Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2015
DOI: 10.1007/978-3-662-49122-5_2
|View full text |Cite
|
Sign up to set email alerts
|

Viper: A Verification Infrastructure for Permission-Based Reasoning

Abstract: Abstract. The automation of verification techniques based on firstorder logic specifications has benefited greatly from verification infrastructures such as Boogie and Why. These offer an intermediate language that can express diverse language features and verification techniques, as well as back-end tools such as verification condition generators. However, these infrastructures are not well suited for verification techniques based on separation logic and other permission logics, because they do not provide di… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
168
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 195 publications
(168 citation statements)
references
References 35 publications
0
168
0
Order By: Relevance
“…Viper [30,42] (and its related projects [31,39]) uses access annotations (expressed as permission predicates) to explicitly transfer access/mutation permis-sions for references between static program names. Like ConSORT, permissions may be fractionally transferred, allowing temporary shared, immutable access to a mutable memory cell.…”
Section: Related Workmentioning
confidence: 99%
“…Viper [30,42] (and its related projects [31,39]) uses access annotations (expressed as permission predicates) to explicitly transfer access/mutation permis-sions for references between static program names. Like ConSORT, permissions may be fractionally transferred, allowing temporary shared, immutable access to a mutable memory cell.…”
Section: Related Workmentioning
confidence: 99%
“…Chalice [36] has rational permissions to verify properties of multi-threaded, objected-based programs such as data races and dead-locks. Viper [37] has an expressive intermediate language that supports both rational and abstract permissions. However, a number of verification tools have chosen tree shares due to their better metatheoretical properties.…”
Section: Related Workmentioning
confidence: 99%
“…The CPAchecker tool is able to migrate predicates across program versions [3]. Deductive verification tools such as Viper and Dafny offer modular verification [12] and cashing the intermediate verification results [10] respectively. In the context of software symbolic model checking, the closest body of work is CBMC -a bounded model-checker for C that to a limited extent exploits incremental capabilities of a SAT solver 4 , but does not use or output any reusable information like function summaries.…”
Section: Introductionmentioning
confidence: 99%