Research on how to reason about correctness properties of software systems using model checking is advancing rapidly. Work on extracting finite-state models from program source code and on abstracting the those models is focused on enabling the tractable checking of program properties such as freedom from deadlock and assertion violations. For the most part, the problem of specifying more general program properties has not been considered. In this paper, we report on the support for specifying properties of dynamic multi-threaded Java programs that we have built into the Bandera system. Bandera extracts finite-state models, in the input format of several existing model checkers, from Java code based on the property to be checked. The...
Formal veri cation of a hierarchical component application involves (i) checking of behavior complia...
Abstract. Framing in the presence of data abstraction is a challenging and important problem in the ...
Abstract. Many safety- and security-critical systems are real-time systems and, as a result, tools a...
Finite-state verification techniques, such as model checking, have shown promise as a cost-effective...
International audienceOne approach to model checking program source code is to view a model checker ...
The majority of work carried out in the formal methods community throughout the last three decades h...
Software specifications describe how code is suppose to behave. Software model checking and related ...
Although there exist several software model checkers that check the code against properties specifie...
Program verification is a technique for proving that a program satisfies its specification. An impor...
Abstract. Systematic state-space exploration is a powerful technique for verication of concurrent so...
Although there exist several software model checkers that check the code against properties specifie...
Behavioural models are a valuable tool for software verification, testing, monitoring, publishing et...
One of the big performance problems of software model checking is the state-explosion problem. Vario...
Framing in the presence of data abstraction is a challenging and important problem in the verificati...
To analyze an open system, one needs to close it with a definition of its environment, i.e., its exe...
Formal veri cation of a hierarchical component application involves (i) checking of behavior complia...
Abstract. Framing in the presence of data abstraction is a challenging and important problem in the ...
Abstract. Many safety- and security-critical systems are real-time systems and, as a result, tools a...
Finite-state verification techniques, such as model checking, have shown promise as a cost-effective...
International audienceOne approach to model checking program source code is to view a model checker ...
The majority of work carried out in the formal methods community throughout the last three decades h...
Software specifications describe how code is suppose to behave. Software model checking and related ...
Although there exist several software model checkers that check the code against properties specifie...
Program verification is a technique for proving that a program satisfies its specification. An impor...
Abstract. Systematic state-space exploration is a powerful technique for verication of concurrent so...
Although there exist several software model checkers that check the code against properties specifie...
Behavioural models are a valuable tool for software verification, testing, monitoring, publishing et...
One of the big performance problems of software model checking is the state-explosion problem. Vario...
Framing in the presence of data abstraction is a challenging and important problem in the verificati...
To analyze an open system, one needs to close it with a definition of its environment, i.e., its exe...
Formal veri cation of a hierarchical component application involves (i) checking of behavior complia...
Abstract. Framing in the presence of data abstraction is a challenging and important problem in the ...
Abstract. Many safety- and security-critical systems are real-time systems and, as a result, tools a...