VCC is a verification environment for software written in C. VCC takes a program (annotated with function contracts, state assertions, and type invariants) and attempts to prove that these annotations are cor-rect, i.e. that they hold for every possible program execution. The en-vironment includes tools for monitoring proof attempts and constructing 1 partial counterexample executions for failed proofs. VCC handles fine-grained concurrency and low-level C features, and has been used to verify the functional correctness of tens of thousands of lines of commercial con-current system code. This tutorial describes how to use VCC to verify C code. It covers the annotation language, the verification methodology, and the use of VCC itself.
International audienceFrama-C1 is an extensible platform dedicated to source-code analysis of C soft...
Security protocols, such as TLS or Kerberos, and security devices such as the Trusted Platform Modul...
We describe how to verify security properties of C code for cryptographic protocols by using a gener...
Title: Analysis of a File System Using the Verifying C Compiler Author: Bc. David Škorvaga Departmen...
We present an approach for automatically generating provably correct abstractions from C source code...
this paper we describe an Assertion Checking Environment (ACE) for compositional verification of pro...
Compilers, and especially optimizing compilers, are complicated programs. Bugs in compilers happen, ...
Abstract. In this paper, we present our approach on testing a particular veri-fication system that i...
International audienceNumerical programs may require a high level of guarantee. This can be achieved...
Abstract. In this paper, we present our approach on testing a particular veri-fication system that i...
Unlike testing, formal verification can not only prove the presence of errors, but their absence as ...
Abstract The Verified Software Toolchain builds foundational machine-checked proofs o...
This document presents a process to verify C programs or librairies using the Frama-C verification t...
Most current approaches to software verification are one-sided -- a safety prover will try to prove ...
In our increasingly computer-oriented society, the computer programs we rely on tend to increase in ...
International audienceFrama-C1 is an extensible platform dedicated to source-code analysis of C soft...
Security protocols, such as TLS or Kerberos, and security devices such as the Trusted Platform Modul...
We describe how to verify security properties of C code for cryptographic protocols by using a gener...
Title: Analysis of a File System Using the Verifying C Compiler Author: Bc. David Škorvaga Departmen...
We present an approach for automatically generating provably correct abstractions from C source code...
this paper we describe an Assertion Checking Environment (ACE) for compositional verification of pro...
Compilers, and especially optimizing compilers, are complicated programs. Bugs in compilers happen, ...
Abstract. In this paper, we present our approach on testing a particular veri-fication system that i...
International audienceNumerical programs may require a high level of guarantee. This can be achieved...
Abstract. In this paper, we present our approach on testing a particular veri-fication system that i...
Unlike testing, formal verification can not only prove the presence of errors, but their absence as ...
Abstract The Verified Software Toolchain builds foundational machine-checked proofs o...
This document presents a process to verify C programs or librairies using the Frama-C verification t...
Most current approaches to software verification are one-sided -- a safety prover will try to prove ...
In our increasingly computer-oriented society, the computer programs we rely on tend to increase in ...
International audienceFrama-C1 is an extensible platform dedicated to source-code analysis of C soft...
Security protocols, such as TLS or Kerberos, and security devices such as the Trusted Platform Modul...
We describe how to verify security properties of C code for cryptographic protocols by using a gener...