A Data Symmetry Reduction Technique for Temporal-epistemic Logic

We present a data symmetry reduction approach for model checking temporal-epistemic logic. The technique abstracts the epistemic indistinguishably relation for the knowledge operators, and is shown to preserve temporal-epistemic formulae. We show a method for statically detecting data symmetry in an ISPL program, the input to the temporal-epistemic model checker MCMAS. The experiments we report show an exponential saving in verification time and space while verifying security properties of the NSPK protocol.

[1]  David L. Dill,et al.  Better verification through symmetry , 1996, Formal Methods Syst. Des..

[2]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[3]  Somesh Jha,et al.  Exploiting symmetry in temporal logic model checking , 1993, Formal Methods Syst. Des..

[4]  Ron van der Meyden,et al.  MCK: Model Checking the Logic of Knowledge , 2004, CAV.

[5]  Yanjing Wang,et al.  Refinement of Kripke Models for Dynamics , 2008, ICTAC.

[6]  Gabriela Lindemann,et al.  Multi-Agent Systems and Applications V, 5th International Central and Eastern European Conference on Multi-Agent Systems, CEEMAS 2007, Leipzig, Germany, September 25-27, 2007, Proceedings , 2007, CEEMAS.

[7]  David Lewis Counterpart Theory and Quantified Modal Logic , 1968 .

[8]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[9]  Alessio Lomuscio,et al.  Combining fault injection and model checking to verify fault tolerance in multi-agent systems , 2009, AAMAS.

[10]  Constantin Enea,et al.  Abstractions of Multi-agent Systems , 2007, CEEMAS.

[11]  Alessio Lomuscio,et al.  MCMAS: A Model Checker for Multi-agent Systems , 2006, TACAS.

[12]  Kaile Su,et al.  Symbolic model checking the knowledge of the dining cryptographers , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..

[13]  Alessio Lomuscio,et al.  MCMAS: A Model Checker for the Verification of Multi-Agent Systems , 2009, CAV.

[14]  Wojciech Penczek,et al.  VerICS 2004: A Model Checker for Real Time and Multi-agent Systems ? , 2004 .

[15]  G. Denker,et al.  CAPSL integrated protocol environment , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[16]  Alessio Lomuscio,et al.  Towards verifying contract regulated service composition , 2008, 2008 IEEE International Conference on Web Services.

[17]  A. Prasad Sistla,et al.  Symmetry and model checking , 1996, Formal Methods Syst. Des..

[18]  Ron van der Meyden,et al.  Complete Axiomatizations for Reasoning about Knowledge and Branching Time , 2003, Stud Logica.

[19]  Ronald Fagin,et al.  Reasoning about knowledge , 1995 .

[20]  Michael Wooldridge,et al.  Computationally grounded theories of agency , 2000, Proceedings Fourth International Conference on MultiAgent Systems.

[21]  Zhifeng Liu,et al.  Abstraction for model checking multi-agent systems , 2011, Frontiers of Computer Science in China.

[22]  Anne Elisabeth Haxthausen,et al.  Theoretical Aspects of Computing - ICTAC 2008, 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings , 2008, ICTAC.

[23]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).