2005
DOI: 10.1007/11513988_6
|View full text |Cite
|
Sign up to set email alerts
|

Interpolant-Based Transition Relation Approximation

Abstract: Abstract. In predicate abstraction, exact image computation is problematic, requiring in the worst case an exponential number of calls to a decision procedure. For this reason, software model checkers typically use a weak approximation of the image. This can result in a failure to prove a property, even given an adequate set of predicates. We present an interpolant-based method for strengthening the abstract transition relation in case of such failures. This approach guarantees convergence given an adequate se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
51
0

Year Published

2005
2005
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 75 publications
(51 citation statements)
references
References 16 publications
0
51
0
Order By: Relevance
“…The two algorithms use interpolation [32] and interpolation sequences [54] (as described in Section II-E) that, when combined with BMC, can provide complete model checking algorithms.…”
Section: E Interpolation and Model Checkingmentioning
confidence: 99%
See 1 more Smart Citation
“…The two algorithms use interpolation [32] and interpolation sequences [54] (as described in Section II-E) that, when combined with BMC, can provide complete model checking algorithms.…”
Section: E Interpolation and Model Checkingmentioning
confidence: 99%
“…Properties of the interpolants (such as logical strength) generated by different algorithms have been studied extensively in [37], [54], [76], and [84]. The generation of interpolants from resolution proofs and clausal proofs in CNF has been addressed in [45] and [83], respectively.…”
Section: E Craig Interpolationmentioning
confidence: 99%
“…Most applications of interpolants have so far been restricted to propositional logic, and the theories of equality with uninterpreted functions together with linear arithmetic [25,26,14,17,18]. This severely restricts the kind of programs and properties that have been studied in the software model checking literature, which have so far been restricted to niche control-dominated applications such as device drivers [2,15] and low level state machine properties such as correct usage of locks or files [15].…”
Section: Introductionmentioning
confidence: 99%
“…Counterexample-guided abstraction refinement (CEGAR) [5,2,15] with interpolation based abstraction refinement [14,17,26,18] has recently received a lot of attention as a robust technique for abstract static analysis of systems. In CEGAR, one attempts to prove a safety property starting with a crude abstraction on system states.…”
Section: Introductionmentioning
confidence: 99%
“…The Mondrian implementation was annotated with a set of assertions by the programmer. For the driver, we considered five safety properties identified in [11]. Both programs involve nontrivial bitwise operations.…”
Section: Introductionmentioning
confidence: 99%