Safe data abstractions are widely used for verification purposes. Positive verification results can be transferred to the concrete system. When a property is violated in the abstract system, one still has to check whether a concrete violation exists. However, even when the violation scenario is not reproducible in the concrete system (a false negative), it may still contain information on possible sources of bugs. Here we propose a bug hunting framework based on abstract violation scenarios. We first extract a violation pattern from an abstract violation scenario. The violation pattern represents multiple violation scenarios, increasing the chance that a corresponding concrete violation exists. Then we look for a concrete violation that cor...
Software inevitably contains mistakes and operates incorrectly in at least some situations. As a res...
Bug reports record tasks performed by users and developers while collaborating to resolve bugs. Such...
There has been a large body of work on local reasoning for proving the absence of bugs, but none for...
Safe data abstractions are widely used for verification purposes. Positive verification results can ...
Safe data abstractions are widely used for verification purposes. Positive verification results can ...
Safe data abstractions are widely used for verification purposes. Positive verification results can ...
Static analysers search for overapproximating proofs of safety commonly known as safety invariants. ...
Static analysers search for overapproximating proofs of safety commonly known as safety invariants. ...
Mining specifications and using them for bug detection is a promising way to reveal bugs in programs...
Software defects, commonly known as bugs, present a serious challenge for system reliability and dep...
A major obstacle to nding program errors in a real sys-tem is knowing what correctness rules the sys...
A method for finding bugs in code is presented. For given small numbers j and k, the code of a proce...
This paper introduces a new property called robust reachability which refines the standard notion of...
International audienceDesigning and developing distributed software has always been a tedious and er...
A major obstacle to nding program errors in a real system is knowing what correctness rules the sys...
Software inevitably contains mistakes and operates incorrectly in at least some situations. As a res...
Bug reports record tasks performed by users and developers while collaborating to resolve bugs. Such...
There has been a large body of work on local reasoning for proving the absence of bugs, but none for...
Safe data abstractions are widely used for verification purposes. Positive verification results can ...
Safe data abstractions are widely used for verification purposes. Positive verification results can ...
Safe data abstractions are widely used for verification purposes. Positive verification results can ...
Static analysers search for overapproximating proofs of safety commonly known as safety invariants. ...
Static analysers search for overapproximating proofs of safety commonly known as safety invariants. ...
Mining specifications and using them for bug detection is a promising way to reveal bugs in programs...
Software defects, commonly known as bugs, present a serious challenge for system reliability and dep...
A major obstacle to nding program errors in a real sys-tem is knowing what correctness rules the sys...
A method for finding bugs in code is presented. For given small numbers j and k, the code of a proce...
This paper introduces a new property called robust reachability which refines the standard notion of...
International audienceDesigning and developing distributed software has always been a tedious and er...
A major obstacle to nding program errors in a real system is knowing what correctness rules the sys...
Software inevitably contains mistakes and operates incorrectly in at least some situations. As a res...
Bug reports record tasks performed by users and developers while collaborating to resolve bugs. Such...
There has been a large body of work on local reasoning for proving the absence of bugs, but none for...