Bounded model checking of high-integrity software
Abstract
References
Index Terms
- Bounded model checking of high-integrity software
Recommendations
Bounded model checking of high-integrity software
HILT '13Model checking [5] is an automated algorithmic technique for exhaustive verification of systems, described as finite state machines, against temporal logic [9] specifications. It has been used successfully to verify hardware at an industrial scale [6]. ...
Improved bounded model checking for the universal fragment of CTL
SAT-based bounded model checking (BMC) has been introduced as a complementary technique to BDD-based symbolic model checking in recent years, and a lot of successful work has been done in this direction. The approach was first introduced by A. Biere et ...
Handling loops in bounded model checking of C programs via k-induction
The first attempts to apply the k-induction method to software verification are only recent. In this paper, we present a novel proof by induction algorithm, which is built on the top of a symbolic context-bounded model checker and uses an iterative ...
Comments
Information & Contributors
Information
Published In
- December 201380 pages
Sponsors
- Ada Europe: Ada Europe
- SIGAda: ACM Special Interest Group on Ada Programming Language
In-Cooperation
- SIGAPP: ACM Special Interest Group on Applied Computing
- SIGPLAN: ACM Special Interest Group on Programming Languages
- SIGBED: ACM Special Interest Group on Embedded Systems
- SIGSOFT: ACM Special Interest Group on Software Engineering
- SIGCAS: ACM Special Interest Group on Computers and Society
- SIGCSE: ACM Special Interest Group on Computer Science Education
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Tutorial
Conference
- Ada Europe
- SIGAda
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 124Total Downloads
- Downloads (Last 12 months)4
- Downloads (Last 6 weeks)3
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in