Masahiro Nakano, K. Ogata, Masaki Nakamura, K. Futatsugi
{"title":"自动化行为规范的不变验证","authors":"Masahiro Nakano, K. Ogata, Masaki Nakamura, K. Futatsugi","doi":"10.1109/QSIC.2006.17","DOIUrl":null,"url":null,"abstract":"We describe a method of automating invariant verification of behavioral specifications, which are algebraic specifications of abstract machines. The proposed method is based on fixed-point computation, which is one of the standard techniques for automatic (invariant) verification. One notable feature of the proposed method is to find and use as lemmas state predicates whose invariant proofs may (even mutually) depend on other state predicates whose invariant proofs may not be completed. Creme is a tool based on the proposed method. We also report on a case study in which Creme proves fully automatically that the NSLPK authentication protocol satisfies the secrecy property","PeriodicalId":378310,"journal":{"name":"2006 Sixth International Conference on Quality Software (QSIC'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Automating Invariant Verification of Behavioral Specifications\",\"authors\":\"Masahiro Nakano, K. Ogata, Masaki Nakamura, K. Futatsugi\",\"doi\":\"10.1109/QSIC.2006.17\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We describe a method of automating invariant verification of behavioral specifications, which are algebraic specifications of abstract machines. The proposed method is based on fixed-point computation, which is one of the standard techniques for automatic (invariant) verification. One notable feature of the proposed method is to find and use as lemmas state predicates whose invariant proofs may (even mutually) depend on other state predicates whose invariant proofs may not be completed. Creme is a tool based on the proposed method. We also report on a case study in which Creme proves fully automatically that the NSLPK authentication protocol satisfies the secrecy property\",\"PeriodicalId\":378310,\"journal\":{\"name\":\"2006 Sixth International Conference on Quality Software (QSIC'06)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-10-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 Sixth International Conference on Quality Software (QSIC'06)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/QSIC.2006.17\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 Sixth International Conference on Quality Software (QSIC'06)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/QSIC.2006.17","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Automating Invariant Verification of Behavioral Specifications
We describe a method of automating invariant verification of behavioral specifications, which are algebraic specifications of abstract machines. The proposed method is based on fixed-point computation, which is one of the standard techniques for automatic (invariant) verification. One notable feature of the proposed method is to find and use as lemmas state predicates whose invariant proofs may (even mutually) depend on other state predicates whose invariant proofs may not be completed. Creme is a tool based on the proposed method. We also report on a case study in which Creme proves fully automatically that the NSLPK authentication protocol satisfies the secrecy property