2010
DOI: 10.1109/tcad.2010.2041847
|View full text |Cite
|
Sign up to set email alerts
|

Partitioning Interpolant-Based Verification for Effective Unbounded Model Checking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 24 publications
0
6
0
Order By: Relevance
“…• BDD-based representations and traversals (BDD), including forward, backward, combined (approximate) forward/ (exact) backward reachability algorithms [14], [15] partitioned BDDs and/or image computation procedures [16], [17] • Interpolant-based verification (ITP), with ad-hoc abstraction and tightening techniques [18], [19], integrated SAT-based approaches [20], [21], Interpolant reduction techniques [22] and Guided Refinement [23] • Property Directed Reachability (PDR) verification strategies [24] Figures 4 and 5 show verification results considering three different unbounded model checking strategies: interpolation (ITP), binary decision diagram reachability (BDD) and Property Directed Reachability strategy (PDR). Results show that the most suitable strategy for the presented security properties verification is PDR.…”
Section: B Verification Strategiesmentioning
confidence: 99%
“…• BDD-based representations and traversals (BDD), including forward, backward, combined (approximate) forward/ (exact) backward reachability algorithms [14], [15] partitioned BDDs and/or image computation procedures [16], [17] • Interpolant-based verification (ITP), with ad-hoc abstraction and tightening techniques [18], [19], integrated SAT-based approaches [20], [21], Interpolant reduction techniques [22] and Guided Refinement [23] • Property Directed Reachability (PDR) verification strategies [24] Figures 4 and 5 show verification results considering three different unbounded model checking strategies: interpolation (ITP), binary decision diagram reachability (BDD) and Property Directed Reachability strategy (PDR). Results show that the most suitable strategy for the presented security properties verification is PDR.…”
Section: B Verification Strategiesmentioning
confidence: 99%
“…This work led us to consider 11 new engines, and enrich our portfolio, to finally include the following 36 methodologies: -9 BDD-based methods [12], i.e., forward, backward and forward/backward, with 3 MC schemes available for each method, based on different clustering and early quantification, insertion of cut-point, etc. -24 ITP-based [16] techniques, with different partitioning and quantification schemes [17][18][19][20][21] (6 base engines multiplied by 4 different running configurations). -2 SAT-based strategies (simple induction [14] and inductive invariants [15,22]).…”
Section: Portfolio Strategiesmentioning
confidence: 99%
“…It includes falsification features, even if it is mainly oriented to the proof of (true) properties. No expert system (or portfolio manager) was present before this work, except an interpolant-based approach integrating a few other SAT-and BDD-based techniques [20,21].…”
Section: The Pdtrav Packagementioning
confidence: 99%
See 2 more Smart Citations