Stavros Tripakis’s research while affiliated with Northeastern University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (195)


Accelerating Protocol Synthesis and Detecting Unrealizability with Interpretation Reduction
  • Preprint
  • File available

January 2025

Derek Egolf

·

Stavros Tripakis

We present a novel counterexample-guided, sketch-based method for the synthesis of symbolic distributed protocols in TLA+. Our method's chief novelty lies in a new search space reduction technique called interpretation reduction, which allows to not only eliminate incorrect candidate protocols before they are sent to the verifier, but also to avoid enumerating redundant candidates in the first place. Further performance improvements are achieved by an advanced technique for exact generalization of counterexamples. Experiments on a set of established benchmarks show that our tool is almost always faster than the state of the art, often by orders of magnitude, and was also able to synthesize an entire TLA+ protocol "from scratch" in less than 3 minutes where the state of the art timed out after an hour. Our method is sound, complete, and guaranteed to terminate on unrealizable synthesis instances under common assumptions which hold in all our benchmarks.

Download


Decoupled Fitness Criteria for Reactive Systems

October 2023

·

10 Reads

·

2 Citations

Lecture Notes in Computer Science

The correctness problem for reactive systems has been thoroughly explored and is well understood. Meanwhile, the efficiency problem for reactive systems has not received the same attention. Indeed, one correct system may be less fit than another correct system and determining this manually is challenging and often done ad hoc. We (1) propose a novel and general framework which automatically assigns comparable fitness scores to reactive systems using interpretable parameters that are decoupled from the system being evaluated, (2) state the computational problem of evaluating this fitness score and reduce this problem to a matrix analysis problem, (3) discuss symbolic and numerical methods for solving this matrix analysis problem, and (4) illustrate our approach by evaluating the fitness of nine systems across three case studies, including the Alternating Bit Protocol and Two Phase Commit.


Synthesis of Distributed Protocols by Enumeration Modulo Isomorphisms

October 2023

·

2 Citations

Lecture Notes in Computer Science

Synthesis of distributed protocols is a hard, often undecidable, problem. Completion techniques provide partial remedy by turning the problem into a search problem. However, the space of candidate completions is still massive. In this paper, we propose optimization techniques to reduce the size of the search space by a factorial factor by exploiting symmetries (isomorphisms) in functionally equivalent solutions. We present both a theoretical analysis of this optimization as well as empirical results that demonstrate its effectiveness in synthesizing both the Alternating Bit Protocol and Two Phase Commit. Our experiments show that the optimized tool achieves a speedup of approximately 2 to 10 times compared to its unoptimized counterpart.


Compute-tolerance.
compute-invariance-tolerance.
Motivating example of a surveillance scenario
LTSs of the surveillance scenario
Tolerable perturbations

+4

On tolerance of discrete systems with respect to transition perturbations

October 2023

·

45 Reads

·

7 Citations

Discrete Event Dynamic Systems

Control systems should enforce a desired property for both expected/modeled situations as well as unexpected/unmodeled environmental situations. Existing methods focus on designing controllers to enforce the desired property only when the environment behaves as expected. However, these methods lack discussion on how the system behaves when the environment is perturbed. In this paper, we propose an approach for analyzing discrete-state control systems with respect to their tolerance against environmental perturbations. We formally define this notion of tolerance and describe a general technique to compute it, for any given regular property. We also present a more efficient method to compute tolerance with respect to invariance properties. Moreover, we show that there exists an inherent trade-off between permissiveness and tolerance that we capture via Pareto optimality conditions. We also study the problem of synthesizing Pareto optimal controllers that achieve a minimum level of tolerance and permissiveness. We demonstrate our framework on examples involving surveillance protocols and robotic motion planning.


Counterexample classification

Software and Systems Modeling

In model checking, when a model fails to satisfy the desired specification, a typical model checker provides a counterexample that illustrates how the violation occurs. In general, there exist many diverse counterexamples that exhibit distinct violating behaviors, which the user may wish to examine before deciding how to repair the model. Unfortunately, (1) the number of counterexamples may be too large to enumerate one by one, and (2) many of these counterexamples are redundant, in that they describe the same type of violating behavior. In this paper, we propose a technique called counterexample classification. The goal of classification is to cover the space of all counterexamples into a finite set of counterexample classes, each of which describes a distinct type of violating behavior for the given specification. These classes are then presented as a summary of possible violating behaviors in the system, freeing the user from manually having to inspect or analyze numerous counterexamples to extract the same information. We have implemented a prototype of our technique on top of an existing formal modeling and verification tool, the Alloy Analyzer, and evaluated the effectiveness of the technique on case studies involving the well-known Needham–Schroeder and TCP protocols with promising results.


Safe Environmental Envelopes of Discrete Systems

July 2023

·

179 Reads

·

3 Citations

Lecture Notes in Computer Science

·

Ian Dardik

·

·

[...]

·

Stavros Tripakis

A safety verification task involves verifying a system against a desired safety property under certain assumptions about the environment. However, these environmental assumptions may occasionally be violated due to modeling errors or faults. Ideally, the system guarantees its critical properties even under some of these violations, i.e., the system is robust against environmental deviations. This paper proposes a notion of robustness as an explicit, first-class property of a transition system that captures how robust it is against possible deviations in the environment. We modeled deviations as a set of transitions that may be added to the original environment. Our robustness notion then describes the safety envelope of this system, i.e., it captures all sets of extra environment transitions for which the system still guarantees a desired property. We show that being able to explicitly reason about robustness enables new types of system analysis and design tasks beyond the common verification problem stated above. We demonstrate the application of our framework on case studies involving a radiation therapy interface, an electronic voting machine, a fare collection protocol, and a medical pump device.


Fig. 9. A completed database manager; i ∈ {1, 2}. If a state has an outgoing transition with a label ending in ? for some label, it implicitly has a self-loop on all missing labels from the set {xi?, gd i ?, bdi?, abi?, cmi?}.
Synthesis of Distributed Protocols by Enumeration Modulo Isomorphisms

June 2023

·

11 Reads

Synthesis of distributed protocols is a hard, often undecidable, problem. Completion techniques provide partial remedy by turning the problem into a search problem. However, the space of candidate completions is still massive. In this paper, we propose optimization techniques to reduce the size of the search space by a factorial factor by exploiting symmetries (isomorphisms) in functionally equivalent solutions. We present both a theoretical analysis of this optimization as well as empirical results that demonstrate its effectiveness in synthesizing both the Alternating Bit Protocol and Two Phase Commit. Our experiments show that the optimized tool achieves a speedup of approximately 2 to 10 times compared to its unoptimized counterpart.


Safe Environmental Envelopes of Discrete Systems

June 2023

·

43 Reads

A safety verification task involves verifying a system against a desired safety property under certain assumptions about the environment. However, these environmental assumptions may occasionally be violated due to modeling errors or faults. Ideally, the system guarantees its critical properties even under some of these violations, i.e., the system is \emph{robust} against environmental deviations. This paper proposes a notion of \emph{robustness} as an explicit, first-class property of a transition system that captures how robust it is against possible \emph{deviations} in the environment. We modeled deviations as a set of \emph{transitions} that may be added to the original environment. Our robustness notion then describes the safety envelope of this system, i.e., it captures all sets of extra environment transitions for which the system still guarantees a desired property. We show that being able to explicitly reason about robustness enables new types of system analysis and design tasks beyond the common verification problem stated above. We demonstrate the application of our framework on case studies involving a radiation therapy interface, an electronic voting machine, a fare collection protocol, and a medical pump device.


Fig. 1: A simple communication protocol modeled with finite LTSs.
Fig. 4: Partial unfolding of the automaton of Fig. 3 into a tree up to depth 4. The column labeled n denotes the number of transitions taken.
Fig. 5: The DFA representations of f 1 and f 2 .
Decoupled Fitness Criteria for Reactive Systems

December 2022

·

19 Reads

The correctness problem for reactive systems has been thoroughly explored and is well understood. Meanwhile, the efficiency problem for reactive systems has not received the same attention. Indeed, one correct system may be less fit than another correct system. We propose a novel and highly general framework which assigns comparable fitness scores to reactive systems. We intentionally decouple the parameters of the framework from the systems to be measured. This decoupling makes the fitness scores more interpretable. It also places a smaller burden on the user than some existing frameworks, which would otherwise require the user to manually annotate systems with numerical values in one way or another. We state the computational problem of evaluating a system with respect to some instances of this framework and propose a method for computing fitness scores of finite labeled transition systems. Finally, we illustrate our approach by measuring and comparing two versions of a simple communication protocol as well as four versions of the well-known Alternating Bit Protocol.


Citations (74)


... For instance, suppose both M 1 and M 2 are (functionally) correct solutions. We may want to evaluate M 1 and M 2 also for efficiency (perhaps using a separate method) [9]. In general, we may want to synthesize (and then evaluate w.r.t. ...

Reference:

Synthesis of Distributed Protocols by Enumeration Modulo Isomorphisms
Decoupled Fitness Criteria for Reactive Systems
  • Citing Chapter
  • October 2023

Lecture Notes in Computer Science

... I.e., Scythe only terminated in cases where the unrealizability was particularly easy to detect. 8 Related Work [2,5,13,15,16] study synthesis of explicit-state machines. TRANSIT [41] requires a human in the loop to handle counterexamples. ...

Synthesis of Distributed Protocols by Enumeration Modulo Isomorphisms
  • Citing Chapter
  • October 2023

Lecture Notes in Computer Science

... However, when the behavior of the agent deviates from the nominal model, the safety guarantee may no longer hold, or the performance may change significantly. Therefore, it is crucial to investigate the robustness of the synthesized controller Majumdar et al. (2011), Rungger and Tabuada (2015), Meira-Góes et al. (2023), Zhang et al. (2023). For instance, the robust semantics of STL has provided a useful way to quantify the robustness of satisfaction when spatial values change. ...

On tolerance of discrete systems with respect to transition perturbations

Discrete Event Dynamic Systems

... Sementara itu, penggunaan gadget pada anak dengan pola asuh permisif cenderung mengabaikan, memanjakan, kurangnya bimbingan dan pengawasan sehingga anak tidak memiliki batasan dan waktu yang digunakan dalam penggunaan gadget pada anak menjadi lebih panjang [29]. Pembatasan durasi penggunaan gadget memiliki keterkaitan dengan pola asuh antara permisif dengan yang lain termasuk kesepakatan anak dan orang tua [30]. ...

On synthesizing tolerable and permissive controllers for labeled transition systems
  • Citing Article
  • October 2022

IFAC-PapersOnLine

... Serial and parallel compositional approaches for multiple untimed properties Indeed, there exist works and research efforts dedicated to compositionally enforce multiple untimed properties through RE techniques. [16,20] delve into RE framework, focusing on untimed properties, 2 It can be computationally expensive because as we combine newer and newer properties with older properties, state space explodes. Computation overhead increases with an increase in the number of states. ...

Compositional runtime enforcement revisited

Formal Methods in System Design

... Known applications of equivalence verification are verification after retraining or pruning [41], student-teacher training [25,36], analysis of sensitivity to NN-based preprocessing steps [29] and construction of quantized NNs [27]. Several publications [15,20,25,30,31,36,41] have proposed methods for the verification of equivalence properties (sometimes calling it "approximate conformance"). While it is known that equivalence verification w.r.t. the ε equivalence (Definition 2) property is coNP-complete [36], the complexity-theoretic status of Top-1 equivalence verification (Definition 3) was to date unclear. ...

On Neural Network Equivalence Checking Using SMT Solvers

Lecture Notes in Computer Science

... We chose TLA + for several reasons. TLA + has been successfully utilized to verify the design of a number of production distributed systems [7,68,79,83,90]. Most notably for us, TLA + has been used to describe both consistency guarantees [22,26,84], and distributed consensus protocols, namely Paxos [46,85] and Raft [73]. ...

Formal verification of a distributed dynamic reconfiguration protocol
  • Citing Conference Paper
  • January 2022

... Also, KORG outputs many identical or similar candidates, but we would prefer a diversity of candidate attackers so that if some are not confirmed, perhaps others will be. The problem of determining when two candidate attackers are similar reduces to defining an equivalence relation on counterexamples, as studied in [64]. Perhaps such work could be leveraged to quotient KORG's search-space by the equivalence class of the candidates it already found, resulting in a diversity of attackers. ...

Counterexample Classification
  • Citing Chapter
  • December 2021

Lecture Notes in Computer Science