Safe data abstractions are widely used for verification purposes. Positive verification results can be transferred from the abstract to the concrete system. When a property is violated in the abstract system, one still has to check whether a concrete violation scenario exists. However, even when the violation scenario is not reproducible in the concrete system (a false negative), it may still contain information on possible sources of bugs. Here, we propose a bug hunting framework based on abstract violation scenarios. We first extract a violation pattern from one abstract violation scenario. The violation pattern represents multiple abstract violation scenarios, increasing the chance that a corresponding concrete violation exists. Then, we...
Static analysers search for overapproximating proofs of safety commonly known as safety invariants. ...
Abstraction is one of the most important issues to cope with large and infinite state spaces in mode...
Safety property checking is mandatory in the validation process of critical software. When formal ve...
Safe data abstractions are widely used for verification purposes. Positive verification results can ...
Safe data abstractions are widely used for verification purposes. Positive verification results can ...
Safe data abstractions are widely used for verification purposes. Positive verification results can ...
International audienceDesigning and developing distributed software has always been a tedious and er...
International audienceThe boundaries of model-checking have been extended through the use of abstrac...
International audienceModel checking techniques verify that a model satisfies a given temporal prope...
International audienceModel checking is an established technique for automatically verifying that a ...
Temporal logic model checking is one of the most widely used verification techniques. It allows to a...
Abstraction is one of the most important issues to cope with large and infinite state spaces in mode...
Static analysers search for overapproximating proofs of safety commonly known as safety invariants. ...
Rapport de RechercheChecking safety properties is mandatory in the validation process of critical so...
There has been a large body of work on local reasoning for proving the absence of bugs, but none for...
Static analysers search for overapproximating proofs of safety commonly known as safety invariants. ...
Abstraction is one of the most important issues to cope with large and infinite state spaces in mode...
Safety property checking is mandatory in the validation process of critical software. When formal ve...
Safe data abstractions are widely used for verification purposes. Positive verification results can ...
Safe data abstractions are widely used for verification purposes. Positive verification results can ...
Safe data abstractions are widely used for verification purposes. Positive verification results can ...
International audienceDesigning and developing distributed software has always been a tedious and er...
International audienceThe boundaries of model-checking have been extended through the use of abstrac...
International audienceModel checking techniques verify that a model satisfies a given temporal prope...
International audienceModel checking is an established technique for automatically verifying that a ...
Temporal logic model checking is one of the most widely used verification techniques. It allows to a...
Abstraction is one of the most important issues to cope with large and infinite state spaces in mode...
Static analysers search for overapproximating proofs of safety commonly known as safety invariants. ...
Rapport de RechercheChecking safety properties is mandatory in the validation process of critical so...
There has been a large body of work on local reasoning for proving the absence of bugs, but none for...
Static analysers search for overapproximating proofs of safety commonly known as safety invariants. ...
Abstraction is one of the most important issues to cope with large and infinite state spaces in mode...
Safety property checking is mandatory in the validation process of critical software. When formal ve...