Filters








5,168 Hits in 9.2 sec

From Well Structured Transition Systems to Program Verification

Alain Finkel
2020 Electronic Proceedings in Theoretical Computer Science  
We describe the use of the theory of WSTS for verifying programs.  ...  The Abstract Interpretation [7] could be completed in the direction to produce WSTSs.  ...  If M is strongly monotone for , we may use the WSTS theory.  ... 
doi:10.4204/eptcs.320.3 fatcat:ex6susvyvvajjpgy7vqstaoeaq

A Certified Denotational Abstract Interpreter [chapter]

David Cachera, David Pichardie
2010 Lecture Notes in Computer Science  
In contrast, abstract interpreters are looking for fixpoints in infinite lattices where widening and narrowing are used for accelerating the convergence.  ...  In this paper, we show how we manage to program and prove correct in Coq an abstract interpreter that uses iteration strategies based on program syntax.  ...  Lattice Theory Intermezzo Abstract Interpretation heavily relies on lattice theory to formalize semantic notions and approximation of properties.  ... 
doi:10.1007/978-3-642-14052-5_3 fatcat:spqaffa76bfzzkikywdk5ccu7u

On the Integration of Software Testing and Formal Analysis [chapter]

Pietro Braione, Giovanni Denaro, Mauro Pezzè
2012 Lecture Notes in Computer Science  
Undergoing efforts include concolic execution, testing-based correctness prove, execution driven abstract interpretation and dynamic invariant generation.  ...  In particular, this paper surveys the most promising approaches to combine dynamic testing and static program analysis.  ...  The authors are solely responsible for the content of this paper.  ... 
doi:10.1007/978-3-642-25231-0_4 fatcat:no3u2cdsdjhx5oa67nix42xnf4

Finite state abstraction and formal methods for traffic flow networks

Samuel Coogan, Murat Arcak, Calin Belta
2016 2016 American Control Conference (ACC)  
Using properties of the mixed monotone dynamics, a finite state abstraction is efficiently computed by overapproximating the set of states that are one-step reachable under the traffic flow dynamics.  ...  This tutorial paper exploits structural properties in a class of networked systems motivated by traffic flow networks to overcome some of these challenges and points towards new directions of research.  ...  One Step Reachable Sets of Mixed Monotone Systems One of the most important properties of mixed monotone systems is that we are able to overapproximate reachable sets by evaluating the decomposition function  ... 
doi:10.1109/acc.2016.7525022 dblp:conf/amcc/CooganAB16 fatcat:rnmmzqkwczcx3pmg4izizg2lka

A minimalistic look at widening operators [article]

David Monniaux
2009 arXiv   pre-print
We consider the problem of formalizing the familiar notion of widening in abstract interpretation in higher-order logic.  ...  In type systems supporting dependent products and sums, this tree can be made to reflect the condition of correct termination of the widening sequence.  ...  Acknowledgments The author would like to thank the anonymous referees, whose suggestions greatly improved this article. This work was partially funded by ANR project "ASOPT".  ... 
arXiv:0902.3722v3 fatcat:qhyzx66llvb2fngvddjzesr2te

A minimalistic look at widening operators

David Monniaux
2009 Higher-Order and Symbolic Computation  
We consider the problem of formalizing in higher-order logic the familiar notion of widening from abstract interpretation.  ...  In type systems supporting dependent products and sums, this tree can be made to reflect the condition of correct termination of the widening sequence. * VERIMAG is a joint laboratory of CNRS, Université  ...  Acknowledgments The author would like to thank the anonymous referees, whose suggestions greatly improved this article. This work was partially funded by ANR project "ASOPT".  ... 
doi:10.1007/s10990-009-9046-8 fatcat:53rl62mtpjfvfh5m3sjmk64one

Invariant Generation for Parametrized Systems Using Self-reflection [chapter]

Alejandro Sanchez, Sriram Sankaranarayanan, César Sánchez, Bor-Yuh Evan Chang
2012 Lecture Notes in Computer Science  
In our approach, the key enabler is the notion of a reflective abstraction that we prove has an important correspondence with inductive invariants.  ...  The central challenge in invariant inference for parametrized systems is that naïvely exploding the transition system with all interleavings is not just impractical but impossible.  ...  First, we briefly recall the theory of abstract interpretation [13, 14, 5] for finding inductive assertion maps as the fixed point of a monotone operator over an abstract domain.  ... 
doi:10.1007/978-3-642-33125-1_12 fatcat:til3cge7qrcs7mzwnrnwitq3cu

Delay-Bounded Scheduling Without Delay! (Extended Technical Report) [article]

Andrew Johnson, Thomas Wahl
2021 arXiv   pre-print
We consider the broad problem of analyzing safety properties of asynchronous concurrent programs under arbitrary thread interleavings.  ...  In this paper we first present a technique to lift the delay bound for the case of finite-domain variable programs, thus adding to the efficiency of bug detection the ability to prove safety of programs  ...  The translation is constructed such that, for any state s reachable in P, the abstract state α(s) is reachable in B. As a result, B can be used to prove safety properties for P.  ... 
arXiv:2105.07277v1 fatcat:j4dysqt3uve2tlkw47pe67i33a

Searching for points-to analysis

Glenn Bruns, Satish Chandra
2002 Proceedings of the tenth ACM SIGSOFT symposium on Foundations of software engineering - SIGSOFT '02/FSE 10  
In this paper, we show how points-to analysis algorithms can be defined as transformed versions of an exact algorithm.  ...  Our transformations are generic and may be useful in the design of other program analysis algorithms.  ...  They also thank the reviewers of a previous version that appeared in the 2002 Symposium on Foundations of Software Engineering. Dave Schmidt also provided several insightful comments on this work.  ... 
doi:10.1145/587051.587061 dblp:conf/sigsoft/BrunsC02 fatcat:7i7cgclznrb4zbdn26n4v6arf4

Searching for points-to analysis

G. Bruns, S. Chandra
2003 IEEE Transactions on Software Engineering  
In this paper, we show how points-to analysis algorithms can be defined as transformed versions of an exact algorithm.  ...  Our transformations are generic and may be useful in the design of other program analysis algorithms.  ...  They also thank the reviewers of a previous version that appeared in the 2002 Symposium on Foundations of Software Engineering. Dave Schmidt also provided several insightful comments on this work.  ... 
doi:10.1109/tse.2003.1237170 fatcat:njgevnlid5h67mguz33vhn6tnu

Searching for points-to analysis

Glenn Bruns, Satish Chandra
2002 Software engineering notes  
In this paper, we show how points-to analysis algorithms can be defined as transformed versions of an exact algorithm.  ...  Our transformations are generic and may be useful in the design of other program analysis algorithms.  ...  They also thank the reviewers of a previous version that appeared in the 2002 Symposium on Foundations of Software Engineering. Dave Schmidt also provided several insightful comments on this work.  ... 
doi:10.1145/605466.605476 fatcat:ioehnchrtjf2vaxjzomp6te7ve

Searching for points-to analysis

Glenn Bruns, Satish Chandra
2002 Proceedings of the tenth ACM SIGSOFT symposium on Foundations of software engineering - SIGSOFT '02/FSE 10  
In this paper, we show how points-to analysis algorithms can be defined as transformed versions of an exact algorithm.  ...  Our transformations are generic and may be useful in the design of other program analysis algorithms.  ...  They also thank the reviewers of a previous version that appeared in the 2002 Symposium on Foundations of Software Engineering. Dave Schmidt also provided several insightful comments on this work.  ... 
doi:10.1145/587059.587061 fatcat:bvk4egazira45dsogt4qeodz4a

Algorithmic Analysis of Programs with Well Quasi-ordered Domains

Parosh Aziz Abdulla, Kārlis Čerāns, Bengt Jonsson, Yih-Kuen Tsay
2000 Information and Computation  
Other safety properties can be reduced to the reachability problem.  ...  We show that the following properties are decidable for well-structured systems: v Reachability: whether a certain set of control states is reachable.  ...  I _ pre(X) in 2 In the abstract interpretation literature, a Galois insertion is defined as follows.  ... 
doi:10.1006/inco.1999.2843 fatcat:7vkbq4w2jje6hmosmsgomumcuy

Page 4504 of Mathematical Reviews Vol. , Issue 87h [page]

1987 Mathematical Reviews  
In particular, it is not clear that by capturing the reachability-based properties the authors have indeed covered the main spatial properties of concurrent systems.  ...  The presentation of the theory is very abstract, but not very clear, at least to the reviewer. Small (toy) examples do not help either.  ... 

Safe & robust reachability analysis of hybrid systems

Eugenio Moggi, Amin Farjudian, Adam Duracz, Walid Taha
2018 Theoretical Computer Science  
of the set of states reachable in finite time from a set of initial states.  ...  First, we observe that, in this context, the usual definition of reachability - namely, the reflexive and transitive closure of a transition relation - can be unsafe, ie, it may compute a proper subset  ...  Thus, we can exploit the universal property of the least prefix-point X for a monotonic map F , i.e., F (Y ) ≤ Y =⇒ X ≤ Y .  ... 
doi:10.1016/j.tcs.2018.06.020 fatcat:wdylpcldh5arpfroufp2mwbrmy
« Previous Showing results 1 — 15 out of 5,168 results