This article is about checking of models in computer science. For the checking of models in statistics, seestatistical model validation.
Elevator control software can be model-checked to verify both safety properties, like"The cabin never moves with its door open",[1] and liveness properties, like"Whenever the nth floor'scall button is pressed, the cabin will eventually stop at the nth floor and open the door".
Incomputer science,model checking orproperty checking is a method for checking whether afinite-state model of a system meets a givenspecification (also known ascorrectness). This is typically associated withhardware orsoftware systems, where the specification contains liveness requirements (such as avoidance oflivelock) as well as safety requirements (such as avoidance of states representing asystem crash).
In order to solve such a problemalgorithmically, both the model of the system and its specification are formulated in some precise mathematical language. To this end, the problem is formulated as a task inlogic, namely to check whether astructure satisfies a given logical formula. This general concept applies to many kinds of logic and many kinds of structures. A simple model-checking problem consists of verifying whether a formula in thepropositional logic is satisfied by a given structure.
Property checking is used forverification when two descriptions are not equivalent. Duringrefinement, the specification is complemented with details that areunnecessary in the higher-level specification. There is no need to verify the newly introduced properties against the original specification since this is not possible. Therefore, the strict bi-directional equivalence check is relaxed to a one-way property check. The implementation or design is regarded as a model of the system, whereas the specifications are properties that the model must satisfy.[2]
An important class of model-checking methods has been developed for checking models ofhardware andsoftware designs where the specification is given by atemporal logic formula. Pioneering work in temporal logic specification was done byAmir Pnueli, who received the 1996 Turing award for "seminal work introducing temporal logic into computing science".[3] Model checking began with the pioneering work ofE. M. Clarke,E. A. Emerson,[4][5][6] by J. P. Queille, andJ. Sifakis.[7] Clarke, Emerson, and Sifakis shared the 2007Turing Award for their seminal work founding and developing the field of model checking.[8][9]
Model checking is most often applied to hardware designs. For software, because of undecidability (seecomputability theory) the approach cannot be fully algorithmic, apply to all systems, and always give an answer; in the general case, it may fail to prove or disprove a given property. Inembedded-systems hardware, it is possible to validate a specification delivered, e.g., by means ofUML activity diagrams[10] or control-interpretedPetri nets.[11]
The structure is usually given as a source code description in an industrialhardware description language or a special-purpose language. Such a program corresponds to afinite-state machine (FSM), i.e., adirected graph consisting of nodes (orvertices) andedges. A set of atomic propositions is associated with each node, typically stating which memory elements are one. Thenodes represent states of a system, the edges represent possible transitions that may alter the state, while the atomic propositions represent the basic properties that hold at a point of execution.[12]
Formally, the problem can be stated as follows: given a desired property, expressed as a temporal logic formula, and a structure with initial state, decide if. If is finite, as it is in hardware, model checking reduces to agraph search.
Instead of enumerating reachable states one at a time, the state space can sometimes be traversed more efficiently by considering large numbers of states at a single step. When such state-space traversal is based on representations of a set of states and transition relations as logical formulas,binary decision diagrams (BDD) or other related data structures, the model-checking method issymbolic.
Historically, the first symbolic methods usedBDDs. After the success ofpropositional satisfiability in solving theplanning problem inartificial intelligence (seesatplan) in 1996, the same approach was generalized to model checking forlinear temporal logic (LTL): the planning problem corresponds to model checking for safety properties. This method is known as bounded model checking.[13] The success ofBoolean satisfiability solvers in bounded model checking led to the widespread use of satisfiability solvers in symbolic model checking.[14]
One example of such a system requirement:Between the time an elevator is called at a floor and the time it opens its doors at that floor, the elevator can arrive at that floor at most twice. The authors of "Patterns in Property Specification for Finite-State Verification" translate this requirement into the following LTL formula:[15]
Here, should be read as "always", as "eventually", as "until" and the other symbols are standard logical symbols, for "or", for "and" and for "not".
Model-checking tools face a combinatorial blow up of the state-space, commonly known as thestate explosion problem, that must be addressed to solve most real-world problems. There are several approaches to combat this problem.
Symbolic algorithms avoid ever explicitly constructing the graph for the FSM; instead, they represent the graph implicitly using a formula in quantified propositional logic. The use of binary decision diagrams (BDDs) was made popular by the work of Ken McMillan,[16] as well as of Olivier Coudert and Jean-Christophe Madre,[17] and the development of open-source BDD manipulation libraries such as CUDD[18] and BuDDy.[19]
Bounded model-checking algorithms unroll the FSM for a fixed number of steps,, and check whether a property violation can occur in or fewer steps. This typically involves encoding the restricted model as an instance ofSAT. The process can be repeated with larger and larger values of until all possible violations have been ruled out (cf.Iterative deepening depth-first search).
Abstraction attempts to prove properties of a system by first simplifying it. The simplified system usually does not satisfy exactly the same properties as the original one so that a process of refinement may be necessary. Generally, one requires the abstraction to besound (the properties proved on the abstraction are true of the original system); however, sometimes the abstraction is notcomplete (not all true properties of the original system are true of the abstraction). An example of abstraction is to ignore the values of non-Boolean variables and to only consider Boolean variables and the control flow of the program; such an abstraction, though it may appear coarse, may, in fact, be sufficient to prove e.g. properties ofmutual exclusion.
Counterexample-guided abstraction refinement (CEGAR) begins checking with a coarse (i.e. imprecise) abstraction and iteratively refines it. When a violation (i.e.counterexample) is found, the tool analyzes it for feasibility (i.e., is the violation genuine or the result of an incomplete abstraction?). If the violation is feasible, it is reported to the user. If it is not, the proof of infeasibility is used to refine the abstraction and checking begins again.[20]
Model-checking tools were initially developed to reason about the logical correctness ofdiscrete state systems, but have since been extended to deal with real-time and limited forms ofhybrid systems.
Given a finiteinterpretation, for instance, one described as arelational database, decide whether the interpretation is a model of the formula.
This problem is in thecircuit classAC0. It istractable when imposing some restrictions on the input structure: for instance, requiring that it hastreewidth bounded by a constant (which more generally implies the tractability of model checking formonadic second-order logic), bounding thedegree of every domain element, and more general conditions such asbounded expansion, locally bounded expansion, and nowhere-dense structures.[21] These results have been extended to the task ofenumerating all solutions to a first-order formula with free variables.[citation needed]
CADP (Construction and Analysis of Distributed Processes) a toolbox for the design of communication protocols and distributed systems
CPAchecker: an open-source software model checker for C programs, based on the CPA framework
ECLAIR: a platform for the automatic analysis, verification, testing, and transformation of C and C++ programs
FDR2: a model checker for verifying real-time systems modelled and specified asCSP Processes
FizzBee: an easier to use alternative to TLA+, that uses Python-like specification language, that has both behavioral modeling like TLA+ and probabilistic modeling like PRISM
Roméo: an integrated tool environment for modelling, simulation, and verification of real-time systems modelled as parametric, time, and stopwatch Petri nets
SPIN: a general tool for verifying the correctness of distributed software models in a rigorous and mostly automated fashion
Storm:[22] A model checker for probabilistic systems.
UPPAAL: an integrated tool environment for modelling, validation, and verification of real-time systems modelled as networks of timed automata
Zing[23] – experimental tool fromMicrosoft to validate state models of software at various levels: high-level protocol descriptions, work-flow specifications, web services, device drivers, and protocols in the core of the operating system. Zing is currently being used for developing drivers for Windows.
^For convenience, the example properties are paraphrased in natural language here. Model-checkers require them to be expressed in some formal logic, likeLTL.
^Allen Emerson, E.; Clarke, Edmund M. (1980), "Characterizing correctness properties of parallel programs using fixpoints",Automata, Languages and Programming, Lecture Notes in Computer Science, vol. 85, pp. 169–181,doi:10.1007/3-540-10003-2_69,ISBN978-3-540-10003-4
^Clarke, E. M.; Emerson, E. A.; Sistla, A. P. (1986), "Automatic verification of finite-state concurrent systems using temporal logic specifications",ACM Transactions on Programming Languages and Systems,8 (2): 244,doi:10.1145/5397.5399,S2CID52853200
^Queille, J. P.; Sifakis, J. (1982), "Specification and verification of concurrent systems in CESAR",International Symposium on Programming, Lecture Notes in Computer Science, vol. 137, pp. 337–351,doi:10.1007/3-540-11494-7_22,ISBN978-3-540-11494-9
^Grobelna, Iwona; Grobelny, Michał; Adamski, Marian (2014). "Model Checking of UML Activity Diagrams in Logic Controllers Design".Proceedings of the Ninth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX. June 30 – July 4, 2014, Brunów, Poland. Advances in Intelligent Systems and Computing. Vol. 286. pp. 233–242.doi:10.1007/978-3-319-07013-1_22.ISBN978-3-319-07012-4.
^Clarke, E.; Biere, A.; Raimi, R.; Zhu, Y. (2001). "Bounded Model Checking Using Satisfiability Solving".Formal Methods in System Design.19:7–34.doi:10.1023/A:1011276507260.S2CID2484208.
^Vizel, Y.; Weissenbacher, G.; Malik, S. (2015). "Boolean Satisfiability Solvers and Their Applications in Model Checking".Proceedings of the IEEE.103 (11):2021–2035.doi:10.1109/JPROC.2015.2455034.S2CID10190144.
Berard, B.; Bidoit, M.; Finkel, A.; Laroussinie, F.; Petit, A.; Petrucci, L.; Schnoebelen, P. (20 June 2001).Systems and Software Verification: Model-Checking Techniques and Tools. Springer.ISBN3-540-41523-8.
Huth, Michael; Ryan, Mark (2004).Logic in Computer Science: Modelling and Reasoning About Systems.Cambridge University Press.