Proving safety with trace automata and bounded model checking
Loop under-approximation enriches C programs with additional branches that represent the effect of a (limited) range of loop iterations. While this technique can speed up bug detection significantly, it introduces redundant execution traces which may complicate the verification of the program. This...
Main Authors: | Kroening, D, Lewis, M, Weissenbacher, G |
---|---|
Other Authors: | Bjørner, N |
Format: | Conference item |
Published: |
Springer
2015
|
Similar Items
-
A Complete Bounded Model Checking Algorithm for Pushdown Systems
by: Basler, G, et al.
Published: (2007) -
Computing Over−Approximations with Bounded Model Checking
by: Kroening, D
Published: (2006) -
Computing over-approximations with bounded model checking
by: Kroening, D
Published: (2006) -
Computational Challenges in Bounded Model Checking
by: Clarke, E, et al.
Published: (2015) -
Computational challenges in bounded model checking
by: Clarke, E, et al.
Published: (2005)