With the advance of SAT solvers, transforming a software program to a propositional formula has generated much interest for bounded model checking of software in recent years. However, reasoning at the Boolean level often may not be able to identify some key relations among the original high-level program variables. In this paper, we propose a novel framework that uses simulation-directed data mining in the original program to extract a set of high-level potential property invariants according to the dynamic execution data of the software. When these learned invariants are added as constraints to the bounded model checking instances of the software, they help to significantly reduce the search space. The simulation-directed invariant mining...
This paper presents novel language and analysis techniques that significantly speed up software mode...
Checking safety properties is mandatory in the validation process of critical software. When formal ...
Systematic State Exploration or Model Checking techniques have been used for years to check the mode...
Software library documentation often describes individual meth-ods ’ APIs, but not the intended prot...
Software library documentation often describes individual meth-ods ’ APIs, but not the intended prot...
To ensure that the design of a hardware system or protocol works according to specification, either ...
Although the program verification community has developed several techniques for analyzing software ...
Abstract. Modeling and analysis techniques are presented for real-time, safety-critical software. So...
Program verification is a promising approach to improving program quality, because it can search all...
Bounded model checking (BMC) is a vital technique to find property violations in programs. BMC can q...
This paper presents novel language and analysis techniques that significantly speed up software mode...
A pre-condition for any verification technique based on simulation is the generation of a high-quali...
An established approach to software verification is SAT-based bounded model checking where a state s...
Abstract. We describe the design and implementation of an automatic invariant generator for imperati...
C bounded model checking (cbmc) has proved to be a successful approach to automatic software analysi...
This paper presents novel language and analysis techniques that significantly speed up software mode...
Checking safety properties is mandatory in the validation process of critical software. When formal ...
Systematic State Exploration or Model Checking techniques have been used for years to check the mode...
Software library documentation often describes individual meth-ods ’ APIs, but not the intended prot...
Software library documentation often describes individual meth-ods ’ APIs, but not the intended prot...
To ensure that the design of a hardware system or protocol works according to specification, either ...
Although the program verification community has developed several techniques for analyzing software ...
Abstract. Modeling and analysis techniques are presented for real-time, safety-critical software. So...
Program verification is a promising approach to improving program quality, because it can search all...
Bounded model checking (BMC) is a vital technique to find property violations in programs. BMC can q...
This paper presents novel language and analysis techniques that significantly speed up software mode...
A pre-condition for any verification technique based on simulation is the generation of a high-quali...
An established approach to software verification is SAT-based bounded model checking where a state s...
Abstract. We describe the design and implementation of an automatic invariant generator for imperati...
C bounded model checking (cbmc) has proved to be a successful approach to automatic software analysi...
This paper presents novel language and analysis techniques that significantly speed up software mode...
Checking safety properties is mandatory in the validation process of critical software. When formal ...
Systematic State Exploration or Model Checking techniques have been used for years to check the mode...