Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Reng Zeng is active.

Publication


Featured researches published by Reng Zeng.


international colloquium on theoretical aspects of computing | 2010

Analyzing a formal specification of Mondex using model checking

Reng Zeng; Xudong He

Mondex, an electronic purse, is the first pilot project of the software verification Grand Challenge to establish the correctness of software. Several research groups around the world have applied different formal methods in specifying and analyzing the Mondex since 2006. In this paper, we present a method to analyze the Sam specification of Mondex using model checking. Our specification uses Sam that integrates high level Petri nets and temporal logic. Our analysis method translates the SAM Mondex specification into a behavior preserving PROMELA program and uses SPIN to model check the resulting PROMELA program. Our results and experiences are discussed, which contributes to the world wide effort in developing a verified software repository.


international workshop on model checking software | 2012

McPatom: a predictive analysis tool for atomicity violation using model checking

Reng Zeng; Zhuo Sun; Su Liu; Xudong He

Multi-thread programs are prone to bugs due to concurrency. Concurrency bugs are hard to find and reproduce because of the large number of interleavings. Most non-deadlock concurrency bugs are atomicity violation bugs due to unprotected accesses of shared variables by multiple threads. This paper presents a dynamic prediction tool named McPatom for predicting atomicity violation bugs involving a pair of threads accessing a shared variable using model checking. McPatom uses model checking to ensure the completeness in predicting any possible atomicity violation captured in the abstract thread model extracted from an interleaved execution. McPatom can predict atomicity violations involving more than three accesses and multiple subroutines, and supports all synchronization primitives. We have applied McPatom in predicting several known bugs in real world systems including one that evades several other existing tools. We provide evaluations of McPatom in terms of atomicity violation predictability and performance with additional improvement strategies.


service oriented software engineering | 2008

A Formal Specification of Mondex Using SAM

Reng Zeng; Jianling Liu; Xudong He

This paper presents a formal specification of Mondex, an electronic purse, using SAM. Mondex is the first pilot project for the 6th Grand Challenge to develop an integrated, automated toolset that developers can use to establish the correctness of software. Several research groups around the world have applied different formal methods in specifying and analyzing the Mondex smart card since 2006. Our specification is unique, which uses a software architecture model integrating high level Petri nets and temporal logic; thus contributes to the world wide effort in tackling one of the grand challenges in computer sciences.


international conference on formal engineering methods | 2014

Bounded Model Checking High Level Petri Nets in PIPE+Verifier

Su Liu; Reng Zeng; Zhuo Sun; Xudong He

High level Petri nets (HLPNs) have been widely applied to model concurrent and distributed systems in computer science and many other engineering disciplines. However, due to the expressive power of HLPNs, they are more difficult to analyze. Exhaustive analysis methods such as traditional model checking based on fixed point calculation of state space may not work for HLPNs due to the state explosion problem. Bounded model checking (BMC) using satisfiability solvers is a promising analysis method that can handle a much larger state space than traditional model checking method. In this paper, we present an analysis method for HLPNs by leveraging the BMC technique with a state-of-the-art satisfiability modulo theories (SMT) solver Z3. A HLPN model and some safety properties are translated into a first order logic formula that is checked by Z3. This analysis method has been implemented in a tool called PIPE+Verifier and is completely automatic. We show our results of applying PIPE+Verifier to several models from the Model Checking Contest @ Petri Nets and a few other sources.


theoretical aspects of software engineering | 2016

A Term Rewriting Approach to Analyze High Level Petri Nets

Xudong He; Reng Zeng; Su Liu; Zhuo Sun; Kyungmin Bae

High level Petri nets (HLPNs) have been widely applied to model concurrent and distributed systems in computer science and many other engineering disciplines. However, due to the expressive power of HLPNs, they are difficult to analyze. In recent years, a variety of new analysis techniques based on model checking have been proposed to analyze high level Petri nets in addition to the traditional analysis techniques such as simulation and reachability (coverability) tree. These new analysis techniques include (1) developing tailored model checkers for particular types of HLPNs or (2) leveraging existing general model checkers through model translation where a HLPN is transformed into an equivalent form suitable for the target model checker. In this paper, we present a term rewriting approach to analyze a particular type of HLPNs -- predicate transition nets (PrT nets). Our approach is completely automatic and implemented in our tool environment, where the frontend is PIPE+, a general graphical editor for creating PrT net models, and the backend is Maude, a well-known term rewriting system. We have applied our approach to the Mondex system -- the 1st pilot project of verified software repository in the worldwide software verification grand challenge, and several well-known problems used in the annual model checking contest of Petri net tools. Our initial experimental results are encouraging and demonstrate the usefulness of the approach.


tools and algorithms for construction and analysis of systems | 2015

A Method for Improving the Precision and Coverage of Atomicity Violation Predictions

Reng Zeng; Zhuo Sun; Su Liu; Xudong He

Atomicity violations are the most common non-deadlock concurrency bugs, which have been extensively studied in recent years. Since detecting the actual occurrences of atomicity violations is extremely hard and exhaustive testing of a multi-threaded program is in general impossible, many predictive methods have been proposed, which make error predictions based on a small number of instrumented interleaved executions. Predictive methods often make tradeoffs between precision and coverage. An over-approximate predictive method ensures coverage but lacks precision and thus may report a large number of false bugs. An under-approximate predictive method ensures precision but lacks coverage and thus can miss significant real bugs. This paper presents a post-prediction analysis method for improving the precision of the prediction results obtained through over-approximation while achieving better coverage than that obtained through under-approximation. Our method analyzes and filters the prediction results of over-approximation by evaluating a subset of read-after-write relationships without enforcing all of them as in existing under-approximation methods. Our post-prediction method is a static analysis method on the predicted traces from dynamic instrumentation of C/C++ executable, and is faster than dynamic replaying methods for ensuring precision.


software engineering and knowledge engineering | 2011

An Empirical Study on Classification of Non-Functional Requirements.

Su Liu; Reng Zeng; Xudong He


software engineering and knowledge engineering | 2011

PIPE+ - A Modeling Tool for High Level Petri Nets.

Su Liu; Reng Zeng; Xudong He


world congress on services | 2011

A Method to Mine Workflows from Provenance for Assisting Scientific Workflow Composition

Reng Zeng; Xudong He; W.M.P. van der Aalst


software engineering and knowledge engineering | 2012

SAMAT - A Tool for Software Architecture Modeling and Analysis.

Su Liu; Reng Zeng; Zhuo Sun; Xudong He

Collaboration


Dive into the Reng Zeng's collaboration.

Top Co-Authors

Avatar

Xudong He

Florida International University

View shared research outputs
Top Co-Authors

Avatar

Su Liu

Florida International University

View shared research outputs
Top Co-Authors

Avatar

Zhuo Sun

Florida International University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Peter J. Clarke

Florida International University

View shared research outputs
Top Co-Authors

Avatar

W.M.P. van der Aalst

Eindhoven University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge