The VACID-0 benchmarks is a set of small programs which pose challenges for formal verification of their functional behavior. This paper reports on the formal verification of one of these challenges: binary heaps. The solution given here is performed using the Why3 environment for program verification. The expected behavior of the program is specified in Why3 logic, structured using the constructs for building hierarchies of theories provided by Why3. The proofs are achieved by a significant amount of automation, using SMT solvers for a large majority of the verification conditions generated, whereas the remaining verification conditions are discharged by interactive constructions of proof scripts using the Coq proof assistant. The general ...
Rigorous numerics aims at providing certified representations for solutions of various problems, not...
The security of Internet applications relies crucially on the secure design and robust implementatio...
Reviewers: Yves Bertot; John Harrison; Philippe LangloisMa recherche se situe à la frontière de deux...
In a computer program, basic functionalities may be implemented using bit-wise operations. This can ...
This report has two objectives. First, we present an original method of proof of soundness of a weak...
To obtain the highest confidence on the correction of numerical simulation programs implementing the...
Performing large, intensive or non-trivial computing on array like datastructures is one of the most...
Proof systems are tools used to formally prove theorems, and in particular that software is bug-free...
State-of-the-art System-on-Chip (SoC) architectures integrate many different components, such as pro...
In the field of formal methods, rewriting techniques and provers by consistency in particular appear...
A major issue in the activity of deductive program verification is the understanding of the reason f...
Les problèmes logiciels sont frustrants et diminuent l’expérience utilisateur. Par exemple, la fuite...
Since 2001, in the Oasis team, I have developed research on the semantics of applications based on d...
The work reported in this thesis revisits in two waysthe abstract domain of polyhedraused for static...
Deduction-based software verification tools have reached a maturity allowing them to be used in indu...
Rigorous numerics aims at providing certified representations for solutions of various problems, not...
The security of Internet applications relies crucially on the secure design and robust implementatio...
Reviewers: Yves Bertot; John Harrison; Philippe LangloisMa recherche se situe à la frontière de deux...
In a computer program, basic functionalities may be implemented using bit-wise operations. This can ...
This report has two objectives. First, we present an original method of proof of soundness of a weak...
To obtain the highest confidence on the correction of numerical simulation programs implementing the...
Performing large, intensive or non-trivial computing on array like datastructures is one of the most...
Proof systems are tools used to formally prove theorems, and in particular that software is bug-free...
State-of-the-art System-on-Chip (SoC) architectures integrate many different components, such as pro...
In the field of formal methods, rewriting techniques and provers by consistency in particular appear...
A major issue in the activity of deductive program verification is the understanding of the reason f...
Les problèmes logiciels sont frustrants et diminuent l’expérience utilisateur. Par exemple, la fuite...
Since 2001, in the Oasis team, I have developed research on the semantics of applications based on d...
The work reported in this thesis revisits in two waysthe abstract domain of polyhedraused for static...
Deduction-based software verification tools have reached a maturity allowing them to be used in indu...
Rigorous numerics aims at providing certified representations for solutions of various problems, not...
The security of Internet applications relies crucially on the secure design and robust implementatio...
Reviewers: Yves Bertot; John Harrison; Philippe LangloisMa recherche se situe à la frontière de deux...