Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleJuly 2005
Bounded model checking of concurrent programs
CAV'05: Proceedings of the 17th international conference on Computer Aided VerificationPages 82–97https://doi.org/10.1007/11513988_9We propose a SAT-based bounded verification technique, called TCBMC, for threaded C programs. Our work is based on CBMC, which models sequential C programs in which the number of executions for each loop and the depth of recursion are bounded.
The ...
- ArticleJuly 2005
Abstraction for falsification
CAV'05: Proceedings of the 17th international conference on Computer Aided VerificationPages 67–81https://doi.org/10.1007/11513988_8Abstraction is traditionally used in the process of verification. There, an abstraction of a concrete system is sound if properties of the abstract system also hold in the concrete system. Specifically, if an abstract state a satisfies a property ψ then ...
- ArticleJuly 2005
Concrete model checking with abstract matching and refinement
CAV'05: Proceedings of the 17th international conference on Computer Aided VerificationPages 52–66https://doi.org/10.1007/11513988_7We propose an abstraction-based model checking method which relies on refinement of an under-approximation of the feasible behaviors of the system under analysis. The method preserves errors to safety properties, since all analyzed behaviors are ...
- ArticleJuly 2005
Interpolant-based transition relation approximation
CAV'05: Proceedings of the 17th international conference on Computer Aided VerificationPages 39–51https://doi.org/10.1007/11513988_6In predicate abstraction, exact image computation is problematic, requiring in the worst case an exponential number of calls to a decision procedure. For this reason, software model checkers typically use a weak approximation of the image. This can ...
- ArticleJuly 2005
Symbolic compositional verification by learning assumptions
CAV'05: Proceedings of the 17th international conference on Computer Aided VerificationPages 548–562https://doi.org/10.1007/11513988_52The verification problem for a system consisting of components can be decomposed into simpler subproblems for the components using assume-guarantee reasoning. However, such compositional reasoning requires user guidance to identify appropriate ...
-
- ArticleJuly 2005
Reasoning about threads communicating via locks
CAV'05: Proceedings of the 17th international conference on Computer Aided VerificationPages 505–518https://doi.org/10.1007/11513988_49We propose a new technique for the static analysis of concurrent programs comprised of multiple threads. In general, the problem is known to be undecidable even for programs with only two threads but where the threads communicate using CCS-style ...
- ArticleJuly 2005
Ymer: a statistical model checker
CAV'05: Proceedings of the 17th international conference on Computer Aided VerificationPages 429–433https://doi.org/10.1007/11513988_43We present Ymer, a tool for verifying probabilistic transient properties of stochastic discrete event systems. Ymer implements both statistical and numerical model checking techniques. We focus on two features of Ymer: distributed acceptance sampling ...
- ArticleJuly 2005
TRANSYT: a tool for the verification of asynchronous concurrent systems
CAV'05: Proceedings of the 17th international conference on Computer Aided VerificationPages 424–428https://doi.org/10.1007/11513988_42transyt is a BDD-based tool specifically designed for the verification of timed and untimed asynchronous concurrent systems. transyt system architecture is designed to be modular, open and flexible, such that additional capabilities can be easily ...
- ArticleJuly 2005
Romeo: a tool for analyzing time petri nets
CAV'05: Proceedings of the 17th international conference on Computer Aided VerificationPages 418–423https://doi.org/10.1007/11513988_41In this paper, we present the features of Romeo, a Time Petri Net (TPN) analyzer. The tool Romeo allows state space computation of TPN and on-the-fly model-checking of reachability properties. It performs translations from TPNs to Timed Automata (TAs) ...
- ArticleJuly 2005
Action language verifier, extended
CAV'05: Proceedings of the 17th international conference on Computer Aided VerificationPages 413–417https://doi.org/10.1007/11513988_40Action Language Verifier (ALV) is an infinite state model checker which specializes on systems specified with linear arithmetic constraints on integer variables. An Action Language specification consists of integer, boolean and enumerated variables, ...
- ArticleJuly 2005
Efficient monitoring of ω-languages
CAV'05: Proceedings of the 17th international conference on Computer Aided VerificationPages 364–378https://doi.org/10.1007/11513988_36We present a technique for generating efficient monitors for ω-regular-languages. We show how Büchi automata can be reduced in size and transformed into special, statistically optimal nondeterministic finite state machines, called binary transition tree ...
- ArticleJuly 2005
Symbolic systems, explicit properties: on hybrid approaches for LTL symbolic model checking
CAV'05: Proceedings of the 17th international conference on Computer Aided VerificationPages 350–363https://doi.org/10.1007/11513988_35In this work we study hybrid approaches to LTL symbolic model checking; that is, approaches that use explicit representations of the property automaton, whose state space is often quite manageable, and symbolic representations of the system, whose state ...
- ArticleJuly 2005
F-SOFT: software verification platform
CAV'05: Proceedings of the 17th international conference on Computer Aided VerificationPages 301–306https://doi.org/10.1007/11513988_31In this paper, we describe our verification tool F-Soft, which is developed for the analysis of C programs. Its novelty lies in the combination of several recent advances in formal verification research including SAT-based verification, static analyses ...
- ArticleJuly 2005
Cogent: accurate theorem proving for program verification
CAV'05: Proceedings of the 17th international conference on Computer Aided VerificationPages 296–300https://doi.org/10.1007/11513988_30Many symbolic software verification engines such as Slam and ESC/Java rely on automatic theorem provers. The existing theorem provers, such as Simplify, lack precise support for important programming language constructs such as pointers, structures and ...
- ArticleJuly 2005
On statistical model checking of stochastic systems
CAV'05: Proceedings of the 17th international conference on Computer Aided VerificationPages 266–280https://doi.org/10.1007/11513988_26Statistical methods to model check stochastic systems have been, thus far, developed only for a sublogic of continuous stochastic logic (CSL) that does not have steady state operator and unbounded until formulas. In this paper, we present a statistical ...
- ArticleJuly 2005
Improved probabilistic models for 802.11 protocol verification
CAV'05: Proceedings of the 17th international conference on Computer Aided VerificationPages 239–252https://doi.org/10.1007/11513988_24The IEEE 802.11 protocol is a popular standard for wireless local area networks. Its medium access control layer (MAC) is a carrier sense multiple access with collision avoidance (CSMA/CA) design and includes an exponential backoff mechanism that makes ...
- ArticleJuly 2005
Program repair as a game
CAV'05: Proceedings of the 17th international conference on Computer Aided VerificationPages 226–238https://doi.org/10.1007/11513988_23We present a conservative method to automatically fix faults in a finite state program by considering the repair problem as a game. The game consists of the product of a modified version of the program and an automaton representing the LTL ...
- ArticleJuly 2005
The ComFoRT reasoning framework
CAV'05: Proceedings of the 17th international conference on Computer Aided VerificationPages 164–169https://doi.org/10.1007/11513988_18Model checking is a promising technology for verifying critical behavior of software. However, software model checking is hamstrung by scalability issues and is difficult for software engineers to use directly. The second challenge arises from the gap ...
- ArticleJuly 2005
Model checking x86 executables with codesurfer/x86 and WPDS++
CAV'05: Proceedings of the 17th international conference on Computer Aided VerificationPages 158–163https://doi.org/10.1007/11513988_17This paper presents a toolset for model checking x86 executables. The members of the toolset are CodeSurfer/x86, WPDS++, and the Path Inspector. CodeSurfer/x86 is used to extract a model from an executable in the form of a weighted pushdown system. WPDS++...
- ArticleJuly 2005
Wolf: bug hunter for concurrent software using formal methods
CAV'05: Proceedings of the 17th international conference on Computer Aided VerificationPages 153–157https://doi.org/10.1007/11513988_16Wolf is a “push-button” model checker for concurrent C programs developed in IBM Haifa. It automatically generates both the model and the specification directly from the C code. Currently, Wolf uses BDD-based symbolic methods integrated with a guided ...