2001
DOI: 10.1007/3-540-45139-0_7
|View full text |Cite
|
Sign up to set email alerts
|

Automatically validating temporal safety properties of interfaces

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
362
0
2

Year Published

2003
2003
2010
2010

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 318 publications
(369 citation statements)
references
References 25 publications
1
362
0
2
Order By: Relevance
“…Using static analysis this tool checks whether a C program operates according to its user written annotations. And the SLAM/SLIC combination [16] resembles our experiment even better. It is a Microsoft tool that checks safety properties of C programs without the need for users to write annotations by hand because it generates them automatically.…”
Section: Related Worksupporting
confidence: 62%
“…Using static analysis this tool checks whether a C program operates according to its user written annotations. And the SLAM/SLIC combination [16] resembles our experiment even better. It is a Microsoft tool that checks safety properties of C programs without the need for users to write annotations by hand because it generates them automatically.…”
Section: Related Worksupporting
confidence: 62%
“…This is important to know because many approaches to verification (e.g., [3]) are inherently associated with the generation of a counter-example path that exhibits the violation of the property of interest. Theorem 7 suggests the possibility that even the shortest error path in the program may be of size exponential in the size of the program.…”
Section: Theorem 7 If Np = Pspace Then There Does Not Exist a Polynmentioning
confidence: 99%
“…A technique that has received particular attention is that of finite state or typestate verification (e.g., see [24,23,19,5,7,3,8,12,11,16,1]). In this model, objects of a given type may exist in one of several states; the operations permitted on an object depend on the state of the object, and the operations may potentially alter the state of the object.…”
Section: Introductionmentioning
confidence: 99%
“…The SLAM tool [12] uses predicate-abstraction techniques to extract a Boolean program from C source code. One can then use Schwoon's translation [15] to obtain a PDS from a Boolean program.…”
Section: Comparision With the Predicate-abstraction Technique Of Slammentioning
confidence: 99%
“…This schema has been successfully applied to handle both pure non-concurrent (sequential) recursive programs in the tool SLAM [12], and concurrent non-recursive programs in the tools BLAST [13] and MAGIC [14].…”
Section: Introductionmentioning
confidence: 99%