Proving safety with trace automata and bounded model checking

7Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Loop under-approximation enriches C programs with additional branches that represent the effect of a (limited) range of loop iterations. While this technique can speed up bug detection significantly, it introduces redundant execution traces which may complicate the verification of the program. This holds particularly true for tools based on Bounded Model Checking, which incorporate simplistic heuristics to determine whether all feasible iterations of a loop have been considered. We present a technique that uses trace automata to eliminate redundant executions after performing loop acceleration. The method reduces the diameter of the program under analysis, which is in certain cases sufficient to allow a safety proof using Bounded Model Checking. Our transformation is precise—it does not introduce false positives, nor does it mask any errors. We have implemented the analysis as a source-tosource transformation, and present experimental results showing the applicability of the technique.

Cite

CITATION STYLE

APA

Kroening, D., Lewis, M., & Weissenbacher, G. (2015). Proving safety with trace automata and bounded model checking. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9109, pp. 325–341). Springer Verlag. https://doi.org/10.1007/978-3-319-19249-9_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free