Proving safety with trace automata and bounded model checking
Loop under-approximation enriches C programs with additional branches that represent the effect of a (limited) range of loop iterations. While this technique can speed up bug detection significantly, it introduces redundant execution traces which may complicate the verification of the program. This...
المؤلفون الرئيسيون: | Kroening, D, Lewis, M, Weissenbacher, G |
---|---|
مؤلفون آخرون: | Bjørner, N |
التنسيق: | Conference item |
منشور في: |
Springer
2015
|
مواد مشابهة
-
A Complete Bounded Model Checking Algorithm for Pushdown Systems
حسب: Basler, G, وآخرون
منشور في: (2007) -
Computing Over−Approximations with Bounded Model Checking
حسب: Kroening, D
منشور في: (2006) -
Computing over-approximations with bounded model checking
حسب: Kroening, D
منشور في: (2006) -
Model Checking Concurrent Linux Device Drivers
حسب: Witkowski, T, وآخرون
منشور في: (2007) -
Model checking concurrent linux device drivers
حسب: Witkowski, T, وآخرون
منشور في: (2007)