@article{CD-jar10, publisher = {Springer}, journal = {Journal of Automated Reasoning}, author = {Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, title = {Decidability and combination results for two notions of knowledge in security protocols}, volume = 48, number = {4}, pages = {441-487}, month = apr, year = 2012, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-jar10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-jar10.pdf}, doi = {10.1007/s10817-010-9208-8}, abstract = {In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic functions (encryption, exclusive~or,~...). The analysis of cryptographic protocols requires a precise understanding of the attacker knowledge. Two standard notions are usually considered: deducibility and indistinguishability. Those notions are well-studied and several decidability results already exist to deal with a variety of equational theories. Most of the existing results are dedicated to specific equational theories and only few results, especially in the case of indistinguishability, have been obtained for equational theories with associative and commutative properties~(AC).\par In this paper, we show that existing decidability results can be easily combined for any disjoint equational theories: if the deducibility and indistinguishability relations are decidable for two disjoint theories, they are also decidable for their union. We also propose a general setting for solving deducibility and indistinguishability for an important class (called \emph{monoidal}) of equational theories involving AC operators.\par As a consequence of these two results, new decidability and complexity results can be obtained for many relevant equational theories.} }
@article{KMT-jar10, publisher = {Springer}, journal = {Journal of Automated Reasoning}, author = {Kremer, Steve and Mercier, Antoine and Treinen, Ralf}, title = {Reducing Equational Theories for the Decision of Static Equivalence}, year = 2012, month = feb, pages = {197-217}, number = 48, volume = 2, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KMT-jar10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KMT-jar10.pdf}, doi = {10.1007/s10817-010-9203-0}, abstract = {Static equivalence is a well established notion of indistinguishability of sequences of terms which is useful in the symbolic analysis of cryptographic protocols. Static equivalence modulo equational theories allows for a more accurate representation of cryptographic primitives by modelling properties of operators by equational axioms. We develop a method that allows us in some cases to simplify the task of deciding static equivalence in a multi-sorted setting, by removing a symbol from the term signature and reducing the problem to several simpler equational theories. We illustrate our technique at hand of bilinear pairings.} }
@article{CDK-jar10, publisher = {Springer}, journal = {Journal of Automated Reasoning}, author = {Ciob{\^a}c{\u{a}}, {\c{S}}tefan and Delaune, St{\'e}phanie and Kremer, Steve}, title = {Computing knowledge in security protocols under convergent equational theories}, year = 2012, month = feb, pages = {219-262}, number = 2, volume = 48, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDK-jar10.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDK-jar10.pdf}, doi = {10.1007/s10817-010-9197-7}, abstract = {The analysis of security protocols requires reasoning about the knowledge an attacker acquires by eavesdropping on network traffic. In formal approaches, the messages exchanged over the network are modeled by a term algebra equipped with an equational theory axiomatizing the properties of the cryptographic primitives (e.g. encryption, signature). In this context, two classical notions of knowledge, deducibility and indistinguishability, yield corresponding decision problems.\par We propose a procedure for both problems under arbitrary convergent equational theories. Since the underlying problems are undecidable we cannot guarantee termination. Nevertheless, our procedure terminates on a wide range of equational theories. In particular, we obtain a new decidability result for a theory we encountered when studying electronic voting protocols. We also provide a prototype implementation.} }
@article{FG-lmcs12, journal = {Logical Methods in Computer Science}, author = {Finkel, Alain and Goubault{-}Larrecq, Jean}, title = {Forward Analysis for {WSTS}, Part~{II}: Complete {WSTS}}, year = 2012, month = sep, volume = 8, number = {3:28}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FG-lmcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FG-lmcs12.pdf}, doi = {10.2168/LMCS-8(3:28)2012}, abstract = {We describe a simple, conceptual forward analysis procedure for \(\infty\)-complete WSTS~\(\mathfrak{S}\). This computes the so-called \emph{clover} of a state. When \(\mathfrak{S}\) is the completion of a WSTS~\(\mathfrak{X}\), the clover in~\(\mathfrak{S}\) is a finite description of the downward closure of the reachability set. We show that such completions are infinity-complete exactly when \(\mathfrak{X}\) is an \(\omega^2\)-WSTS, a~new robust class of WSTS. We show that our procedure terminates in more cases than the generalized Karp-Miller procedure on extensions of Petri nets and on lossy channel systems. We characterize the WSTS where our procedure terminates as those that are \emph{clover-flattable}. Finally, we apply this to well-structured counter systems.} }
@article{JGL-lmcs12, journal = {Logical Methods in Computer Science}, author = {Goubault{-}Larrecq, Jean}, title = {{QRB}-Domains and the Probabilistic Powerdomain}, year = 2012, volume = 8, number = {1:14}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-lmcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JGL-lmcs12.pdf}, doi = {10.2168/LMCS-8(1:14)2012}, abstract = {Is there any Cartesian-closed category of continuous domains that would be closed under Jones and Plotkin's probabilistic powerdomain construction? This is a major open problem in the area of denotational semantics of probabilistic higher-order languages. We relax the question, and look for quasi-continuous dcpos instead.\par We introduce a natural class of such quasi-continuous dcpos, the omega-QRB-domains. We show that they form a category omega-QRB with pleasing properties: omega-QRB is closed under the probabilistic powerdomain functor, under finite products, under taking bilimits of expanding sequences, under retracts, and even under so-called quasi-retracts. But... omega-QRB is not Cartesian closed. We conclude by showing that the QRB domains are just one half of an FS-domain, merely lacking control.} }
@article{BGGLP-comp11, publisher = {Springer}, journal = {Computing}, author = {Bouissou, Olivier and Goubault, {\'E}ric and Goubault{-}Larrecq, Jean and Putot, Sylvie}, title = {A Generalization of {P}-boxes to Affine Arithmetic, and Applications to Static Analysis of Programs}, year = 2012, month = mar, volume = 94, number = {2-4}, pages = {189-201}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGGLP-comp11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGGLP-comp11.pdf}, doi = {10.1007/s00607-011-0182-8}, abstract = {We often need to deal with information that contains both interval and probabilistic uncertainties. P-boxes and Dempster-Shafer structures are models that unify both kind of information, but they suffer from the main defect of intervals, the wrapping effect. We present here a new arithmetic that mixes, in a guaranteed manner, interval uncertainty with probabilities, while using some information about variable dependencies, hence limiting the loss from not accounting for correlations. This increases the precision of the result and decreases the computation time compared to standard p-box arithmetic.} }
@inproceedings{BC-post12, address = {Tallinn, Estonia}, month = mar, year = 2012, volume = {7215}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Degano, Pierpaolo and Guttman, Joshua D.}, acronym = {{POST}'12}, booktitle = {{P}roceedings of the 1st {I}nternational {C}onference on {P}rinciples of {S}ecurity and {T}rust ({POST}'12)}, author = {Bana, Gergei and Comon{-}Lundh, Hubert}, title = {Towards Unconditional Soundness: Computationally Complete Symbolic Attacker}, pages = {189-208}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BC-post12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BC-post12.pdf}, doi = {10.1007/978-3-642-28641-4_11}, abstract = {We consider the question of the adequacy of symbolic models versus computational models for the verification of security protocols. We neither try to include properties in the symbolic model that reflect the properties of the computational primitives nor add computational requirements that enforce the soundness of the symbolic model. We propose in this paper a different approach: everything is possible in the symbolic model, unless it contradicts a computational assumption. In this way, we obtain unconditional soundness almost by construction. And we do not need to assume the absence of dynamic corruption or the absence of key-cycles, which are examples of hypotheses that are always used in related works. We set the basic framework, for arbitrary cryptographic primitives and arbitrary protocols, however for trace security properties only.} }
@inproceedings{CCS-post12, address = {Tallinn, Estonia}, month = mar, year = 2012, volume = {7215}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Degano, Pierpaolo and Guttman, Joshua D.}, acronym = {{POST}'12}, booktitle = {{P}roceedings of the 1st {I}nternational {C}onference on {P}rinciples of {S}ecurity and {T}rust ({POST}'12)}, author = {Comon{-}Lundh, Hubert and Cortier, V{\'e}ronique and Scerri, Guillaume}, title = {Security proof with dishonest keys}, pages = {149-168}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CCS-post12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CCS-post12.pdf}, doi = {10.1007/978-3-642-28641-4_9}, abstract = {Symbolic and computational models are the two families of models for rigorously analysing security protocols. Symbolic models are abstract but offer a high level of automation while computational models are more precise but security proof can be tedious. Since the seminal work of Abadi and Rogaway, a new direction of research aims at reconciling the two views and many soundness results establish that symbolic models are actually sound w.r.t. computational models.\par This is however not true for the prominent case of encryption. Indeed, all existing soundness results assume that the adversary only uses honestly generated keys. While this assumption is acceptable in the case of asymmetric encryption, it is clearly unrealistic for symmetric encryption. In this paper, we provide with several examples of attacks that do not show-up in the classical Dolev-Yao model, and that do not break the IND-CPA nor INT-CTXT properties of the encryption scheme.\par Our main contribution is to show the first soundness result for symmetric encryption and arbitrary adversaries. We consider arbitrary indistinguishability properties and an unbounded number of sessions. This result relies on an extension of the symbolic model, while keeping standard security assumptions: IND-CPA and IND-CTXT for the encryption scheme.} }
@inproceedings{CDD-post12, address = {Tallinn, Estonia}, month = mar, year = 2012, volume = {7215}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Degano, Pierpaolo and Guttman, Joshua D.}, acronym = {{POST}'12}, booktitle = {{P}roceedings of the 1st {I}nternational {C}onference on {P}rinciples of {S}ecurity and {T}rust ({POST}'12)}, author = {Cortier, V{\'e}ronique and Degrieck, Jan and Delaune, St{\'e}phanie}, title = {Analysing routing protocols: four nodes topologies are sufficient}, pages = {30-50}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CDD-post12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CDD-post12.pdf}, doi = {10.1007/978-3-642-28641-4_3}, abstract = {Routing protocols aim at establishing a route between nodes on a network. Secured versions of routing protocols have been proposed in order to provide more guarantees on the resulting routes. Formal methods have proved their usefulness when analysing standard security protocols such as confidentiality or authentication protocols. However, existing results and tools do not apply to routing protocols. This is due in particular to the fact that all possible topologies (infinitely many) have to be considered.\par In this paper, we propose a simple reduction result: when looking for attacks on properties such as the validity of the route, it is sufficient to consider topologies with only four nodes, resulting in a number of just five distinct topologies to consider. As an application, we analyse the SRP applied to DSR and the SDMSR protocols using the ProVerif tool.} }
@inproceedings{BHP-tacas12, address = {Tallinn, Estonia}, month = mar, year = 2012, volume = {7214}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Flanagan, Cormac and K{\"o}nig, Barbara}, acronym = {{TACAS}'12}, booktitle = {{P}roceedings of the 18th {I}nternational {C}onference on {T}ools and {A}lgorithms for {C}onstruction and {A}nalysis of {S}ystems ({TACAS}'12)}, author = {Barbot, Beno{\^\i}t and Haddad, Serge and Picaronny, Claudine}, title = {Coupling and Importance Sampling for Statistical Model Checking}, pages = {331-346}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BHP-tacas12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHP-tacas12.pdf}, doi = {10.1007/978-3-642-28756-5_23}, abstract = {Statistical model-checking is an alternative verification technique applied on stochastic systems whose size is beyond numerical analysis ability. Given a model (most often a Markov chain) and a formula, it provides a confidence interval for the probability that the model satisfies the formula. One of the main limitations of the statistical approach is the computation time explosion triggered by the evaluation of very small probabilities. In order to solve this problem we develop a new approach based on importance sampling and coupling. The corresponding algorithms have been implemented in our tool cosmos. We present experimentation on several relevant systems, with estimated time reductions reaching a factor of~\(10^{120}\).} }
@inproceedings{CMV-tacas12, address = {Tallinn, Estonia}, month = mar, year = 2012, volume = {7214}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Flanagan, Cormac and K{\"o}nig, Barbara}, acronym = {{TACAS}'12}, booktitle = {{P}roceedings of the 18th {I}nternational {C}onference on {T}ools and {A}lgorithms for {C}onstruction and {A}nalysis of {S}ystems ({TACAS}'12)}, author = {Chadha, Rohit and Madhusudan, P. and Viswanathan, Mahesh}, title = {Reachability under Contextual Locking}, pages = {437-450}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CMV-tacas12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CMV-tacas12.pdf}, doi = {10.1007/978-3-642-28756-5_30}, abstract = {The pairwise reachability problem for a multi-threaded program asks, given control locations in two threads, whether they can be simultaneously reached in an execution of the program. The problem is important for static analysis and is used to detect statements that are concurrently enabled. This problem is in general undecidable even when data is abstracted and when the threads (with recursion) synchronize only using a finite set of locks. Popular programming paradigms that limit the lock usage patterns have been identified under which the pairwise reachability problem becomes decidable. In this paper, we consider a new natural programming paradigm, called contextual locking, which ties the lock usage to calling patterns in each thread: we assume that locks are released in the same context that they were acquired and that every lock acquired by a thread in a procedure call is released before the procedure returns. Our main result is that the pairwise reachability problem is polynomial-time decidable for this new programming paradigm as well.} }
@inproceedings{BCGK-fossacs12, address = {Tallinn, Estonia}, month = mar, year = 2012, volume = 7213, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Birkedal, Lars}, acronym = {{FoSSaCS}'12}, booktitle = {{P}roceedings of the 15th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'12)}, author = {Bollig, Benedikt and Cyriac, Aiswarya and Gastin, Paul and Narayan Kumar, K.}, title = {Model Checking Languages of Data Words}, pages = {391-405}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCGK-fossacs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCGK-fossacs12.pdf}, doi = {10.1007/978-3-642-28729-9_26}, abstract = {We consider the model-checking problem for data multi-pushdown automata (DMPA). DMPA generate data words, i.e, strings enriched with values from an infinite domain. The latter can be used to represent an unbounded number of process identifiers so that DMPA are suitable to model concurrent programs with dynamic process creation. To specify properties of data words, we use monadic second-order (MSO) logic, which comes with a predicate to test two word positions for data equality. While satisfiability for MSO logic is undecidable (even for weaker fragments such as first-order logic), our main result states that one can decide if all words generated by a DMPA satisfy a given formula from the full MSO logic.} }
@inproceedings{BBMU-fossacs12, address = {Tallinn, Estonia}, month = mar, year = 2012, volume = 7213, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Birkedal, Lars}, acronym = {{FoSSaCS}'12}, booktitle = {{P}roceedings of the 15th {I}nternational {C}onference on {F}oundations of {S}oftware {S}cience and {C}omputation {S}tructures ({FoSSaCS}'12)}, author = {Bouyer, Patricia and Brenguier, Romain and Markey, Nicolas and Ummels, Michael}, title = {Concurrent games with ordered objectives}, pages = {301-315}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BBMU-fossacs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BBMU-fossacs12.pdf}, doi = {10.1007/978-3-642-28729-9_20}, abstract = {We consider concurrent games played on graphs, in which each player has several qualitative (e.g. reachability or B{\"u}chi) objectives, and a preorder on these objectives (for instance the counting order, where the aim is to maximise the number of objectives that are fulfilled).\par We study two fundamental problems in that setting: (1)~the \emph{value problem}, which aims at deciding the existence of a strategy that ensures a given payoff; (2)~the \emph{Nash equilibrium problem}, where we want to decide the existence of a Nash equilibrium (possibly with a condition on the payoffs). We characterise the exact complexities of these problems for several relevant preorders, and several kinds of objectives.} }
@article{haar-deds11, publisher = {Springer}, journal = {Discrete Event Dynamic Systems: Theory and Applications}, author = {Haar, Stefan}, title = {What topology tells us about diagnosability in partial order semantics}, pages = {383-402}, volume = 22, number = 4, year = {2012}, month = dec, url = {http://www.lsv.fr/Publis/PAPERS/PDF/haar-deds11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/haar-deds11.pdf}, doi = {10.1007/s10626-011-0121-z}, abstract = {From a partial observation of the behaviour of a labeled Discrete Event System, \emph{fault diagnosis} strives to determine whether or not a given {"}invisible{"} fault event has occurred. The \emph{diagnosability problem} can be stated as follows: does the labeling allow for an outside observer to determine the occurrence of the fault, no later than a bounded number of events after that unobservable occurrence? When this problem is investigated in the context of concurrent systems, partial order semantics adds to the difficulty of the problem, but also provides a richer and more complex picture of observation and diagnosis. In particular, it is crucial to clarify the intuitive notion of {"}\emph{time after fault occurrence}{"}. To this end, we will use a unifying metric framework for event structures, providing a general topological description of diagnosability in both sequential and nonsequential semantics for Petri nets.} }
@inproceedings{CD-lopstr11, address = {Odense, Denmark}, year = 2012, volume = {7225}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Vidal, Germ{\'a}n}, acronym = {{LOPSTR}'11}, booktitle = {{P}roceedings of the 21st {I}nternational {W}orkshop on {L}ogic {P}rogram {S}ynthesis and {T}ransformation ({LOPSTR}'11)}, author = {Cabalar, Pedro and Demri, St{\'e}phane}, title = {Automata-Based Computation of Temporal Equilibrium Models}, pages = {57-72}, doi = {10.1007/978-3-642-32211-2_5}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-lopstr11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-lopstr11.pdf}, abstract = {Temporal Equilibrium Logic~(TEL) is a formalism for temporal logic programming that generalizes the paradigm of Answer Set Programming~(ASP) introducing modal temporal operators from standard Linear-time Temporal Logic~(LTL). In this paper we solve some problems that remained open for TEL like decidability, bounds for computational complexity as well as computation of temporal equilibrium models for arbitrary theories. We propose a method for the latter that consists in building a B{\"u}chi automaton that accepts exactly the temporal equilibrium models of a given theory, providing an automata-based decision procedure and illustrating the \(\omega\)-regularity of such sets. We show that TEL satisfiability can be solved in exponential space and it is hard for polynomial space. Finally, given two theories, we provide a decision procedure to check if they have the same temporal equilibrium models.} }
@article{BJ-jal11, publisher = {Elsevier Science Publishers}, journal = {Journal of Applied Logic}, author = {Bouhoula, Adel and Jacquemard, Florent}, title = {Sufficient completeness verification for conditional and constrained~{TRS}}, year = {2012}, month = mar, volume = {10}, number = {1}, pages = {127-143}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BJ-jal11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BJ-jal11.pdf}, doi = {10.1016/j.jal.2011.09.001}, abstract = {We present a procedure for checking sufficient completeness of conditional and constrained term rewriting systems containing axioms for constructors which may be constrained (by e.g. equalities, disequalities, ordering, membership,~...). Such axioms allow to specify complex data structures like e.g. sets, sorted lists or powerlists. Our approach is integrated into a framework for inductive theorem proving based on tree grammars with constraints, a formalism which permits an exact representation of languages of ground constructor terms in normal form.\par The procedure is presented by an inference system which is shown sound and complete. A~precondition of one inference of this system refers to a (undecidable) property called strong ground reducibility which is discharged to the above inductive theorem proving system. We have successfully applied our method to several examples, yielding readable proofs and, in case of negative answer, a counter-example suggesting how to complete the specification. Moreover, we show that it is a decision procedure when the TRS is unconditional but constrained, for an expressive class of constrained constructor axioms.} }
@article{DDG-jlc11, publisher = {Oxford University Press}, journal = {Journal of Logic and Computation}, author = {Demri, St{\'e}phane and D'Souza, Deepak and Gascon, R{\'e}gis}, title = {Temporal Logics of Repeating Values}, year = {2012}, month = oct, volume = 22, number = 5, pages = {1059-1096}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DDG-jlc11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DDG-jlc11.pdf}, doi = {10.1093/logcom/exr013}, abstract = {Various logical formalisms with the freeze quantifier have been recently considered to model computer systems even though this is a powerful mechanism that often leads to undecidability. In this paper, we study a linear-time temporal logic with past-time operators such that the freeze operator is only used to express that some value from an infinite set is repeated in the future or in the past. Such a restriction has been inspired by a recent work on spatio-temporal logics that suggests such a restricted use of the freeze operator. We show decidability of finitary and infinitary satisfiability by reduction into the verification of temporal properties in Petri nets by proposing a symbolic representation of models. This is a quite surprising result in view of the expressive power of the logic since the logic is closed under negation, contains future-time and past-time temporal operators and can express the nonce property and its negation. These ingredients are known to lead to undecidability with a more liberal use of the freeze quantifier. The paper also contains developments about the relationships between temporal logics with the freeze operator and counter automata as well as reductions into first-order logics over data words.} }
@inproceedings{DDS-tosca11, address = {Saarbr{\"u}cken, Germany}, month = jan, year = 2012, volume = 6993, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {M{\"o}dersheim, Sebastian A. and Palamidessi, Catuscia}, acronym = {{TOSCA}'11}, booktitle = {{R}evised {S}elected {P}apaers of the {W}orkshop on {T}heory of {S}ecurity and {A}pplications ({TOSCA}'11)}, author = {Dahl, Morten and Delaune, St{\'e}phanie and Steel, Graham}, title = {Formal Analysis of Privacy for Anonymous Location Based Services}, pages = {98-112}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DDS-tosca11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DDS-tosca11.pdf}, doi = {10.1007/978-3-642-27375-9_6}, abstract = {We propose a framework for formal analysis of privacy in location based services such as anonymous electronic toll collection. We give a formal definition of privacy, and apply it to the VPriv scheme for vehicular services. We analyse the resulting model using the ProVerif tool, concluding that our privacy property holds only if certain conditions are met by the implementation. Our analysis includes some novel features such as the formal modelling of privacy for a protocol that relies on interactive zero-knowledge proofs of knowledge and list permutations. } }
@inproceedings{JLTV-tosca11, address = {Saarbr{\"u}cken, Germany}, month = jan, year = 2012, volume = 6993, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {M{\"o}dersheim, Sebastian A. and Palamidessi, Catuscia}, acronym = {{TOSCA}'11}, booktitle = {{R}evised {S}elected {P}apaers of the {W}orkshop on {T}heory of {S}ecurity and {A}pplications ({TOSCA}'11)}, author = {Jacquemard, Florent and Lozes, {\'E}tienne and Treinen, Ralf and Villard, Jules}, title = {Multiple Congruence Relations, First-Order Theories on Terms, and the Frames of the Applied Pi-Calculus}, pages = {166-185}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/JLTV-tosca11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JLTV-tosca11.pdf}, doi = {10.1007/978-3-642-27375-9_10}, abstract = {We investigate the problem of deciding first-order theories of finite trees with several distinguished congruence relations, each of them given by some equational axioms. We give an automata-based solution for the case where the different equational axiom systems are linear and variable-disjoint (this includes the case where all axioms are ground), and where the logic does not permit to express tree relations \(x=f(y,z)\). We~show that the problem is undecidable when these restrictions are relaxed. As motivation and application, we show how to translate the model-checking problem of \(A\pi\mathcal{L}\), a~spatial equational logic for the applied pi-calculus, to the validity of first-order formulas in term algebras with multiple congruence relations.} }
@incollection{DG-iis09, author = {Demri, St{\'e}phane and Gastin, Paul}, title = {Specification and Verification using Temporal Logics}, booktitle = {Modern applications of automata theory}, editor = {D'Souza, Deepak and Shankar, Priti}, series = {IISc Research Monographs}, volume = 2, publisher = {World Scientific}, chapter = 15, pages = {457-494}, year = 2012, month = jul, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DG-iis09.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DG-iis09.pdf}, abstract = {This chapter illustrates two aspects of automata theory related to linear-time temporal logic LTL used for the verification of computer systems. First, we present a translation from LTL formulae to B{\"u}chi automata. The aim is to design an elementary translation which is reasonably efficient and produces small automata so that it can be easily taught and used by hand on real examples. Our translation is in the spirit of the classical tableau constructions but is optimized in several ways. Secondly, we recall how temporal operators can be defined from regular languages and we explain why adding even a single operator definable by a context-free language can lead to undecidability.} }
@inproceedings{CU-fsttcs12, address = {Hyderabad, India}, month = dec, year = 2012, volume = 18, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {D'Souza, Deepak and Radhakrishnan, Jaikumar and Telikepalli, Kavitha}, acronym = {{FSTTCS}'12}, booktitle = {{P}roceedings of the 32nd {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'12)}, author = {Chadha, Rohit and Ummels, Michael}, title = {The complexity of quantitative information flow in recursive programs}, pages = {534-545}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-15.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-15.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2012.534}, abstract = {Information-theoretic measures based upon mutual information can be employed to quantify the information that an \emph{execution} of a program reveals about its \emph{secret inputs}. The \emph{information leakage bounding problem} asks whether the information leaked by a program does not exceed a certain amount. We consider this problem for two scenarios: a)~the \emph{outputs} of the program are revealed, and b)~the \emph{timing} (measured in the number of execution steps) of the program is revealed. For both scenarios, we establish complexity results in the context of deterministic boolean programs, both for programs with and without recursion. In particular, we prove that for recursive programs the information leakage bounding problem is no harder than checking reachability.} }
@inproceedings{ASV-www12comp, address = {Lyon, France}, month = apr, year = 2012, publisher = {ACM Press}, editor = {Mille, Alain and Gandon, Fabien L. and Misselis, Jacques and Rabinovich, Michael and Staab, Steffen}, acronym = {{WWW}'12}, booktitle = {{P}roceedings of the 21st {W}orld {W}ide {W}eb {C}onference ({WWW}'12)~-- {C}ompanion {V}olume}, author = {Abiteboul, Serge and Senellart, Pierre and Vianu, Victor}, title = {The {ERC} webdam on foundations of web data management}, pages = {211-214}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ASV-www12comp.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ASV-www12comp.pdf}, abstract = {The Webdam ERC grant is a five-year project that started in December~2008. The goal is to develop a formal model for Web data management that would open new horizons for the development of the Web in a well-principled way, enhancing its functionality, performance, and reliability. Specifically, the goal is to develop a universally accepted formal framework for describing complex and flexible interacting Web applications featuring notably data exchange, sharing, integration, querying, and updating. We also propose to develop formal foundations that will enable peers to concurrently reason about global data management activities, cooperate in solving specific tasks, and support services with desired quality of service. Although the proposal addresses fundamental issues, its goal is to serve as the basis for future software development for Web data management.} }
@inproceedings{ABD-webdb12, address = {Scottsdale, Arizona, USA}, month = may, year = 2012, editor = {Ives, Zachary G. and Velegrakis, Yannis}, acronym = {({W}eb{DB}'12)}, booktitle = {{P}roceedings of the 15th {I}nternational {W}orkshop on the {W}eb and {D}atabases ({W}eb{DB}'12)}, author = {Abiteboul, Serge and Bienvenu, Meghyn and Deutch, Daniel}, title = {Deduction in the Presence of Distribution and Contradictions}, pages = {31-36}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABD-webdb12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABD-webdb12.pdf}, abstract = {We study deduction, captured by \emph{datalog}-style rules, in the presence of contradictions, captured by \emph{functional dependency} (FD) violation. We propose a simple non-deterministic semantics for datalog with FDs based on inferring facts one at a time, never violating the FDs. We present a novel \emph{proof theory} for this semantics. We also discuss a set-at-a-time semantics, where at each iteration, all facts that can be inferred are added to the database, and then choices are made between contradicting facts. We then build upon a distributed datalog idiom, namely \emph{Webdamlog}, to define a semantics for the \emph{distributed setting}. Observe that contradictions naturally arise in such a setting, with different peers having conflicting information or opinions. We study different semantics for this setting.} }
@inproceedings{AAMS-sigmod12, address = {Scottsdale, Arizona, USA}, month = may, year = 2012, publisher = {ACM Press}, editor = {Candan, K. Sel{\c{c}}uk and Chen, Yi and Snodgrass, Richard T. and Gravano, Luis and Fuxman, Ariel}, acronym = {{SIGMOD}'12}, booktitle = {{P}roceedings of the {ACM} {SIGMOD} {I}nternaitonal {C}onference on {M}anagement of {D}ata ({SIGMOD}'12)}, author = {Abiteboul, Serge and Amsterdamer, Yael and Milo, Tova and Senellart, Pierre}, title = {Auto-completion learning for~{XML}}, pages = {669-672}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AAMS-sigmod12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AAMS-sigmod12.pdf}, doi = {10.1145/2213836.2213928}, abstract = {Editing an XML document manually is a complicated task. While many XML editors exist in the market, we argue that some important functionalities are missing in all of them. Our goal is to makes the editing task simpler and faster. We~present ALEX (Auto-completion Learning Editor for~XML), an editor that assists the users by providing intelligent autocompletion suggestions. These suggestions are adapted to the user needs, simply by feeding ALEX with a set of example XML documents to learn from. The~suggestions are also guaranteed to be compliant with a given XML schema, possibly including integrity constraints. To~fulfill this challenging goal, we rely on novel, theoretical foundations by us and others, which are combined here in a system for the first time.} }
@inproceedings{ABV-icdt12, address = {Berlin, Germany}, month = mar, year = 2012, publisher = {ACM Press}, editor = {Deutsch, Alin}, acronym = {{ICDT}'12}, booktitle = {{P}roceedings of the 15th {I}nternational {C}onference on {D}atabase {T}heory ({ICDT}'12)}, author = {Abiteboul, Serge and Bourhis, Pierre and Vianu, Victor}, title = {Highly expressive query languages for unordered data trees}, pages = {46-60}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABV-icdt12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABV-icdt12.pdf}, doi = {10.1145/2274576.2274583}, abstract = {We study highly expressive query languages for unordered data trees, using as formal vehicles Active XML and extensions of languages in the while family. All languages may be seen as adding some form of control on top of a set of basic pattern queries. The results highlight the impact and interplay of different factors: the expressive power of basic queries, the embedding of computation into data (as~in Active~XML), and the use of deterministic vs. nondeterministic control. All languages are Turing complete, but not necessarily query complete in the sense of Chandra and Harel. Indeed, we show that some combinations of features yield serious limitations, analogous to \(FO^{k}\) definability in the relational context. On the other hand, the limitations come with benefits such as the existence of powerful normal forms. Other languages are {"}almost{"} complete, but fall short because of subtle limitations reminiscent of the copy elimination problem in object databases.} }
@inproceedings{AADMS-icdt12, address = {Berlin, Germany}, month = mar, year = 2012, publisher = {ACM Press}, editor = {Deutsch, Alin}, acronym = {{ICDT}'12}, booktitle = {{P}roceedings of the 15th {I}nternational {C}onference on {D}atabase {T}heory ({ICDT}'12)}, author = {Abiteboul, Serge and Amsterdamer, Yael and Deutch, Daniel and Milo, Tova and Senellart, Pierre}, title = {Finding optimal probabilistic generators for {XML} collections}, pages = {127-139}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AADMS-icdt12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AADMS-icdt12.pdf}, doi = {10.1145/2274576.2274591}, abstract = {We study the problem of, given a corpus of XML documents and its schema, finding an optimal (generative) probabilistic model, where optimality here means maximizing the likelihood of the particular corpus to be generated. Focusing first on the structure of documents, we present an efficient algorithm for finding the best generative probabilistic model, in the absence of constraints. We further study the problem in the presence of integrity constraints, namely key, inclusion, and domain constraints. We study in this case two different kinds of generators. First, we consider a continuation-test generator that performs, while generating documents, tests of schema satisfiability; these tests prevent from generating a document violating the constraints but, as we will see, they are computationally expensive. We also study a restart generator that may generate an invalid document and, when this is the case, restarts and tries again. Finally, we consider the injection of data values into the structure, to obtain a full XML document. We study different approaches for generating these values.} }
@inproceedings{AAS-icde12, address = {Washington, D.C., USA}, month = apr, year = 2012, publisher = {{IEEE} Computer Society Press}, editor = {Kementsietsidis, Anastasios and Vaz{~}Salles, Marcos Antonio}, acronym = {{ICDE}'12}, booktitle = {{P}roceedings of the 28th {I}nternational {C}onference on {D}ata {E}ngineering ({ICDE}'12)}, author = {Abiteboul, Serge and Antoine, {\'E}milien and Stoyanovich, Julia}, title = {Viewing the Web as a Distributed Knowledge Base}, pages = {1-4}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AAS-icde12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AAS-icde12.pdf}, doi = {10.1109/ICDE.2012.150}, abstract = {This papers addresses the challenges faced by everyday Web users, who interact with inherently heterogeneous and distributed information. Managing such data is currently beyond the skills of casual users. We describe ongoing work that has as its goal the development of foundations for declarative distributed data management. In this approach, we see the Web as a knowledge base consisting of distributed logical facts and rules. Our objective is to enable automated reasoning over this knowledge base, ultimately improving the quality of service and of data. For this, we use Webdamlog, a Datalog-style language with rule delegation. We outline ongoing efforts on the WebdamExchange platform that combines Webdamlog evaluation with communication and security protocols.} }
@inproceedings{SA-dl12, address = {Rome, Italy}, month = jun, year = 2012, volume = 846, series = {CEUR Workshop Proceedings}, publisher = {RWTH Aachen, Germany}, editor = {Kazakov, Yevgeny and Lembo, Domenico and Wolter, Frank }, acronym = {{DL}'12}, booktitle = {{P}roceedings of the 2012 {I}nternational {W}orkshop {D}escription {L}ogic ({DL}'09)}, author = {Abiteboul, Serge}, title = {Viewing the Web as a Distributed Knowledge Base}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SA-dl12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SA-dl12.pdf} }
@inproceedings{SA-csl12, address = {Fontainebleau, France}, month = sep, year = 2012, volume = 16, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {C{\'e}gielski, Patrick and Durand, Arnaud}, acronym = {{CSL}'12}, booktitle = {{P}roceedings of the 21st {A}nnual {EACSL} {C}onference on {C}omputer {S}cience {L}ogic ({CSL}'12)}, author = {Abiteboul, Serge}, title = {Sharing Distributed Knowledge on the Web (Invited Talk)}, pages = {6-8}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SA-csl12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SA-csl12.pdf}, doi = {10.4230/LIPIcs.CSL.2012.6}, abstract = {To share information, we propose to see the Web as a knowledge base consisting of distributed logical facts and rules. Our objective is to help Web users finding information, as well as controlling their own, using automated reasoning over this knowledge base towards improving the quality of service and of data. For this, we introduce Webdamlog, a Datalog-style language with rule delegation. We~mention the implementation of a system to support this language as well as standard communications and security protocols.} }
@article{ABV-tods12, publisher = {ACM Press}, journal = {ACM Transactions on Database Systems}, author = {Abiteboul, Serge and Bourhis, Pierre and Vianu, Victor}, title = {Comparing workflow specification languages: A~matter of views}, volume = 37, number = {2:10}, nopages = {}, year = 2012, month = may, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ABV-tods12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ABV-tods12.pdf}, doi = {10.1145/2188349.2188352}, abstract = {We address the problem of comparing the expressiveness of workflow specification formalisms using a notion of view of a workflow. Views allow to compare widely different workflow systems by mapping them to a common representation capturing the observables relevant to the comparison. Using this framework, we compare the expressiveness of several workflow specification mechanisms, including automata, temporal constraints, and pre-and-post conditions, with XML and relational databases as underlying data models. One surprising result shows the considerable power of static constraints to simulate apparently much richer workflow control mechanisms.} }
@article{BSS-lmcs12, journal = {Logical Methods in Computer Science}, author = {Boja{\'n}czyk, Miko{\l}aj and Segoufin, Luc and Straubing, Howard}, title = {Piecewise testable tree languages}, volume = 8, number = {3:26}, nopages = {}, year = 2012, month = sep, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BSS-lmcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BSS-lmcs12.pdf}, doi = {10.2168/LMCS-8(3:26)2012}, abstract = {This paper presents a decidable characterization of tree languages that can be defined by a boolean combination of \(\Sigma_{1}\) sentences. This is a tree extension of the Simon theorem, which says that a string language can be defined by a boolean combination of \(\Sigma_{1}\) sentences if and only if its syntactic monoid is \(\mathcal{J}\)-trivial.} }
@article{AMSS-siamjc12, publisher = {SIAM}, journal = {SIAM Journal on Computing}, author = {Anderson, Matthew and van Melkebeek, Dieter and Schweikardt, Nicole and Segoufin, Luc}, title = {Locality from Circuit Lower Bounds}, volume = 41, number = 6, pages = {1481-1523}, year = {2012}, month = nov, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AMSS-siamjc12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AMSS-siamjc12.pdf}, doi = {10.1137/110856873}, abstract = {We study the locality of an extension of first-order logic that captures graph queries computable in \(\textsf{AC}^{0}\), i.e., by families of polynomial-size constant-depth circuits. The extension considers first-order formulas over relational structures which may use arbitrary numerical predicates in such a way that their truth value is independent of the particular interpretation of the numerical predicates. We refer to such formulas as Arb-invariant first-order. We consider the two standard notions of locality, Gaifman and Hanf locality. Our main result gives a Gaifman locality theorem: An Arb-invariant first-order formula cannot distinguish between two tuples that have the same neighborhood up to distance \((\log n)^{c}\), where \(n\) represents the number of elements in the structure and \(c\) is a constant depending on the formula. When restricting attention to string structures, we achieve the same quantitative strength for Hanf locality. In both cases we show that our bounds are tight. We also present an application of our results to the study of regular languages. Our proof exploits the close connection between first-order formulas and the complexity class \(\textsf{AC}^{0}\) and hinges on the tight lower bounds for parity on constant-depth circuits.} }
@phdthesis{benzina-phd2012, author = {Benzina, Hedi}, title = {Enforcing Virtualized Systems Security}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2012, month = dec, url = {http://www.lsv.fr/Publis/PAPERS/PDF/benzina-these12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/benzina-these12.pdf} }
@phdthesis{balaguer-phd2012, author = {Balaguer, Sandie}, title = {La concurrence dans les syst{\`e}mes distribu{\'e}s temps-r{\'e}el}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2012, month = dec, url = {http://www.lsv.fr/Publis/PAPERS/PDF/balaguer-these12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/balaguer-these12.pdf} }
@book{SA-bookCDF, author = {Abiteboul, Serge}, title = {Sciences des donn{\'e}es: De la logique du premier ordre {\`a} la Toile}, publisher = {Fayard}, year = {2012}, series = {Le{\c{c}}ons inaugurales du {C}oll{\`e}ge de {F}rance} }
@techreport{rr-lsv-12-25, author = {Feld, Gilles and Fribourg, Laurent and Labrousse, Denis and Revol, Bertrand and Soulat, Romain}, title = {Correct-by-Design Control of 5-level and 7-level Power Converters}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2012}, month = dec, type = {Research Report}, number = {LSV-12-25}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-25.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-25.pdf}, versions = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2012-25-v1.pdf, 20121205}, note = {8~pages}, abstract = {High-power converters based on elementary switching cells are more and more used in the industry of power electronics owing to various advantages such as lower voltage stress and reduced power loss. However, the complexity of controlling such converters is a major challenge that the power manufacturing industry has to face with. The synthesis of industrial switching controllers relies today on heuristic rules and empiric simulation. The state of the system is not guaranteed to stay within the limits that are admissible for its correct electrical behavior. We show here how to apply a formal method in order to synthesise a correct-by-design control that guarantees that the power converter will always stay within a predened safe zone of variations for its input parameters. Our method nds local invariants by decomposing the safety space into smaller zones. The method is applied in order to synthesize correct-by-design controls for a 5-level and 7-level power converters. We check the validity of our approach by numerical simulations and physical experimentations done with a prototype built by SATIE laboratory.} }
@techreport{rr-lsv-12-24, author = {Fribourg, Laurent and Soulat, Romain}, title = {Controlled Recurrent Subspaces for Sampled Switched Linear Systems}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2012}, month = dec, type = {Research Report}, number = {LSV-12-24}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-24.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-24.pdf}, versions = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2012-24-v1.pdf, 20121205}, note = {11~pages}, abstract = {Sampled switched linear systems are governed by piecewise linear dynamics that are periodically sampled with a given period~\(\tau\). At each sampling time, the {"}mode{"} of the system, i.e., the parameters of the linear dynamics, are switched according to a control rule. We give here a procedure for showing that a given area~\(R\) of the state space has a {"}\(k\)-recurrent decomposition: such a decomposition induces a control that makes every trajectory starting from~\(R\) go back to~\(R\) within at most \(k\) steps (i.e, \(k\tau\)\ time). We can then determine an extended zone that contains all the trajectories issued from~\(R\); this allows us to check safety properties of the system. We show the practical interest of our approach on several examples of the literature. We also give a geometrical condition on~\(R\) that ensures the existence of a \(k\)-recurrent decomposition.} }
@techreport{rr-lsv-12-23, author = {Vester, Steen}, title = {Symmetric {N}ash equilibria}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2012}, month = dec, type = {Research Report}, number = {LSV-12-23}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-23.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-23.pdf}, versions = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2012-23-v1.pdf, 20121204}, note = {51~pages} }
@mastersthesis{m2-chretien, author = {Chr{\'e}tien, R{\'e}my}, title = {Trace equivalence of protocols for an unbounded number of sessions}, school = {{M}aster {P}arisien de {R}echerche en {I}nformatique, Paris, France}, type = {Rapport de {M}aster}, year = {2012}, month = sep, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-22.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-22.pdf}, note = {30~pages}, abstract = {The problem of deciding reachability for cryptographic protocols has been thoroughly studied for an unbounded number of sessions and proven to be undecidable in general. Nevertheless some fragments were shown to be decidable, either by tagging or by restricting the number of blind-copies. On the other hand, trace equivalenc has only been proven to be decidable for a bounded number of sessions. The objective of this talk is to provide the first results of decidability of trace equivalence for an unbounded number of sessions by lifting the approach followed by Comon-Lundh and Cortier to trace equivalence.\par Trace equivalence for a first class of protocols was shown undecidable under scarce restrictions one variable and symmetric encryption are indeed enough. Consequently, we restrained our class of protocols a step further by making the protocols deterministic in some sense and preventing it from disclosing secret keys. This tighter class of protocols was then shown to be decidable after reduction to an equivalence between deterministic pushdown automata.} }
@phdthesis{brenguier-phd2012, author = {Brenguier, Romain}, title = {{\'E}quilibres de {N}ash dans les Jeux Concurrents~-- {A}pplication aux Jeux Temporis{\'e}s}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2012, month = nov, url = {http://www.lsv.fr/Publis/PAPERS/PDF/brenguier-these12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/brenguier-these12.pdf} }
@phdthesis{cheval-phd2012, author = {Cheval, Vincent}, title = {Automatic verification of cryptographic protocols: privacy-type properties}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2012, month = dec, url = {http://www.lsv.fr/Publis/PAPERS/PDF/cheval-these12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/cheval-these12.pdf} }
@article{CFM-ijfcs12, publisher = {World Scientific}, journal = {International Journal of Foundations of Computer Science}, author = {Cadilhac, Micha{\"e}l and Finkel, Alain and McKenzie, Pierre}, title = {Bounded {P}arikh automata}, year = 2012, month = dec, volume = {23}, number = {8}, pages = {1691-1710}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CFM-ijfcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CFM-ijfcs12.pdf}, doi = {10.1142/S0129054112400709}, abstract = {The Parikh finite word automaton model~(PA) was introduced and studied by Klaedtke and Rue{\ss}. Here, we present some expressiveness properties of a restriction of the deterministic affine PA recently introduced, and use them as a tool to show that the bounded languages recognized by PA are the same as those recognized by deterministic PA. Moreover, this class of languages is shown equal to the class of bounded languages with a semilinear iteration set.} }
@article{CFM-rairo12, address = {Les Ulis, France}, publisher = {EDP Sciences}, journal = {RAIRO Informatique Th{\'e}orique et Applications}, author = {Cadilhac, Micha{\"e}l and Finkel, Alain and McKenzie, Pierre}, title = {Affine {P}arikh automata}, year = 2012, month = oct, volume = 46, number = 4, pages = {511-545}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CFM-rairo12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CFM-rairo12.pdf}, doi = {10.1051/ita/2012013}, abstract = {The Parikh finite word automaton (PA) was introduced and studied in 2003 by Klaedtke and Rue\ss. Natural variants of the PA arise from viewing a PA equivalently as an automaton that keeps a count of its transitions and semilinearly constrains their numbers. Here we adopt this view and define the affine PA, that extends the PA by having each transition induce an affine transformation on the PA registers, and the PA on letters, that restricts the PA by forcing any two transitions on the same letter to affect the registers equally. Then we report on the expressiveness, closure, and decidability properties of such PA variants. We note that deterministic PA are strictly weaker than deterministic reversal-bounded counter machines.} }
@inproceedings{CFM-dlt12, address = {Taipei, Taiwan}, month = aug, year = 2012, volume = 7410, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Yen, Hsu-Chun and Ibarra, Oscar H.}, acronym = {{DLT}'12}, booktitle = {{P}roceedings of the 16th {I}nternational {C}onference on {D}evelopments in {L}anguage {T}heory ({DLT}'12)}, author = {Cadilhac, Micha{\"e}l and Finkel, Alain and McKenzie, Pierre}, title = {Unambiguous Constrained Automata}, pages = {239-250}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CFM-dlt12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CFM-dlt12.pdf}, doi = {10.1007/978-3-642-31653-1_22}, abstract = {The class of languages captured by Constrained Automata~(CA) that are unambiguous is shown to possess more closure properties than the provably weaker class captured by deterministic~CA. Problems decidable for deterministic CA are nonetheless shown to remain decidable for unambiguous CA, and testing for \emph{regularity} is added to this set of decidable problems. Unambiguous CA are then shown incomparable with deterministic reversal-bounded machines in terms of expressivity, and a \emph{deterministic} model equivalent to unambiguous CA is identified.} }
@article{DDMM-lmcs12, journal = {Logical Methods in Computer Science}, author = {Darondeau, {\relax Ph}ilippe and Demri, St{\'e}phane and Meyer, Roland and Morvan, {\relax Ch}ristophe}, title = {{P}etri Net Reachability Graphs: Decidability Status of {FO} Properties}, volume = 8, number = {4:9}, nopages = {}, month = oct, year = 2012, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DDMM-lmcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DDMM-lmcs12.pdf}, doi = {10.2168/LMCS-8(4:9)2012}, abstract = {We investigate the decidability and complexity status of model-checking problems on unlabelled reachability graphs of Petri nets by considering first-order and modal languages without labels on transitions or atomic propositions on markings. We consider several parameters to separate decidable problems from undecidable ones. Not only are we able to provide precise borders and a systematic analysis, but we also demonstrate the robustness of our proof techniques.} }
@techreport{AGL-arxiv12, author = {Adj{\'e}, Assal{\'e} and Goubault{-}Larrecq, Jean}, title = {Concrete Semantics of Programs with Non-Deterministic and Random Inputs}, year = {2012}, month = oct, type = {Research Report}, institution = {Computing Research Repository}, number = {cs.LO/1210.2605}, url = {http://arxiv.org/abs/1210.2605}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AGL-arxiv12.pdf}, originalpdf = {http://arxiv.org/pdf/1210.2605}, note = {19~pages}, abstract = {This document gives semantics to programs written in a C-like programming language, featuring interactions with an external environment with noisy and imprecise data.} }
@inproceedings{BHP-simul12, address = {Lisbon, Portugal}, month = nov, year = 2012, publisher = {XPS}, editor = {Dini, Petre and Lorenz, Pascal}, acronym = {{SIMUL}'12}, booktitle = {{P}roceedings of the 4th {I}nternational {C}onference on {A}dvances in {S}ystem {S}imulation ({SIMUL}'12)}, author = {Barbot, Beno{\^\i}t and Haddad, Serge and Picaronny, Claudine}, title = {Importance Sampling for Model Checking of Continuous Time {M}arkov Chains}, pages = {30-35}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BHP-simul12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHP-simul12.pdf}, abstract = {Model checking real time properties on probabilistic systems requires computing transient probabilities on continuous time Markov chains. Beyond numerical analysis ability, a probabilistic framing can only be obtained using simulation. This statistical approach fails when directly applied to the estimation of very small probabilities. Here combining the uniformization technique and extending our previous results, we design a method which applies to continuous time Markov chains and formulas of a timed temporal logic. The corresponding algorithm has been implemented in our tool \textsc{cosmos}. We present experimentations on a relevant system, with drastic time reductions with respect to standard statistical model checking.} }
@misc{verydic-d2, author = {Iosif, Radu and Habermehl, Peter and Labbe, Sebastien and Lozes, {\'E}tienne and Yakobowski, Boris}, title = {Concurrent Programs with Simple Data Structures {{\slash}} Sequential Programs with Composite Data Structures}, howpublished = {Deliverable VERIDYC D~2 (ANR-09-SEGI-016)}, month = mar, year = {2012}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/veridyc-d2.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/veridyc-d2.pdf} }
@inproceedings{LV-wsfm11, address = {Clermont-Ferrand, France}, year = 2012, volume = 7176, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Carbone, Marco and Petit, Jean-Marc}, acronym = {{WS-FM}'11}, booktitle = {{R}evised {S}elected {P}apers of the 8th {I}nternational {W}orkshop on {W}eb {S}ervices and {F}ormal {M}ethods ({WS}-{FM}'11)}, author = {Lozes, {\'E}tienne and Villard, Jules}, title = {Reliable Contracts for Unreliable Half-Duplex Communications}, pages = {2-16}, doi = {10.1007/978-3-642-29834-9_2}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LV-wsfm11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LV-wsfm11.pdf}, abstract = {Recent trends in formal models of web services description languages and session types focus on the asynchronicity of communications. In this paper, we study a core of these models that arose from our modelling of the Sing\# programming language, and demonstrate correspondences between Sing\# contracts, asynchronous session behaviors, and the subclass of communicating automata with two participants that satisfy the half-duplex property. This correspondence better explains the criteria proposed by Stengel and Bultan for Sing\# contracts to be reliable, and possibly indicate useful criteria for the design of WSDL. We moreover establish a polynomial-time complexity for the analysis of communication contracts under arbitrary models of asynchronicity, and we investigate the model-checking problems against LTL formulas.} }
@inproceedings{LL-fics12, address = {Tallinn, Estonia}, month = mar, year = 2012, volume = 77, series = {Electronic Proceedings in Theoretical Computer Science}, editor = {Miller, Dale and {\'E}sik, Zolt{\'a}n}, acronym = {{FICS}'12}, booktitle = {{P}roceedings of the 8th {W}orkshop on {F}ixed {P}oints in {C}omputer {S}cience ({FICS}'12)}, author = {Lange, Martin and Lozes, {\'E}tienne}, title = {Model-Checking the Higher-Dimensional Modal \(\mu\)-Calculus}, pages = {39-46}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/LL-fics12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/LL-fics12.pdf}, doi = {10.4204/EPTCS.77.6}, abstract = {The higher-dimensional modal \(\mu\)-calculus is an extension of the \(\mu\)-calculus in which formulas are interpreted in tuples of states of a labeled transition system. Every property that can be expressed in this logic can be checked in polynomial time, and conversely every polynomial-time decidable problem that has a bisimulation-invariant encoding into labeled transition systems can also be defined in the higher-dimensional modal \(\mu\)-calculus. We exemplify the latter connection by giving several examples of decision problems which reduce to model checking of the higher-dimensional modal \(\mu\)-calculus for some fixed formulas. This way generic model checking algorithms for the logic can then be used via partial evaluation in order to obtain algorithms for theses problems which may benefit from improvements that are well-established in the field of program verification, namely on-the-fly and symbolic techniques. The aim of this work is to extend such techniques to other fields as well, here exemplarily done for process equivalences, automata theory, parsing, string problems, and games.} }
@inproceedings{CD-lics12, address = {Dubrovnik, Croatia}, month = jun, year = 2012, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'12}, booktitle = {{P}roceedings of the 27th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'12)}, author = {Chatterjee, Krishnendu and Doyen, Laurent}, title = {Partial-Observation Stochastic Games: How to Win when Belief Fails}, pages = {175-184}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-lics12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-lics12.pdf}, doi = {10.1109/LICS.2012.28}, abstract = {We consider two-player stochastic games played on finite graphs with reachability objectives where the first player tries to ensure a target state to be visited almost-surely (i.e., with probability~\(1\)), or positively (i.e., with positive probability), no matter the strategy of the second player.\par We classify such games according to the information and the power of randomization available to the players. On the basis of information, the game can be one-sided with either (a)~player~1, or (b)~player~2 having partial observation (and the other player has perfect observation), or two-sided with (c)~both players having partial observation. On the basis of randomization, the players (a)~may not be allowed to use randomization (pure strategies), or (b)~may choose a probability distribution over actions but the actual random choice is external and not visible to the player (actions invisible), or (c)~may use full randomization.\par Our main results for pure strategies are as follows. (1)~For one-sided games with player~1 having partial observation we show that (in contrast to full randomized strategies) belief-based (subset-construction based) strategies are not sufficient, and we present an exponential upper bound on memory both for almost-sure and positive winning strategies; we show that the problem of deciding the existence of almost-sure and positive winning strategies for player~1 is EXPTIME-complete. (2)~For one-sided games with player~2 having partial observation we show that non-elementary memory is both necessary and sufficient for both almost-sure and positive winning strategies. (3)~We~show that for the general (two-sided) case finite-memory strategies are sufficient for both positive and almost-sure winning, and at least non-elementary memory is required.\par We establish the equivalence of the almost-sure winning problems for pure strategies and for randomized strategies with actions invisible. Our equivalence result exhibits serious flaws in previous results of the literature: we show a non-elementary memory lower bound for almost-sure winning whereas an exponential upper bound was previously claimed.} }
@article{CD-tcs12, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Chatterjee, Krishnendu and Doyen, Laurent}, title = {Energy parity games}, volume = 458, year = 2012, month = nov, pages = {49-60}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-tcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-tcs12.pdf}, doi = {10.1016/j.tcs.2012.07.038}, abstract = {Energy parity games are infinite two-player turn-based games played on weighted graphs. The objective of the game combines a (qualitative) parity condition with the (quantitative) requirement that the sum of the weights (i.e., the level of energy in the game) must remain positive. Beside their own interest in the design and synthesis of resource-constrained omega-regular specifications, energy parity games provide one of the simplest model of games with combined qualitative and quantitative objectives. Our main results are as follows: (a)~exponential memory is sufficient and may be necessary for winning strategies in energy parity games; (b)~the~problem of deciding the winner in energy parity games can be solved in \(\textsf{NP} \cap \textsf{coNP}\); and (c)~we~give an algorithm to solve energy parity by reduction to energy games. We also show that the problem of deciding the winner in energy parity games is logspace-equivalent to the problem of deciding the winner in mean-payoff parity games, which can thus be solved in \(\textsf{NP} \cap \textsf{coNP}\). As a consequence we also obtain a conceptually simple algorithm to solve mean-payoff parity games.} }
@misc{impro-D4.1, author = {Balaguer, Sandie and Chatain, {\relax Th}omas and Haar, Stefan}, title = {Concurrent semantics for timed distributed systems}, howpublished = {Deliverable ImpRo D~4.1 (ANR-2010-BLAN-0317)}, year = 2012, month = mar, url = {http://www.lsv.fr/Publis/PAPERS/PDF/impro-d41.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/impro-d41.pdf} }
@misc{impro-D2.1, author = {Akshay, S. and B{\'e}rard, B{\'e}atrice and Bouyer, Patricia and Haar, Stefan and Haddad, Serge and Jard, Claude and Lime, Didier and Markey, Nicolas and Reynier, Pierre-Alain and Sankur, Ocan and Thierry-Mieg, Yann}, title = {Overview of Robustness in Timed Systems}, howpublished = {Deliverable ImpRo D~2.1 (ANR-2010-BLAN-0317)}, year = 2012, month = jan, url = {http://www.lsv.fr/Publis/PAPERS/PDF/impro-d21.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/impro-d21.pdf} }
@inproceedings{KS-stm12, address = {Pisa, Italy}, month = sep, year = 2012, volume = 7783, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {J{\o}sang, Audun and Samarati, Pierangela and Petrocchi, Marinella}, acronym = {{STM}'12}, booktitle = {{R}evised {S}elected {P}apers of the 8th {W}orkshop on {S}ecurity and {T}rust {M}anagement ({STM}'12)}, author = {K{\"u}nnemann, Robert and Steel, Graham}, title = {{Y}ubi{S}ecure? Formal Security Analysis Results for the {Y}ubikey and {Y}ubi{HSM}}, pages = {257-272 }, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-stm12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-stm12.pdf}, doi = {10.1007/978-3-642-38004-4_17}, abstract = {The Yubikey is a small hardware device designed to authenticate a user against network-based services. Despite its widespread adoption (over a million devices have been shipped by Yubico to more than 20~000 customers including Google and Microsoft), the Yubikey protocols have received relatively little security analysis in the academic literature. In the first part of this paper, we give a formal model for the operation of the Yubikey one-time password (OTP) protocol. We prove security properties of the protocol for an unbounded number of fresh OTPs using a protocol analysis tool, tamarin.\par In the second part of the paper, we analyze the security of the protocol with respect to an adversary that has temporary access to the authentication server. To address this scenario, Yubico offers a small Hardware Security Module (HSM) called the YubiHSM, intended to protect keys even in the event of server compromise. We show if the same YubiHSM configuration is used both to set up Yubikeys and run the authentication protocol, then there is inevitably an attack that leaks all of the keys to the attacker. Our discovery of this attack lead to a Yubico security advisory in February 2012. For the case where separate servers are used for the two tasks, we give a configuration for which we can show using the same verification tool that if an adversary that can compromise the server running the Yubikey-protocol, but not the server used to set up new Yubikeys, then he cannot obtain the keys used to produce one-time passwords.} }
@article{BGKR-tcs12, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Berwanger, Dietmar and Gr{\"a}del, Erich and Kaiser, {\L}ukasz and Rabinovich, Roman}, title = {Entanglement and the complexity of directed graphs}, volume = 463, year = 2012, month = dec, pages = {2-25}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGKR-tcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGKR-tcs12.pdf}, doi = {10.1016/j.tcs.2012.07.010}, abstract = {Entanglement is a parameter for the complexity of finite directed graphs that measures to which extent the cycles of the graph are intertwined. It is defined by way of a game similar in spirit to the cops and robber games used to describe tree width, directed tree width, and hypertree width. Nevertheless, on many classes of graphs, there are significant differences between entanglement and the various incarnations of tree width.\par Entanglement is intimately related with the computational and descriptive complexity of the modal \(\mu\)-calculus. The number of fixed-point variables needed to describe a finite graph up to bisimulation is captured by its entanglement. This plays a crucial role in the proof that the variable hierarchy of the \(\mu\)-calculus is strict.\par We study complexity issues for entanglement and compare it to other structural parameters of directed graphs. One of our main results is that parity games of bounded entanglement can be solved in polynomial time. Specifically, we establish that the complexity of solving a parity game can be parametrised in terms of the minimal entanglement of subgames induced by a winning strategy.\par Furthermore, we discuss the case of graphs of entanglement two. While graphs of entanglement zero and one are very simple, graphs of entanglement two allow arbitrary nesting of cycles, and they form a sufficiently rich class for modelling relevant classes of structured systems. We provide characterisations of this class, and propose decomposition notions similar to the ones for tree width, DAG-width, and Kelly-width.} }
@inproceedings{BKL-mfcs12, address = {Bratislava, Slovakia}, month = aug, year = 2012, volume = 7464, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Rovan, Branislav and Sassone, Vladimiro and Widmayer, Peter}, acronym = {{MFCS}'12}, booktitle = {{P}roceedings of the 37th {I}nternational {S}ymposium on {M}athematical {F}oundations of {C}omputer {S}cience ({MFCS}'12)}, author = {Berwanger, Dietmar and Kaiser, {\L}ukasz and Le{\ss}enich, Simon}, title = {Solving Counter Parity Games}, pages = {160-171}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BKL-mfcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BKL-mfcs12.pdf}, doi = {10.1007/978-3-642-32589-2_17}, abstract = {We study a class of parity games equipped with counters that evolve according to arbitrary non-negative affine functions. These games capture several cost models for dynamic systems from the literature. We present an elementary algorithm for computing the exact value of a counter parity game, which both generalizes previous results and improves their complexity. To this end, we introduce a class of \(\omega\)-regular games with imperfect information and imperfect recall, solve them using automata-based techniques, and prove a correspondence between finite-memory strategies in such games and strategies in counter parity games.} }
@proceedings{rp2012-FLP, title = {{P}roceedings of the 6th {I}nternational {W}okshop on {R}eachability {P}roblems ({RP}'12)}, booktitle = {{P}roceedings of the 6th {I}nternational {W}okshop on {R}eachability {P}roblems ({RP}'12)}, acronym = {{RP}'12}, editor = {Finkel, Alain and Leroux, J{\'e}r{\^o}me and Potapov, Igor}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = 7550, year = 2012, month = sep, address = {Bordeaux, France}, doi = {10.1007/978-3-642-33512-9}, url = {http://www.springerlink.com/content/978-3-642-33511-2/} }
@article{BDHKO-jctB12, publisher = {Elsevier Science Publishers}, journal = {Journal of Combinatorial Theory, Series~B}, author = {Berwanger, Dietmar and Dawar, Anuj and Hunter, Paul and Kreutzer, Staphan and Obdrz{\'a}lek, Jan}, title = {The {DAG}-width of directed graphs}, volume = 102, number = 4, year = 2012, month = jul, pages = {900-923}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDHKO-jctB12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDHKO-jctB12.pdf}, doi = {10.1016/j.jctb.2012.04.004}, abstract = {Tree-width is a well-known metric on undirected graphs that measures how tree-like a graph is and gives a notion of graph decomposition that proves useful in algorithm design. Tree-width can be characterised by a graph searching game where a number of cops attempt to capture a robber. We consider the natural adaptation of this game to directed graphs and show that monotone strategies in the game yield a measure, called DAG-width, that can be seen to describe how close a directed graph is to a directed acyclic graph (DAG). We also provide an associated decomposition and show how it is useful for developing algorithms on directed graphs. In particular, we show that the problem of determining the winner of a parity game is solvable in polynomial time on graphs of bounded DAG-width. We also consider the relationship between DAG-width and other connectivity measures such as directed tree-width and path-width. A consequence we obtain is that certain NP-complete problems such as Hamiltonicity and disjoint paths are polynomial-time computable on graphs of bounded DAG-width.} }
@article{FLC-rts12, publisher = {Springer}, journal = {Real-Time Systems}, author = {Faggioli, Dario and Lipari, Giuseppe and Cucinotta, Tommaso}, title = {Analysis and Implementation of the Multiprocessor Bandwidth Inheritance Protocol}, volume = {48}, number = {6}, year = {2012}, month = nov, pages = {789-825}, doi = {10.1007/s11241-012-9162-0}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FLC-rts12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FLC-rts12.pdf}, abstract = {The Multiprocessor Bandwidth Inheritance (M-BWI) protocol is an extension of the Bandwidth Inheritance (BWI) protocol for symmetric multiprocessor systems. Similar to Priority Inheritance, M-BWI lets a task that has locked a resource execute in the resource reservations of the blocked tasks, thus reducing their blocking time. The protocol is particularly suitable for open systems where different kinds of tasks dynamically arrive and leave, because it guarantees temporal isolation among independent subsets of tasks without requiring any information on their temporal parameters. Additionally, if the temporal parameters of the interacting tasks are known, it is possible to compute an upper bound to the interference suffered by a task due to other interacting tasks. Thus, it is possible to provide timing guarantees for a subset of interacting hard real-time tasks. Finally, the M-BWI protocol is neutral to the underlying scheduling policy: it can be implemented in global, clustered and semi-partitioned scheduling.\par After introducing the M-BWI protocol, in this paper we formally prove its isolation properties, and propose an algorithm to compute an upper bound to the interference suffered by a task. Then, we describe our implementation of the protocol for the LITMUS\textsuperscript{RT} real-time testbed, and measure its overhead. Finally, we compare M-BWI against FMLP and OMLP, two other protocols for resource sharing in multiprocessor systems.} }
@article{SLBC-rts12, publisher = {Springer}, journal = {Real-Time Systems}, author = {Santos, Rodrigo M. and Lipari, Giuseppe and Bini, Enrico and Cucinotta, Tommaso}, title = {On-line schedulability tests for adaptive reservations in fixed priority scheduling}, volume = {48}, number = {5}, year = {2012}, month = sep, pages = {601-634}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SLBC-rts12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SLBC-rts12.pdf}, doi = {10.1007/s11241-012-9156-y}, abstract = {Adaptive reservation is a real-time scheduling technique in which each application is associated a fraction of the computational resource (a reservation) that can be dynamically adapted to the varying requirements of the application by using appropriate feedback control algorithms. An adaptive reservation is typically implemented by using an aperiodic server (e.g. sporadic server) algorithm with fixed period and variable budget. When the feedback law demands an increase of the reservation budget, the system must run a schedulability test to check if there is enough spare bandwidth to accommodate such increase. The schedulability test must be very fast, as it may be performed at each budget update, i.e. potentially at each instance of a task; yet, it must be as efficient as possible, to maximize resource usage.\par In this paper, we tackle the problem of performing an efficient on-line schedulability test for adaptive resource reservations in fixed priority schedulers. In the literature, a number of algorithms have been proposed for on-line admission control in fixed priority systems. We describe four of these tests, with increasing complexity and performance. In addition, we propose a novel on-line test, called Spare-Pot algorithm, which has been specifically designed for the problem at hand, and which shows a good cost/performance ratio compared to the other tests.} }
@proceedings{atpn2012-HP, title = {{P}roceedings of the 33rd {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({ICATPN}'12)}, booktitle = {{P}roceedings of the 33rd {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({ICATPN}'12)}, acronym = {{ICATPN}'12}, editor = {Haddad, Serge and Pomello, Lucia}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = 7347, year = 2012, month = jun, address = {Hamburg, Germany}, doi = {10.1007/978-3-642-31131-4}, url = {http://www.springer.com/978-3-642-31131-4} }
@inproceedings{FGL-pn12, address = {Hamburg, Germany}, month = jun, year = 2012, volume = 7347, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Haddad, Serge and Pomello, Lucia}, acronym = {{PETRI~NETS}'12}, booktitle = {{P}roceedings of the 33rd {I}nternational {C}onference on {A}pplications and {T}heory of {P}etri {N}ets ({PETRI~NETS}'12)}, author = {Finkel, Alain and Goubault{-}Larrecq, Jean}, title = {The~Theory of~{WSTS}: The~Case of Complete~{WSTS}}, pages = {3-31}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FGL-atpn12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FGL-atpn12.pdf}, doi = {10.1007/978-3-642-31131-4_2}, abstract = {We describe a simple, conceptual forward analysis procedure for \(\infty\)-complete WSTS~\(\mathfrak{S}\). This computes the so-called \emph{clover} of a state. When \(\mathfrak{S}\) is the completion of a WSTS~\(\mathfrak{X}\), the clover in~\(\mathfrak{S}\) is a finite description of the downward closure of the reachability set. We show that such completions are \(\infty\)-complete exactly when \(\mathfrak{X}\) is an \emph{\(\omega^{2}\)-WSTS}, a new robust class of WSTS. We show that our procedure terminates in more cases than the generalized Karp-Miller procedure on extensions of Petri nets. We characterize the WSTS where our procedure terminates as those that are \emph{clover-flattable}. Finally, we apply this to well-structured Presburger counter systems.} }
@inproceedings{BFP-fsttcs12, address = {Hyderabad, India}, month = dec, year = 2012, volume = 18, series = {Leibniz International Proceedings in Informatics}, publisher = {Leibniz-Zentrum f{\"u}r Informatik}, editor = {D'Souza, Deepak and Radhakrishnan, Jaikumar and Telikepalli, Kavitha}, acronym = {{FSTTCS}'12}, booktitle = {{P}roceedings of the 32nd {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'12)}, author = {Bonnet, R{\'e}mi and Finkel, Alain and Praveen, M.}, title = {Extending the {R}ackoff technique to affine nets}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFP-fsttcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFP-fsttcs12.pdf}, doi = {10.4230/LIPIcs.FSTTCS.2012.301}, abstract = {We study the possibility of extending the Rackoff technique to Affine nets, which are Petri nets extended with affine functions. The Rackoff technique has been used for establishing \textsc{Expspace} upper bounds for the coverability and boundedness problems for Petri nets. We show that this technique can be extended to strongly increasing Affine nets, obtaining better upper bounds compared to known results. The possible copies between places of a strongly increasing Affine net make this extension non-trivial. One cannot expect similar results for the entire class of Affine nets since coverability is Ackermann-hard and boundedness is undecidable. Moreover, it can be proved that model checking a logic expressing generalized coverability properties is undecidable for strongly increasing Affine nets, while it is known to be \textsc{Expspace}-complete for Petri nets.} }
@article{bs-ipl12, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Berwanger, Dietmar and Serre, Olivier}, title = {Parity games on undirected graphs}, volume = 112, number = 23, year = 2012, month = dec, pages = {928-932}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/bs-ipl12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/bs-ipl12.pdf}, doi = {10.1016/j.ipl.2012.08.021}, abstract = {We examine the complexity of solving parity games in the special case when the underlying game graph is undirected. For strictly alternating games, that is, when the game graph is bipartite between the players, we observe that the solution can be computed in linear time. In contrast, when the assumption of strict alternation is dropped, we show that the problem is as hard in the undirected case as it is in the general, directed, case.} }
@article{bbckrs-tcs12, publisher = {Elsevier Science Publishers}, journal = {Theoretical Computer Science}, author = {Baldan, Paolo and Bruni, Alessandro and Corradini, Andrea and K{\"o}nig, Barbara and Rodr{\'\i}guez, C{\'e}sar and Schwoon, Stefan}, title = {Efficient unfolding of contextual {P}etri nets}, volume = 449, number = 1, year = 2012, month = aug, pages = {2-22}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/bbckrs-tcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/bbckrs-tcs12.pdf}, doi = {10.1016/j.tcs.2012.04.046}, abstract = {A contextual net is a Petri net extended with read arcs, which allows transitions to check for tokens without consuming them. Contextual nets allow for better modelling of concurrent read access than Petri nets, and their unfoldings can be exponentially more compact than those of a corresponding Petri net. A constructive but abstract procedure for generating those unfoldings was proposed in previous work. However, it remained unclear whether the approach was useful in practice and which data structures and algorithms would be appropriate to implement it. Here, we address this question. We provide two concrete methods for computing contextual unfoldings, with a view to efficiency. We report on experiments carried out on a number of benchmarks. These show that not only are contextual unfoldings more compact than Petri net unfoldings, but they can be computed with the same or better efficiency, in particular with respect to alternative approaches based on encodings of contextual nets into Petri nets.} }
@inproceedings{BFKSST-crypto12, address = {Santa Barbara, California, USA}, month = aug, year = 2012, volume = 7417, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Safavi-Naini, Reihaneh and Canetti, Ran}, acronym = {{CRYPTO}'12}, booktitle = {{P}roceedings of the 32nd {A}nnual {I}nternational {C}ryptology {C}onference ({CRYPTO}'12)}, author = {Bardou, Romain and Focardi, Riccardo and Kawamoto, Yusuke and Simionato, Lorenzo and Steel, Graham and Tsay, Joe-Kai}, title = {Efficient Padding Oracle Attacks on Cryptographic Hardware}, pages = {608-625}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFKSST-crypto12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFKSST-crypto12.pdf}, doi = {10.1007/978-3-642-32009-5_36}, abstract = {We show how to exploit the encrypted key import functions of a variety of different cryptographic devices to reveal the imported key. The attacks are padding oracle attacks, where error messages resulting from incorrectly padded plaintexts are used as a side channel. In the asymmetric encryption case, we modify and improve Bleichenbacher's attack on RSA PKCS\#1v1.5 padding, giving new cryptanalysis that allows us to carry out the 'million message attack' in a mean of 49 000 and median of 14 500 oracle calls in the case of cracking an unknown valid ciphertext under a 1024 bit key (the original algorithm takes a mean of 215 000 and a median of 163 000 in the same case). We show how implementation details of certain devices admit an attack that requires only 9 400 operations on average (3 800 median). For the symmetric case, we adapt Vaudenay's CBC attack, which is already highly efficient. We demonstrate the vulnerabilities on a number of commercially available cryptographic devices, including security tokens, smartcards and the Estonian electronic ID card. The attacks are efficient enough to be practical: we give timing details for all the devices found to be vulnerable, showing how our optimisations make a qualitative difference to the practicality of the attack. We give mathematical analysis of the effectiveness of the attacks, extensive empirical results, and a discussion of countermeasures.} }
@article{GS-ipl12, publisher = {Elsevier Science Publishers}, journal = {Information Processing Letters}, author = {Gastin, Paul and Sznajder, Nathalie}, title = {Decidability of well-connectedness for distributed synthesis}, pages = {963-968}, volume = {112}, number = {24}, month = dec, year = 2012, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GS-ipl12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GS-ipl12.pdf}, doi = {10.1016/j.ipl.2012.08.018}, abstract = {Although the synthesis problem is often undecidable for distributed, synchronous systems, it becomes decidable for the subclass of uniformly well-connected (UWC) architectures, provided that only robust specifications are considered. It is then an important issue to be able to decide whether a given architecture falls in this class. This is the problem addressed in this paper: we establish the decidability and precise complexity of checking this property. This problem is in EXPSPACE and NP-hard in the general case, but falls into PSPACE when restricted to a natural subclass of architectures.} }
@inproceedings{BDF-cdc12, address = {Maui, Hawaii, USA}, month = dec, year = 2012, publisher = {{IEEE} Control System Society}, acronym = {{CDC}'12}, booktitle = {{P}roceedings of the 51st {IEEE} {C}onference on {D}ecision and {C}ontrol ({CDC}'12)}, author = {Bu{\v{s}}i{\'c}, Ana and Djafri, Hilal and Fourneau, Jean-Michel}, title = {Bounded state space truncation and censored {M}arkov chains}, pages = {5828-5833}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDF-cdc12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDF-cdc12.pdf}, doi = {10.1109/CDC.2012.6426156}, abstract = {Censored Markov chains (CMC) allow to represent the conditional behavior of a system within a subset of observed states. They provide a theoretical framework to study the truncation of a discrete-time Markov chain when the generation of the state-space is too hard or when the number of states is too large. However, the stochastic matrix of a CMC may be difficult to obtain. Dayar \emph{et~al.} (2006) have proposed an algorithm, called DPY, that computes a stochastic bounding matrix for a CMC with a smaller complexity with only a partial knowledge of the chain. We prove that this algorithm is optimal for the information they take into account. We also show how some additional knowledge on the chain can improve stochastic bounds for~CMC.} }
@inproceedings{jks-ifiptcs12, address = {Amsterdam, The Netherlands}, month = sep, year = 2012, volume = {7604}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Baeten, Jos and Ball, Tom and de~Boer, Frank}, acronym = {{IFIP~TCS}'12}, booktitle = {{P}roceedings of the 7th {IFIP} {I}nternational {C}onference on {T}heoretical {C}omputer {S}cience ({IFIP~TCS}'12)}, author = {Jan\v{c}ar, Petr and Karandikar, Prateek and Schnoebelen, {\relax Ph}ilippe}, title = {Unidirectional channel systems can be tested}, pages = {149-163}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/JKS-ifiptcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/JKS-ifiptcs12.pdf}, doi = {10.1007/978-3-642-33475-7_11}, abstract = {{"}Unidirectional channel systems{"} (Chambart~\& Schnoebelen, CONCUR~2008) are systems where one-way communication from a sender to a receiver goes via one reliable and one unreliable (unbounded fifo) channel. Equipping these systems with the possibility of testing regular properties on the contents of channels makes verification undecidable. Decidability is preserved when only emptiness and nonemptiness tests are considered: the proof relies on a series of reductions eventually allowing us to take advantage of recent results on Post's Embedding Problem.} }
@techreport{rr-lsv-12-16, author = {Feld, Gilles and Fribourg, Laurent and Labrousse, Denis and Revol, Bertrand and Soulat, Romain}, title = {Numerical simulation and physical experimentation of a 5-level and 7-level power converter under a control designed by a formal method}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2012}, month = jul, type = {Research Report}, number = {LSV-12-16}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-16.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-16.pdf}, versions = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2012-16-v1.pdf, 20120727}, note = {18~pages}, abstract = {High-power converters based on elementary switching cells are more and more used in the industry of power electronics owing to various advantages such as lower voltage stress and reduced power loss. However, the complexity of controlling such converters is a major challenge that the power manufacturing industry has to face with. The synthesis of industrial switching controllers relies today on heuristic rules and empiric simulation. There is no formal guarantee of correctness in zones around nominal values. In [3], we have applied a backward-oriented formal method to guarantee the good behavior of the systems within predefined zones of variations for the input parameters. Here, for numerical stability reasons, we choose to use a forward-oriented method. We apply this method to a 5-level and 7-level power converters. We check the correctness of our approach by numerical simulations and physical experimentations.} }
@article{AGG-lmcs12, journal = {Logical Methods in Computer Science}, author = {Adj{\'e}, Assal{\'e} and Gaubert, St{\'e}phane and Goubault, {\'E}ric}, title = {Coupling policy iteration with semi-definite relaxation to compute accurate numerical invariants in static analysis}, year = 2012, month = jan, volume = {8}, number = {1:1}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AGG-lmcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AGG-lmcs12.pdf}, doi = {10.2168/LMCS-8(1:01)2012}, abstract = {We introduce a new domain for finding precise numerical invariants of programs by abstract interpretation. This domain, which consists of level sets of non-linear functions, generalizes the domain of linear {"}templates{"} introduced by Manna, Sankaranarayanan, and Sipma. In the case of quadratic templates, we use Shor's semi-definite relaxation to derive computable yet precise abstractions of semantic functionals, and we show that the abstract fixpoint equation can be solved accurately by coupling policy iteration and semi-definite programming. We demonstrate the interest of our approach on a series of examples (filters, integration schemes) including a degenerate one (symplectic scheme).} }
@article{Fig-lmcs12, journal = {Logical Methods in Computer Science}, author = {Figueira, Diego}, title = {Alternating register automata on finite words and trees}, year = 2012, volume = {8}, number = {1:22}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/Fig-lmcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/Fig-lmcs12.pdf}, doi = {10.2168/LMCS-8(1:22)2012}, abstract = {We study alternating register automata on data words and data trees in relation to logics. A data word (resp. data tree) is a word (resp. tree) whose every position carries a label from a finite alphabet and a data value from an infinite domain. We investigate one-way automata with alternating control over data words or trees, with one register for storing data and comparing them for equality. This is a continuation of the study started by Demri, Lazi{\'c} and Jurdzi{\'n}ski. From the standpoint of register automata models, this work aims at two objectives: (1)~simplifying the existent decidability proofs for the emptiness problem for alternating register automata; and (2)~exhibiting decidable extensions for these models. From the logical perspective, we show that (a)~in~the case of data words, satisfiability of LTL with one register and quantification over data values is decidable; and (b)~the~satisfiability problem for the so-called forward fragment of XPath on XML documents is decidable, even in the presence of DTDs and even of key constraints. The decidability is obtained through a reduction to the automata model introduced. This fragment contains the child, descendant, next-sibling and following-sibling axes, as well as data equality and inequality tests.} }
@article{BFLZ-lmcs12, journal = {Logical Methods in Computer Science}, author = {Bonnet, R{\'e}mi and Finkel, Alain and Leroux, J{\'e}r{\^o}me and Zeitoun, Marc}, title = {Model Checking Vector Addition Systems with one zero-test}, year = 2012, volume = {8}, number = {2:11}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BFLZ-lmcs12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BFLZ-lmcs12.pdf}, doi = {10.2168/LMCS-8(2:11)2012}, abstract = {We design a variation of the Karp-Miller algorithm to compute, in a forward manner, a finite representation of the cover (i.e., the downward closure of the reachability set) of a vector addition system with one zero-test. This algorithm yields decision procedures for several problems for these systems, open until now, such as place-boundedness or LTL model-checking. The proof techniques to handle the zero-test are based on two new notions of cover: the refined and the filtered cover. The refined cover is a hybrid between the reachability set and the classical cover. It inherits properties of the reachability set: equality of two refined covers is undecidable, even for usual Vector Addition Systems (with no zero-test), but the refined cover of a Vector Addition System is a recursive set. The second notion of cover, called the filtered cover, is the central tool of our algorithms. It inherits properties of the classical cover, and in particular, one can effectively compute a finite representation of this set, even for Vector Addition Systems with one zero-test.} }
@phdthesis{lozes-HDR12, author = {Lozes, {\'E}tienne}, title = {Separation Logic: Expressiveness and Copyless Message-Passing}, year = 2012, month = jul, type = {M{\'e}moire d'habilitation}, school = {{\'E}cole Normale Sup{\'e}rieure de Cachan, France}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/hdr-el12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/hdr-el12.pdf} }
@techreport{rr-lsv-12-14, author = {Feld, Gilles and Fribourg, Laurent and Labrousse, Denis and Lefebvre, St{\'e}phane and Revol, Bertrand and Soulat, Romain}, title = {Control of Multilevel Power Converters using Formal Methods}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2012}, month = jun, type = {Research Report}, number = {LSV-12-14}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-14.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-14.pdf}, versions = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2012-14-v1.pdf, 20120626}, note = {14~pages}, abstract = {High-power converters based on elementary switching cells are more and more used in the industry of power electronics owing to various advantages such as lower voltage stress and reduced power loss. However, the complexity of controlling such converters is a major challenge that the power manufacturing industry has to face with. The synthesis of industrial switching controllers relies today on heuristic rules and empiric simulation. There is no formal guarantee of correctness in zones around nominal values. It is therefore interesting to apply formal methods to guarantee the good behavior of the systems within predefined zones of variations for the input parameters. As far as we know, such formal methods have been applied only to small electronic power devices (like DC-DC boost converters) containing one switching cell. We show in this paper that one can apply formal methods to more complicated systems, such as multi-level converters containing several pairs of switching cells.} }
@inproceedings{GM-ciaa12, address = {Porto, Portugal}, month = jul, year = 2012, volume = {7381}, series = {Lecture Notes in Computer Science}, publisher = {Springer-Verlag}, editor = {Moreira, Nelma and Reis, Rog{\'e}rio}, acronym = {{CIAA}'12}, booktitle = {{P}roceedings of the 17th {I}nternational {C}onference on {I}mplementation and {A}pplication of {A}utomata ({CIAA}'12)}, author = {Gastin, Paul and Monmege, Benjamin}, title = {Adding Pebbles to Weighted Automata}, pages = {28-51}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GM-ciaa12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GM-ciaa12.pdf}, doi = {10.1007/978-3-642-31606-7_4}, abstract = {We extend weighted automata and weighted rational expressions with 2-way moves and (reusable) pebbles. We show with examples from natural language modeling and quantitative model-checking that weighted expressions and automata with pebbles are more expressive and allow much more natural and intuitive specifications than classical ones.\par We extend Kleene-Sch{\"u}tzenberger theorem showing that weighted expressions and automata with pebbles have the same expressive power. We focus on an efficient translation from expressions to automata.\par We also prove that the evaluation problem for weighted automata can be done very efficiently if the number of (reusable) pebbles is low.} }
@inproceedings{BGMZ-atva12, address = {Thiruvananthapuram, India}, month = oct, year = {2012}, volume = {7561}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Mukund, Madhavan and Chakraborty, Supratik}, acronym = {{ATVA}'12}, booktitle = {{P}roceedings of the 10th {I}nternational {S}ymposium on {A}utomated {T}echnology for {V}erification and {A}nalysis ({ATVA}'12)}, author = {Bollig, Benedikt and Gastin, Paul and Monmege, Benjamin and Zeitoun, Marc}, title = {A Probabilistic {K}leene Theorem}, pages = {400-415}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGMZ-atva12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGMZ-atva12.pdf}, doi = {10.1007/978-3-642-33386-6_31}, abstract = {We provide a Kleene Theorem for (Rabin) probabilistic automata over finite words. Probabilistic automata generalize deterministic finite automata and assign to a word an acceptance probability. We provide probabilistic expressions with probabilistic choice, guarded choice, concatenation, and a star operator. We prove that probabilistic expressions and probabilistic automata are expressively equivalent. Our result actually extends to two-way probabilistic automata with pebbles and corresponding expressions.} }
@phdthesis{djafri-phd2011, author = {Djafri, Hilal}, title = {Approches num{\'e}riques et statistiques pour le model checking des processus stochastiques}, school = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, type = {Th{\`e}se de doctorat}, year = 2012, month = jun, url = {http://www.lsv.fr/Publis/PAPERS/PDF/djafri-these11.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/djafri-these11.pdf} }
@inproceedings{CD-aiml12, address = {Copenhagen, Denmark}, month = aug, year = 2012, publisher = {College Publications}, editor = {Bolander, Thomas and Bra{\"u}ner, Torben and Ghilardi, Silvio and Moss, Lawrence}, acronym = {{AiML}'12}, booktitle = {{S}elected {P}apers from the 9th {W}orkshop on {A}dvances in {M}odal {L}ogics ({AiML}'12)}, author = {Carreiro, Facundo and Demri, St{\'e}phane}, title = {Beyond Regularity for {P}resburger Modal Logics}, pages = {161-182}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-aiml12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-aiml12.pdf}, abstract = {Satisfiability problem for modal logic~K with quantifier-free Presburger and regularity constraints~(EML) is known to be pspace-complete. In this paper, we consider its extension with nonregular constraints, and more specifically those expressed by visibly pushdown languages~(VPL). This class of languages behaves nicely, in particular when combined with Propositional Dynamic Logic~(PDL). By extending EML, we show that decidability is preserved if we allow at most one positive VPL-constraint at each modal depth. However, the presence of two VPL-contraints or the presence of a negative occurrence of a single VPL-constraint leads to undecidability. These results contrast with the decidability of PDL augmented with VPL-constraints.} }
@inproceedings{PHL-tap12, address = {Prague, Czech Republic}, month = may # {-} # jun, year = 2012, volume = 7305, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Brucker, Achim D. and Julliand, Jacques}, acronym = {{TAP}'12}, booktitle = {{P}roceedings of the 6th {I}nternational {C}onference on {T}ests and {P}roofs ({TAP}'12)}, author = {Ponce{ }de{~}Le{\'o}n, Hern{\'a}n and Haar, Stefan and Longuet, Delphine}, title = {Conformance Relations for Labeled Event Structures}, pages = {83-98}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/PHL-tap12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/PHL-tap12.pdf}, doi = {10.1007/978-3-642-30473-6_8}, abstract = {We propose a theoretical framework for testing concurrent systems from true concurrency models like Petri nets or networks of automata. The underlying model of computation of such formalisms are labeled event structures, which allow to represent concurrency explicitly. The activity of testing relies on the definition of a conformance relation that depends on the observable behaviors on the system under test, which is given for sequential systems by ioco type relations. However, these relations are not capable of capturing and exploiting concurrency of non sequential behavior. We~study different conformance relations for labeled event structures, relying on different notions of observation, and investigate their properties and connections.} }
@inproceedings{HSS-lics2012, address = {Dubrovnik, Croatia}, month = jun, year = 2012, publisher = {{IEEE} Computer Society Press}, acronym = {{LICS}'12}, booktitle = {{P}roceedings of the 27th {A}nnual {IEEE} {S}ymposium on {L}ogic in {C}omputer {S}cience ({LICS}'12)}, author = {Haddad, Serge and Schmitz, Sylvain and Schnoebelen, {\relax Ph}ilippe}, title = {The Ordinal-Recursive Complexity of Timed-Arc {P}etri Nets, Data Nets, and Other Enriched Nets}, pages = {355-364}, url = {http://hal.archives-ouvertes.fr/hal-00793811}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HSS-lics12.pdf}, doi = {10.1109/LICS.2012.46}, abstract = {We show how to reliably compute fast-growing functions with timed-arc Petri nets and data nets. This construction provides ordinal-recursive lower bounds on the complexity of the main decidable properties (safety, termination, regular simulation,~etc.) of these models. Since these new lower bounds match the upper bounds that one can derive from wqo theory, they precisely characterise the computational power of these so-called {"}enriched{"} nets.} }
@inproceedings{DDS-ijcar12, address = {Manchester, UK}, month = jun, year = 2012, volume = {7364}, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer-Verlag}, editor = {Gramlich, Bernhard and Miller, Dale and Sattler, Uli}, acronym = {{IJCAR}'12}, booktitle = {{P}roceedings of the 6th {I}nternational {J}oint {C}onference on {A}utomated {R}easoning ({IJCAR}'12)}, author = {Demri, St{\'e}phane and Dhar, Amit Kumar and Sangnier, Arnaud}, title = {Taming Past {LTL} and Flat Counter Systems}, pages = {179-193}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DDS-ijcar12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DDS-ijcar12.pdf}, doi = {10.1007/978-3-642-31365-3_16}, abstract = {Reachability and LTL model-checking problems for flat counter systems are known to be decidable but whereas the reachability problem can be shown in NP, the best known complexity upper bound for the latter problem is made of a tower of several exponentials. Herein, we show that the problem is only NP-complete even if LTL admits past-time operators and arithmetical constraints on counters. Actually, the NP upper bound is shown by adequately combining a new stuttering theorem for Past LTL and the property of small integer solutions for quantifier-free Presburger formulae. Other complexity results are proved, for instance for restricted classes of flat counter systems.} }
@inproceedings{RS-concur12, address = {Newcastle, UK}, month = sep, year = 2012, volume = 7454, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Koutny, Maciej and Ulidowski, Irek}, acronym = {{CONCUR}'12}, booktitle = {{P}roceedings of the 23rd {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'12)}, author = {Rodr{\'\i}guez, C{\'e}sar and Schwoon, Stefan}, title = {Verification of {P}etri Nets with Read Arcs}, pages = {471-485}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/RS-concur12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/RS-concur12.pdf}, doi = {10.1007/978-3-642-32940-1_33}, abstract = {Recent work studied the unfolding construction for contextual nets, i.e. nets with read arcs. Such unfoldings are more concise and can usually be constructed more efficiently than for Petri nets. However, concrete verification algorithms exploiting these advantages were lacking so far. We address this question and propose SAT-based verification algorithms for deadlock and reachability of contextual nets. Moreover, we study optimizations of the SAT encoding and report on experiments.} }
@inproceedings{CGN-concur12, address = {Newcastle, UK}, month = sep, year = 2012, volume = 7454, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Koutny, Maciej and Ulidowski, Irek}, acronym = {{CONCUR}'12}, booktitle = {{P}roceedings of the 23rd {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'12)}, author = {Cyriac, Aiswarya and Gastin, Paul and Narayan Kumar, K.}, title = {{MSO} Decidability of Multi-Pushdown Systems via Split-Width}, pages = {547-561}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CGN-concur12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CGN-concur12.pdf}, doi = {10.1007/978-3-642-32940-1_38}, abstract = {Multi-threaded programs with recursion are naturally modeled as multi-pushdown systems. The behaviors are represented as multiply nested words (MNWs), which are words enriched with additional binary relations for each stack matching a push operation with the corresponding pop operation. Any MNW can be decomposed by two basic and natural operations: shuffle of two sequences of factors and merge of consecutive factors of a sequence. We say that the split-width of a MNW is~\(k\) if it admits a decomposition where the number of factors in each sequence is at most~\(k\). The MSO theory of MNWs with split-width~\(k\) is decidable. We introduce two very general classes of MNWs that strictly generalize known decidable classes and prove their MSO decidability via their split-width and obtain comparable or better bounds of tree-width of known classes.} }
@inproceedings{BGS-concur12, address = {Newcastle, UK}, month = sep, year = 2012, volume = 7454, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Koutny, Maciej and Ulidowski, Irek}, acronym = {{CONCUR}'12}, booktitle = {{P}roceedings of the 23rd {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'12)}, author = {Brenguier, Romain and G{\"o}ller, Stefan and Sankur, Ocan}, title = {A~Comparison of Succinctly Represented Finite-State Systems}, pages = {147-161}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BGS-concur12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BGS-concur12.pdf}, doi = {10.1007/978-3-642-32940-1_12}, abstract = {We study the succinctness of different classes of succinctly presented finite transition systems with respect to bisimulation equivalence. Our results show that synchronized product of finite automata, hierarchical graphs, and timed automata are pairwise incomparable in this sense. We moreover study the computational complexity of deciding simulation preorder and bisimulation equivalence on these classes.} }
@inproceedings{BHSS-concur12, address = {Newcastle, UK}, month = sep, year = 2012, volume = 7454, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Koutny, Maciej and Ulidowski, Irek}, acronym = {{CONCUR}'12}, booktitle = {{P}roceedings of the 23rd {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'12)}, author = {B{\'e}rard, B{\'e}atrice and Haddad, Serge and Sassolas, Mathieu and Sznajder, Nathalie}, title = {Concurrent Games on~{VASS} with Inhibition}, pages = {39-52}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BHSS-CONCUR12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHSS-CONCUR12.pdf}, doi = {10.1007/978-3-642-32940-1_5}, abstract = {We propose to study concurrent games on a new extension of Vector Addition Systems with States, where inhibition conditions are added for modeling purposes. Games are a well-suited framework to solve control problems, and concurrent semantics reflect realistic situations where the environment can always produce a move before the controller, although it is never required to do so. This is in contrast with previous works, which focused mainly on turn-based semantics. Moreover, we consider asymmetric games, where environment and controller do not have the same capabilities, although they both have restricted power. In this setting, we investigate reachability and safety objectives, which are not dual to each other anymore, and we prove that (i)~reachability games are undecidable for finite targets, (ii)~they are 2-EXPTIME-complete for upward-closed targets and (iii)~safety games are co-NP-complete for finite, upward-closed and semi-linear targets. Moreover, for the decidable cases, we build a finite representation of the corresponding controllers.} }
@inproceedings{BC-concur12, address = {Newcastle, UK}, month = sep, year = 2012, volume = 7454, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Koutny, Maciej and Ulidowski, Irek}, acronym = {{CONCUR}'12}, booktitle = {{P}roceedings of the 23rd {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'12)}, author = {Balaguer, Sandie and Chatain, {\relax Th}omas}, title = {Avoiding Shared Clocks in Networks of Timed Automata}, pages = {100-114}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BC-concur12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BC-concur12.pdf}, doi = {10.1007/978-3-642-32940-1_9}, abstract = {Networks of timed automata~(NTA) are widely used to model distributed real-time systems. Quite often in the literature, the automata are allowed to share clocks. This is a problem when one considers implementing such model in a distributed architecture, since reading clocks a priori requires communications which are not explicitly described in the model. We focus on the following question: given a NTA \(A_{1} \parallel A_{2}\) where \(A_{2}\) reads some clocks reset by~\(A_{1}\), does there exist a NTA \(A'_{1} \parallel A'_{2}\) without shared clocks with the same behavior as the initial NTA? For this, we allow the automata to exchange information during synchronizations only. We discuss a formalization of the problem and give a criterion using the notion of contextual timed transition system, which represents the behavior of~\(A_{2}\) when in parallel with~\(A_{1}\). Finally, we effectively build \(A'_{1} \parallel A'_{2}\) when it exists.} }
@inproceedings{DLM-concur12, address = {Newcastle, UK}, month = sep, year = 2012, volume = 7454, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Koutny, Maciej and Ulidowski, Irek}, acronym = {{CONCUR}'12}, booktitle = {{P}roceedings of the 23rd {I}nternational {C}onference on {C}oncurrency {T}heory ({CONCUR}'12)}, author = {Da{~}Costa, Arnaud and Laroussinie, Fran{\c{c}}ois and Markey, Nicolas}, title = {Quantified {CTL}: expressiveness and model checking}, pages = {177-192}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DLM-concur12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DLM-concur12.pdf}, doi = {10.1007/978-3-642-32940-1_14}, abstract = {While it was defined long ago, the extension of CTL with quantification over atomic propositions has never been studied extensively. Considering two different semantics (depending whether propositional quantification refers to the Kripke structure or to its unwinding tree), we study its expressiveness (showing in particular that QCTL coincides with Monadic Second-Order Logic for both semantics) and characterize the complexity of its model-checking problem, depending on the number of nested propositional quantifiers (showing that the structure semantics populates the polynomial hierarchy while the tree semantics populates the exponential hierarchy). We also show how these results apply to model checking ATL-like temporal logics for games.} }
@inproceedings{FLMS-time12, address = {Leicester, UK}, month = sep, year = 2012, publisher = {{IEEE} Computer Society Press}, editor = {Reynolds, Mark and Terenziani, Paolo and Moszkowski, Ben}, acronym = {{TIME}'12}, booktitle = {{P}roceedings of the 19th {I}nternational {S}ymposium on {T}emporal {R}epresentation and {R}easoning ({TIME}'12)}, author = {Fribourg, Laurent and Lesens, David and Moro, Pierre and Soulat, Romain}, title = {Robustness Analysis for Scheduling Problems using the Inverse Method}, pages = {73-80}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/FLMS-time12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/FLMS-time12.pdf}, doi = {10.1109/TIME.2012.10}, abstract = {Given a Parametric Timed Automaton (PTA)~\(\mathcal{A}\) and a tuple~\(\pi_{0}\) of reference valuations for timings, the \emph{Inverse Method~(IM)} synthesizes a constraint around~\(\pi_{0}\) where \(\mathcal{A}\) behaves in the same time-abstract manner. This provides us with a quantitative measure of robustness of the behavior of~\(\mathcal{A}\) around~\(\pi_{0}\). We~show in this paper how \textit{IM} can be applied in a specific way to treat the robustness of scheduling systems. We also explain how to use the method in order to synthesize large zones of the timing parameter space where the system is guaranteed to be schedulable. We illustrate the method on several examples of the literature as well as a case study originating from an industrial design project.} }
@inproceedings{AFKS12, address = {Paris, France}, month = aug, year = 2012, volume = {7436}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Giannakopoulou, Dimitra and M{\'e}ry, Dominique}, acronym = {{FM}'12}, booktitle = {{P}roceedings of the 18th {I}nternational {S}ymposium on {F}ormal {M}ethods ({FM}'12)}, author = {Andr{\'e}, {\'E}tienne and Fribourg, Laurent and K{\"u}hne, Ulrich and Soulat, Romain}, title = {{IMITATOR}~2.5: A~Tool for Analyzing Robustness in Scheduling Problems}, pages = {33-36}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AFKS-fm12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AFKS-fm12.pdf}, doi = {10.1007/978-3-642-32759-9_6}, abstract = {The tool \textsc{Imitator} implements the \emph{Inverse Method~(IM)} for Timed Automata~(TAs). Given a TA~\(\mathcal{A}\) and a tuple~\(\pi_{0}\) of reference valuations for timings, \textit{IM} synthesizes a constraint around~\(\pi_{0}\) where \(\mathcal{A}\) behaves in the same discrete manner. This provides us with a quantitative measure of robustness of the behavior of~\(\mathcal{A}\) around~\(\pi_{0}\). The new version \textsc{Imitator}~2.5 integrates the new features of stopwatches (in~addition to standard clocks) and updates (in addition to standard clock resets), as well as powerful algorithmic improvements for state space reduction. These new features make the tool well-suited to analyze the robustness of solutions in several classes of preemptive scheduling problems.} }
@inproceedings{AMH-safep12, address = {Mexico City, Mexico}, month = aug, year = 2012, publisher = {IFAC}, acronym = {{SAFEPROCESS}'12}, booktitle = {{P}roceedings of the 8th {IFAC} {S}ymposium on {F}ault {D}etection, {S}upervision and {S}afety for {T}echnical {P}rocesses ({SAFEPROCESS}'12)}, author = {Agarwal, Anoopam and Madalinski, Agnes and Haar, Stefan}, title = {Effective Verification of Weak Diagnosability}, nopages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AMH-safep12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AMH-safep12.pdf}, doi = {10.3182/20120829-3-MX-2028.00083}, abstract = {The \emph{diagnosability} problem can be stated as follows: does a given labeled Discrete Event System allow for an outside observer to determine the occurrence of the {"}invisible{"} fault, no later than a bounded number of events after that unobservable occurrence, and based on the partial observation of the behaviour? When this problem is investigated in the context of concurrent systems, partial order semantics induces a separation between classical or strong diagnosability on the one hand, and \emph{weak diagnosability} on the other hand. The present paper presents the first solution for checking weak diagnosability, via a \emph{verifier} construction.} }
@inproceedings{BBJM-qest12, address = {London, UK}, month = sep, year = 2012, publisher = {{IEEE} Computer Society Press}, acronym = {{QEST}'12}, booktitle = {{P}roceedings of the 9th {I}nternational {C}onference on {Q}uantitative {E}valuation of {S}ystems ({QEST}'12)}, author = {Bouyer, Patricia and Brihaye, {\relax Th}omas and Jurdzi{\'n}ski, Marcin and Menet, Quentin}, title = {Almost-Sure Model-Checking of Reactive Timed Automata}, pages = {138-147}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BBJM-qest12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BBJM-qest12.pdf}, doi = {10.1109/QEST.2012.10}, abstract = {We consider the model of stochastic timed automata, a model in which both delays and discrete choices are made probabilistically. We are interested in the almost-sure model-checking problem, which asks whether the automaton satisfies a given property with probability~\(1\). While this problem was shown decidable for single-clock automata few years ago, it was also proven that the algorithm for this decidability result could not be used for general timed automata. In this paper we describe the subclass of reactive timed automata, and we prove decidability of the almost-sure model-checking problem under that restriction. Decidability relies on the fact that this model is almost-surely fair. As a desirable property of real systems, we show that reactive automata are almost-surely non-Zeno. Finally we show that the almost-sure model-checking problem can be decided for specifications given as deterministic timed automata.} }
@inproceedings{BLM-qest12, address = {London, UK}, month = sep, year = 2012, publisher = {{IEEE} Computer Society Press}, acronym = {{QEST}'12}, booktitle = {{P}roceedings of the 9th {I}nternational {C}onference on {Q}uantitative {E}valuation of {S}ystems ({QEST}'12)}, author = {Bouyer, Patricia and Larsen, Kim G. and Markey, Nicolas}, title = {Lower-Bound Constrained Runs in Weighted Timed Automata}, pages = {128-137}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BLM-qest12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BLM-qest12.pdf}, doi = {10.1109/QEST.2012.28}, noontract = {}, abstract = {We investigate a number of problems related to infinite runs of weighted timed automata, subject to lower-bound constraints on the accumulated weight. Closing an open problem from [Bouyer \textit{et~al.}, {"}Infinite runs in weighted timed automata with energy constraints{"}, FORMATS'08], we show that the existence of an infinite lower-bound-constrained run is---for us somewhat unexpectedly---undecidable for weighted timed automata with four or more clocks.\par This undecidability result assumes a fixed and know initial credit. We show that the related problem of existence of an initial credit for which there ex- ist a feasible run is decidable in PSPACE. We also investigate the variant of these problems where only bounded-duration runs are considered, showing that this restriction makes our original problem decidable in NEXPTIME. Finally, we prove that the universal versions of all those problems (i.e, checking that all the considered runs satisfy the lower-bound constraint) are decidable in PSPACE.} }
@article{BMOSW-fac12, publisher = {Springer}, journal = {Formal Aspects of Computing}, author = {Bouyer, Patricia and Markey, Nicolas and Ouaknine, Jo{\"e}l and Schnoebelen, {\relax Ph}ilippe and Worrell, James}, title = {On Termination and Invariance for Faulty Channel Systems}, year = 2012, month = jul, volume = 24, number = {4-6}, pages = {595-607}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMOSU-fac12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMOSU-fac12.pdf}, doi = {10.1007/s00165-012-0234-7}, abstract = {A~\emph{channel machine} consists of a finite controller together with several fifo channels; the controller can read messages from the head of a channel and write messages to the tail of a channel. In this paper we focus on channel machines with \emph{insertion errors}, i.e., machines in whose channels messages can spontaneously appear. We consider the invariance problem: does a given insertion channel machine have an infinite computation all of whose configurations satisfy a given predicate? We show that this problem is primitive-recursive if the predicate is closed under message losses. We also give a non-elementary lower bound for the invariance problem under this restriction. Finally, using the previous result, we show that the satisfiability problem for the safety fragment of Metric Temporal Logic is non-elementary.} }
@inproceedings{BDL-tase12, address = {Beijing, China}, month = jul, year = 2012, publisher = {{IEEE} Computer Society Press}, noeditor = {}, acronym = {{TASE}'12}, booktitle = {{P}roceedings of the 6th {I}nternational {S}ymposium on {T}heoretical {A}spects of {S}oftware {E}ngineering ({TASE}'12)}, author = {Bollig, Benedikt and Decker, Normann and Leucker, Martin}, title = {Frequency Linear-time Temporal Logic}, pages = {85-92}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDL-tase12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDL-tase12.pdf}, doi = {10.1109/TASE.2012.43}, abstract = {We propose fLTL, an extension to linear-time temporal logic (LTL) that allows for expressing relative frequencies by a generalization of temporal operators. This facilitates the specification of requirements such as the deadlines in a real-time system must be met in at least~\(95\%\) of all cases. For our novel logic, we establish an undecidability result regarding the satisfiability problem but identify a decidable fragment which strictly increases the expressiveness of LTL by allowing, e.g., to express non-context-free properties.} }
@inproceedings{IL-pairing12, address = {Cologne, Germany}, month = may, year = 2012, volume = 7708, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Abdalla, Michel and Lange, Tanja}, acronym = {{PAIRING}'12}, booktitle = {{P}roceedings of the 5th {I}nternational {C}onference on {P}airing-Based {C}ryptography ({PAIRING}'12)}, author = {Izabach{\`e}ne, Malika and Libert, Beno{\^\i}t}, title = {Divisible E-Cash in the Standard Model}, pages = {314-332}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/IL-pairing12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/IL-pairing12.pdf}, doi = {10.1007/978-3-642-36334-4_20}, abstract = {Off-line e-cash systems are the digital analogue of regular cash. One of the main desirable properties is anonymity: spending a coin should not reveal the identity of the spender and, at the same time, users should not be able to double-spend coins without being detected. Compact e-cash systems make it possible to store a wallet of \(O(2^{L})\) coins using \(O(L + \lambda)\) bits, where \(\lambda\) is the security parameter. They are called \emph{divisible} whenever the user has the flexibility of spending an amount of~\(2^{\ell}\), for some \(\ell\leq L\), more efficiently than by repeatedly spending individual coins. This paper presents the first construction of divisible e-cash in the standard model (i.e., without the random oracle heuristic). The scheme allows a user to obtain a wallet of~\(2^{L}\) coins by running a withdrawal protocol with the bank. Our construction is built on the traditional binary tree approach, where the wallet is organized in such a way that the monetary value of a coin depends on how deep the coin is in the tree.} }
@inproceedings{BMS-icalp12, address = {Warwick, UK}, month = jul, year = 2012, volume = {7392}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Czumaj, Artur and Mehlhorn, Kurt and Pitts, Andrew and Wattenhofer, Roger}, acronym = {{ICALP}'12}, booktitle = {{P}roceedings of the 39th {I}nternational {C}olloquium on {A}utomata, {L}anguages and {P}rogramming ({ICALP}'12)~-- {P}art~{II}}, author = {Bouyer, Patricia and Markey, Nicolas and Sankur, Ocan}, title = {Robust Reachability in Timed Automata: A~Game-based Approach}, pages = {128-140}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-icalp12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BMS-icalp12.pdf}, doi = {10.1007/978-3-642-31585-5_15}, abstract = {Reachability checking is one of the most basic problems in verification. By solving this problem, one synthesizes a strategy that dictates the actions to be performed for ensuring that the target location is reached. In this work, we are interested in synthesizing {"}robust{"} strategies for ensuring reachability of a location in a timed automaton; with {"}robust{"}, we mean that it must still ensure reachability even when the delays are perturbed by the environment. We model this perturbed semantics as a game between the controller and its environment, and solve the parameterized robust reachability problem: we show that the existence of an upper bound on the perturbations under which there is a strategy reaching a target location is EXPTIME-complete.} }
@incollection{topnoc12-ehh, year = 2012, volume = 6900, series = {Lecture Notes in Computer Science}, editor = {Jensen, Kurt and Donatelli, Susanna and Kleijn, Jetty}, publisher = {Springer}, booktitle = {Transactions on {P}etri Nets and Other Models of Concurrency~{V}}, author = {El{~}Hog{-}Benzina, Dorsaf and Haddad, Serge and Hennicker, Rolf}, title = {Refinement and Asynchronous Composition of Modal {P}etri Nets}, pages = {96-120}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/topnoc12-ehh.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/topnoc12-ehh.pdf}, doi = {10.1007/978-3-642-29072-5_4}, abstract = {We propose a framework for the specification of infinite state systems based on Petri nets with distinguished \emph{may}- and \emph{must}-transitions (called modalities) which specify the allowed and the required behavior of refinements and hence of implementations. For any modal Petri net, we define its generated modal language specification which abstracts away silent transitions. On this basis we consider refinements of modal Petri nets by relating their generated modal language specifications. We show that this refinement relation is decidable if the underlying modal Petri nets are weakly deterministic. We also show that the membership problem for the class of weakly deterministic modal Petri nets is decidable. As an important application scenario of our approach we consider I/O-Petri nets and their asynchronous composition which typically leads to an infinite state system.} }
@inproceedings{benzina-dictap12, address = {Bangkok, Thailand}, month = may, year = 2012, publisher = {{IEEE} Computer Society Press}, acronym = {{DICTAP}'12}, booktitle = {{P}roceedings of the 2nd {I}nternational {C}onference on {D}igital {I}nformation and {C}ommunication {T}echnology and its {A}pplication ({DICTAP}'12)}, author = {Benzina, Hedi}, title = {Towards Designing Secure Virtualized Systems}, pages = {250-255}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/HB-dictap12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/HB-dictap12.pdf}, doi = {10.1109/DICTAP.2012.6215385}, abstract = {Virtual machine technology is rapidly gaining acceptance as a fundamental building block in enterprise data centers. It is most known for improving efficiency and ease of management. However, it also provides a compelling approach to enhancing system security, offering new ways to rearchitect todays systems and opening the door for a wide range of future security technologies. While this technology is meant to enhance the security of computer systems, some recent attacks show that virtual machine technology has many weaknesses and becomes exposed to many security threats. In this paper we present some of these threats and show how we protect these systems through intrusion detection and security policies mechanisms.} }
@article{jcss12-DJLL, publisher = {Elsevier Science Publishers}, journal = {Journal of Computer and System Sciences}, author = {Demri, St{\'e}phane and Jurdzi{\'n}ski, Marcin and Lachish, Oded and Lazi{\'c}, Ranko}, title = {The covering and boundedness problems for branching vector addition systems}, year = {2012}, volume = 79, number = 1, pages = {23-38}, month = feb, url = {http://www.lsv.fr/Publis/PAPERS/PDF/djll-jcss12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/djll-jcss12.pdf}, doi = {10.1016/j.jcss.2012.04.002}, abstract = {The covering and boundedness problems for branching vector addition systems are shown complete for doubly-exponential time.} }
@inproceedings{ACD-csf12, address = {Cambridge Massachusetts, USA}, month = jun, year = 2012, publisher = {{IEEE} Computer Society Press}, acronym = {{CSF}'12}, booktitle = {{P}roceedings of the 25th {IEEE} {C}omputer {S}ecurity {F}oundations {S}ymposium ({CSF}'12)}, author = {Arapinis, Myrto and Cheval, Vincent and Delaune, St{\'e}phanie}, title = {Verifying privacy-type properties in a modular way}, pages = {95-109}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/ACD-csf12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/ACD-csf12.pdf}, doi = {10.1109/CSF.2012.16}, abstract = {Formal methods have proved their usefulness for analysing the security of protocols. In this setting, privacy-type security properties (e.g. vote-privacy, anonymity, unlinkability) that play an important role in many modern applications are formalised using a notion of equivalence.\par In this paper, we study the notion of trace equivalence and we show how to establish such an equivalence relation in a modular way. It is well-known that composition works well when the processes do not share secrets. However, there is no result allowing us to compose processes that rely on some shared secrets such as long term keys. We show that composition works even when the processes share secrets provided that they satisfy some reasonable conditions. Our composition result allows us to prove various equivalence-based properties in a modular way, and works in a quite general setting. In particular, we consider arbitrary cryptographic primitives and processes that use non-trivial else branches.\par As an example, we consider the ICAO e-passport standard, and we show how the privacy guarantees of the whole application can be derived from the privacy guarantees of its sub-protocols.} }
@inproceedings{benzina-iscc12, address = {Nev{\c{s}}ehir, Turkey}, month = jul, year = 2012, publisher = {{IEEE} Computer Society Press}, noeditor = {}, acronym = {{ISCC}'12}, booktitle = {{P}roceedings of the 17th {IEEE} {S}ymposium on {C}omputers and {C}ommunications ({ISCC}'12)}, author = {Benzina, Hedi}, title = {A~Network Policy Model for Virtualized Systems}, pages = {680-683}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/benzina-iscc12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/benzina-iscc12.pdf}, doi = {10.1109/ISCC.2012.6249376}, abstract = {Modern hypervisors offer the ability to build virtual networks between virtual machines. These networks are very useful in both personal and professional activities since they offer the same opportunities as physical networks, but in a much lower cost in terms of hardware and time. On the other hand, these networks are facing many security threats due to the absence of rigourous security policies that protect the sensitive ressources of the network. In this paper, we propose a multilevel security policy model for these networks, this policy covers not only network operations, but also operations related to the management of the virtual architecture.} }
@inproceedings{DKP-ijcar12, address = {Manchester, UK}, month = jun, year = 2012, volume = {7364}, series = {Lecture Notes in Artificial Intelligence}, publisher = {Springer-Verlag}, editor = {Gramlich, Bernhard and Miller, Dale and Sattler, Uli}, acronym = {{IJCAR}'12}, booktitle = {{P}roceedings of the 6th {I}nternational {J}oint {C}onference on {A}utomated {R}easoning ({IJCAR}'12)}, author = {Delaune, St{\'e}phanie and Kremer, Steve and Pasail{\u{a}}, Daniel}, title = {Security protocols, constraint systems, and group theories}, pages = {164-178}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/DKP-ijcar12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/DKP-ijcar12.pdf}, doi = {10.1007/978-3-642-31365-3_15}, abstract = {When formally analyzing security protocols it is often important to express properties in terms of an adversary's inability to distinguish two protocols. It has been shown that this problem amounts to deciding the equivalence of two constraint systems, i.e., whether they have the same set of solutions. In this paper we study this equivalence problem when cryptographic primitives are modeled using a group equational theory, a special case of monoidal equational theories. The results strongly rely on the isomorphism between group theories and rings. This allows us to reduce the problem under study to the problem of solving systems of equations over rings.\par We provide several new decidability and complexity results, notably for equational theories which have applications in security protocols, such as exclusive or and Abelian groups which may additionally admit a unary, homomorphic symbol.} }
@inproceedings{KS-csr12, address = {Nizhni Novgorod, Russia}, month = jul, year = 2012, volume = {7353}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Hirsch, Edward A. and Karhum{\"a}ki, Juhani and Lepist{\"o}, Arto and Prilutskii, Michail}, acronym = {{CSR}'12}, booktitle = {{P}roceedings of the 7th {I}nternational {C}omputer {S}cience {S}ymposium in {R}ussia ({CSR}'12)}, author = {Karandikar, Prateek and Schnoebelen, {\relax Ph}ilippe}, title = {Cutting Through Regular {P}ost Embedding Problems}, pages = {229-240}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-csr12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/KS-csr12.pdf}, doi = {10.1007/978-3-642-30642-6_22}, abstract = {The Regular Post Embedding Problem extended with partial (co)directness is shown decidable. This extends to universal and{\slash}or counting versions. It is also shown that combining directness and codirectness in Post Embedding problems leads to undecidability.} }
@phdthesis{doyen-HDR11, author = {Doyen, Laurent}, title = {Games and Automata: From Boolean to Quantitative Verification}, year = 2012, month = mar, type = {M{\'e}moire d'habilitation}, school = {{\'E}cole Normale Sup{\'e}rieure de Cachan, France}, url = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hdr-ld.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hdr-ld.pdf}, noslides = {http://www.lsv.ens-cachan.fr/Publis/PAPERS/SLIDES/hdr-ld-slides.pdf} }
@techreport{rr-lsv-12-05, author = {Soulat, Romain}, title = {Scheduling with {IMITATOR}: Some Case Studies}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2012}, month = mar, type = {Research Report}, number = {LSV-12-05}, url = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-05.pdf}, pdf = {http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2012-05.pdf}, versions = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2012-05-v1.pdf, 20120313}, note = {13~pages}, abstract = {The tool IMITATOR implements the \emph{Inverse Method (IM)} for Timed Automata (TAs). Given a TA~\(\mathcal{A}\) and a tuple~\(\pi_0\) of reference valuations for timings, IM synthesizes a constraint around pi0 where A behaves in the same discrete manner. This provides us with a quantitative measure of robustness of the behavior of~\(\mathcal{A}\) around~\(\pi_0\).\par The new version IMITATOR~2.5 integrates the new features of stopwatches (in addition to standard clocks) and updates (in addition to standard clock resets), as well as powerful algorithmic improvements for state space reduction. We illustrate on several case studies of preemptive scheduling problems how such features make the tool well-suited to analyze robustness.} }
@article{BCH-fmsd12, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {Balaguer, Sandie and Chatain, {\relax Th}omas and Haar, Stefan}, title = {A~Concurrency-Preserving Translation from Time {P}etri Nets to Networks of Timed Automata}, year = 2012, month = jun, volume = 40, number = 3, pages = {330-355}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BCH-fmsd12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BCH-fmsd12.pdf}, doi = {10.1007/s10703-012-0146-4}, abstract = {Several formalisms to model distributed real-time systems coexist in the literature. This naturally induces a need to compare their expressiveness and to translate models from one formalism to another when possible. The first formal comparisons of the expressiveness of these models focused on the preservation of the sequential behavior of the models, using notions like timed language equivalence or timed bisimilarity. They do not consider preservation of concurrency. In~this paper we define timed traces as a partial order representation of executions of our models for real-time distributed systems. Timed traces provide an alternative to timed words, and take the distribution of actions into account. We propose a translation between two popular formalisms that describe timed concurrent systems: \(1\)-bounded time Petri nets~(TPN) and networks of timed automata~(NTA). Our translation preserves the distribution of actions, that is we require that if the TPN represents the product of several components (called processes), then each process should have its counterpart as one timed automaton in the resulting~NTA.} }
@techreport{rr-lsv-12-04, author = {Barbot, Beno{\^\i}t and Haddad, Serge and Picaronny, Claudine}, title = {Importance Sampling for Model Checking of Time-Bounded Until}, institution = {Laboratoire Sp{\'e}cification et V{\'e}rification, ENS Cachan, France}, year = {2012}, month = feb, type = {Research Report}, number = {LSV-12-04}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2012-04.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2012-04.pdf}, versions = {http://www.lsv.fr/Publis/PAPERS/PDF/rr-lsv-2012-04-v1.pdf, 20120227}, note = {14~pages}, abstract = {Statistical model-checking is an alternative verification technique applied on stochastic systems whose size is beyond numerical analysis ability. Given a model (most often a Markov chain) and a formula, it provides a confidence interval for the probability that the model satisfies the formula. In a previous contribution, we have overtaken the main limitation of the statistical approach, i.e. the computation time explosion associated with the evaluation of very small probabilities. This method was valid only for the standard ``Until'' of temporal logics. We establish a similar validity condition which applies to the ``Bounded Until'', using more elaborate arguments. We also address the problem of additional memory requirements necessary to apply the method and we design several algorithms depending on the intended trade-off between time and memory. The corresponding algorithms have been implemented in our tool Cosmos. We present experimentations on several relevant systems, with drastic time reductions w.r.t. standard statistical model checking.} }
@inproceedings{AFS-nfm12, address = {Norfolk, Virginia, USA}, month = apr, year = 2012, volume = 7226, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Goodloe, Alwyn and Person, Suzette}, acronym = {{NFM}'12}, booktitle = {{P}roceedings of the 4th {NASA} {F}ormal {M}ethods {S}ymposium ({NFM}'12)}, author = {Andr{\'e}, {\'E}tienne and Fribourg, Laurent and Soulat, Romain}, title = {Enhancing the Inverse Method with State Merging}, pages = {100-105}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/AFS-nfm12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/AFS-nfm12.pdf}, doi = {10.1007/978-3-642-28891-3_10}, abstract = {Keeping the state space small is essential when verifying real-time systems using Timed Automata~(TA). In~the model-checker Uppaal, the merging operation has been used extensively in order to reduce the number of states. Actually, Uppaal's merging technique applies within the more general setting of Parametric Timed Automata (PTA). The \emph{Inverse Method~(IM)} for a PTA~\(\mathcal{A}\) is a procedure that synthesizes a zone around a given point~\(\pi^{0}\) (parameter valuation) over which \(\mathcal{A}\) is guaranteed to behave similarly. We show that the integration of merging into~\emph{IM} leads to the synthesis of larger zones around~\(\pi^{0}\). It~also often improves the performance of~\emph{IM}, both in terms of computational space and time, as shown by our experimental results.} }
@article{BHS-fmsd2012, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {B{\'e}rard, B{\'e}atrice and Haddad, Serge and Sassolas, Mathieu}, title = {Interrupt Timed Automata: Verification and Expressiveness}, year = {2012}, month = feb, volume = {40}, number = {1}, pages = {41-87}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BHS-fmsd12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BHS-fmsd12.pdf}, doi = {10.1007/s10703-011-0140-2}, abstract = {We introduce the class of Interrupt Timed Automata (ITA), a subclass of hybrid automata well suited to the description of timed multi-task systems with interruptions in a single processor environment.\par While the reachability problem is undecidable for hybrid automata we show that it is decidable for ITA. More precisely we prove that the untimed language of an ITA is regular, by building a finite automaton as a generalized class graph. We then establish that the reachability problem for ITA is in NEXPTIME and in PTIME when the number of clocks is fixed. To prove the first result, we define a subclass ITA\(_{-}\) of ITA, and show that (1)~any ITA can be reduced to a language-equivalent automaton in ITA\(_{-}\) and (2)~the reachability problem in this subclass is in NEXPTIME (without any class graph).\par In the next step, we investigate the verification of real time properties over ITA. We prove that model checking SCL, a fragment of a timed linear time logic, is undecidable. On the other hand, we give model checking procedures for two fragments of timed branching time logic.\par We also compare the expressive power of classical timed automata and ITA and prove that the corresponding families of accepted languages are incomparable. The result also holds for languages accepted by controlled real-time automata (CRTA), that extend timed automata. We finally combine ITA with CRTA, in a model which encompasses both classes and show that the reachability problem is still decidable. Additionally we show that the languages of ITA are neither closed under complementation nor under intersection.} }
@article{BK-jal12, publisher = {Elsevier Science Publishers}, journal = {Journal of Applied Logic}, author = {Bollig, Benedikt and Kuske, Dietrich}, title = {An optimal construction of {H}anf sentences}, year = {2012}, month = jun, volume = {10}, number = {2}, pages = {179-186}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BK-jal12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BK-jal12.pdf}, doi = {10.1016/j.jal.2012.01.002}, abstract = {We give a new construction of formulas in Hanf normal form that are equivalent to first-order formulas over structures of bounded degree. This is the first algorithm whose running time is shown to be elementary. The triply exponential upper bound is complemented by a matching lower bound.} }
@article{GMM-fmsd2012, publisher = {Springer}, journal = {Formal Methods in System Design}, author = {Ganty, Pierre and Majumdar, Rupak and Monmege, Benjamin}, title = {Bounded underapproximations}, year = {2012}, month = apr, volume = {40}, number = {2}, pages = {206-231}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/GMM-fmsd12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/GMM-fmsd12.pdf}, doi = {10.1007/s10703-011-0136-y}, abstract = {We show a new and constructive proof of the following language-theoretic result: for every context-free language~\(L\), there is a bounded context-free language \(L'\subseteq L\) which has the same Parikh (commutative) image as~\(L\). Bounded languages, introduced by Ginsburg and Spanier, are subsets of regular languages of the form \(w_{1}^{*}w_{2}^{*}\cdots w_{m}^{*}\) for some \(w_1,\cdots,w_{m}\in \Sigma^{*}\). In particular bounded context-free languages have nice structural and decidability properties. Our proof proceeds in two parts. First, we give a new construction that shows that each context free language~\(L\) has a subset~\(L_{N}\) that has the same Parikh image as~\(L\) and that can be represented as a sequence of substitutions on a linear language. Second, we inductively construct a Parikh-equivalent bounded context-free subset of~\(L_{N}\).\par We show two applications of this result in model checking: to underapproximate the reachable state space of multithreaded procedural programs and to underapproximate the reachable state space of recursive counter programs. The bounded language constructed above provides a decidable underapproximation for the original problems. By iterating the construction, we get a semi-algorithm for the original problems that constructs a sequence of underapproximations such that no two underapproximations of the sequence can be compared. This provides a progress guarantee: every word~\(w\in L\) is in some underapproximation of the sequence, and hence, a program bug is guaranteed to be found. In particular, we show that verification with bounded languages generalizes context-bounded reachability for multithreaded programs.} }
@inproceedings{CCK-esop12, address = {Tallinn, Estonia}, month = mar, year = 2012, volume = {7211}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Seidl, Helmut}, acronym = {{ESOP}'12}, booktitle = {{P}rogramming {L}anguages and {S}ystems~--- {P}roceedings of the 22nd {E}uropean {S}ymposium on {P}rogramming ({ESOP}'12)}, author = {Chadha, Rohit and Ciob{\^a}c{\u{a}}, {\c{S}}tefan and Kremer, Steve}, title = {Automated verification of equivalence properties of cryptographic protocols}, pages = {108-127}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CCK-esop12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CCK-esop12.pdf}, doi = {10.1007/978-3-642-28869-2_6}, abstract = {Indistinguishability properties are essential in formal verification of cryptographic protocols. They are needed to model anonymity properties, strong versions of confidentiality and resistance to offline guessing attacks, and can be conveniently modeled using process equivalences. We present a novel procedure to verify equivalence properties for bounded number of sessions. Our procedure is able to verify trace equivalence for determinate cryptographic protocols. On determinate protocols, trace equivalence coincides with observational equivalence which can therefore be automatically verified for such processes. When protocols are not determinate our procedure can be used for both under- and over-approximations of trace equivalence, which proved successful on examples. The procedure can handle a large set of cryptographic primitives, namely those which can be modeled by an optimally reducing convergent rewrite system. Although, we were unable to prove its termination, it has been implemented in a prototype tool and has been effectively tested on examples, some of which were outside the scope of existing tools.} }
@article{BDL-icomp12, publisher = {Elsevier Science Publishers}, journal = {Information and Computation}, author = {Brochenin, R{\'e}mi and Demri, St{\'e}phane and Lozes, {\'E}tienne}, title = {On the Almighty Wand}, year = {2012}, volume = 211, pages = {106-137}, month = feb, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BDL-icomp12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BDL-icomp12.pdf}, doi = {10.1016/j.ic.2011.12.003}, abstract = {We investigate decidability, complexity and expressive power issues for (first-order) separation logic with one record field (herein called~\texttt{SL}) and its fragments. \texttt{SL}~can specify properties about the memory heap of programs with singly-linked lists. Separation logic with two record fields is known to be undecidable by reduction of finite satisfiability for classical predicate logic with one binary relation. Surprisingly, we show that second-order logic is as expressive as \texttt{SL} and as a by-product we get undecidability of~\texttt{SL}. This is refined by showing that \texttt{SL} without the separating conjunction is as expressive as~\texttt{SL}, whence undecidable too. As a consequence, in \texttt{SL} the separating implication (also known as the magic wand) can simulate the separating conjunction. By~contrast, we establish that \texttt{SL} without the magic wand is decidable, and we~prove a non-elementary complexity by reduction from satisfiability for the first-order theory over finite words. This result is extended with a bounded use of the magic wand that appears in Hoare-style rules. As a generalisation, it~is shown that~\(k\texttt{SL}\), the separation logic over heaps with \(k\geq 1\) record fields, is equivalent to~\(k\texttt{SO}\), the second-order logic over heaps with \(k\) record fields.} }
@inproceedings{BLLJKFSFR-revet12, address = {Hammamet, Tunisia}, month = mar, year = 2012, publisher = {{IEEE} Power~\& Energy Society}, editor = {Neji, Rafik}, acronym = {{REVET}'12}, booktitle = {{P}roceedings of the 1st {I}nternational {C}onference on {R}enewable {E}nergies and {VE}hicular {T}echnology ({REVET}'12)}, author = {Belkacem, Ghania and Labrousse, Denis and Lefebvre, St{\'e}phane and Joubert, Pierre-Yves and K{\"u}hne, Ulrich and Fribourg, Laurent and Soulat, Romain and Florentin, {\'E}ric and Rey, {\relax Ch}ristian}, title = {Distributed and Coupled Electrothermal Model of Power Semiconductor Devices}, pages = {84-89}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/BLLJKFSFR-revet12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/BLLJKFSFR-revet12.pdf}, doi = {10.1109/REVET.2012.6195253}, abstract = {Electro-thermal model of power semiconductor devices are of key importance in order to optimize their thermal design and increase their reliability. The development of such an electro-thermal model for power MOSFET transistors (COOLMOS\textsuperscript{(TM)}) based on the coupling between two computation softwares (Matlab and Cast3M) is described in the paper. The elaborated 2D electro-thermal model is able to predict i)~the~temperature distribution on chip surface well as in volume, ii)~the~effect of the temperature on the distribution of the current flowing within the die and iii)~the~effects of the ageing of the metallization layer on the current density and the temperature. In the paper, the used electrical and thermal models are described as well as the implemented coupling scheme.} }
@inproceedings{SVMM-sbbd2012, address = {S{\~a}o~Paulo, Brazil}, month = oct, year = 2012, editor = {Casanova, Marco A.}, publisher = {Sociedade Brasileira de Computa{\c{c}}{\~a}o}, acronym = {{SBBD}'12}, booktitle = {{P}roceedings of the 27th {B}razilian {S}ymposium on {D}atabases ({SBBD}'12)}, author = {Sim{\~o}es{ }De{~}Sousa, Diego V. and Viana, Henrique and Markey, Nicolas and de Mac{\^e}do, Jose Ant{\^o}nio F.}, title = {Querying Trajectories through Model Checking based on Timed Automata}, pages = {}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/SVMM-sbbd2012.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/SVMM-sbbd2012.pdf}, abstract = {The popularization of geographical position devices (e.g.~GPS) creates new opportunities for analyzing behavior of moving objects. However, such analysis are hindered by a lack of semantic information associated to the basic information provided by~GPS. Previous works propose semantic enrichment of trajectories. Through the semantic enrichment, we~could check which trajectories have a given moving sequence in an application. Often, this~sequence is expressed according to the semantic application, using the approach of semantic trajectories proposed in the literature. This~trajectory can be represented as a sequence of predicates that holds in some time interval. However, the solutions for querying moving sequence proposed by previous works have a high computational cost. In~this paper, we~propose an expressive query language to semantic trajectories that allows temporal constraints. To~evaluate a query we will use model checking based on timed automata, that can be performed in polynomial time. As~this model checking algorithm is not implemented yet, we propose to use UPPAAL tool, that can be more expensive theoretically, but we expected that will be ecient for our approach. In addition, we will present a query example that demonstrates the expressive power of our language. Although in this paper we will focus on semantic trajectories data, our approach is general enough for being applied to other purposes.} }
@incollection{CD-nato12, author = {Comon{-}Lundh, Hubert and Delaune, St{\'e}phanie}, title = {Formal Security Proofs}, booktitle = {Software Safety and Security}, pages = {26-63}, editor = {Nipkow, Tobias and Grumberg, Orna and Hauptmann, Benedikt}, series = {NATO Science for Peace and Security Series~-- D:~Information and Communication Security}, volume = {33}, publisher = {{IOS} Press}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-nato12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CD-nato12.pdf}, year = 2012, month = may }
@inproceedings{CLHKS-ispec12, address = {Hangzhou, China}, year = 2012, month = apr, volume = 7232, series = {Lecture Notes in Computer Science}, publisher = {Springer}, editor = {Ryan, Mark D. and Smyth, Ben and Wang, Guilin}, acronym = {{ISPEC}'12}, booktitle = {{P}roceedings of the 8th {I}nternational {C}onference on {I}nformation {S}ecurity {P}ractice and {E}xperience ({ISPEC}'12)}, author = {Comon{-}Lundh, Hubert and Hagiya, Masami and Kawamoto, Yusuke and Sakurada, Hideki}, title = {Computational Soundness of Indistinguishability Properties without Computable Parsing}, pages = {63-79}, url = {http://www.lsv.fr/Publis/PAPERS/PDF/CHKS-ispec12.pdf}, pdf = {http://www.lsv.fr/Publis/PAPERS/PDF/CHKS-ispec12.pdf}, doi = {10.1007/978-3-642-29101-2_5}, abstract = {We provide a symbolic model for protocols using public-key encryption and hash function, and prove that this model is computationally sound: if there is an attack in the computational world, then there is an attack in the symbolic (abstract) model. Our original contribution is that we deal with the security properties, such as anonymity, which cannot be described using a single execution trace, while considering an unbounded number of sessions of the protocols in the presence of active and adaptive adversaries. Our soundness proof is different from all existing studies in that it does not require a computable parsing function from bit strings to terms. This allows us to deal with more cryptographic primitives, such as a preimage-resistant and collision-resistant hash function whose input may have different lengths.} }
@comment{{B-arxiv16, author = Bollig, Benedikt, affiliation = aff-LSVmexico, title = One-Counter Automata with Counter Visibility, institution = Computing Research Repository, number = 1602.05940, month = feb, nmonth = 2, year = 2016, type = RR, axeLSV = mexico, NOcontrat = "", url = http://arxiv.org/abs/1602.05940, PDF = "http://www.lsv.fr/Publis/PAPERS/PDF/B-arxiv16.pdf", lsvdate-new = 20160222, lsvdate-upd = 20160222, lsvdate-pub = 20160222, lsv-category = "rapl", wwwpublic = "public and ccsb", note = 18~pages, abstract = "In a one-counter automaton (OCA), one can read a letter from some finite alphabet, increment and decrement the counter by one, or test it for zero. It is well-known that universality and language inclusion for OCAs are undecidable. We consider here OCAs with counter visibility: Whenever the automaton produces a letter, it outputs the current counter value along with~it. Hence, its language is now a set of words over an infinite alphabet. We show that universality and inclusion for that model are in PSPACE, thus no harder than the corresponding problems for finite automata, which can actually be considered as a special case. In fact, we show that OCAs with counter visibility are effectively determinizable and closed under all boolean operations. As~a~strict generalization, we subsequently extend our model by registers. The general nonemptiness problem being undecidable, we impose a bound on the number of register comparisons and show that the corresponding nonemptiness problem is NP-complete.", }}
@misc{AG:anr-cpp12, author = {Adj{\'e}, Assal{\'e} and Goubault-Larrecq, Jean}, howpublished = {Fourniture du projet ANR CPP (Confidence, Proofs, and Probabilities), WP 2, version 1}, month = oct, title = {Concrete semantics of programs with non-deterministic and random inputs}, year = {2012}, url = {http://arxiv.org/abs/1210.2605} }
This file was generated by bibtex2html 1.98.