We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 616 results
  1. PROTON: PRObes for Termination Or Not (Competition Contribution)

    PROTON is a tool to check whether a given C program has a non-terminating behaviour or not. It is built around the C Bounded Model Checker (CBMC)....
    Ravindra Metta, Hrishikesh Karmarkar, ... Supratik Chakraborty in Tools and Algorithms for the Construction and Analysis of Systems
    Conference paper Open access 2024
  2. A verified low-level implementation and visualization of the adaptive exterior light and speed control system

    In this article, we present an approach to the ABZ 2020 case study that differs from those usually presented at ABZ: Rather than using a...

    Sebastian Krings, Philipp Körner, ... Kristin Rutenkolk in International Journal on Software Tools for Technology Transfer
    Article Open access 27 May 2024
  3. An empirical assessment of machine learning approaches for triaging reports of static analysis tools

    Despite their ability to detect critical bugs in software, static analysis tools’ high false positive rates are a key barrier to their adoption in...

    Sai Yerramreddy, Austin Mordahl, ... Adam A. Porter in Empirical Software Engineering
    Article 10 January 2023
  4. Btor2-Cert: A Certifying Hardware-Verification Framework Using Software Analyzers

    Formal verification is essential but challenging: Even the best verifiers may produce wrong verification verdicts. Certifying verifiers enhance the...
    Zsófia Ádám, Dirk Beyer, ... Nils Sirrenberg in Tools and Algorithms for the Construction and Analysis of Systems
    Conference paper Open access 2024
  5. CoPTIC: Constraint Programming Translated Into C

    Constraint programming systems allow a diverse range of problems to be modelled and solved. Most systems require the user to learn a new constraint...
    Conference paper Open access 2023
  6. Cutting the Cake into Crumbs: Verifying Envy-Free Cake-Cutting Protocols Using Bounded Integer Arithmetic

    Fair division protocols specify how to split a continuous resource (conventionally represented by a cake) between multiple agents with different...
    Conference paper 2023
  7. Deagle: An SMT-based Verifier for Multi-threaded Programs (Competition Contribution)

    Deagle is an SMT-based multi-threaded program verification tool. It is built on top of CBMC (front-end) and MiniSAT (back-end). The basic idea of...
    Conference paper Open access 2022
  8. HyperPUT: generating synthetic faulty programs to challenge bug-finding tools

    As research in automatically detecting bugs grows and produces new techniques, having suitable collections of programs with known bugs becomes...

    Riccardo Felici, Laura Pozzi, Carlo A. Furia in Empirical Software Engineering
    Article Open access 15 January 2024
  9. CBMC Path: A Symbolic Execution Retrofit of the C Bounded Model Checker

    We gave CBMC the ability to explore and model check single program paths, as opposed to its default whole-program model-checking behaviour. This...
    Conference paper Open access 2019
  10. Efficient Bounded Model Checking of Heap-Manipulating Programs using Tight Field Bounds

    Software model checkers are able to exhaustively explore different bounded program executions arising from various sources of non-determinism. These...
    Pablo Ponzio, Ariel Godio, ... Marcelo F. Frias in Fundamental Approaches to Software Engineering
    Conference paper Open access 2021
  11. Binary Level Concolic Execution on Windows with Rich Instrumentation Based Taint Analysis

    Windows programs are widely used. The effective testing of Windows applications can prevent financial losses. Currently, there are only a few tools...
    Conference paper 2024
  12. Verifying PLC Programs via Monitors: Extending the Integration of FRET and PLCverif

    Verification of Programmable Logic Controller (PLC) programs requires reasoning about propositions qualified in terms of time. CERN’s PLCverif, an...
    Xaver Fink, Anastasia Mavridou, ... Borja Fernández Adiego in NASA Formal Methods
    Conference paper 2024
  13. ESBMC v7.3: Model Checking C++ Programs Using Clang AST

    This paper introduces ESBMC v7.3, the latest Efficient SMT-Based Context-Bounded Model Checker version, which now incorporates a new Clang-based C++...
    Kunjian Song, Mikhail R. Gadelha, ... Lucas C. Cordeiro in Formal Methods: Foundations and Applications
    Conference paper 2024
  14. Ten Years of Industrial Experiments with Frama-C at Mitsubishi Electric R&D Centre Europe

    Mitsubishi Electric R &D Centre Europe (MERCE), the advanced European research laboratory of Mitsubishi Electric group, has been carrying research...
    Éric Lavillonnière, David Mentré, Benoît Boyer in Guide to Software Verification with Frama-C
    Chapter 2024
  15. Analysing Software

    In Chaps. 3–5, we consider systems modelled at an abstract level in the form of one or more FSMs. However, if a model has been derived from an actual...
    Marieke Huisman, Anton Wijs in Concise Guide to Software Verification
    Chapter 2023
  16. Automated SC-MCC test case generation using coverage-guided fuzzing

    One of the main objectives of testing is to achieve adequate code coverage. Modern code coverage standards suggest MC/DC (Modified Condition/Decision...

    Monika Rani Golla, Sangharatna Godboley in Software Quality Journal
    Article 14 May 2024
  17. VeriFuzz 1.4: Checking for (Non-)termination (Competition Contribution)

    In VeriFuzz 1.4, we implemented two new techniques for checking Non-termination and Termination. VeriFuzz 1.4 won the Termination category of SV-COMP...
    Ravindra Metta, Prasanth Yeduru, ... Raveendra Kumar Medicherla in Tools and Algorithms for the Construction and Analysis of Systems
    Conference paper Open access 2023
  18. Towards Efficient Data-Flow Test Data Generation

    Data-flow testing (DFT) aims to detect potential data interaction anomalies by focusing on the points at which variables receive values and the...
    Ting Su, Chengyu Zhang, ... Zhendong Su in Theories of Programming and Formal Methods
    Chapter 2023
  19. Quantifying Software Reliability via Model-Counting

    Critical software should be verified. But how to handle the situation when a proof for the functional correctness could not be established? In this...
    Samuel Teuber, Alexander Weigl in Quantitative Evaluation of Systems
    Conference paper 2021
  20. Verifying verified code

    A recent case study from AWS by Chong et al. proposes an effective methodology for Bounded Model Checking in industry. In this paper, we report on a...

    Siddharth Priya, **ang Zhou, ... Arie Gurfinkel in Innovations in Systems and Software Engineering
    Article 30 March 2022
Did you find what you were looking for? Share feedback.