2013 Formal Methods in Computer-Aided Design 2013
DOI: 10.1109/fmcad.2013.6679392
|View full text |Cite
|
Sign up to set email alerts
|

Invariants for finite instances and beyond

Abstract: Abstract-Verification of safety properties of concurrent programs with an arbitrary numbers of processes is an old challenge. In particular, complex parameterized protocols like FLASH are still out of the scope of state-of-the-art model checkers. In this paper, we describe a new algorithm, called BRAB, that is able to automatically infer invariants strong enough to prove a protocol like FLASH. BRAB computes over-approximations of backward reachable states that are checked to be unreachable in a finite instance… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(26 citation statements)
references
References 38 publications
0
26
0
Order By: Relevance
“…This is an advantage since development of automatic and scalable over-abstraction based parameterized safety verification techniques is a promising area of ongoing research (e.g. [15]) which our approach directly benefits from.…”
Section: Methodsmentioning
confidence: 99%
“…This is an advantage since development of automatic and scalable over-abstraction based parameterized safety verification techniques is a promising area of ongoing research (e.g. [15]) which our approach directly benefits from.…”
Section: Methodsmentioning
confidence: 99%
“…In the evaluation, the resulting CHCs are solved by a CHC solver Spacer [19,18]. This combination is similar to the MCMT [14] approach, and, in particular, to the Barb algorithm [10] of Cubicle [9]. The key similarities and differences are highlighted below.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, FLASH protocol is the cache coherence protocol of the Stanford FLASH mutlitprocessor [1]. This protocol is so complex that only a few approaches [2], [3], [4], [5] have successfully verified it so far. Furthermore, all existing successful verification approaches have their downsides.…”
Section: Introductionmentioning
confidence: 99%
“…The cases of [3] and [4] are similar to [2] that hand-crafted invariants are required to provide by human experts. As a contrast, [5] is a model checking based approach which can be carried out automatically. However, the formal proof can not be obtained from the work of [5].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation