MOP: an Efficient and Generic Runtime Verification Framework

Total Page:16

File Type:pdf, Size:1020Kb

MOP: an Efficient and Generic Runtime Verification Framework Technical report UIUCDCS-R-2007-2836, March 2007 MOP: An Efficient and Generic Runtime Verification Framework ∗ Feng Chen Grigore Ros¸u University of Illinois at Urbana-Champaign {fengchen,grosu}@cs.uiuc.edu Abstract 1. Introduction Monitoring-Oriented Programming (MOP 1) [19, 16, 20, 17] Runtime verification [28, 41, 10] aims at combining test- is a formal framework for software development and analy- ing with formal methods in a mutually beneficial way. The sis, in which the developer specifies desired properties using idea underlying runtime verification is that system require- definable specification formalisms, along with code to ex- ments specifications, typically formal and referring to tem- ecute when properties are violated or validated. The MOP poral behaviors and histories of events or actions, are rig- framework automatically generates monitors from the spec- orously checked at runtime against the current execution of ified properties and then integrates them together with the the program, rather than statically against all hypothetical user-defined code into the original system. executions. If used for bug detection, runtime verification The previous design of MOP only allowed specifications gives a rigorous means to state and test complex temporal without parameters, so it could not be used to state and mon- requirements, and is particularly appealing when combined itor safety properties referring to two or more related ob- with test case generation [5] or with steering of programs jects. In this paper we propose a parametric specification- [34]. A large number of runtime verification techniques, al- formalism-independent extension of MOP, together with an gorithms, formalisms, and tools such as Tracematches [2], implementation of JavaMOP that supports parameters. In PQL [37], PTQL [26], MOP [17], Hawk/Eraser [21], MAC our current implementation, parametric specifications are [34], PaX [27], etc., have been and are still being developed, translated into AspectJ code and then weaved into the appli- showing that runtime verification is increasingly adopted not cation using off-the-shelf AspectJ compilers; hence, MOP only by formal methods communities, but also by program- specifications can be seen as formal or logical aspects. ming language designers and software engineers. Our JavaMOP implementation was extensively evaluated We present a parametric extension together with a ma- on two benchmarks, Dacapo [13] and Tracematches [8], ture, optimized and thoroughly evaluated implementation of showing that runtime verification in general and MOP in monitoring-oriented programming (MOP). MOP was first particular are feasible. In some of the examples, millions proposed in 2003 [19] as a software development and anal- of monitor instances are generated, each observing a set of ysis framework based on runtime verification intuitions and related objects. To keep the runtime overhead of monitor- techniques. It was further described and extended in [16, 20, ing and event observation low, we devised and implemented 17], but, up to now, it was not able to handle parameters in a decentralized indexing optimization. Less than 8% of the specifications, and was not shown, through large-scale per- experiments showed more than 10% runtime overhead; in formance tests measuring run-time overhead, to be feasible most cases our tool generates monitoring code as efficient as in practice. An implementation of JavaMOP was carried out the hand-optimized code. Despite its genericity, JavaMOP is to support these, together with decentralized monitor index- empirically shown to be more efficient than runtime verifica- ing algorithms for reducing the runtime overhead. tion systems specialized and optimized for particular speci- As shown in this paper, MOP is expressive, generic, and fication formalisms. Many property violations were detected efficient. MOP logic-plugins encapsulate monitor synthesis during our experiments; some of them are benign, others in- algorithms for logics of interest; these allow users comfort- dicate defects in programs. Many of these are subtle and hard able with formal notation to declare properties using high- to find by ordinary testing. level or application-specific requirements specification for- malisms. Specifications using any of the logic-plugins are allowed to have parameters; this way, multiple monitor in- stances for the same property can coexist, one per collection of objects of interest. MOP also allows its users to imple- ment monitors manually, using the full strength of the target ∗ This material is based upon work supported by the National Science Foun- dation under Grant No. 0448501 and Grant No. 0509321. Any opinions, language. In other words, MOP supports and encourages the findings, and conclusions or recommendations expressed in this material use of formal specifications, but it does not require it. Since are those of the author(s) and do not necessarily reflect the views of the the safety properties are precisely the monitorable ones [40], National Science Foundation. MOP can therefore handle any safety property. 1 Not to be confused with “meta-object protocol” [33]. 1 2007/4/3 Technical report UIUCDCS-R-2007-2836, March 2007 class Resource { /*+MonitorAspect+*/ /*@ public aspect MonitorAspect { scope = class /*+ Generated by JavaMOP for javamop.monitor PTLTL_0 */ logic = PTLTL public boolean[] Resource.PTLTL_0_pre = new boolean[1]; { public boolean[] Resource.PTLTL_0_now = new boolean[1]; event authenticate: end(exec(* authenticate())); pointcut PTLTL_0_Init(Resource thisObject): event access: begin(exec(* access())); execution(Resource.new(..)) && target(thisObject); formula: access -> <*> authenticate; after(Resource thisObject): PTLTL_0_Init(thisObject) { } boolean authenticate = false; violation handler { @this.authenticate(); } boolean access = false; @*/ thisObject.PTLTL_0_now[0] = authenticate; void authenticate() {...} } void access() {...} pointcut PTLTL_0_authenticate0(Resource thisObject): ... target(thisObject) && execution(* Resource.authenticate()); } after (Resource thisObject) returning: PTLTL_0_authenticate0(thisObject) { Figure 1. MOP specification for resource safety boolean authenticate = false; boolean access = false; 1.1 Examples authenticate = true; thisObject.PTLTL_0_pre[0] = thisObject.PTLTL_0_now[0]; Let us consider a simple and common safety property for thisObject.PTLTL_0_now[0] = authenticate || thisObject.PTLTL_0_pre[0]; a shared resource, namely that any access to the resource if (access && ! thisObject.PTLTL_0_now[0]){ should be authenticated. For simplicity, suppose that all thisObject.authenticate(); } } the operations on the shared resource are implemented pointcut PTLTL_0_access0(Resource thisObject): in the class Resource, including methods access() and target(thisObject) && execution(* Resource.access()); before (Resource thisObject): authenticate(). Then the safety property can be speci- PTLTL_0_access0(thisObject) { fied as a trivial “always past” linear temporal logic (LTL) boolean authenticate = false; boolean access = false; formula over method invocations, namely access = true; access -> <*> authenticate, thisObject.PTLTL_0_pre[0] = thisObject.PTLTL_0_now[0]; thisObject.PTLTL_0_now[0] = authenticate || stating that “if access then authenticate held in the past” thisObject.PTLTL_0_pre[0]; (“<*>” reads “eventually in the past”); the “always” part is if (access && ! thisObject.PTLTL_0_now[0]){ thisObject.authenticate(); } implicit, since MOP properties are continuously monitored. } Using MOP like in Figure 1, one can enforce this policy /* Generated code ends +*/ } to hold in any system that manages the resource via the Figure 2. Generated monitor for the property in Figure 1 Resource class; by “enforce” we mean that MOP ensures that the system will satisfy the property even though it was formula, and insert the monitor with the recovery handler not originally programmed (intentionally or not) to satisfy it. into appropriate points of the program. The first line of the MOP specification in Figure 1 states There are two important observations regarding the ex- that this property is a class invariant, i.e., it should hold ample above, each reflecting a crucial aspect of MOP: in the scope of this class (specification attributes are dis- cussed in Section 4.1). The second line chooses a desired 1. By synthesizing monitoring code from specifications and formalism to express the corresponding formal requirement, automatically integrating it together with the recovery in this case past-time LTL (PTLTL); MOP allows users code at relevant points in the program, the developer to “plug-and-play” new specification formalisms, provided can and should have quite a high confidence that the that they respect the standardized interface of logic-plugins resource is used correctly throughout the system. In fact, (these are discussed in Section 3.1). The content enclosed if we trust that the MOP tool generates and integrates the by the curly brackets is specific to the chosen formalism. monitoring code correctly, then we can also trust that the For PTLTL, the user needs to first build an abstraction that resulting system is correct w.r.t. this safety property, no maps runtime events into logical elements, e.g., the in- matter how complicated the system is. vocation of authenticate() being mapped to an event 2. Suppose that authentication-before-access was not a re- authenticate. Using the elements produced by the ab- quirement of the system originally, but that it became a straction, a PTLTL formula is given
Recommended publications
  • A Formalization of the C99 Standard in HOL, Isabelle And
    A Formalization of the C99 Standard in HOL, Isabelle and Coq Robbert Krebbers Freek Wiedijk Institute for Computing and Information Sciences, Radboud University Nijmegen, The Netherlands The C99 standard Related projects Some subtleties of C The official description issued by ANSI and ISO: Michael Norrish. C and C++ semantics (L4.verified) Undefined behavior due to unknown evaluation order: Written in English Xavier Leroy et al. Verified C compiler in Coq (Compcert) int i = 0; No mathematically precise formalism Chucky Ellison and Grigore Rosu. Executable C semantics in Maude i = ++i; // undefined Incomplete and ambiguous Overflow of signed integers is undefined: The formalizations The Formalin project int i = INT_MAX; Describe a space C semantics of all possible C semantics with relations return i < i + 1; May 2011 to May 2015 between these semantics // undefined: hence, a compiler is allowed to http://ch2o.cs.ru.nl/ And, a small step semantics, C99 : C semantics // optimize this to return 1 Create a formalization of the complete C99 standard On the other hand, unsigned integer arithmetic is modular In the theorem provers HOL4, Isabelle/HOL and Coq Undefined behavior due to jumping into a block with a variable length Which follow the standard closely array declaration: All derived from a common master formalization (e.g. in Ott) goto foo; // undefined Isabelle/ Features int a[n]; HOL4 label foo; printf("bar\n"); C preprocessor HOL Freeing memory makes pointers to it indeterminate C standard library int *x = malloc(sizeof(int)); Floating point arithmetic 99 free (x); Casts C printf("%p\n", x); // undefined Non-determinism Contiguously allocated objects Sequence points int x = 30, y = 31; Alignment requirements int *p = &x + 1, *q = &y; Non-local control flow ( , / , signal handling) goto setjmp longjmp if (memcmp(&p, &q, sizeof(p)) == 0) { volatile, restrict and const variables printf("%d\n", *p); Programs in a `freestanding environment' COQ // the standard is unclear whether this is Purposes // defined (see Defect report #260).
    [Show full text]
  • Curriculum Vitæ RESEARCH INTERESTS EDUCATION PROFESSIONAL POSITIONS
    Curriculum Vitæ Mark Hills East Carolina University Department of Computer Science Greenville, North Carolina, United States of America Phone: (252) 328-9692 (office) E-mail: [email protected] Skype: mahills Home page: http://www.cs.ecu.edu/hillsma/ RESEARCH INTERESTS I am interested broadly in the fields of programming languages and software engineering, especially where they intersect. Specifically, my research focuses on static and dynamic program analysis; empirical software engineering; software analytics; software repository mining; automated refactoring; programming language semantics; and program verification. My goal is to provide developers with powerful new tools for under- standing, creating, analyzing, and improving software. As part of this, I am a continuing contributor to Rascal, a meta-programming language for program analysis, program transformation, and programming language implementation. EDUCATION • Ph.D. in Computer Science (advisor Grigore Ro¸su),University of Illinois Urbana-Champaign, com- pleted December 2009. • B.S. in Computer Science, Western Illinois University, 1995 PROFESSIONAL POSITIONS Associate Professor East Carolina University, Department of Computer Science (Assistant Professor 2013{2019, Associate Professor 2019{present) My research at ECU has focused on understanding complex, web-based systems written in dynamic lan- guages. This research includes a strong empirical component, looking first at how developers use specific features of dynamic languages, and second at how knowledge of these uses, which implicitly represent devel- oper intent, can lead to more precise analysis tools. Recently, I have also started to look at how to model the knowledge of developers (including students), and at how such models can be used to direct developers to more relevant, understandable code examples.
    [Show full text]
  • A DSL for Dynamic Semantics Specification}, Year = {2015}}
    Delft University of Technology Software Engineering Research Group Technical Report Series DynSem: A DSL for Dynamic Semantics Specification Vlad Vergu, Pierre Neron, Eelco Visser Report TUD-SERG-2015-003 SERG TUD-SERG-2015-003 Published, produced and distributed by: Software Engineering Research Group Department of Software Technology Faculty of Electrical Engineering, Mathematics and Computer Science Delft University of Technology Mekelweg 4 2628 CD Delft The Netherlands ISSN 1872-5392 Software Engineering Research Group Technical Reports: http://www.se.ewi.tudelft.nl/techreports/ For more information about the Software Engineering Research Group: http://www.se.ewi.tudelft.nl/ This technical report is an extended version of the paper: Vlad Vergu, Pierre Neron, Eelco Visser. DynSem: A DSL for Dynamic Semantics Specification. In Mari- bel Fernandez, editor, 26th International Conference on Rewriting Techniques and Applications, RTA 2015, Proceedings Leibniz International Proceedings in Informatics Schloss Dagstuhl Leibniz-Zentrum fur Infor- matik, Dagstuhl Publishing, Germany. @inproceedings{VerguNV-RTA-2015, Author = {Vlad Vergu and Pierre Neron and Eelco Visser}, Booktitle = {26th International Conference on Rewriting Techniques and Applications, RTA 2015, Proceedings}, Month = {June}, Note = {To appear}, Publisher = {Schloss Dagstuhl -- Leibniz-Zentrum fur Informatik, Dagstuhl Publishing, Germany}, Series = {Leibniz International Proceedings in Informatics}, Title = {DynSem: A DSL for Dynamic Semantics Specification}, Year = {2015}}
    [Show full text]
  • KEVM: a Complete Semantics of the Ethereum Virtual Machine
    CORE Metadata, citation and similar papers at core.ac.uk Provided by Illinois Digital Environment for Access to Learning and Scholarship Repository KEVM: A Complete Semantics of the Ethereum Virtual Machine Everett Hildenbrandt (UIUC), Manasvi Saxena (UIUC), Xiaoran Zhu (UIUC), Nishant Rodrigues (UIUC), Philip Daian (Cornell Tech, IC3, and RV Inc.), Dwight Guth (RV Inc.), and Grigore Ro¸su(UIUC and RV Inc.) August 1, 2017 Abstract A developing field of interest for the distributed systems and applied cryptography community is that of smart contracts: self-executing financial instruments that synchronize their state, often through a blockchain. One such smart contract system that has seen widespread practical adoption is Ethereum, which has grown to secure approximately 30 billion USD of currency value and in excess of 300,000 daily transactions. Unfortunately, the rise of these technologies has been marred by a repeated series of security vulnerabilities and high profile contract failures. To address these failures, the Ethereum community has turned to formal verification and program analysis which show great promise due to the computational simplicity and bounded- time execution inherent to smart contracts. Despite this, no fully formal, rigorous, comprehensive, and executable semantics of the EVM (Ethereum Virtual Machine) currently exists, leaving a lack of rigor on which to base such tools. In this work, we present KEVM, the first fully executable formal semantics of the EVM, the bytecode language in which smart contracts are executed. We create this semantics in a framework for executable semantics, the K framework. We show that our semantics not only passes the official 40,683-test stress test suite for EVM implementations, but also reveals ambiguities and potential sources of error in the existing on-paper formalization of EVM semantics [45] on which our work is based.
    [Show full text]
  • Working Formal Methods Symposium 1St International Workshop from 2017 Bucharest, Romania, July 5-8, 2017
    Working Formal Methods Symposium 1st International Workshop FROM 2017 Bucharest, Romania, July 5-8, 2017 Informal Proceedings Dorel Lucanu and Viorica Sofronie-Stokkermans (Eds.) July 5-8, 2017 Foreword This volume contains the papers presented at FROM 2017, Working Formal Methods Symposium, held on July 5-8 in Bucharest. Formal methods use mathematical techniques and rigour for developing soft- ware and hardware. The formal methods can be used to specify, verify, and analyse in any part of the system life cycle: requirements engineering, modeling, design, architecture, implementation, testing, maintenance and evolution. This assumes on the one hand the development of adequate mathematical methods and frameworks and on the other hand the development of tools that help the user to effectively apply these methods/frameworks in the life cycle of the sys- tem. Working Formal Methods Symposium (FROM) aims to bring together researchers and practitioners who work in the area of formal methods by contributing with new theoretical results, methods, techniques, and frameworks, and/or make the formal methods work by creating or using software tools that apply theoretical contributions. Areas and formalisms of interest include: category theory in computer science, distributed systems and concurrency, formal languages and automata theory, for- mal modelling, verification and testing, logic in computer science, mathematical structures in computer science, models of computation, semantics of program- ming languages. Methods of interest include: model checking, deductive verification, automated reasoning and model generation, automated induction, symbolic computation. Applications of interest include: program analysis, verification and synthesis of software and hardware, computational logic, computer mathematics, knowledge representation, ontology reasoning, deductive databases, uncertainty reasoning and soft computing.
    [Show full text]
  • Industrial Experience Report on the Formal Specification of a Packet
    Industrial Experience Report on the Formal Specification of a Packet Filtering Language Using the K Framework Gurvan LE GUERNIC Benoit COMBEMALE José A. GALINDO DGA Maîtrise de l’Information INRIA RENNES – BRETAGNE ATLANTIQUE 35998 Rennes Cedex 9, France Campus universitaire de Beaulieu 35042 Rennes Cedex, France Many project-specific languages, including in particular filtering languages, are defined using non- formal specifications written in natural languages. This leads to ambiguities and errors in the speci- fication of those languages. This paper reports on an industrial experiment on using a tool-supported language specification framework (K) for the formal specification of the syntax and semantics of a filtering language having a complexity similar to those of real-life projects. This experimentation aims at estimating, in a specific industrial setting, the difficulty and benefits of formally specifying a packet filtering language using a tool-supported formal approach. 1 Introduction Packet filtering (accepting, rejecting, modifying or generating packets, i.e. strings of bits, belonging to a sequence) is a recurring problematic in the domain of information systems security. Such filters can serve, among other uses, to reduce the attack surface by limiting the capacities of a communication link to the legitimate needs of the system it belongs to. This type of filtering can be applied to network links (which is the most common use), product interfaces, or even on the communication buses of a product. If the filtering policy needs to be adapted during the deployment or operational phases of the system or product, it is often required to design a specific language L (syntax and semantics) to express new filtering policies during the lifetime of the system or product.
    [Show full text]
  • A Language-Independent Program Verification Framework
    A Language-Independent Program Verification Framework Xiaohong Chen1 and Grigore Ro¸su1;2 1 University of Illinois at Urbana-Champaign 2 Runtime Verification Inc. Abstract. This invited paper describes an approach to language-independent deductive verification using the K semantics framework, in which an operational semantics of a language is defined and a program verifier together with other language tools are generated automatically, correct- by-construction. 1 Introduction and Motivation Given a program and a specification of the program, the deductive verification problem asks if the program satisfies the specification. If the answer is positive, a collection of proof obligations is expected to be generated as evidence, while counterexamples, often of the form of concrete program execution traces, witness the negative answer. Many program verification approaches are associated with a program logic and a proof system of that logic that allows to derive new facts about programs from axioms and established facts. The proof rules of the proof system define the semantics of the target language. Hoare logic [12], for example, is a program logic proposed in 1969 for a simple imperative language which we refer to as IMP. The syntax of IMP is defined in Fig. 1, where Id is the category for program variables and Exp is the category for arithmetic expressions. If- statements and while-statements use Exp as conditions, where zero means false and nonzero values mean true. The specification of an IMP program is written as a Hoare triple, consisting of the program and its precondition and postcondition (e.g., Fig. 2). A set of Hoare logic proof rules can then be used to rigorously reason about the correctness of IMP programs (Fig.
    [Show full text]
  • A Rewriting Approach to the Design and Evolution of Object-Oriented Languages
    Outline Problem Description Goal Statement Research Method Questions and Discussion A Rewriting Approach to the Design and Evolution of Object-Oriented Languages Mark Hills and Grigore Ro¸su {mhills, grosu}@cs.uiuc.edu Department of Computer Science University of Illinois at Urbana-Champaign 30 July 2007 Mark Hills and Grigore Ro¸su Rewriting for OO Language Design and Evolution Outline Problem Description Goal Statement Research Method Questions and Discussion 1 Problem Description 2 Goal Statement 3 Research Method 4 Questions and Discussion Mark Hills and Grigore Ro¸su Rewriting for OO Language Design and Evolution Outline Problem Description Goal Statement Research Method Questions and Discussion Outline 1 Problem Description 2 Goal Statement 3 Research Method 4 Questions and Discussion Mark Hills and Grigore Ro¸su Rewriting for OO Language Design and Evolution Outline Problem Description Goal Statement Research Method Questions and Discussion Defining Languages Most languages defined informally first, formally later (if ever) Order seems backwards; would be nice to start with a formal definition Problem: often not very flexible, need something that can be useful during design Mark Hills and Grigore Ro¸su Rewriting for OO Language Design and Evolution Outline Problem Description Goal Statement Research Method Questions and Discussion Why Formal Definitions? Define a real language “meaning”, independent of a specific implementation Develop a solid basis for experimenting with extensions Help guard against ambiguities, unexpected feature interactions,
    [Show full text]
  • Defining the Circus Operational Semantics in the K-Framework
    Defining the Circus operational semantics inthe K-framework Alex Alberto, Marie-Claude Gaudel To cite this version: Alex Alberto, Marie-Claude Gaudel. Defining the Circus operational semantics in the K-framework. [Research Report] LRI - CNRS, University Paris-Sud; ICMC, University of Sao Paulo. 2017, pp.59. hal-01438386 HAL Id: hal-01438386 https://hal.archives-ouvertes.fr/hal-01438386 Submitted on 17 Jan 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Defining the Circus operational semantics in the K-framework Alex Alberto1 and Marie-Claude Gaudel2 1Universidade de S~aoPaulo, ICMC, S~aoCarlos, Brazil 2LRI, Univ. Paris-Sud and CNRS, Universit´eParis-Saclay, 91405 Orsay, France January 17, 2017 Abstract This report documents how we have implemented a trace generator for the Circus specification language using K, a rewrite-based executable semantic framework in which programming languages, type systems and formal analysis tools can be defined using configurations, computations and rules. This implementation is based on the operational semantics of Circus, that we have revisited to make it exploitable with K. The moti- vation of this work is the development of a test generation environment for Circus.
    [Show full text]
  • Programming Language Design (CS 422)
    Programming Language Design (CS 422) Elsa L Gunter 2112 Siebel Center, UIUC [email protected] http://courses.engr.illinois.edu/cs422/sp2016 Slides based in part on previous lectures by Grigore Ro¸su January 18, 2017 Slides based in part on previous lectures by Grigore Ro¸suJanuary 18, 2017 1 Elsa L Gunter Programming Language Design (CS 422) / 25 Contact Information Office: 2112 Siebel Center Office hours: Wednesday, Friday 12:50pm { 1:45pm Also by appointment Email: [email protected] Slides based in part on previous lectures by Grigore Ro¸suJanuary 18, 2017 2 Elsa L Gunter Programming Language Design (CS 422) / 25 Course Website main page - summary of news items policy - rules governing the course lectures - syllabus, slides and example code mps - Information about homework unit projects - for 4 credit students resources - papers, tools, and helpful info faq - answers to some general questions about the course and course resources Slides based in part on previous lectures by Grigore Ro¸suJanuary 18, 2017 3 Elsa L Gunter Programming Language Design (CS 422) / 25 Some Course References No Required Textbook Concrete Semantics With Isabelle/HOL, by Tobias Nipkow and Gerwin Klein. Springer, 2014. (In your snv directory) Lecture Notes of Grigore Rosu, found in Resources The Formal Semantics of Programming Languages: An Introduction by Glynn Winskel. MIT Press, 1993. Essentials of Programming Languages (2nd Edition) by Daniel P. Friedman, Mitchell Wand and Christopher T. Haynes, MIT Press 2001 Slides based in part on previous lectures by Grigore Ro¸suJanuary 18, 2017 4 Elsa L Gunter Programming Language Design (CS 422) / 25 Main Programming Platform: Isabelle/HOL Download from: http://www.cl.cam.ac.uk/research/hvg/Isabelle/ Runs inside jEdit Two implementation languages: SML (for proofs) and Scala (for jEdit) Full-powered general-purpose interactive mathematical theorem prover Can export executable specifications directly to code in SML, OCaml, Haskell, and Scala.
    [Show full text]
  • Inductive Proof Systems for Compositional Proofs in Reachability Logic Vlad Rusu, David Nowak
    (Co)inductive Proof Systems for Compositional Proofs in Reachability Logic Vlad Rusu, David Nowak To cite this version: Vlad Rusu, David Nowak. (Co)inductive Proof Systems for Compositional Proofs in Reachabil- ity Logic. Working Formal Methods Symposium, Sep 2019, Timisoara, Romania. pp. 32-47, 10.4204/EPTCS.303.3. hal-02176456v2 HAL Id: hal-02176456 https://hal.inria.fr/hal-02176456v2 Submitted on 23 Aug 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. (Co)inductive Proof Systems for Compositional Proofs in Reachability Logic Vlad Rusu David Nowak Inria CRIStAL∗ Lille, France Lille, France Reachability Logic is a formalism that can be used, among others, for expressing partial-correctness properties of transition systems. In this paper we present three proof systems for this formalism, all of which are sound and complete and inherit the coinductive nature of the logic. The proof systems differ, however, in several aspects. First, they use induction and coinduction in different proportions. The second aspect regards compositionality, broadly meaning their ability to prove simpler formulas on smaller systems, and to reuse those formulas as lemmas for more complex formulas on larger systems.
    [Show full text]
  • A Modular Structural Operational Semantics for Delimited Continuations
    A Modular Structural Operational Semantics for Delimited Continuations Neil Sculthorpe Paolo Torrini Peter D. Mosses PLANCOMPS Project GRACEFUL Project PLANCOMPS Project Department of Computer Science Department of Computer Science Department of Computer Science Swansea University, UK KU Leuven, Belgium Swansea University, UK [email protected] [email protected] [email protected] It has been an open question as to whether the Modular Structural Operational Semantics frame- work can express the dynamic semantics of call/cc. This paper shows that it can, and furthermore, demonstrates that it can express the more general delimited control operators control and shift. 1 Introduction Modular Structural Operational Semantics (MSOS) [25, 26, 27] is a variant of the well-known Structural Operational Semantics (SOS) framework [29]. The principal innovation of MSOS relative to SOS is that it allows the semantics of a programming construct to be specified independently of any semantic entities with which it does not directly interact. For example, function application can be specified by MSOS rules without mentioning stores or exception propagation. While it is known that MSOS can specify the semantics of programming constructs for exception handling [7, 8, 25], it has been unclear whether MSOS can specify more complex control-flow operators, such as call/cc [1, 9]. Indeed, the perceived difficulty of handling control operators has been regarded as one of the main limitations of MSOS relative to other modular semantic frameworks (e.g. [30, Sec- tion 2]). This paper demonstrates that the dynamic semantics of call/cc can be specified in MSOS, with no extensions to the MSOS framework required.
    [Show full text]