Proving safety with trace automata and bounded model checking
Loop under-approximation enriches C programs with additional branches that represent the effect of a (limited) range of loop iterations. While this technique can speed up bug detection significantly, it introduces redundant execution traces which may complicate the verification of the program. This...
Main Authors: | Kroening, D, Lewis, M, Weissenbacher, G |
---|---|
Outros autores: | Bjørner, N |
Formato: | Conference item |
Publicado: |
Springer
2015
|
Títulos similares
-
A Complete Bounded Model Checking Algorithm for Pushdown Systems
por: Basler, G, et al.
Publicado: (2007) -
Computing Over−Approximations with Bounded Model Checking
por: Kroening, D
Publicado: (2006) -
Computing over-approximations with bounded model checking
por: Kroening, D
Publicado: (2006) -
Model Checking Concurrent Linux Device Drivers
por: Witkowski, T, et al.
Publicado: (2007) -
Model checking concurrent linux device drivers
por: Witkowski, T, et al.
Publicado: (2007)