2019
DOI: 10.1145/3371073
|View full text |Cite
|
Sign up to set email alerts
|

Complexity and information in invariant inference

Abstract: This paper addresses the complexity of SAT-based invariant inference, a prominent approach to safety verification. We consider the problem of inferring an inductive invariant of polynomial length given a transition system and a safety property. We analyze the complexity of this problem in a black-box model, called the Hoare-query model, which is general enough to capture algorithms such as IC3/PDR and its variants. An algorithm in this model learns about the system's reachable states by querying the validity o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 57 publications
0
6
0
Order By: Relevance
“…All 29 protocols are safe based on manual verification. Even though finding counterexample traces is equally important, we limit our evaluation to safe protocols where the property holds, since inferring inductive invariants is the main bottleneck of existing techniques for verifying distributed protocols [29,30,63].…”
Section: Discussionmentioning
confidence: 99%
“…All 29 protocols are safe based on manual verification. Even though finding counterexample traces is equally important, we limit our evaluation to safe protocols where the property holds, since inferring inductive invariants is the main bottleneck of existing techniques for verifying distributed protocols [29,30,63].…”
Section: Discussionmentioning
confidence: 99%
“…All 29 protocols are safe based on manual verification. Even though finding counterexample traces is equally important, we limit our evaluation to safe protocols where the property holds, since inferring inductive invariants is the main bottleneck of existing techniques for verifying distributed protocols [30,31,63].…”
Section: Discussionmentioning
confidence: 99%
“…Algorithm 2 describes the symmetric incremental induction algorithm. The procedure first checks whether the property can be trivially violated (lines [19][20][21][22], and if not, starts recursively deriving and blocking counterexamples-toinduction (CTI) from the topmost frame (lines [24][25][26][27][28][29][30][31][32][33][34][35]. Given a solver model m, < never occurred > --infer ∀ by default (may not be compact, though correct for the current instance) The core of the SymIC3 algorithm is the SymBoost∀∃ algorithm, presented in Algorithm 3.…”
Section: Discussionmentioning
confidence: 99%
“…A study of overfitting in invariant synthesis was conducted in [24]. ICE was compared with IC3/PDR in terms of complexity in [12]. A generalization of ICE with relative inductiveness [31] can implement IC3/PDR following the paradigm of active learning with a learner and a teacher.…”
Section: Introductionmentioning
confidence: 99%