2020
DOI: 10.1007/978-3-030-45237-7_24
|View full text |Cite
|
Sign up to set email alerts
|

Dartagnan: Bounded Model Checking for Weak Memory Models (Competition Contribution)

Abstract: Dartagnanis a bounded model checker for concurrent programs under weak memory models. What makes it different from other tools is that the memory model is not hard-coded inside Dartagnanbut taken as part of the input. For SV-COMP’20, we take as input sequential consistency (i.e. the standard interleaving memory model) extended by support for atomic blocks. Our point is to demonstrate that a universal tool can be competitive and perform well in SV-COMP. Being a bounded model checker, Dartagnan’s focus is on dis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…GenMC [53] is a stateless model checker that can efficiently verify C++ programs. Dartagnan [54] is another model checker that can accept any axiomatic memory model that is specified in the CAT language. Recent work by Ponce de Le ón et al [55] and by Fan et al [56] has cast memory-model consistency axioms as a theory that can be deployed by SMT solvers.…”
Section: Related Workmentioning
confidence: 99%
“…GenMC [53] is a stateless model checker that can efficiently verify C++ programs. Dartagnan [54] is another model checker that can accept any axiomatic memory model that is specified in the CAT language. Recent work by Ponce de Le ón et al [55] and by Fan et al [56] has cast memory-model consistency axioms as a theory that can be deployed by SMT solvers.…”
Section: Related Workmentioning
confidence: 99%
“…For C programs, we use SMACK [8] to compile to LLVM and transform the compiled code to Boogie. Dartagnan's architecture, and main verification techniques (in particular how to efficiently handle different memory models) are described in [3,4,7]. Version 2.0.7 participating in SV-COMP'21 [1] can be downloaded from https://github.com/hernanponcedeleon/Dat3M directly as a java archive (.jar) or built from source code using the Maven build system.…”
Section: Overviewmentioning
confidence: 99%
“…To answer RQ3, we report on our development efforts to support all vulnerabilities discussed in this paper. KAIBYO is based on the tool DARTAGNAN [18] which implements the traditional control flow encoding from §III-A and supports the core of the CAT language from Fig. 3.…”
Section: Flexibility Of the Analysismentioning
confidence: 99%