2013
DOI: 10.1007/s10009-013-0293-y
|View full text |Cite
|
Sign up to set email alerts
|

Implementation-level verification of algorithms with KeY

Abstract: We give an account on the authors' experience and results from the software verification competition held at the Formal Methods 2012 conference. Competitions like this are meant to provide a benchmark for verification systems. It consisted of three algorithms which the authors have implemented in Java, specified with the Java Modeling Language, and verified using the KeY system. Building on our solutions, we argue that verification systems which target implementations in real-world programming languages better… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
5
2
1

Relationship

4
4

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 21 publications
0
9
0
Order By: Relevance
“…A JML* specification of red-black trees was proposed in [30], but the specification has not been verified. A successful deductive verification of a tree operation specified in JML* has been reported in [31]. However, they use extensions to JML such as abstract data types and complex frame conditions that cannot be reduced to standard JML.…”
Section: Applying the Approach To Treesmentioning
confidence: 98%
“…A JML* specification of red-black trees was proposed in [30], but the specification has not been verified. A successful deductive verification of a tree operation specified in JML* has been reported in [31]. However, they use extensions to JML such as abstract data types and complex frame conditions that cannot be reduced to standard JML.…”
Section: Applying the Approach To Treesmentioning
confidence: 98%
“…@ accessible footprintUntilLeft(t); @ measured_by height; @ model boolean leftSubTree(Tree t) { return t == this || (left != null && left.leftSubTree(t)); } @*/ Figure 5. An excerpt of the solution to the Tree challenge from [5].…”
Section: Terminationmentioning
confidence: 99%
“…Although this challenge does not, e.g., require the use of two-state model methods or in fact even inheritance, the solution that uses model methods is far more elegant than all the other solutions we have (unsuccessfully) tried previously. The challenge and our solution are described in full in [9], here we only present the essence of our solution.…”
Section: Model Methods In Practicementioning
confidence: 99%