Proceedings of the 2014 International SPIN Symposium on Model Checking of Software 2014
DOI: 10.1145/2632362.2632364
|View full text |Cite
|
Sign up to set email alerts
|

CTL+FO verification as constraint solving

Abstract: Expressing program correctness often requires relating program data throughout (different branches of) an execution. Such properties can be represented using CTL+FO, a logic that allows mixing temporal and first-order quantification. Verifying that a program satisfies a CTL+FO property is a challenging problem that requires both temporal and data reasoning. Temporal quantifiers require discovery of invariants and ranking functions, while first-order quantifiers demand instantiation techniques. In this paper, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…We are currently working on the verification of CTL formulas, by using a recently developed encoding into Horn clauses [4]. Furthermore, we plan to extend our tool in order to check non-interference properties and prove the absence of implicit information flows.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…We are currently working on the verification of CTL formulas, by using a recently developed encoding into Horn clauses [4]. Furthermore, we plan to extend our tool in order to check non-interference properties and prove the absence of implicit information flows.…”
Section: Resultsmentioning
confidence: 99%
“…The Horn clauses are encoded in the SMT-LIB format supported by many popular SMT solvers, including our choice Z3 [9]. HornDroid automatically generates analysis queries based on its database of sources and sinks 4 and the unsatisfiability of the queries is verified using the Property-Directed Reachability (PDR) engine implemented in Z3 [16]. If no query is satisfiable, no information leak from a source to a sink may occur in the analysed application.…”
Section: Methodsmentioning
confidence: 99%
“…With respect to the verification of temporal properties, a danger invariant for a loop with an assertion A essentially proves the CTL property EF¬A over the loop. While there exist CTL verifiers based on a reduction to exist-forall quantified Horn clauses [11,12], we specialise the concept for finding deep bugs and describe a modular constraint generation technique over arbitrary programs, rather than for transition systems.…”
Section: Bug Findingmentioning
confidence: 99%
“…Various kinds of symbolic techniques such as: (i) automata and grammars, e.g., [1,15,13,14,38,66,5,4,3,33]; (ii) SMT and other forms of constraint solving, e.g., [6,20,35,36,64,73,75,39,11]; and (iii) narrowing [72,30,31,9,10], have been employed for this purpose. All are useful in their own way and can complement each other; and there is great interest in combining the power of these different symbolic approaches to handle a wider range of applications [59,60] (see, e.g., [70] and the survey [58] for combinations of this kind).…”
Section: Introductionmentioning
confidence: 99%