2016
DOI: 10.1007/978-3-319-49052-6_13
|View full text |Cite
|
Sign up to set email alerts
|

Predator Shape Analysis Tool Suite

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Testification approaches [28,29,39,43,52,74,81] often sequentially combine a verification and a validation approach and prioritize or only report confirmed proofs and alarms. Sequential portfolio approaches [44,61] run distinct, independent analyses in sequence while parallel portfolio approaches [91,12,57,65,66,96] execute various, independent analyses in parallel. Parallel white-box combinations [7,9,37,38,54,56,59,79] run different approaches in parallel, which exchange information for the purpose of collaboration.…”
Section: Related Workmentioning
confidence: 99%
“…Testification approaches [28,29,39,43,52,74,81] often sequentially combine a verification and a validation approach and prioritize or only report confirmed proofs and alarms. Sequential portfolio approaches [44,61] run distinct, independent analyses in sequence while parallel portfolio approaches [91,12,57,65,66,96] execute various, independent analyses in parallel. Parallel white-box combinations [7,9,37,38,54,56,59,79] run different approaches in parallel, which exchange information for the purpose of collaboration.…”
Section: Related Workmentioning
confidence: 99%
“…Cooperative Verification. Several verification tools apply different analyses using no cooperation [1,2,38,49,54,64,65,76] or select a suitable analysis from a set of analyses [2,14,50,83,96]. Further approaches split the verification effort among different analyses [20,23,26,29,40,41,46,47,52,54,[89][90][91].…”
Section: Related Workmentioning
confidence: 99%
“…There are a number of related tools that can check pointer programs for memory safety. For example: a combination of ccured [Necula et al 2002] and blast [Henzinger et al 2003] due to Beyer et al [2005], invader [Yang et al 2008], xisa [Laviron et al 2010], slayer [Berdine et al 2011], infer [Calcagno and Distefano 2011], forester [Holík et al 2013], predator [Dudka et al 2013;Holík et al 2016], and aprove [Ströder et al 2017]. These tools can only handle sequential code.…”
Section: Related Workmentioning
confidence: 99%