-
1
-
-
58749090365
-
Bounded model checking of software using smt solvers instead of sat solvers
-
A. Armando, J. Mantovani, and L. Platania, "Bounded model checking of software using smt solvers instead of sat solvers," Int. J. Softw. Tools Technol. Transf., vol. 11, pp. 69-83, 2009.
-
(2009)
Int. J. Softw. Tools Technol. Transf.
, vol.11
, pp. 69-83
-
-
Armando, A.1
Mantovani, J.2
Platania, L.3
-
2
-
-
84894630000
-
Automatically validating temporal safety properties of interfaces
-
T. Ball and S. Rajamani, "Automatically validating temporal safety properties of interfaces," in SPIN Workshop, 2001, pp. 103-122.
-
SPIN Workshop, 2001
, pp. 103-122
-
-
Ball, T.1
Rajamani, S.2
-
3
-
-
33749664425
-
Boogie: A modular reusable verifier for object-oriented programs
-
M. Barnett, B. Chang, R. Deline, and et al., "Boogie: A modular reusable verifier for object-oriented programs,"in FMCO, 2006, pp. 364-387.
-
(2006)
FMCO
, pp. 364-387
-
-
Barnett, M.1
Chang, B.2
Deline, R.3
-
5
-
-
0036980185
-
Korat: Automated testing based on java predicates
-
C. Boyapati, S. Khurshid, and D. Marinov, "Korat: Automated testing based on java predicates," in ISSTA, 2002, pp. 123-133.
-
(2002)
ISSTA
, pp. 123-133
-
-
Boyapati, C.1
Khurshid, S.2
Marinov, D.3
-
7
-
-
35048861896
-
A tool for checking ANSI-C programs
-
E. Clarke, D. Kroening, and F. Lerda, "A tool for checking ANSI-C programs," in TACAS, 2004, pp. 168-176.
-
(2004)
TACAS
, pp. 168-176
-
-
Clarke, E.1
Kroening, D.2
Lerda, F.3
-
8
-
-
25844442786
-
Esc/java2: Uniting esc/java and jml - Progress and issues in building and using esc/java2
-
SpringerVerlag
-
D. R. Cok and J. R. Kiniry, "Esc/java2: Uniting esc/java and jml - progress and issues in building and using esc/java2," in CASSIS. SpringerVerlag, 2004.
-
(2004)
CASSIS
-
-
Cok, D.R.1
Kiniry, J.R.2
-
9
-
-
77952137297
-
Smt-based bounded model checking for embedded ansi-c software
-
L. Cordeiro, B. Fischer, and J. Marques-Silva, "Smt-based bounded model checking for embedded ansi-c software," in ASE, 2009, pp. 137-148.
-
(2009)
ASE
, pp. 137-148
-
-
Cordeiro, L.1
Fischer, B.2
Marques-Silva, J.3
-
10
-
-
45749085681
-
Z3: An efficient smt solver
-
L. de Moura and N. Bjørner, "Z3: An efficient smt solver," in TACAS, 2008, pp. 337-340.
-
(2008)
TACAS
, pp. 337-340
-
-
De Moura, L.1
Bjørner, N.2
-
12
-
-
34247324377
-
Modular verification of code with sat
-
G. Dennis, F. Chang, and D. Jackson, "Modular verification of code with sat," in ISSTA, 2006, pp. 109-120.
-
(2006)
ISSTA
, pp. 109-120
-
-
Dennis, G.1
Chang, F.2
Jackson, D.3
-
13
-
-
37849010680
-
Finding bugs efficiently with a sat solver
-
J. Dolby, M. Vaziri, and F. Tip, "Finding bugs efficiently with a sat solver," in FSE, 2007, pp. 195-204.
-
(2007)
FSE
, pp. 195-204
-
-
Dolby, J.1
Vaziri, M.2
Tip, F.3
-
14
-
-
0036036098
-
Extended static checking for java
-
C. Flanagan, R. Leino, M. Lillibridge, G. Nelson, J. Saxe, and R. Stata, "Extended static checking for java," in PLDI, 2002, pp. 234-245.
-
(2002)
PLDI
, pp. 234-245
-
-
Flanagan, C.1
Leino, R.2
Lillibridge, M.3
Nelson, G.4
Saxe, J.5
Stata, R.6
-
15
-
-
46149102489
-
Accelerating high-level bounded model checking
-
M. Ganai and A. Gupta, "Accelerating high-level bounded model checking," in ICCAD, 2006, pp. 794-801.
-
(2006)
ICCAD
, pp. 794-801
-
-
Ganai, M.1
Gupta, A.2
-
17
-
-
26444468031
-
F-soft: Software verification platform
-
F. Ivančić, Z. Yang, M. Ganai, A. Gupta, I. Shlyakhter, and P. Ashar, "F-soft: Software verification platform,"in CAV, 2005, pp. 301-306.
-
(2005)
CAV
, pp. 301-306
-
-
Ivančić, F.1
Yang, Z.2
Ganai, M.3
Gupta, A.4
Shlyakhter, I.5
Ashar, P.6
-
18
-
-
0346255705
-
-
[Online]. Available
-
"Jml reference manual." [Online]. Available: http://www.eecs.ucf.edu/ leavens/JML/
-
Jml Reference Manual
-
-
-
19
-
-
35248872018
-
Generalized symbolic execution for model checking and testing
-
S. Khurshid, C. Pasareanu, and W. Visser, "Generalized symbolic execution for model checking and testing," in TACAS, 2003, pp. 553-568.
-
(2003)
TACAS
, pp. 553-568
-
-
Khurshid, S.1
Pasareanu, C.2
Visser, W.3
-
22
-
-
26944445043
-
Simulating reachability using first-order logic with applications to verification of linked data structures
-
T. Lev-ami, N. Immerman, T. Reps, M. Sagiv, and et al., "Simulating reachability using first-order logic with applications to verification of linked data structures,"in In CADE-20, 2005, pp. 99-115.
-
(2005)
CADE-20
, pp. 99-115
-
-
Lev-ami, T.1
Immerman, N.2
Reps, T.3
Sagiv, M.4
-
23
-
-
84906086021
-
Tvla: A system for implementing static analyses
-
T. Lev-Ami and M. Sagiv, "Tvla: A system for implementing static analyses," in SAS, 2000, pp. 280-301.
-
(2000)
SAS
, pp. 280-301
-
-
Lev-Ami, T.1
Sagiv, M.2
-
25
-
-
0013090018
-
Testera: A novel frame-work for automated testing of java programs
-
D. Marinov and S. Khurshid, "Testera: A novel frame-work for automated testing of java programs," in ASE, 2001, pp. 322-342.
-
(2001)
ASE
, pp. 322-342
-
-
Marinov, D.1
Khurshid, S.2
-
26
-
-
35148886764
-
Efficient e-matching for smt solvers
-
L. Moura and N. Bjørner, "Efficient e-matching for smt solvers," in CADE, 2007, pp. 183-198.
-
(2007)
CADE
, pp. 183-198
-
-
Moura, L.1
Bjørner, N.2
-
27
-
-
81055127127
-
A dataflow analysis to improve sat-based bounded program verification
-
B. Parrino, J. Galeotti, D. Garbervetsky, and M. Frias, "A dataflow analysis to improve sat-based bounded program verification," in SEFM, 2011, pp. 138-154.
-
(2011)
SEFM
, pp. 138-154
-
-
Parrino, B.1
Galeotti, J.2
Garbervetsky, D.3
Frias, M.4
-
28
-
-
84855441649
-
An incremental approach to scope-bounded checking using a lightweight formal method
-
D. Shao, S. Khurshid, and D. Perry, "An incremental approach to scope-bounded checking using a lightweight formal method," in FM, 2009.
-
(2009)
FM
-
-
Shao, D.1
Khurshid, S.2
Perry, D.3
-
29
-
-
79952017580
-
Optimizing incremental scope-bounded checking with data-flow analysis
-
D. Shao, D. Gopinath, S. Khurshid, and D. Perry, "Optimizing incremental scope-bounded checking with data-flow analysis," in ISSRE, 2010, pp. 408-417.
-
(2010)
ISSRE
, pp. 408-417
-
-
Shao, D.1
Gopinath, D.2
Khurshid, S.3
Perry, D.4
-
30
-
-
84874011582
-
A precise memory model for low-level bounded model checking
-
C. Sinz, S. Falke, and F. Merz, "A precise memory model for low-level bounded model checking," in SSV, 2010.
-
(2010)
SSV
-
-
Sinz, C.1
Falke, S.2
Merz, F.3
-
34
-
-
77954700037
-
Memsat: Checking axiomatic specifications of memory models
-
E. Torlak, M. Vaziri, and J. Dolby, "Memsat: checking axiomatic specifications of memory models," in PLDI, 2010, pp. 341-350.
-
(2010)
PLDI
, pp. 341-350
-
-
Torlak, E.1
Vaziri, M.2
Dolby, J.3
-
35
-
-
84903134095
-
The loop compiler for java and jml
-
J. van den Berg and B. Jacobs, "The loop compiler for java and jml," in TACAS, 2001, pp. 299-312.
-
(2001)
TACAS
, pp. 299-312
-
-
Van Den Berg, J.1
Jacobs, B.2
-
37
-
-
84960853881
-
Model checking programs
-
W. Visser, K. Havelund, G. Brat, S. Part, and F. Lerda, "Model checking programs," in ASE, 2000, pp. 3-11.
-
(2000)
ASE
, pp. 3-11
-
-
Visser, W.1
Havelund, K.2
Brat, G.3
Part, S.4
Lerda, F.5
-
38
-
-
84983233748
-
Development and evaluation of LAV: An SMT-based error finding platform
-
M. Vujošević-Janičić and V. Kuncak, "Development and evaluation of LAV: an SMT-based error finding platform," in VSTTE, 2012.
-
(2012)
VSTTE
-
-
Vujošević-Janičić, M.1
Kuncak, V.2
-
39
-
-
79958746832
-
Efficiently solving quantified bit-vector formulas
-
C. Wintersteiger, Y. Hamadi, and L. de Moura, "Efficiently solving quantified bit-vector formulas," in FMCAD, 2010, pp. 239-246.
-
(2010)
FMCAD
, pp. 239-246
-
-
Wintersteiger, C.1
Hamadi, Y.2
De Moura, L.3
|