2014 Formal Methods in Computer-Aided Design (FMCAD) 2014
DOI: 10.1109/fmcad.2014.6987597
|View full text |Cite
|
Sign up to set email alerts
|

Disproving termination with overapproximation

Abstract: Abstract-When disproving termination using known techniques (e.g. recurrence sets), abstractions that overapproximate the program's transition relation are unsound. In this paper we introduce live abstractions, a natural class of abstractions that can be combined with the recent concept of closed recurrence sets to soundly disprove termination. To demonstrate the practical usefulness of this new approach we show how programs with nonlinear, nondeterministic, and heap-based commands can be shown nonterminating … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
36
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(36 citation statements)
references
References 33 publications
0
36
0
Order By: Relevance
“…LoAT The TPDB examples mostly use linear arithmetic and T2 and VeryMax are restricted to such programs [11,32]. To evaluate LoAT on examples with non-linear arithmetic, we also compared with the tool Anant [14], which has been specifically designed to handle non-linearity. Here, we used the 29 non-terminating programs with non-linear arithmetic from the evaluation of [14].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…LoAT The TPDB examples mostly use linear arithmetic and T2 and VeryMax are restricted to such programs [11,32]. To evaluate LoAT on examples with non-linear arithmetic, we also compared with the tool Anant [14], which has been specifically designed to handle non-linearity. Here, we used the 29 non-terminating programs with non-linear arithmetic from the evaluation of [14].…”
Section: Methodsmentioning
confidence: 99%
“…Proving non-termination of integer programs is an important research topic (e.g., [2,7,13,14,26,32,33,34,39,40]). In another line of research, under-approximating loop acceleration is used to analyze safety [30] and runtime complexity [21].…”
Section: Introductionmentioning
confidence: 99%
“…Traditional algorithms, e.g. [3,6,8,20,22], are based on a search for lasso-shaped traces and a discovery of recurrence sets, i.e., states that are visited infinitely often. For instance, [32] searches for a geometric series in lasso-shaped traces.…”
Section: Related Workmentioning
confidence: 99%
“…That is, they find a set of states from which a program cannot escape. This can be done using Farkas' lemma [14], forward [8] or backward [34] abstract interpretation based analysis, or by encoding the search as a max-SMT problem [26]. Le et al propose a specification logic and an inference algorithm [27] (implemented in HipTNT+) that can capture the absence of terminating behaviors.…”
Section: Related Workmentioning
confidence: 99%
“…Several modern analyses [8,13,14,26] characterize non-terminating behaviors with a notion of recurrent set, i.e., a set of states from which an execution of the program or fragment cannot or might not escape (there exist multiple definitions). In this paper, we focus on the notion of an existential recurrent set -a set of states, s.t., from every state in the set there exists at least one non-terminating execution.…”
Section: Introductionmentioning
confidence: 99%