2016 Formal Methods in Computer-Aided Design (FMCAD) 2016
DOI: 10.1109/fmcad.2016.7886669
|View full text |Cite
|
Sign up to set email alerts
|

Proof certificates for SMT-based model checkers for infinite-state systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 19 publications
0
11
0
Order By: Relevance
“…We start from a benchmark suite that is a superset of the benchmarks used in the previous experiments. This suite contains 660 models, and includes all models that yield a valid result (530 in total) from previous Lustre model checking papers [59,119] and 130 industrial models yielding valid results derived from an infusion pump system [3] and other sources [59,121]. As this paper is concerned with analysis problems involving multiple MIVCs, we include only models that had more than 4 MIVCs (46 models in total).…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…We start from a benchmark suite that is a superset of the benchmarks used in the previous experiments. This suite contains 660 models, and includes all models that yield a valid result (530 in total) from previous Lustre model checking papers [59,119] and 130 industrial models yielding valid results derived from an infusion pump system [3] and other sources [59,121]. As this paper is concerned with analysis problems involving multiple MIVCs, we include only models that had more than 4 MIVCs (46 models in total).…”
Section: Methodsmentioning
confidence: 99%
“…For this purpose, we have collected a large set of benchmarks from different sources. Our experiments are conducted on a set of benchmarks containing 660 Lustre models, 530 from [59,119] and 130 industrial models derived from [3] and other sources [59,121]. This evaluation shows promising results about the IVC techniques.…”
Section: Chaptermentioning
confidence: 99%
See 1 more Smart Citation
“…These tools are JKind model checker and Graphviz. JKind is a software tool that we used to conduct cyberattack scenarios against the PARMS [40]. The model checker keeps checking repeatedly if a given finite-state model of a system meets a given security property of importance.…”
Section: Attack Graph Generationmentioning
confidence: 99%
“…In SMC kinduction is equivalent to induction: any k-inductive property P can be strengthened to an inductive property Q [6,16]. Even though in the worst case Q is exponentially larger than P [6], this is rarely observed in practice [26]. Furthermore, the SAT queries get very hard as k increases and usually succeed only for rather small values of k. A recent work [16] shows that strong induction can be integrated in Pdr.…”
Section: Introductionmentioning
confidence: 99%