2015
DOI: 10.1007/978-3-662-46681-0_34
|View full text |Cite
|
Sign up to set email alerts
|

CPAchecker with Support for Recursive Programs and Floating-Point Arithmetic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 40 publications
(22 citation statements)
references
References 3 publications
0
22
0
Order By: Relevance
“…We call such a verifier witness validator. A widely-used instance of error-witness validation is counterexample checking (e.g., [30]), for example during the refinement phase in CEGAR [21], where an abstract counterexample (which is an error witness) is checked for feasibility (the witness testifies against the program's claim to correctness). The given error witness is either rejected, which means that it describes no feasible counterexample, or it is accepted because it contains a concrete error path and CEGAR stops.…”
Section: Testificationmentioning
confidence: 99%
See 1 more Smart Citation
“…We call such a verifier witness validator. A widely-used instance of error-witness validation is counterexample checking (e.g., [30]), for example during the refinement phase in CEGAR [21], where an abstract counterexample (which is an error witness) is checked for feasibility (the witness testifies against the program's claim to correctness). The given error witness is either rejected, which means that it describes no feasible counterexample, or it is accepted because it contains a concrete error path and CEGAR stops.…”
Section: Testificationmentioning
confidence: 99%
“…• Witness validation can be used to automatically eliminate false alarms in program analysis (e.g., as used in [30]). …”
Section: Introductionmentioning
confidence: 99%
“…We compare 13 verifiers that participated successfully in the category Reachsafety-Recursive of SV-COMP. This includes the predicate-based verifiers CPAchecker [35,56], PeSCo [34,49] and Ultimate Automizer [37,39], the bounded model checkers Cbmc [29,42] and Esbmc [36,45], the symbolic-execution tool Symbiotic [24,25], as well as the SMTbased tool Map2Check [51,52]. The binary archives of all verifiers are publicly available.…”
Section: Resultsmentioning
confidence: 99%
“…On reaching the UNKNOWN configuration, we exit the verification sequence. Instead of leaving the overall process, specialized techniques will be applied in the following situations: For recursive programs we facilitate Block Abstraction Memoization (BAM) [8,13] and Binary Decision Diagrams (BDD) [2] are used for concurrent programs. Witnesses are written as generated by the verifiers.…”
Section: Software Architecturementioning
confidence: 99%