Loop under-approximation enriches C programs with additional branches that represent the effect of a (limited) range of loop iterations. While this technique can speed up bug detection significantly, it introduces redundant execution traces which may complicate the verification of the program. This holds particularly true for tools based on Bounded Model Checking, which incorporate simplistic heuristics to determine whether all feasible iterations of a loop have been considered. We present a technique that uses trace automata to eliminate redundant executions after performing loop acceleration. The method reduces the diameter of the program under analysis, which is in certain cases sufficient to allow a safety proof using Bounded Model Che...
Abstract. A main idea underlying bounded model checking is to limit the length of the potential coun...
Static analysers search for overapproximating proofs of safety commonly known as safety invariants. ...
Abstract. We aim at checking safety and temporal properties over models repre-senting the behavior o...
Abstract. Loop under-approximation enriches C programs with addi-tional branches that represent the ...
Most current approaches to software verification are one-sided -- a safety prover will try to prove ...
Many software model checkers only detect counterexamples with deep loops after exploring numerous sp...
Abstract. Many software model checkers only detect counterexamples with deep loops after exploring n...
Context-bounded model checking has been used successfully to verify safety properties in multi-threa...
The first attempts to apply the k-induction method to software verification are only recent. In this...
In classical automata-theoretic model checking of safety properties [6], a system model generates a ...
In classical automata-theoretic model checking of safety properties [6], a system model generates a ...
Empirical thesis.Bibliography: pages 61-63.1. Introduction -- 2. Background and related work -- 3. F...
International audienceThreshold automata, and the counter systems they define, were introduced as a ...
We check statically whether it is safe for untrusted foreign machine code to be loaded into a truste...
This work is about proving safety properties on programs. Such proof can be done by showing that "fo...
Abstract. A main idea underlying bounded model checking is to limit the length of the potential coun...
Static analysers search for overapproximating proofs of safety commonly known as safety invariants. ...
Abstract. We aim at checking safety and temporal properties over models repre-senting the behavior o...
Abstract. Loop under-approximation enriches C programs with addi-tional branches that represent the ...
Most current approaches to software verification are one-sided -- a safety prover will try to prove ...
Many software model checkers only detect counterexamples with deep loops after exploring numerous sp...
Abstract. Many software model checkers only detect counterexamples with deep loops after exploring n...
Context-bounded model checking has been used successfully to verify safety properties in multi-threa...
The first attempts to apply the k-induction method to software verification are only recent. In this...
In classical automata-theoretic model checking of safety properties [6], a system model generates a ...
In classical automata-theoretic model checking of safety properties [6], a system model generates a ...
Empirical thesis.Bibliography: pages 61-63.1. Introduction -- 2. Background and related work -- 3. F...
International audienceThreshold automata, and the counter systems they define, were introduced as a ...
We check statically whether it is safe for untrusted foreign machine code to be loaded into a truste...
This work is about proving safety properties on programs. Such proof can be done by showing that "fo...
Abstract. A main idea underlying bounded model checking is to limit the length of the potential coun...
Static analysers search for overapproximating proofs of safety commonly known as safety invariants. ...
Abstract. We aim at checking safety and temporal properties over models repre-senting the behavior o...