2000
DOI: 10.1016/s1383-7621(00)00014-x
|View full text |Cite
|
Sign up to set email alerts
|

Symbolic forward/backward traversals of large finite state machines

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2001
2001
2016
2016

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…• BDD-based representations and traversals (BDD), including forward, backward, combined (approximate) forward/ (exact) backward reachability algorithms [14], [15] partitioned BDDs and/or image computation procedures [16], [17] • Interpolant-based verification (ITP), with ad-hoc abstraction and tightening techniques [18], [19], integrated SAT-based approaches [20], [21], Interpolant reduction techniques [22] and Guided Refinement [23] • Property Directed Reachability (PDR) verification strategies [24] Figures 4 and 5 show verification results considering three different unbounded model checking strategies: interpolation (ITP), binary decision diagram reachability (BDD) and Property Directed Reachability strategy (PDR). Results show that the most suitable strategy for the presented security properties verification is PDR.…”
Section: B Verification Strategiesmentioning
confidence: 99%
“…• BDD-based representations and traversals (BDD), including forward, backward, combined (approximate) forward/ (exact) backward reachability algorithms [14], [15] partitioned BDDs and/or image computation procedures [16], [17] • Interpolant-based verification (ITP), with ad-hoc abstraction and tightening techniques [18], [19], integrated SAT-based approaches [20], [21], Interpolant reduction techniques [22] and Guided Refinement [23] • Property Directed Reachability (PDR) verification strategies [24] Figures 4 and 5 show verification results considering three different unbounded model checking strategies: interpolation (ITP), binary decision diagram reachability (BDD) and Property Directed Reachability strategy (PDR). Results show that the most suitable strategy for the presented security properties verification is PDR.…”
Section: B Verification Strategiesmentioning
confidence: 99%
“…-BDD-based representations and traversals, including forward, backward, combined (approximate)forward/(exact)backward algorithms [26,27], partitioned BDDs and/or image computation procedures [28,29]. -Interpolant-based verification, with ad-hoc abstraction and tightening techniques [18,19], integrated SAT-based approaches [20,21].…”
Section: The Pdtrav Packagementioning
confidence: 99%
“…Some of the above contributions are full-length descriptions of results that are available in the conference literature. 19,20 …”
Section: Introductionmentioning
confidence: 99%