2003
DOI: 10.1145/780822.781153
|View full text |Cite
|
Sign up to set email alerts
|

A static analyzer for large safety-critical software

Abstract: We show that abstract interpretation-based static program analysis can be made efficient and precise enough to formally verify a class of properties for a family of large programs with few or no false alarms. This is achieved by refinement of a general purpose static analyzer and later adaptation to particular programs of the family by the end-user through parametrization. This is applied to the proof of soundness of data manipulation operations at the machine level for periodic synchronous safety critical emb… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

3
208
0
1

Year Published

2005
2005
2014
2014

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 219 publications
(212 citation statements)
references
References 35 publications
3
208
0
1
Order By: Relevance
“…This technique, called "widening up to" in [40,41] and "widening with thresholds" in [12], consists in precomputing a set U of constraints that are likely to be invariants in a widening location (e.g., the negation of the exit condition of a "for" loop), and in keeping in P 1 ∇P 2 all the constraints in U which are satisfied by both P 1 and P 2 . In [40], the set U is computed, at a given widening point, as the set of all conditions that permit to come back to this control point, by propagating the exiting condition on the global loops.…”
Section: Limited Wideningmentioning
confidence: 99%
See 1 more Smart Citation
“…This technique, called "widening up to" in [40,41] and "widening with thresholds" in [12], consists in precomputing a set U of constraints that are likely to be invariants in a widening location (e.g., the negation of the exit condition of a "for" loop), and in keeping in P 1 ∇P 2 all the constraints in U which are satisfied by both P 1 and P 2 . In [40], the set U is computed, at a given widening point, as the set of all conditions that permit to come back to this control point, by propagating the exiting condition on the global loops.…”
Section: Limited Wideningmentioning
confidence: 99%
“…This delaying strategy was proposed in [40,12]. A variant is the loop unrolling technique used in [37,52].…”
Section: Widening Strategies 351 Delaying the Application Of The Wimentioning
confidence: 99%
“…Moreover, narrowing alone is often not enough to obtain precise xpoints which has been illustrated in many papers that present improved widenings/narrowings [10,11,12,15,17]. All of these approaches require disruptive changes to the xpoint engine, for instance, tracking several abstract states [10,12], temporarily disabling parts of the CFG [11], performing a preanalysis with di erent semantics [13,15], collecting \landmarks" [17] or referring to user-supplied thresholds [5]. This paper shows that widening and its various re nements can be implemented without modifying an existing xpoint engine, thereby making numeric domains available to analyses that are oblivious to the…”
mentioning
confidence: 99%
“…The key idea of our approach is to implement abstract domains as co bered domains [18], an approach sometimes called \functor domains" [5]. Here, each domain h has a child g that it controls.…”
mentioning
confidence: 99%
See 1 more Smart Citation