgia, R. Zunino
{"title":"Verifying liquidity of recursive Bitcoin contracts","authors":"Massimo Bartoletti, Stefano Lande, Maurizio Murgia, R. Zunino","doi":"10.46298/lmcs-18(1:22)2022","DOIUrl":"https://doi.org/10.46298/lmcs-18(1:22)2022","url":null,"abstract":"Smart contracts - computer protocols that regulate the exchange of\u0000crypto-assets in trustless environments - have become popular with the spread\u0000of blockchain technologies. A landmark security property of smart contracts is\u0000liquidity: in a non-liquid contract, it may happen that some assets remain\u0000frozen, i.e. not redeemable by anyone. The relevance of this issue is witnessed\u0000by recent liquidity attacks to Ethereum, which have frozen hundreds of USD\u0000millions. We address the problem of verifying liquidity on BitML, a DSL for\u0000smart contracts with a secure compiler to Bitcoin, featuring primitives for\u0000currency transfers, contract renegotiation and consensual recursion. Our main\u0000result is a verification technique for liquidity. We first transform the\u0000infinite-state semantics of BitML into a finite-state one, which focusses on\u0000the behaviour of a chosen set of contracts, abstracting from the moves of the\u0000context. With respect to the chosen contracts, this abstraction is sound, i.e.\u0000if the abstracted contract is liquid, then also the concrete one is such. We\u0000then verify liquidity by model-checking the finite-state abstraction. We\u0000implement a toolchain that automatically verifies liquidity of BitML contracts\u0000and compiles them to Bitcoin, and we assess it through a benchmark of\u0000representative contracts.","PeriodicalId":314387,"journal":{"name":"Log. Methods Comput. Sci.","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116324048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A theory of transaction parallelism in blockchains","authors":"Massimo Bartoletti, Letterio Galletta, Maurizio Murgia","doi":"10.46298/lmcs-17(4:10)2021","DOIUrl":"https://doi.org/10.46298/lmcs-17(4:10)2021","url":null,"abstract":"Decentralized blockchain platforms have enabled the secure exchange of\u0000crypto-assets without the intermediation of trusted authorities. To this\u0000purpose, these platforms rely on a peer-to-peer network of byzantine nodes,\u0000which collaboratively maintain an append-only ledger of transactions, called\u0000blockchain. Transactions represent the actions required by users, e.g. the\u0000transfer of some units of crypto-currency to another user, or the execution of\u0000a smart contract which distributes crypto-assets according to its internal\u0000logic. Part of the nodes of the peer-to-peer network compete to append\u0000transactions to the blockchain. To do so, they group the transactions sent by\u0000users into blocks, and update their view of the blockchain state by executing\u0000these transactions in the chosen order. Once a block of transactions is\u0000appended to the blockchain, the other nodes validate it, re-executing the\u0000transactions in the same order. The serial execution of transactions does not\u0000take advantage of the multi-core architecture of modern processors, so\u0000contributing to limit the throughput. In this paper we develop a theory of\u0000transaction parallelism for blockchains, which is based on static analysis of\u0000transactions and smart contracts. We illustrate how blockchain nodes can use\u0000our theory to parallelize the execution of transactions. Initial experiments on\u0000Ethereum show that our technique can improve the performance of nodes.","PeriodicalId":314387,"journal":{"name":"Log. Methods Comput. Sci.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126735310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strongly Normalizing Higher-Order Relational Queries","authors":"W. Ricciotti, J. Cheney","doi":"10.46298/lmcs-18(3:23)2022","DOIUrl":"https://doi.org/10.46298/lmcs-18(3:23)2022","url":null,"abstract":"Language-integrated query is a powerful programming construct allowing\u0000database queries and ordinary program code to interoperate seamlessly and\u0000safely. Language-integrated query techniques rely on classical results about\u0000the nested relational calculus, stating that its queries can be algorithmically\u0000translated to SQL, as long as their result type is a flat relation. Cooper and\u0000others advocated higher-order nested relational calculi as a basis for\u0000language-integrated queries in functional languages such as Links and F#.\u0000However, the translation of higher-order relational queries to SQL relies on a\u0000rewrite system for which no strong normalization proof has been published: a\u0000previous proof attempt does not deal correctly with rewrite rules that\u0000duplicate subterms. This paper fills the gap in the literature, explaining the\u0000difficulty with a previous proof attempt, and showing how to extend the\u0000$toptop$-lifting approach of Lindley and Stark to accommodate duplicating\u0000rewrites. We also show how to extend the proof to a recently-introduced\u0000calculus for heterogeneous queries mixing set and multiset semantics.","PeriodicalId":314387,"journal":{"name":"Log. Methods Comput. Sci.","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128679017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characterization and Derivation of Heard-Of Predicates for Asynchronous Message-Passing Models","authors":"A. Shimi, A. Hurault, P. Quéinnec","doi":"10.46298/lmcs-17(3:26)2021","DOIUrl":"https://doi.org/10.46298/lmcs-17(3:26)2021","url":null,"abstract":"In distributed computing, multiple processes interact to solve a problem\u0000together. The main model of interaction is the message-passing model, where\u0000processes communicate by exchanging messages. Nevertheless, there are several\u0000models varying along important dimensions: degree of synchrony, kinds of\u0000faults, number of faults... This variety is compounded by the lack of a general\u0000formalism in which to abstract these models. One way to bring order is to\u0000constrain these models to communicate in rounds. This is the setting of the\u0000Heard-Of model, which captures many models through predicates on the messages\u0000sent in a round and received on time. Yet, it is not easy to define the\u0000predicate that captures a given operational model. The question is even harder\u0000for the asynchronous case, as unbounded message delay means the implementation\u0000of rounds must depend on details of the model. This paper shows that\u0000characterising asynchronous models by heard-of predicates is indeed meaningful.\u0000This characterization relies on delivered predicates, an intermediate\u0000abstraction between the informal operational model and the heard-of predicates.\u0000Our approach splits the problem into two steps: first extract the delivered\u0000model capturing the informal model, and then characterize the heard-of\u0000predicates that are generated by this delivered model. For the first part, we\u0000provide examples of delivered predicates, and an approach to derive more. It\u0000uses the intuition that complex models are a composition of simpler models. We\u0000define operations like union, succession or repetition that make it easier to\u0000derive complex delivered predicates from simple ones while retaining\u0000expressivity. For the second part, we formalize and study strategies for when\u0000to change rounds. Intuitively, the characterizing predicate of a model is the\u0000one generated by a strategy that waits for as much messages as possible,\u0000without blocking forever.","PeriodicalId":314387,"journal":{"name":"Log. Methods Comput. Sci.","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127036199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}