Proving safety with trace automata and bounded model checking
Loop under-approximation enriches C programs with additional branches that represent the effect of a (limited) range of loop iterations. While this technique can speed up bug detection significantly, it introduces redundant execution traces which may complicate the verification of the program. This...
Autors principals: | Kroening, D, Lewis, M, Weissenbacher, G |
---|---|
Altres autors: | Bjørner, N |
Format: | Conference item |
Publicat: |
Springer
2015
|
Ítems similars
-
A Complete Bounded Model Checking Algorithm for Pushdown Systems
per: Basler, G, et al.
Publicat: (2007) -
Computing Over−Approximations with Bounded Model Checking
per: Kroening, D
Publicat: (2006) -
Computing over-approximations with bounded model checking
per: Kroening, D
Publicat: (2006) -
Model Checking Concurrent Linux Device Drivers
per: Witkowski, T, et al.
Publicat: (2007) -
Model checking concurrent linux device drivers
per: Witkowski, T, et al.
Publicat: (2007)