Proceedings of the 14th Workshop on Formal Techniques for Java-Like Programs 2012
DOI: 10.1145/2318202.2318208
|View full text |Cite
|
Sign up to set email alerts
|

Verifying the reflective visitor pattern

Abstract: Computational reflection allows a program to inspect and manipulate the structure or behaviour of itself at runtime. Often this means that it is possible to create more generic or adaptable programs in an elegant way. However, there is little support for specification and automatic verification of reflective programs. We address this problem by implementing, specifying, and verifying a reflective library using a Hoare-logic for a simple language with stored procedures. The latter is important since reflective … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2013
2013
2014
2014

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…The two extra pre and post annotations to the store-code statement hint serve this purpose and can give the necessary fold instruction. A demonstration of the use of such hints in a more realistic setting can be seen in the verification of the reflective visitor pattern [28].…”
Section: Advanced Hintsmentioning
confidence: 99%
See 3 more Smart Citations
“…The two extra pre and post annotations to the store-code statement hint serve this purpose and can give the necessary fold instruction. A demonstration of the use of such hints in a more realistic setting can be seen in the verification of the reflective visitor pattern [28].…”
Section: Advanced Hintsmentioning
confidence: 99%
“…The assertion language uses nested triples to specify stored procedures and recursively defined assertions to deal with recursion through the store. An SMT solver is invoked to deal with pure assertions and therefore Crowfoot can be used to prove more than just memory safety (see [13,28], and the example in this paper where fib is proved to compute Fibonacci numbers).…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations