Safe data abstractions are widely used for verification purposes. Positive verification results can be transferred from the abstract to the concrete system. When a property is violated in the abstract system, one still has to check whether a concrete violation scenario exists. However, even when the violation scenario is not reproducible in the concrete system (a false negative), it may still contain information on possible sources of bugs. Here, we propose a bug hunting framework based on abstract violation scenarios. We first extract a violation pattern from one abstract violation scenario. The violation pattern represents multiple abstract violation scenarios, increasing the chance that a corresponding concrete violation exists. Then, we...
Abstraction techniques have been very successful in model checking large systems by enabling the mod...
This paper introduces a new property called robust reachability which refines the standard notion of...
A method for finding bugs in code is presented. For given small numbers j and k, the code of a proce...
Safe data abstractions are widely used for verification purposes. Positive verification results can ...
Safe data abstractions are widely used for verification purposes. Positive verification results can ...
Safe data abstractions are widely used for verification purposes. Positive verification results can ...
Static analysers search for overapproximating proofs of safety commonly known as safety invariants. ...
Static analysers search for overapproximating proofs of safety commonly known as safety invariants. ...
International audienceDesigning and developing distributed software has always been a tedious and er...
International audienceThe boundaries of model-checking have been extended through the use of abstrac...
Temporal logic model checking is one of the most widely used verification techniques. It allows to a...
We present a model checking tool based on game semantics and CSP for verifying safety properties of ...
Abstraction is one of the most important issues to cope with large and infinite state spaces in mode...
Abstract We present an abstraction refinement algorithm for model checking of safety properties that...
Abstract—Bounded Model Checking (BMC) for software is a precise bug-finding technique that builds up...
Abstraction techniques have been very successful in model checking large systems by enabling the mod...
This paper introduces a new property called robust reachability which refines the standard notion of...
A method for finding bugs in code is presented. For given small numbers j and k, the code of a proce...
Safe data abstractions are widely used for verification purposes. Positive verification results can ...
Safe data abstractions are widely used for verification purposes. Positive verification results can ...
Safe data abstractions are widely used for verification purposes. Positive verification results can ...
Static analysers search for overapproximating proofs of safety commonly known as safety invariants. ...
Static analysers search for overapproximating proofs of safety commonly known as safety invariants. ...
International audienceDesigning and developing distributed software has always been a tedious and er...
International audienceThe boundaries of model-checking have been extended through the use of abstrac...
Temporal logic model checking is one of the most widely used verification techniques. It allows to a...
We present a model checking tool based on game semantics and CSP for verifying safety properties of ...
Abstraction is one of the most important issues to cope with large and infinite state spaces in mode...
Abstract We present an abstraction refinement algorithm for model checking of safety properties that...
Abstract—Bounded Model Checking (BMC) for software is a precise bug-finding technique that builds up...
Abstraction techniques have been very successful in model checking large systems by enabling the mod...
This paper introduces a new property called robust reachability which refines the standard notion of...
A method for finding bugs in code is presented. For given small numbers j and k, the code of a proce...