Information Technology Reference
In-Depth Information
selection
. Later, Goubault-Larrecq and Parrennes [8] applied
H
1
Horn clauses for ana-
lyzing implementations of cryptographic protocols in C.
In order to extend the class
H
1
, Nielsen et al. [11] introduced the
Iterative Special-
ization Schema
. The idea is to approximate a finite set of arbitrary Horn clauses by
means of
H
1
Horn clauses to detect components of predicates which are
finite
.This
information then is exploited to obtain an equivalent, but hopefully syntactically sim-
pler set of Horn clauses via
instantiation
. Using these techniques, Nielsen et al. [11]
successfully validated the non-trivial Yahalom protocol for key-distribution.
In the present paper, we extend
H
1
into another direction. We consider arbitrary
linear
Horn clauses and present a normalization semi-procedure for computing least
models of finite sets of linear Horn clauses. Our normalization semi-procedure is a
simplification of the procedure of Nielson et al. [12], since no pre-computations are
necessary. It destructs complex heads on the fly. Moreover, it is a direct and strict ex-
tension: It always terminates on finite sets of
H
1
Horn clauses in at most exponentially
many steps. Although satisfiability for finite sets of linear Horn clauses is undecid-
able [6], our semi-procedure at least terminates for certain meaningful subclasses of
the class of all finite sets of linear Horn clauses. One meaningful example, where the
semi-procedure terminates after at most exponentially many steps, are the finite sets of
linear Horn clauses that can be used for encoding a backward reachability analysis for
constrained dynamic pushdown networks
(see Bouajjani et al. [3]). This application in
particular demonstrates that potential applications are not restricted to the analysis of
cryptographic protocols.
Outline.
The present paper is organized as follows: We present our technical contri-
bution — the normalization semi-procedure for finite sets of linear Horn clauses — in
section 2. In section 3, we introduce an application which is not related to the analy-
sis of cryptographic protocols, namely, backward reachability for constrained dynamic
pushdown networks. We conclude in section 4. Omitted proofs can be found in the
corresponding technical report.
2
Normalization of Finite Sets of Linear Horn Clauses
2.1
Basics
For a set
Σ
of ranked function symbols and a set
of variables,
T
(
Σ,X
) denotes the
set of terms built up from symbols in
Σ
and variables in
X
X
. We assume that there are
k
-ary function symbols
k
for all
k
∅
) is also denoted by
T
(
Σ
) and contains all ground terms, i.e. all terms without variables. We denote function
symbols in the following by
f
,
g
and
h
, nullary function symbols (also called
constants
)
by
a
,
b
and
c
, variables by
x
,
y
and
z
, and finally terms by
s
,
t
and
u
.
Positions
in terms
are defined as usual as sequences of strictly positive integers. For a term
t
,
t
∈
N
\{
1
}
in
Σ
.Theset
T
(
Σ,
|
l
is the
subterm of
t
at position
l
,and
t
[
s
]
l
the result of replacing that subterm by
s
.Given
aset
P
of unary predicate symbols we are able to build
atoms
. For a unary predicate
P
X
),
P
(
t
) is called an
atom
. In order to simplify nota-
tions, we also denote the atom
P
(
k
(
t
1
,...,t
k
)) by
P
(
t
1
,...,t
k
) for all
k
∈
P
and a term
t
∈
T
(
Σ,
.
We identify the pair (
P,
k
) with the
k
-ary predicate
P
.
Substitutions
are functions
∈
N
\{
1
}
Search WWH ::
Custom Search