2021
DOI: 10.1007/978-3-030-81685-8_35
|View full text |Cite
|
Sign up to set email alerts
|

Constraint-Based Relational Verification

Abstract: In recent years they have been numerous works that aim to automate relational verification. Meanwhile, although Constrained Horn Clauses ($$\mathrm {CHCs}$$ CHCs ) empower a wide range of verification techniques and tools, they lack the ability to express hyperproperties beyond k-safety such as generalized non-interference and co-termination.This paper describes a novel and fully automated constraint-based approach to relational verification. We first introduce a new class… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 28 publications
(26 citation statements)
references
References 67 publications
0
26
0
Order By: Relevance
“…We expect that user-provided coupling invariants and loop properties can avoid having to rely on code transformation methods. Moreover, we expect termination and co-termination [16], [34] to be used to extend the modularity of relational contracts. Recall that we consider a relational property R sw :…”
Section: Discussionmentioning
confidence: 99%
“…We expect that user-provided coupling invariants and loop properties can avoid having to rely on code transformation methods. Moreover, we expect termination and co-termination [16], [34] to be used to extend the modularity of relational contracts. Recall that we consider a relational property R sw :…”
Section: Discussionmentioning
confidence: 99%
“…We study the verification of such properties in infinite-state systems arising, e.g., in software. In contrast to k-safety, where a broad range of methods has been developed [38,26,39,10,40], no method for the automated verification of temporal ∀ * ∃ * properties in infinite-state systems exists (we discuss related approaches in Section 8).…”
Section: Verification Beyond K-safetymentioning
confidence: 99%
“…Hyperproperties are system properties that relate multiple execution traces of a system [21] and commonly arise, e.g., in information-flow policies [34], the verification of code optimizations [6], and robustness of software [18]. Consequently, many methods for the automated verification of hyperproperties have been developed [38,40,26,39]. Almost all previous approaches verify a class of hyperproperties called k-safety, i.e., properties that stipulate the absence of a bad interaction between any k traces in the system.…”
Section: Introductionmentioning
confidence: 99%
“…Farzan and Vandikas [FV19] describe an approach to hypersafety verification of unary programs by discovering representative executions of a product program, whose correctness proofs are sufficient to prove the overall property. Unno et al [UTK21] work with transition systems and use a constraintsolving approach to automatically discover a "scheduler"-a form of alignment described as a function that directs which element of the -tuple (product of transition systems) should take the next step.…”
Section: Other Related Workmentioning
confidence: 99%