We propose an abstract-interpretation-based analysis for recurrent sets. A recurrent set is a set of states from which the execution of a program cannot or might not (as in our case) escape. A recurrent set is a part of a program’s nontermination proof (that needs to be complemented by reachability analysis). We find recurrent sets by performing a potentially over-approximate backward analysis that produces an initial candidate. We then perform over-approximate forward analysis on the candidate to check and refine it and ensure soundness. In practice, the analysis relies on trace partitioning that predicts future paths through the program that non-terminating executions will take. Using our technique, we were able to find recurrent sets in ...
Causality Checking [LL13a] has been proposed as a finite state space exploration technique which com...
When disproving termination using known techniques (e.g. recurrence sets), abstractions that overapp...
Backward and mixed chains of recurrences are introduced. A complete set of chains of recurrences man...
Non-termination of structured imperative programs is primarily due to infinite loops. An important c...
Termination and non-termination are a pair of fundamental program properties. Arguably, the majority...
International audienceWe present new static analysis methods for proving liveness properties of prog...
This paper describes a general and e ective method for backward dependence analysis in the presence ...
We consider the problem of learning an inner approximation of the region of attraction (ROA) of an a...
Complex systems are characterized by deterministic laws (which often may be hidden) and randomness. ...
International audienceWe present new static analysis methods for proving liveness properties of prog...
Trace slicing is a widely used technique for execution trace analysis that is effectively used in pr...
We propose a novel approach for computing weakest liberal safe preconditions of programs. The standa...
International audienceThe classical method for program analysis by abstract interpretation consists ...
Trace slicing is a widely used technique for execution trace analysis that is effectively used in pr...
Abstract. We propose a novel approach for computing weakest liberal safe pre-conditions of programs....
Causality Checking [LL13a] has been proposed as a finite state space exploration technique which com...
When disproving termination using known techniques (e.g. recurrence sets), abstractions that overapp...
Backward and mixed chains of recurrences are introduced. A complete set of chains of recurrences man...
Non-termination of structured imperative programs is primarily due to infinite loops. An important c...
Termination and non-termination are a pair of fundamental program properties. Arguably, the majority...
International audienceWe present new static analysis methods for proving liveness properties of prog...
This paper describes a general and e ective method for backward dependence analysis in the presence ...
We consider the problem of learning an inner approximation of the region of attraction (ROA) of an a...
Complex systems are characterized by deterministic laws (which often may be hidden) and randomness. ...
International audienceWe present new static analysis methods for proving liveness properties of prog...
Trace slicing is a widely used technique for execution trace analysis that is effectively used in pr...
We propose a novel approach for computing weakest liberal safe preconditions of programs. The standa...
International audienceThe classical method for program analysis by abstract interpretation consists ...
Trace slicing is a widely used technique for execution trace analysis that is effectively used in pr...
Abstract. We propose a novel approach for computing weakest liberal safe pre-conditions of programs....
Causality Checking [LL13a] has been proposed as a finite state space exploration technique which com...
When disproving termination using known techniques (e.g. recurrence sets), abstractions that overapp...
Backward and mixed chains of recurrences are introduced. A complete set of chains of recurrences man...