This paper presents a novel safety property verification approach for component-based systems modelled in BIP (Behaviour, Interaction and Priority), encompassing multiparty synchronisation with data transfer and priority. Our contributions consist of: (1) an on-the-fly lazy predicate abstraction technique for BIP; (2) a novel explicit state reduction technique, called simultaneous set reduction, that can be combined with lazy predicate abstraction to prune the search space of abstract reachability analysis; (3) a prototype tool implementing all the proposed techniques. We also conduct thorough experimental evaluation, which demonstrates the effectiveness of our proposed approach
This thesis proposes two techniques, simultaneous reachability analysis and simultaneous product met...
Software components and the methodology of component-based development offer a promising approach to...
Formal verification of properties in reactive real-time systems is crucial, as these systems are oft...
Reduction and abstraction techniques have been proposed to address the state space explosion problem...
International audienceWe propose invariant-based techniques for the efficient verification of safety...
International audienceWe present a compositional method for the verification of component-based syst...
Automatic verification of cyber-physical systems (CPS) typically involves computing the reachable se...
Safety critical and business critical systems are usually controlled by policies with the objective ...
International audienceA new method for incremental computation of invariants is proposed, for checki...
Abstract—We propose invariant-based techniques for the effi-cient verification of safety and deadloc...
International audienceIn order to deal with the verification of large systems, compositional approac...
Abstract. Safety critical and business critical systems are usually controlled by policies with the ...
Predicate abstraction has been proved effective for verifying several infinite-state systems. In pre...
Predicate abstraction has been proved effective for verifying severalinfinite-state systems. In pred...
Component-based Software Engineering (CBSE) is currently a key paradigm used for developing safety-c...
This thesis proposes two techniques, simultaneous reachability analysis and simultaneous product met...
Software components and the methodology of component-based development offer a promising approach to...
Formal verification of properties in reactive real-time systems is crucial, as these systems are oft...
Reduction and abstraction techniques have been proposed to address the state space explosion problem...
International audienceWe propose invariant-based techniques for the efficient verification of safety...
International audienceWe present a compositional method for the verification of component-based syst...
Automatic verification of cyber-physical systems (CPS) typically involves computing the reachable se...
Safety critical and business critical systems are usually controlled by policies with the objective ...
International audienceA new method for incremental computation of invariants is proposed, for checki...
Abstract—We propose invariant-based techniques for the effi-cient verification of safety and deadloc...
International audienceIn order to deal with the verification of large systems, compositional approac...
Abstract. Safety critical and business critical systems are usually controlled by policies with the ...
Predicate abstraction has been proved effective for verifying several infinite-state systems. In pre...
Predicate abstraction has been proved effective for verifying severalinfinite-state systems. In pred...
Component-based Software Engineering (CBSE) is currently a key paradigm used for developing safety-c...
This thesis proposes two techniques, simultaneous reachability analysis and simultaneous product met...
Software components and the methodology of component-based development offer a promising approach to...
Formal verification of properties in reactive real-time systems is crucial, as these systems are oft...