2015
DOI: 10.1007/978-3-662-46681-0_40
|View full text |Cite
|
Sign up to set email alerts
|

Predator Hunting Party (Competition Contribution)

Abstract: This paper introduces PredatorHP (Predator Hunting Party), a program verifier built on top of the Predator shape analyser, and discusses its participation in the SV-COMP'15 software verification competition. Predator is a sound shape analyser dealing with C programs with lists implemented via low-level pointer operations. PredatorHP uses Predator to prove programs safe while at the same time using several bounded versions of Predator for bug hunting. The Underlying Verification ApproachAt the heart of Predator… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…CPAchecker [26] won the competition on software verification 2013 (SV-COMP'13, [7]) using a sequential combination [97] that started with explicit-state model checking for up to 100 s and then switched to a predicate analysis [27]. and PredatorHP [77], which start several different strategies simultaneously and take the result from the approach that terminates first.…”
Section: Sequential Combinations Examples Of Sequential Combinations Are Sdv Andmentioning
confidence: 99%
“…CPAchecker [26] won the competition on software verification 2013 (SV-COMP'13, [7]) using a sequential combination [97] that started with explicit-state model checking for up to 100 s and then switched to a predicate analysis [27]. and PredatorHP [77], which start several different strategies simultaneously and take the result from the approach that terminates first.…”
Section: Sequential Combinations Examples Of Sequential Combinations Are Sdv Andmentioning
confidence: 99%
“…Recursive programs are, however, analysed up to a given call depth only. PredatorHP, i.e., the Predator Hunting Party [3,4], whose flow of control is shown on the right, is implemented as a Python script, and used to increase the efficiency and precision of the analysis. Namely, PredatorHP runs the base Predator verifier in parallel with several Predator hunters that do not use the list-segment abstraction, do not join semantically different SMGs, nor use function summaries with matching of call parameters based on SMG entailment.…”
Section: Witnessxmlmentioning
confidence: 99%
“…Parallel Combinations. Examples of parallel combinations are the verifiers Ufo [47] and PredatorHP [62], which start several different strategies simultaneously and take the result from the approach that terminates first.…”
Section: Sequential Combinations Examples Of Sequential Combinations ...mentioning
confidence: 99%