Combining BMC and Complementary Approximate Reachability to Accelerate Bug-Finding
Abstract
References
Index Terms
- Combining BMC and Complementary Approximate Reachability to Accelerate Bug-Finding
Recommendations
Accelerate Safety Model Checking Based on Complementary Approximate Reachability
Model checking is an automatic formal verification method that is widely applied to hardware verification. Safety properties are the mainly verified properties in practice that can be falsified within finite steps if they do not hold for systems. However, ...
Tightening BDD-based approximate reachability with SAT-based clause generalization
DATE '14: Proceedings of the conference on Design, Automation & Test in EuropeIn the framework of symbolic model checking, BDD-based approximate reachability is potentially much more scalable than its exact counterpart. However, its practical applicability is highly limited by its static approach to abstraction, and the intrinsic ...
Constraint-based BMC: a backjumping strategy
Safety property checking is mandatory in the validation process of critical software. When formal verification tools fail to prove some properties, the automatic generation of counterexamples for a given loop depth is an important issue in practice. We ...
Comments
Information & Contributors
Information
Published In

- Conference Chair:
- Tulika Mitra,
- Program Chairs:
- Evangeline Young,
- Jinjun Xiong
Sponsors
In-Cooperation
- IEEE-EDS: Electronic Devices Society
- IEEE CAS
- IEEE CEDA
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 87Total Downloads
- Downloads (Last 12 months)20
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in