Skip to main content

Showing 1–7 of 7 results for author: Wendler, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2208.05046  [pdf, other

    cs.SE cs.PL

    Interpolation and SAT-Based Model Checking Revisited: Adoption to Software Verification

    Authors: Dirk Beyer, Nian-Ze Lee, Philipp Wendler

    Abstract: The article "Interpolation and SAT-Based Model Checking" (McMillan, 2003) describes a formal-verification algorithm, which was originally devised to verify safety properties of finite-state transition systems. It derives interpolants from unsatisfiable BMC queries and collects them to construct an overapproximation of the set of reachable states. Although 20 years old, the algorithm is still state… ▽ More

    Submitted 12 March, 2024; v1 submitted 9 August, 2022; originally announced August 2022.

    Comments: 29 pages, 8 figures, 2 tables

    ACM Class: D.2.4; F.3.1

  2. Program Analysis with Local Policy Iteration

    Authors: George Karpenkov, David Monniaux, Philipp Wendler

    Abstract: We present a new algorithm for deriving numerical invariants that combines the precision of max-policy iteration with the flexibility and scalability of conventional Kleene iterations. It is defined in the Configurable Program Analysis (CPA) framework, thus allowing inter-analysis communication. It uses adjustable-block encoding in order to traverse loop-free program sections, possibly containin… ▽ More

    Submitted 3 November, 2015; v1 submitted 11 September, 2015; originally announced September 2015.

  3. arXiv:1502.00096  [pdf, other

    cs.SE cs.PL

    Combining k-Induction with Continuously-Refined Invariants

    Authors: Dirk Beyer, Matthias Dangl, Philipp Wendler

    Abstract: Bounded model checking (BMC) is a well-known and successful technique for finding bugs in software. k-induction is an approach to extend BMC-based approaches from falsification to verification. Automatically generated auxiliary invariants can be used to strengthen the induction hypothesis. We improve this approach and further increase effectiveness and efficiency in the following way: we start wit… ▽ More

    Submitted 31 January, 2015; originally announced February 2015.

    Comments: 12 pages, 5 figures, 2 tables, 2 algorithms

    Report number: MIP-1503

  4. arXiv:1502.00045  [pdf, other

    cs.SE cs.PL

    Domain-Type-Guided Refinement Selection Based on Sliced Path Prefixes

    Authors: Dirk Beyer, Stefan Löwe, Philipp Wendler

    Abstract: Abstraction is a successful technique in software verification, and interpolation on infeasible error paths is a successful approach to automatically detect the right level of abstraction in counterexample-guided abstraction refinement. Because the interpolants have a significant influence on the quality of the abstraction, and thus, the effectiveness of the verification, an algorithm for deriving… ▽ More

    Submitted 30 January, 2015; originally announced February 2015.

    Comments: 10 pages, 5 figures, 1 table, 4 algorithms

    Report number: MIP-1501

  5. arXiv:1305.6915  [pdf, other

    cs.SE cs.PL

    Reusing Precisions for Efficient Regression Verification

    Authors: Dirk Beyer, Stefan Löwe, Evgeny Novikov, Andreas Stahlbauer, Philipp Wendler

    Abstract: Continuous testing during development is a well-established technique for software-quality assurance. Continuous model checking from revision to revision is not yet established as a standard practice, because the enormous resource consumption makes its application impractical. Model checkers compute a large number of verification facts that are necessary for verifying if a given specification hold… ▽ More

    Submitted 29 May, 2013; originally announced May 2013.

    Comments: 14 pages, 2 figures, 6 tables

    Report number: MIP-1302

  6. arXiv:1110.0021  [pdf, other

    cs.SE cs.PL

    Feature-Aware Verification

    Authors: Sven Apel, Hendrik Speidel, Philipp Wendler, Alexander von Rhein, Dirk Beyer

    Abstract: A software product line is a set of software products that are distinguished in terms of features (i.e., end-user--visible units of behavior). Feature interactions ---situations in which the combination of features leads to emergent and possibly critical behavior--- are a major source of failures in software product lines. We explore how feature-aware verification can improve the automatic detecti… ▽ More

    Submitted 30 September, 2011; originally announced October 2011.

    Comments: 12 pages, 9 figures, 1 table

    Report number: Technical Report, Number MIP-1105, University of Passau, Germany

  7. arXiv:1109.6926  [pdf, other

    cs.SE cs.PL

    Conditional Model Checking

    Authors: Dirk Beyer, Thomas A. Henzinger, M. Erkan Keremoglu, Philipp Wendler

    Abstract: Software model checking, as an undecidable problem, has three possible outcomes: (1) the program satisfies the specification, (2) the program does not satisfy the specification, and (3) the model checker fails. The third outcome usually manifests itself in a space-out, time-out, or one component of the verification tool giving up; in all of these failing cases, significant computation is performed… ▽ More

    Submitted 30 September, 2011; originally announced September 2011.

    Comments: 14 pages, 8 figures, 3 tables

    Report number: Technical Report, Number MIP-1107, University of Passau, Germany