You’ll acquire the theoretical knowledge and practical skills to utilize symbolic model checking for ensuring the reliability and accuracy of your systems
This training dives into the world of symbolic model checking, a powerful technique for automatically verifying the correctness of software systems and hardware designs. Here’s what you will learn:
Foundations of Automated Reasoning: Grasp the core concepts behind automated reasoning, a field dedicated to using logic and algorithms to prove properties about systems.
Modeling Systems: Explore techniques for creating formal models that capture the behavior and functionality of a system under scrutiny. This could involve using state machines, transition systems, or other formalisms.
Symbolic Representation: Learn how to represent sets of states and properties symbolically using techniques like Binary Decision Diagrams (BDDs). This allows for efficient manipulation of large state spaces encountered in complex systems.
Formal Specification Languages: Get familiar with languages like CTL (Computation Tree Logic) for expressing properties you want to verify about your system model. These properties can encompass safety (no bad states) or liveness (desired events will eventually happen).
Model Checking Techniques: Understand the core algorithms used in symbolic model checking. This might involve exploring symbolic search methods and techniques for efficiently checking if a system model satisfies the desired properties.
Case Studies and Applications: The training likely incorporates examples of applying symbolic model checking to real-world problems. This could involve verifying properties of communication protocols, embedded systems, or even security protocols.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behaviour or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.