=Paper= {{Paper |id=None |storemode=property |title=SMT-based parameter synthesis for L/U automata |pdfUrl=https://ceur-ws.org/Vol-851/paper6.pdf |volume=Vol-851 |dblpUrl=https://dblp.org/rec/conf/apn/KnapikP12 }} ==SMT-based parameter synthesis for L/U automata== https://ceur-ws.org/Vol-851/paper6.pdf
                 SMT-based Parameter Synthesis
                      for L/U Automata

                    Michal Knapik1,2 and Wojciech Penczek1,3
             1
                Institute of Computer Science, Polish Academy of Sciences,
                        J.K. Ordona 21, 01-237 Warszawa, Poland
          2
            International PhD Project in Intelligent Computing (MPD, FNP)
                                 mknapik@ipipan.waw.pl
       3
         Institute of Informatics, University of Natural Sciences and Humanities,
                             3 Maja 54, 08-110 Siedlce, Poland
                                 penczek@ipipan.waw.pl



        Abstract We present and evaluate a straightforward method of repre-
        senting finite runs of a parametric timed automaton (PTA) by means of
        formulae accepted by satisfiability modulo theories (SMT)-solvers. Our
        method is applied to the problem of parametric reachability, i.e., the
        synthesis of a set of the parameter substitutions under which a state sat-
        isfying a given property is reachable. While the problem of parametric
        reachability is not decidable in general, we provide algorithms for under-
        approximation of the solution to this problem for a certain class of PTA,
        namely for the lower/upper bound automata.


1     Introduction

Model checking of real-time systems (RTS), performed by the analysis of their
models is a very important subject of research. This is highly motivated by an
increasing demand to verify safety critical systems, i.e., time-dependent systems,
failure of which could cause dramatic consequences for both people and hard-
ware. These systems include robotic surgery machines, nuclear reactor control
systems, railway signalling, breaking systems, air traffic control systems, flight
planning systems, rocket range launch safety systems, and many others. Humans
already benefit a lot from a variety of real-time systems, being often unaware of
this. Parametric model checking [2,10] aims at extending the successful develop-
ments of model checking of RTS. In this case, the model contains free variables,
called parameters. Such a situation typically arises at the initial stages of a
system design, when some of the details might be unknown.
    Timed automata (TA) [1] constitute the most popular and applied class of
RTS. The introduction of free variables into timed automata leads to parametric
timed automata [2]. It was proven in [12] that the emptiness problem: “Is there
a parameter valuation for which an automaton has an accepting run” for PTA is
    W. Penczek is partly supported by the Polish National Science Centre under grant
    No. DEC-2011/01/B/ ST6/01477.
78       PNSE’12 – Petri Nets and Software Engineering



undecidable. Several tools have been implemented ([3,5,9,12,14,16]), which allow
to verify certain properties of PTA (or related phase automata in [9]). All these
tools except for [9] have one thing in common: they aim at fully describing the
set of parameter substitutions under which the given property holds. Unfortu-
nately, this means that the process of parametric model checking does not need to
stop, consuming time and memory resources. These approaches usually employ
extensions of classical (non-parametric) model checking methods such as: para-
metric difference bound matrices [5,12], partition refinement [16], compositional
model-checking [9], and CEGAR and CEGAR-inspired methods [3,4,11].
    In [17] a theoretical basis for bounded model checking for PTA was intro-
duced. We have presented the counterpart of the region graph, which allows for
a synthesis of a part of the set of constraints under which the given existential
CTL property holds. The proposed method ensures that the process of verifica-
tion stops with correct (but usually not complete) results. In the current paper
we continue this work in order to ensure its feasibility. To this aim we consider
lower bound/upper bound (L/U) automata [12] in which each parameter occurs
either as a lower- or as an upper bound in the timing constraints. Despite this
limitation, L/U automata are still interesting in practice, as for example they
can be used to model the Fischer’s Mutual Exclusion Algorithm, the Root Con-
tention Protocol [12] and other well known systems1 . Hune et al. [12] showed that
the emptiness problem for L/U automata with respect to finite runs is decid-
able, whereas Bozelli and Torre [8] proved that it is also decidable w.r.t. infinite
accepting runs. Similarly, the universality problem: “Does an automaton have
an accepting run for each parameter valuation” is decidable for L/U automata.
The above decidability results do not solve the problem of finding the valuations
of the parameters in case the answer to the emptiness problem is positive and
the answer to the universality problem is negative. This means that in case an
automaton does have an accepting run only for some parameter valuations, it
is not known how to compute them. The above observation is the main moti-
vation of our work, which aims at offering a symbolic method for the synthesis
of parameter valuations for which an L/U automaton satisfies some reachability
property, i.e., it has a finite accepting run.
    From the practical point of view the synthesis of all the parameter valuations
is usually not needed: an analyst would typically be satisfied with a possibility
of obtaining just a part of them. The direct analysis of parametric region graph
is not feasible due to its typically large size, therefore the new methods of un-
winding of the state space are needed. To this end, in this paper we offer a direct
translation from an unwinding of the the concrete model of an L/U automa-
ton to an SMT instance. This allows for synthesizing a subset of the parameter
valuations for which an automaton satisfies some reachability property.
    The rest of the paper is organized as follows. In the next section we briefly
present the theory of parametric timed automata and formulate the task of para-
metric synthesis. In Section 3 we present how to encode all the finite runs of a
1
     IEEE Computer Society. IEEE Standard for a High Performance Serial Bus. Std
     1394-1995, 1996.
    M. Knapik, W. Penczek: SMT-based parameter synthesis for L/U automata               79



given length as an SMT formula, and in Section 4 the algorithm for a state space
exploration and a parameter synthesis for L/U automata is presented. Section
5 contains the preliminary evaluation of our method, as applied to two bench-
marks: Fischer’s Mutual Exclusion Protocol and a version of Generic Timed
Pipeline Paradigm. We conclude with a brief discussion in Section 5.

2     Theory of parametric timed automata
In this section we introduce all the main notions and define timed automata,
parametric timed automata, and L/U automata.
    Parametric timed automata, to be defined later, employ two sets of variables:
the set X = {x1 , . . . , xn } of real time variables, called clocks, and the set P =
{p1 , . . . , pm } of integer variables, called parameters. Both types of the variables
are used in the clock constraints of parametric timed automata.
    The Pm   clock constraints are built using linear expressions, i.e., expressions of the
form i=1 ti · pi + t0 , where ti ∈ Z. Clocks or differences of clocks compared with
linear expressions, formally, the expressions of the form xi ≺ e or xi − xj ≺ e,
where i 6= j, ≺∈ {≤, <} and e is a linear expression, are called simple guards.
The conjunctions of simple guards are called guards. By G we denote the set of
all guards. By G0 we mean the subset of G consisting of the guards built only of
the simple guards of type xi ≺ e, where xi ∈ X and ≺∈ {≤, <}.
    The clocks range over the nonnegative reals (R≥0 ) while the parameters range
over the naturals (N, including 0). The function υ : P → N is called a parameter
valuation and ω : X → R≥0 is called a clock valuation. Sometimes it is convenient
to perceive υ and ω as points in, respectively, Nm and Rn≥0 .
    The value obtained by substituting the parameters in a linear expression e
according to the parameter valuation υ is denoted by e[υ]. If ω(xi )−ω(xj ) ≺ e[v]
(ω(xi ) ≺ e[v]) holds, then we write ω |=υ xi − xj ≺ e (resp., ω |=υ xi ≺ e). This
notion is naturally extended to the guards.
    Two operations can be executed on the clocks: incrementation and reset. Let
ω be a clock valuation and δ ∈ R, then by ω + δ we denote such a clock valuation
that (ω + δ)(xi ) = ω(xi ) + δ for all 1 ≤ i ≤ n. A set of the expressions of the form
xi := bi , where bi ∈ N, and 1 ≤ i ≤ n is called a reset, and the set of all resets is
denoted by R. Let ω be a clock valuation and r be a reset, then by ω[r] we denote
such a clock valuation that ω[r](xi ) = bi if xi := bi ∈ r, and ω[r](xi ) = ω(xi )
otherwise. Intuitively, resetting a clock valuation amounts to setting the selected
clocks to some fixed values, while leaving the remaining clocks intact. The initial
clock valuation ω0 satisfies ω0 (xi ) = 0 for all xi ∈ X.

2.1    Parametric timed automata
Timed automata [1] are an established formalism for modelling the behavior of
real-time systems. The clock constraints are expressed as the restrictions imposed
on clocks or differences of clocks. Parametric timed automata [2] are an extension
of timed automata, where linear expressions containing parameters are allowed
in the clock constraints.
80      PNSE’12 – Petri Nets and Software Engineering



Definition 1. A parametric timed automaton is a seven-tuple
A = hQ, l0 , A, X, P, →, Ii, where:

 – Q is a finite set of locations,
 – l0 ∈ Q is the initial location,
 – A is a finite set of actions,
 – X and P are, respectively, finite sets of clocks and parameters,
 – I : Q → G0 is an invariant function,
 – →⊆ Q × A × G × R × Q is a transition relation.
                                                                 a,g,r
A transition (q, a, g, r, q 0 ) ∈→ is typicaly denoted by q → q 0 .

Notice that the co-domain of the invariant function is the conjunction of upper
bounds on clocks. This assumption is taken from [12] in order to ensure that
the set of time delays under which the automaton can stay in a given location
is connected and contains 0 (if nonempty) for each parameter valuation.
    The concrete semantics of a parametric timed automaton under a parameter
valuation υ is defined in the form of a labelled transition system.

Definition 2 (Concrete semantics). Let A = hQ, l0 , A, X, P, →, Ii be a para-
metric timed automaton and υ be a parameter valuation. The labelled transition
                                                                      d
system for A under υ is defined as the tuple JAKυ = hS, s0 , R≥0 ∪ A, →i, where:

 – S = {(l, ω) | l ∈ Q, and ω is a clock valuation such that ω |=υ I(l)},
 – s0 = (l0 , ω0 ) (we assume that ω0 |=υ I(l0 )),
                                                         d
 – Let (l, ω), (l0 , ω 0 ) ∈ S. The transition relation →⊆ S ×S is defined as follows:
                                    d
      • if d ∈ R≥0 , then (l, ω) → (l0 , ω 0 ) iff (l = l0 and ω 0 = ω + d),
                                d              d,g,r
      • if d ∈ A, then (l, ω) → (l0 , ω 0 ) iff l → l0 , for some g ∈ G, r ∈ R, where
        ω |=υ g, and ω 0 = ω[r].

The elements of S are called the concrete states of JAKυ .

After substituting the parameters in A according to a parameter valuation υ
we obtain the timed automaton, denoted by Aυ . The concrete semantics of
Aυ is usually denoted by JAυ K and it is straightforward [12] to observe that
JAυ K = JAKυ .
   For k ∈ N by a k-run ρk in JAKυ we mean a sequence of states and transitions:
         d      act     d     act       dk−1       act       d
ρk = s0 →0 s00 →1 s1 →1 s01 →2 . . . → s0k−1 →k sk →   k
                                                         s0k , where di ∈ R≥0 and
acti ∈ A for all 0 ≤ i ≤ k. By a run we mean any k-run for k ∈ N. We say that
k is the length of ρk and s0k is k–reachable in JAKυ .


2.2   Parametric reachability and synthesis

The original definition of parametric timed automata [2] contains a distinguished
subset of the locations, called final locations. A run is accepted under a given
valuation of the parameters if it ends with a final state. The question of the
  M. Knapik, W. Penczek: SMT-based parameter synthesis for L/U automata            81



emptiness of a set of the parameter valuations under which there exists an ac-
cepting run was shown in [2] to be undecidable.
    Following [12,17] we present the results in the setting typical for model check-
ing, where we distinguish the model and the property to be verified.

Definition 3. Let A = hQ, l0 , A, X, P, →, Ii be a parametric timed automaton.
The state formulae are defined by the following grammar:

                     φ = l | xi ≺ b | xi − xj ≺ b | φ ∧ φ | ¬φ,

where l ∈ Q, xi , xj ∈ X, ≺∈ {≤, <} and b ∈ N.
We also refer to a state formula as to a property. Let υ be a parameter valuation,
(l, ω) ∈ JAKυ , and let φ, ψ be state formulae. We define the validity of a state
formula in a global states, denoted (l, ω) |= φ, inductively as follows:

 – (l, ω) |= l0 iff l = l0 ,
 – (l, ω) |= xi ≺ b iff ω |=υ xi ≺ b, and (l, ω) |= xi − xj ≺ b iff ω |=υ xi − xj ≺ b,
 – (l, ω) |= φ ∧ ψ iff (l, ω) |= φ and (l, ω) |= ψ,
 – (l, ω) |= ¬φ iff not (l, ω) |= φ.

Let υ be a parameter valuation and φ be a state formula. Let k ∈ N, dj ∈ R≥0 and
                                           d     act     d     act     dk−1       act
actj ∈ A for all 1 ≤ j ≤ k. Let ρk = s0 →0 s00 →1 s1 →1 s01 →2 . . . → s0k−1 →k
   d
sk →k
      s0k be a k-run in JAKυ . If for some k ∈ N there exists a run ρk in JAKυ
such that s0k |= φ, then we say that a state satisfying φ is reachable in A under
υ and write JAKυ |= EF φ. The EF modality originates from Computation Tree
Logic (CTL), where EF φ stands for “there exists a path such that eventually φ
holds”.
   The task of parametric reachability, otherwise called the parameter synthesis
problem, is formulated as follows.

       Let A be parametric timed automaton and let φ be a state formula.
          Automatically describe the set Γ (A, φ) = {υ | JAKυ |= EF φ}.

As mentioned earlier, there is no decision procedure for checking whether Γ (A, φ)
is empty or contains all the parameter valuations, therefore we can not expect
to be able to fully solve the parameter synthesis problem, at least in the general
case.


2.3    L/U automata

Hune et al. have identified in [12] an important class of parametric timed au-
tomata for which the problem of the emptiness of Γ (A, φ) is decidable. These are
the lower/upper bound automata (L/U automata, for short), where additional
constraints on the parameters are used.
   In what follows if f is a function and B a subset of its domain, then f|B
stands for the restriction of f to B.
82      PNSE’12 – Petri Nets and Software Engineering



Definition 4. A lower/upper bound automaton is a parametric timed automa-
ton A = hQ, l0 , A, X, P, →, Ii satisfying the following conditions

 – P = L ∪ U , where L = {λ1 , . . . , λl }, U = {µ1 , . . . , µu }, and L ∩ U = ∅.
 – Each P               Puin the guards or the invariants of A can be written in
         linear expression
            l
   form i=1 li · λi + j=1 uj · µj + t0 , where li , uj , t0 ∈ Z and li ≤ 0, uj ≥ 0
   for all 1 ≤ i ≤ l and 1 ≤ j ≤ u.

The elements of L are called the lower parameters while the elements of U are
called the upper parameters.

Intuitively, in an L/U automaton the clock constraints can be uniformly relaxed
by decreasing the values assigned to the lower parameters and increasing the
values assigned to the upper parameters.
   Let A be an L/U automaton and υ be a parameter valuation. Define λ = υ|L
and µ = υ|U . If υ 0 is also a valuation of the parameters, λ0 = υ 0 |L , µ0 = υ 0 |U ,
and ∀λi ∈L λ0 (λi ) ≤ λ(λi ) and ∀µj ∈U µ(µj ) ≤ µ0 (µj ), then we write υ ≤ υ 0 .
   When it is convenient to define υ in terms of of λ and µ, we write υ = (λ, µ).

Proposition 1 ([12]). Let A be an L/U automaton, φ a state formula, and
υ, υ 0 be parameter valuations such that υ ≤ υ 0 . Then, JAKυ |= EF φ implies
JAKυ0 |= EF φ.

Assume that A is an L/U automaton. From the above lemma it follows that the
problem of the emptiness of Γ (A, φ) can be reduced to the problem of reacha-
bility of a state satisfying φ in the automaton obtained from A by substituting
lower parameters with 0 and removing each guard or invariant containing at least
one upper parameter. The latter, in terms of [12], is equivalent to substituting
∞ for each upper parameter.


3    Translation to SMT

The idea of encoding of system’s behavior using the translation to propositional
formulae originates from [7]. The techniques for SAT-based verification of various
extensions of timed automata have evolved in parallel with these based on dif-
ference bound matrices. Usually, it is possible to translate only a part of a model
to a logical formula, hence this method is applied for bounded model checking:
a technique especially suited for seeking for bugs and unwanted behaviors.
    SMT-solvers extend the capabilities of SAT-solvers by allowing for formulae
of the first order over several built-in theories as an input. In our considerations,
we use SMT-solvers to obtain the satisfiability and example models (valuations
of the parameters) for formulae expressed using boolean variables and operators
together with real-valued variables, linear arithmetic operators and relations. As
we have decided to make the translation as straightforward as possible, in this
experimental phase we have chosen to use SMT-lib ver. 2.0 [6] compliant solvers
and rich logics allowing for linear arithmetic over real sort (e.g. QF LRA).
   M. Knapik, W. Penczek: SMT-based parameter synthesis for L/U automata                 83



    Let A = hQ, l0 , A, X, P, →, Ii be a parametric timed automaton. In this sec-
tion we show how to encode, for a given k ∈ N, all the k-runs of Aυ for all
the parameter valuations υ, as the formula acceptable by SMT solvers such as
CVC3. We start with the description of the sorts (types), the variables, and the
additional predicates used.


3.1   Sorts and Predicates

We encode the locations of A by means of enumerating them using proposi-
tional expressions. For each i ∈ N let BV i = {bv1i , bv2i , . . . , bvdlog|Q|e
                                                                          i
                                                                                 } be a set
                                             i
of propositional variables. Let BE denote the set of all the propositional for-
mulae over BV i . It is straightforward to notice for each i ∈ N we can define
the function loc enci : Q → BE i assigning to each of the locations from Q
the conjunction of the literals (variables or their negations) from BV i such that
loc enci (l) ∧ loc encj (l0 ) is false iff i 6= j or l 6= l0 . Intuitively, for l ∈ Q and
i ∈ N, the formula loc enci (l) can be interpreted as an encoding of the location
l at the i–th step (i ≤ k) of the k-runs, using variables from BV i .
    Recall that X = {x1 , x2 , . . . , xn } is a set of the clocks. For each i ∈ N let
X i = {xi1 , xi2 , . . . , xin } be a set of real variables, where X i ∩ X j = ∅ for i 6= j,
and similarly, let T = {t0 , t1 , . . .} be a set of real variables. As previously, the
variables from X i are used to encode the clock valuations in the i–th steps of
the k-runs with the help of the variables from T , which record the time delays
between the consecutive actions.
    Recall that P = {p1 , p2 , . . . , pm } is a set of the parameters ranging over N.
With a slight notational abuse we treat P as a set of the variables of real sort.
In the current version, SMT-lib standard does not allow for typecasts between
reals and integers, therefore we need to use the predicate is int to ensure that
the variables from P hold integer values only (e.g., is int(7.0) evaluates to true,
while is int(4.3) is false).
                                                                                 Sk
    Summarizing, when considering the k-runs, we declare V arsk = i=1 X i ∪
                                                        S k
T ∪ P to be real variables and Bvarsk = i=1 BV i to be boolean variables.
Additionally, we define the formula
                                        ^              ^
                      T ypeCutk =            v ≥0∧          is int(p)
                                     v∈V arsk         p∈P


which ensures that all used variables range over the appropriate sets.


3.2   Encoding the Transitions

In what follows, if η is a formula containing the free variables a1 , a2 , . . . , an ,
then by η[a1 ← a01 , a2 ← a02 , . . . an ← a0n ] we denote the formula obtained by
substituting a01 for a1 , a02 for a2 , etc. in η. Additionally, we assume that there are
no two transitions having the same label in A. This assumption is not essential
84        PNSE’12 – Petri Nets and Software Engineering



for the translation2 , and it is used only to simplify the presentation of the results
and the associated proofs.
                act,g,r
    Let tr = l → l0 be a transition, where l, l0 are respectively the source and
the target location, act is the action label, g is the guard, and r is the reset.
It is convenient to use the following notations: source(tr) = l, target(tr) = l0 ,
guard(tr) = g, and reset(tr) = r. Now, let i ∈ N. We define guardi (tr) =
guard(tr)[x1 ← xi1 , . . . , xn ← xin ], i.e., the encoding of guard(tr) using the
variables introduced earlier. Define reseti (tr) as the smallest set such that xij :=
a + ti ∈ reseti (tr) if xj := a ∈ reset(tr) and xij := xi−1         j   + ti ∈ reseti (tr)
otherwise, for each 1 ≤ j ≤ n. Intuitively, reseti (tr) models the new value of
each clock after the consecutive reset and delay. Let s ∈ Q be a location, we
define inv i (s) = I(s)[x1 ← xi1 , . . . , xn ← xin ], i.e., the encoding of the invariant
of s. The above notions are combined to define the encoding of the transition tr
as follows:
            tr enci (tr) = loc enci (source(tr)) ∧ guardi (tr) ∧ reseti+1 (tr)
                           ∧ inv i+1 (target(tr)) ∧ loc enci+1 (target(tr)).
The correctness of the above construction is stated in the following lemma.
                           act,g,r
Lemma 1. Let tr = l → l0 be a transition in A, υ be a parameter valuation,
                                                              act            d
(l, ω) be a concrete state in JAKυ and i ∈ N. Then, (l, ω) −→ (l0 , ω[r]) −→
(l0 , ω[r] + d) in JAKυ iff for some valuation V of all the variables in V arsk
satisfying V |= tr enci (tr) ∧ T ypeCuti+1 we have that:
 – υ = V|P ,
 – ω = V|X i [xi1 ← x1 , . . . , xin ← xn ],
 – d = V (ti+1 ),
 – ω[r] + d = V|X i+1 [xi+1
                          1      ← x1 , . . . , xi+1
                                                 n   ← xn ].
Proof. Observe that the locations are uniquely represented by their encodings,
thus we can focus on nonboolean variables only.
    (⇐) Let V be a valuation of the variables such that V |= tr enci (tr) ∧
T ypeCuti+1 . Let ω = V|X i [xi1 ← x1 , . . . , xin ← xn ] and υ = V|P . Denote ω i =
V|X i , then from V |= guardi (tr) we obtain ω i |=υ guardi (tr), which in turn
yields that ω |=υ guard(tr). Let d = V (ti+1 ), denote ω i+1 = V|X i+1 and notice
that from V |= reseti+1 (tr) it follows that ω i+1 (xi+1          i      i
                                                          j ) = ω [r](xj ) + d for all
                                      0              i+1            i+1
1 ≤ j ≤ n. Thus, if we denote ω = V|X i+1 [x1 ← x1 , . . . , xn ← xn ], then
ω 0 = ω[r] + d. Now, observe that from V |= inv i+1 (target(tr)) we can infer that
ω i+1 |=υ inv i+1 (target(tr)), from which ω 0 |=υ I(target(tr)), i.e., ω[r] + d |=υ
I(target(tr)). As d ≥ 0 and in the view of the assumption that the invariants
admit only upper bounds on clocks, we have also that ω[r] |=υ I(target(tr)).
This, together with the fact that V |= T ypeCuti+1 assures that the used variables
range over the correct sets, concludes this part of the proof.
    (⇒) The implication in the other direction follows easily from the basic def-
initions of the transitions in JAυ K.
2
     We can always relabel the labels.
   M. Knapik, W. Penczek: SMT-based parameter synthesis for L/U automata                     85



3.3     Encoding k-runs and reachability testing

Our aim is to encode all the k-runs of Aυ for each parameter valuation υ. Recall
that n is the number of the clocks. To this end we define the following formula:
                                           Vn                                            
      model enck (A) = T ypeCutk ∧              0                 0           0
                                          i=1 (xi = t0 ) ∧ loc enc (l0 ) ∧ inv (l0 )
                                         Vk−1 W
                                        ∧ i=0 tr∈ → tr enci (tr).

The first component ensures that all variables range over the proper values. The
second component sets all the initial clocks to some arbitrary common value
(the assumption that the invariants represent the upper bounds on the clocks is
significant here), encodes the initial state, and makes sure that its invariant is
satisfied. The last component encodes all the possible transitions in the k–runs.
    Let φ be a state formula and i ∈ N. Let {l1 , . . . , lm } be a set of all the
locations present in φ. We define the encoding of φ as follows:

pr enci (φ) = φ[x1 ← xi1 , . . . , xn ← xin , l1 ← loc enci (l1 ), . . . , lm ← loc enci (lm )],

i.e., we simply substitute in φ each clock with its i–th variable counterpart, and
each location with its encoding using boolean variables from BV i .
     We obtain the formula to be used for testing and parameter synthesis by
combining the encodings of the k-runs and the property, as presented in the
following lemma.

Lemma 2. Let A be a parametric timed automaton, φ be a state formula, υ be
a valuation of the parameters, and k ∈ N. A state satisfying φ is k–reachable
in JAKυ iff there exists a valuation V of all the variables in V arsk such that
V |= model enck (A) ∧ pr enck (φ) and V|P = υ.

Proof. Due to the presence of T ypeCutk in model enck (A) we know that all the
variables range over the proper sets.
    Let l be the (unique) location such that V|BV k |= loc enck (l) and ω k =
V|X k [xk1 ← x1 , . . . , xkn ← xn ], First, we prove that V |= model enck (A) iff the
state (l, ω k ) is k–reachable in JAυ K for υ = V|P .
                          Vn
    If k = 0, then i=1 (x0i = t0 ) ∧ loc enc0 (l0 ) ∧ inv 0 (l0 ) is satisfied by the
valuation V iff V is such that if we denote ω 0 = V|X 0 [x01 ← x1 , . . . , x0n ← xn ]
and V|P = υ, then for some t0 = V (t0 ) we have that ω 0 = ω0 +t0 and ω 0 |=υ I(l0 ).
This corresponds to the set of states to which JAυ K can progress by the time
transitions
                                                          k
W For the inductive           step observe that
                                            W model enc (A)k−1  = model enck−1 (A)∧
                  k−1                  k
  tr∈ → tr enc        (tr)∧T ypeCut = tr∈ → model enc            (A)∧tr enck−1 (tr) ∧
T ypeCutk and apply Lemma 1 and the inductive assumption.
    To conclude, notice that pr enck (φ) simply encodes all the concrete states
for which φ holds, using the variables from BV k ∪ X k .
86     PNSE’12 – Petri Nets and Software Engineering



4    Parameter set approximations

We already know how to write, for a given parametric timed automaton and a
property, the formula encoding k–reachable states for which the property holds
together with the associated valuations of the parameters. It might be beneficial
to verify this formula as it is, if we wish to obtain the answer to the question
whether the property is satisfied by k–reachable states. We can also rely on
the SMT-solver to obtain an exemplary witness, i.e., a correct valuation of the
parameters. Our task is, however, to systematically explore the space of the
admissible parameters, with a hope for painting a part of the picture from which
an analyst can make further generalizations.
    Let A = hQ, l0 , A, X, P, →, Ii be an L/U automaton and P = L ∪ U , where
L and U are disjoint sets of the upper and the lower parameters, respectively.
Assume that L = {λ1 , . . . , λl } and U = {µ1 , . . . , µu }.
    Let φ be a property and υ be such a valuation of the parameters that there
exists a reachable state in JAKυ satisfying φ. Recall (Proposition 1) that in the
class of the L/U automata this means that a state satisfying φ is also reachable
in JAKυ0 for each υ 0 such that υ ≤ υ 0 .
    Define the complementing clause with respect to υ as follows
                                  l
                                  _                     u
                                                        _
             ComplClause(υ) =         (λi > υ(λi )) ∨       (µi < υ(µi )),
                                  i=1                   i=1

and observe that υ 0 |= ComplClause(υ) iff υ ≤ υ 0 is not true.
    We employ ComplClause(υ) to block the SMT-solver from seeking for pa-
rameter valuations which can be inferred from the L/U automata properties and
the set of the parameters that has been already synthesized.
    The following algorithm attemps to synthesise parameter valuations for which
there exists a k–reachable state satisfying the property φ. If the search is suc-
cessful, the user is presented with a newly synthesised parameter valuation υ
and asked whether the procedure should be continued. If so, a new blocking
ComplClause(υ) is added to the main formula and the loop takes another turn.


Algorithm 1 ReachSynth(A, φ, k)
Input: an L/U automaton A, a property φ, a depth value k ∈ N
Output: a set Res of valuations of the parameters
 1: Res := ∅
 2: reachF ormula := model enck (A) ∧ pr enck (φ)
 3: while user requests to expand Res and reachFormula is satisfiable do
 4:   let V be such that V |= reachF ormula and υ := V|P
 5:   let Res := Res ∪ {υ}
 6:   let reachF ormula := reachF ormula ∧ ComplClause(υ)
 7: end while
 8: return Res
    M. Knapik, W. Penczek: SMT-based parameter synthesis for L/U automata            87



   Note that in the above algorithm the testing for satisfiability (line 3), and
extraction of the witness valuation υ of the parameters (line 4) is performed by
means of a call to an external SMT-solver.

Lemma 3. Let A be an L/U automaton, φ be a property, and k ∈ N. For each
valuation of the parameters υ 0 such that there exists υ ∈ ReachSynth(A, φ, k)
satisfying υ ≤ υ 0 we have that JAKυ0 |= EF φ.

Proof. It follows immediately from Lemma 2 combined with the properties of
ComplClause(υ).

The ReachSynth algorithm can be used as the main building block of a bounded
parametric model checking process. The input consists of an L/U automaton A
and a property φ. Initially, we can employ the results from [12] to solve the
emptiness problem for φ and A, i.e., to check whether there exists a parameter
valuation υ such that JAKυ |= EF φ. If the existence of such a valuation is
confirmed, then the universality problem, i.e., the question whether JAKυ |= EF φ
for all parameter valuations υ, can be checked as a dual to the emptiness. If the
answer to the universality problem is false, then ReachSynth(A, φ, k) is called,
starting from k = 0 and incrementing the value of k whenever the previous call
returned empty set or the loop was stopped by the user.


5    Evaluation
In this section we present some preliminary results on parametric analysis of
two selected models, namely Fischer’s Mutual Exclusion Protocol and a version
of Generic Timed Pipeline Paradigm [15]. Both of them are well established
and scalable benchmarks specified in a form of networks of parametric timed
automata.

Definition 5. Let U = {Ai = hQi , l0 i , Ai , X i , P i , →i , I i i | 1 ≤ i ≤ m} be a
set (a network) of parametric timed automata such that X i ∩ X j = ∅ for each
1 ≤ i, j ≤ m and i 6= j. LetS L(a) = {1 ≤ i ≤ m | a ∈ Ai } be a function associ-
ating with each action a ∈ 1≤i≤m Ai the indices of the automata recognizing a.
We define the product automaton A = hQ, l0 , A, X, P, →, Ii of the network U,
where:
         Qm
 – Q = i=1 Qi ,
            1          m
 – l0 = (l
         S0m, . . . ,il0 ),
 – A = Si=1 A ,
              m
 – X = S i=1 X i ,
             m
 – P = i=1 P i ,            Vm
 – I((l1 , . . . , lm )) = i=1 I i (li ) for each (l1 , . . . , lm ) ∈ Q,
and the transition relation → is such that:
                 a,g,r                                                   a,gi ,ri
          . . , lm ) → (l10 ,S. . . , lm
 – (l1 , .V                            0
                                         ) iff for each i ∈ L(a) we have li →i li0 , and
   g = i∈L(a) gi , r = i∈L(a) ri , and li = li0 for all i ∈ {1, . . . , m} \ L(a).
88               PNSE’12 – Petri Nets and Software Engineering



In addition to a network, the user is expected to supply an experiment’s plan
file. Such a plan consists of a sequence of pairs (k, No) of natural numbers, where
k is the length of the runs to be considered, and No is a maximal number of
parameter valuations to be synthesised should the verified property be found
satisfiable. Our tool goes through the pairs in accordance with increasing k,
incrementally building the formulae to be tested as it was presented in earlier
sections.
     All the experiments have been performed on Intel P6200 2.13GHz dual core
machine with 3GB memory, running Linux operating system.


5.1          Fischer’s Mutual Exclusion Protocol

The timed automata network presented in Figure 1 models one of the possible
solutions to the classical problem of mutual exclusion, i.e., ensuring that only
one of the competing processes is able to gain an access to the critical section.
    The system in question consists of n independent processes synchronised via
the shared variable X. The model contains two parameters, i.e., the lower bound
parameter δ and the upper bound parameter ∆. It is well known that no two
processes are able to simultaneously get to their critical sections iff ∆ ≤ δ, thus
we have chosen to verify the reachability of φ1 = critical1 ∧ critical2 . Intuitively,
this means that we aim to synthesise values of the parameters δ and ∆ under
which the system behaves incorrectly, allowing two competing processes to jointly
enter their critical sections.


                                                                                                                         Start 1
                                                                                                                         Start 2
     idle1                      trying1            idle2                   trying2
                   Start 1                                                                                         0
                                                              Start 2
                   x1 := 0                                    x2 := 0
                                                                                                   SetX 2                       SetX 1
SetX 01                             SetX 1    SetX 02                          SetX 2
                                    x1 < ∆                                     x2 < ∆               SetX 02               SetX 01
                                    x1 := 0                                    x2 := 0

                                                                                                                SetX 1
                   Enter 1                                    Enter 2                                 2                         1
                   x1 > δ                                     x2 > δ                     SetX 2                 SetX 2                   SetX 1
     critical1                  waiting1          critical2                waiting2      Enter 2                                         Enter 1

                    Process 1                                  Process 2                                    Shared variable X



                     Figure 1: Fischer’s Mutual Exclusion Protocol, 2 processes



   As it turns out, for each test with the positive outcome, the set of the returned
valuations consists of the pairs (δ = i, ∆ = i + 1) for i from 0 to the limit No
= 10 given in the experiment’s plan. Clearly, from the point of view of an analyst
and in light of Lemma 3 this result indeed justifies an educated guess that the
mutual exclusion property is violated if ∆ > δ.
    M. Knapik, W. Penczek: SMT-based parameter synthesis for L/U automata                                                                                89



                          n   k   SAT? param vals max. form. form. bdg. total CVC3 peak CVC3
                                  (Y/N) found     size (MB) time (sec.) time (sec.) mem. (MB)
                          7 1–5     N        –                 1.54              1.7           1.8                   20
                          7  6      Y        10                3.51              2.25          37.2                  41
                          8 1–5     N        –                 2.95              3.95          3.6                   30
                          8  6      Y        10                7.13              5.45          75.3                  70
                          9 1–5     N        –                 5.48              7.1           6.5                   48
                          9  6      Y        10                13.71             11.86         187.8                 119
                         10 1–5     N        –                 9.43              13.1          11.33                 69
                         10 6       Y        10                24.62             24.06         245.75                198
                         11 1–5     N        –                 15.25             23.29         20.71                 108
                         11 6       Y        10                41.84             46.23         504.35                331
                         12 1–5     N        –                 24.94             40.13         25.11                 170
                         12 6       Y        10                71.17             85.07         726.51                560
                         13 1–5     N        –                 38.89             66.1          40.78                 256
                         13 6       Y        10                115.8             149.24        1315.87               1000
                         14 1–5     N        –                 57.76             105.98        67.50                 384
                         14 6       Y        10                180.71            253.99        3192.47               1600

        Table 1: Fischer’s Mutual Exclusion parametric verification results
Legend: n: a number of competing processes, k: runs’ lengths, SAT? : satisfia-
bility, 4–th column: the number of the synthesised parameter valuations, 5–th
column: the maximal (if k is an interval) size of the generated SMT-lib v2 for-
mula, 6–th column: the time spent on incrementally building the formulae, 7–th
column: the total time spent on verifying the formulae, 8–th column: the maximal
memory used by CVC3 solver.



               Producer
              prodReady




                x1 ≤ d
ProdReset                     Feed2                                  node1 Ready                                                node2 Ready
 x1 ≥ a                       x1 ≥ c               Feed2                                                       Feed3
 x1 := 0                      x1 := 0              x2 ≥ c                                                      x3 ≥ c
                                                   x2 := 0                                                     x3 := 0
                                                                        x2 ≤ d            Feed3                                    x3 ≤ d          Feed4
              prodWaiting                                                                 x2 ≥ c                                                   x3 ≥ c
                                                                                          x2 := 0                                                  x3 := 0
                                                                intermediate 1                                              intermediate 1
                                                                x2 ≤ f                                                      x3 ≤ f
                x1 ≤ b                                       Node1 Process1                                              Node2 Process1
              consReady                                      x2 ≥ e                                                      x3 ≥ e
                                                             x2 := 0                                                     x3 := 0
                                                                                                send                                                     send
                                                                intermediate 2                  x2 ≤ d                      intermediate 2               x3 ≤ d
                                                                x2 ≤ f                                                      x3 ≤ f
                x4 ≤ d
ConsReset                     Feed4        Node1 Process2                                              Node2 Process2
                                           x2 ≥ e                      Node1 Process3                  x3 ≥ e                     Node2 Process3
 x4 ≥ a                       x4 ≥ c       x2 := 0                                                     x3 := 0
 x4 := 0                      x4 := 0                                    x2 ≥ e                                                     x3 ≥ e
                                                                         x2 := 0                                                    x3 := 0

                                        intermediate 3                                              intermediate 3
                                             x2 ≤ f                                                      x3 ≤ f
              consWaiting




                x4 ≤ b
              Consumer                                   Processing node 1                                       Processing node 2



   Figure 2: Generic Timed Pipeline Paradigm, 2 processing nodes of length 3


5.2         Generic Timed Pipeline Paradigm

The network presented in Figure 2 models the system consisting of the Producer
feeding the Consumer with data sent through a sequence of nodes with additional
processing capabilities.
90         PNSE’12 – Petri Nets and Software Engineering



     The model is scalable with respect to the number n of the processing nodes
and the length m of each processing node and it contains three lower (a, c, e)
and three upper (b, d, f ) parameters.
     We have decided to add one dummy clock, called xtotal , to the above system.
It is straightforward to see that such an alteration does not change the behaviour
of the model, and that xtotal can be used to measure the total time passed along
a given run. With the help of the new clock we have analysed the reachability
of φ2 = ConsW aiting ∧ P rodReady ∧ xtotal ≥ 5. Again, the limit No is set to
10 for all k.

                     n m   k     SAT? param vals max. form. form. bdg. total CVC3 peak CVC3
                                 (Y/N) found     size (MB) time (sec.) time (sec.) mem. (MB)
                     2 10 1–12     N   —            0.01          0.01       1.27      7
                     2 10 13       Y   10           0.02          0.003      9.25      17
                     2 15 1–17     N   —            0.02          0.015      3.04      12
                     2 15 18       Y   10           0.02          0.004      22.29     29
                     2 20 1–22     N   —            0.03          0.02       6.40      18
                     2 20 23       Y   10           0.03          0.004      57.73     60
                     3 1 1–5       N   —            0.01          0.008      0.26      4
                     3 1    6      Y   10           0.02          0.004      16.91     26
                     3 2 1–7       N   —            0.02          0.014      0.51      5
                     3 2    8      Y   10           0.03          0.006      86.55     85
                     3 3 1–9       N   —            0.04          0.023      0.89      10
                     3 3   10      Y   10           0.05          0.008      13.68     17
                     3 4 1–11      N   —            0.06          0.034      1.48      10
                     3 4   12      Y   10           0.08          0.01       39.87     32
                     3 5 1–13      N   —            0.08          0.049      2.55      8
                     3 5   14      Y   10           0.11          0.014      2472.87   458

     Table 2: Generic Timed Pipeline Paradigm parametric verification results
               Legend: see Table 1, m: a number of processing nodes


    Note that the generated SMT formulae are rather small in this case. This
probably reflects the power of a concise representation by means of SMT in-
stances rather than the size of model’s state space [13].
    Table 3 contains some exemplary parameter valuations, synthesised for sev-
eral instances of the model. This illustrates the power of approximation-based
approach, where the collected data may be used in search for general pattern.


       n   m    k    a b c d e f               n     m     k   a b c d e f             n   m   k    a b c d e f
                     0 0 0 0 0 0                               0 0 0 1 0 0                          0 0 0 0 0 0
                     0 0 1 2 0 0                               0 1 1 4 0 0                          1 1 0 1 0 1
                     1 1 0 1 0 1                               1 1 0 1 0 0                          2 2 0 2 0 2
                     0 0 1 17 1 1                              0 2 1 6 1 1                          3 3 0 3 0 3
                     0 0 2 16 0 0                              1 1 1 4 0 0                          4 4 0 4 0 4
       2   15   18                              3    1     6                           3   3   10
                     1 1 1 2 0 1                               2 2 0 3 1 1                          5 5 0 5 0 5
                     0 0 2 19 1 1                              0 1 0 2 1 1                          6 6 0 6 0 6
                     0 0 3 17 0 0                              2 2 0 1 0 0                          7 7 0 7 0 7
                     1 1 0 15 1 1                              1 1 0 3 1 1                          8 8 0 8 0 8
                     0 0 3 6 0 0                               2 2 0 2 0 0                          9 9 0 9 0 9
                     0 0 0 0 0 0                               0 0 0 0 0 0                          0 0 0 0 0 0
                     0 0 1 2 0 0                               0 1 1 3 0 0                          1 1 0 1 0 1
                     1 1 0 1 0 1                               1 1 0 1 0 0                          2 2 0 2 0 2
                     0 0 1 22 1 1                              0 3 1 7 1 1                          3 3 0 3 0 3
                     0 0 2 21 0 0                              1 2 2 6 0 0                          4 4 0 4 0 4
       2   20   23                              3    2     8                           3   4   12
                     1 1 0 20 1 1                              2 2 0 1 0 1                          5 5 0 5 0 5
                     0 0 2 4 0 0                               1 1 1 4 0 0                          6 6 0 6 0 6
                     1 1 1 2 0 1                               1 1 1 3 0 0                          7 7 0 7 0 7
                     0 0 2 24 1 1                              3 3 0 2 0 1                          8 8 0 8 0 8
                     0 0 3 22 0 0                              0 2 0 4 1 1                          9 9 0 9 0 9

 Table 3: Generic Timed Pipeline Paradigm: exemplary parameter valuations
    M. Knapik, W. Penczek: SMT-based parameter synthesis for L/U automata             91



6    Conclusions

We have proposed a simple translation for a direct representation of finite runs
of a parametric timed automaton in form of SMT instances. This translation
coupled with blocking clauses allowed us for an underapproximation of the set
of the parameter valuations under which the given reachability property holds
in L/U automata. To the best of our knowledge this is the first such application
of SMT solvers, and this is at the same time a proof-of-concept as well as a
practical tool for exploring the spaces of parameter valuations.
    In the future we plan to extend our work to the parametric verification
of properties more complex than reachability, e.g., the existential fragment of
CTL*. Additionally, we plan to investigate the possibilites of an automated in-
ference of more general (or even complete) constraints under which the given
property holds using partial knowledge on the space of the parameter valuations
obtained using the methods presented in this paper.


References

 1. R. Alur and D. Dill. A theory of timed automata. Theoretical Computer Science,
    126(2):183–235, 1994.
 2. R. Alur, T. Henzinger, and M. Vardi. Parametric real-time reasoning. In Proc. of
    the 25th Ann. Symp. on Theory of Computing (STOC’93), pages 592–601. ACM,
    1993.
 3. É. André. Imitator ii: A tool for solving the good parameters problem in timed
    automata. In Yu-Fang Chen and Ahmed Rezine, editors, INFINITY, volume 39 of
    EPTCS, pages 91–99, 2010.
 4. E. André, T. Chatain, E. Encrenaz, and L. Fribourg. An inverse method for
    parametric timed automata. International Journal of Foundations of Computer
    Science, 20(5):819–836, Oct 2009.
 5. A. Annichini, A. Bouajjani, and M. Sighireanu. TREX: A tool for reachability
    analysis of complex systems. In Proc. of the 13th International Conference on
    Computer Aided Verification, CAV ’01, pages 368–372, 2001.
 6. C. Barrett, A. Stump, and C. Tinelli. The SMT-LIB Standard: Version 2.0. Techni-
    cal report, Department of Computer Science, The University of Iowa, 2010. Avail-
    able at www.SMT-LIB.org.
 7. A. Biere, A. Cimatti, E. Clarke, and Y. Zhu. Symbolic model checking without
    BDDs. In Proc. of the 5th Int. Conf. on Tools and Algorithms for the Construc-
    tion and Analysis of Systems (TACAS’99), volume 1579 of LNCS, pages 193–207.
    Springer-Verlag, 1999.
 8. L. Bozzelli and S. La Torre. Decision problems for lower/upper bound parametric
    timed automata. Formal Methods in System Design, 35(2):121–151, 2009.
 9. H. Dierks and J. Tapken. Moby/DC – A tool for model-checking parametric real-
    time specifications. In H. Garavel and J. Hatcliff, editors, Tools and Algorithms for
    the Construction and Analysis of Systems (TACAS 2003), volume 2619 of LNCS,
    pages 271–277. Springer, 2003.
10. L. Doyen. Robust parametric reachability for timed automata. Inf. Process. Lett.,
    102:208–213, May 2007.
92      PNSE’12 – Petri Nets and Software Engineering



11. G. Frehse, S. K. Jha, and B. H. Krogh. A counterexample-guided approach to
    parameter synthesis for linear hybrid automata. In Proc. of the 11th international
    workshop on Hybrid Systems: Computation and Control, HSCC ’08, pages 187–200,
    Berlin, Heidelberg, 2008. Springer-Verlag.
12. T. Hune, J. Romijn, M. Stoelinga, and F. Vaandrager. Linear parametric model
    checking of timed automata. J. Log. Algebr. Program., 52-53:183–220, 2002.
13. M. Knapik, W. Penczek, M. Szreter, and A. Pólrola. Bounded parametric verifica-
    tion for distributed time Petri nets with discrete-time semantics. Fundam. Inform.,
    101(1-2):9–27, 2010.
14. D. Lime, O. H. Roux, C. Seidner, and L. M. Traonouez. Romeo: A parametric
    model-checker for Petri nets with stopwatches. In S. Kowalewski and A. Philippou,
    editors, TACAS, volume 5505 of Lecture Notes in Computer Science, pages 54–57.
    Springer, 2009.
15. D. Peled. All from one, one for all: On model checking using representatives. In
    Proc. of the 5th Int. Conf. on Computer Aided Verification (CAV’93), volume 697
    of LNCS, pages 409–423. Springer-Verlag, 1993.
16. R. F. Lutje Spelberg and W. J. Toetenel. Splitting trees and partition refinement
    in real-time model checking. In HICSS, page 278, 2002.
17. W. Penczek and M. Knapik. Bounded Model Checking for Parametric Timed
    Automata. T. Petri Nets and Other Models of Concurrency, 5, to appear, 2012.