2017
DOI: 10.1007/978-3-662-54580-5_22
|View full text |Cite
|
Sign up to set email alerts
|

CPA-BAM-BnB: Block-Abstraction Memoization and Region-Based Memory Models for Predicate Abstractions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0
2

Year Published

2018
2018
2021
2021

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 6 publications
0
6
0
2
Order By: Relevance
“…It was evaluated on 2734 tasks from the Systems DeviceDriversLinux64 ReachSafety subcategory of the SV-COMP'18 benchmarks on Intel Xeon E3-1230 v5 (3.4 GHz) machines in the competition setting. The submitted configuration with slicing was compared to baseline CPA-BAM-BnB [7,8] configuration (-ldv-bam-svcomp) without slicing that was also submitted to this year's competition. The results are presented in the following There are two significant limitations of the approach.…”
Section: Evaluation Of the Approachmentioning
confidence: 99%
“…It was evaluated on 2734 tasks from the Systems DeviceDriversLinux64 ReachSafety subcategory of the SV-COMP'18 benchmarks on Intel Xeon E3-1230 v5 (3.4 GHz) machines in the competition setting. The submitted configuration with slicing was compared to baseline CPA-BAM-BnB [7,8] configuration (-ldv-bam-svcomp) without slicing that was also submitted to this year's competition. The results are presented in the following There are two significant limitations of the approach.…”
Section: Evaluation Of the Approachmentioning
confidence: 99%
“…Software verification is an increasingly important research area, and the annual Competition on Software Verification (SV-COMP) 1 is the showcase of the state of the art in the area, in particular, of the effectiveness and efficiency that is currently achieved by tool implementations of the most recent ideas, concepts, and algorithms for fully automatic verification. Every year, the SV-COMP project consists of two parts: (1) The collection of verification tasks and their partitioning into categories has to take place before the actual experiments start, and requires quality-assurance work on the source code in order to ensure a high-quality evaluation.…”
Section: Introductionmentioning
confidence: 99%
“…As for (1), there were 31 participating software systems from 14 countries, representing a broad spectrum of technologies (cf. Table 5).…”
Section: Introductionmentioning
confidence: 99%
“…Одним ΠΈΠ· ΠΊΠ»ΡŽΡ‡Π΅Π²Ρ‹Ρ… Ρ„Π°ΠΊΡ‚ΠΎΡ€ΠΎΠ² для эффСктивного процСсса Π²Π΅Ρ€ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΠΈ являСтся Π²Ρ‹Π±ΠΎΡ€ ΠΌΠΎΠ΄Π΅Π»ΠΈ для прСдставлСния памяти ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΡ‹. Π’ ΠΏΡ€Π΅Π΄ΠΈΠΊΠ°Ρ‚Π½Ρ‹Ρ… модСлях памяти [10] ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅Ρ‚ΡΡ прСдикатная Π»ΠΎΠ³ΠΈΠΊΠ° ΠΈ, соотвСтствСнно, ΠΏΠ°ΠΌΡΡ‚ΡŒ ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΡ‹ описываСтся с ΠΏΠΎΠΌΠΎΡ‰ΡŒΡŽ логичСских Ρ„ΠΎΡ€ΠΌΡƒΠ», Π² ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Ρ… ΠΌΠΎΠ³ΡƒΡ‚ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚ΡŒΡΡ Ρ€Π°Π·Π»ΠΈΡ‡Π½Ρ‹Π΅ Ρ‚Π΅ΠΎΡ€ΠΈΠΈ, Π½Π°ΠΏΡ€ΠΈΠΌΠ΅Ρ€, тСория массивов ΠΈΠ»ΠΈ тСория Π½Π΅ΠΈΠ½Ρ‚Π΅Ρ€ΠΏΡ€Π΅Ρ‚ΠΈΡ€ΡƒΠ΅ΠΌΡ‹Ρ… Ρ„ΡƒΠ½ΠΊΡ†ΠΈΠΉ [11,12,13]. Π”Π°Π½Π½Ρ‹Π΅ ΠΌΠΎΠ΄Π΅Π»ΠΈ Ρ€Π΅Π°Π»ΠΈΠ·ΠΎΠ²Π°Π½Ρ‹, Π½Π°ΠΏΡ€ΠΈΠΌΠ΅Ρ€, Π² инструмСнтах BLAST [14,15], SLAM [16], CPAchecker [8].…”
Section: Introductionunclassified