Sciweavers

CAV
2008
Springer
144views Hardware» more  CAV 2008»
13 years 7 months ago
The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis
A Tool: Causality-based Abstraction for Security Protocol Analysis (Tool Paper) Michael Backes1,2 , Stefan Lorenz1 , Matteo Maffei1 , and Kim Pecina1 1 Saarland University, Saarbr
Michael Backes, Stefan Lorenz, Matteo Maffei, Kim ...
CAV
2008
Springer
170views Hardware» more  CAV 2008»
13 years 7 months ago
Efficient Craig Interpolation for Linear Diophantine (Dis)Equations and Linear Modular Equations
Abstract. The use of Craig interpolants has enabled the development of powerful hardware and software model checking techniques. Efficient algorithms are known for computing interp...
Himanshu Jain, Edmund M. Clarke, Orna Grumberg
CAV
2008
Springer
96views Hardware» more  CAV 2008»
13 years 7 months ago
Monitoring Atomicity in Concurrent Programs
We study the problem of monitoring concurrent program runs for atomicity violations. Unearthing fundamental results behind scheduling algorithms in database control, we build space...
Azadeh Farzan, P. Madhusudan
CAV
2008
Springer
160views Hardware» more  CAV 2008»
13 years 7 months ago
Scalable Shape Analysis for Systems Code
Pointer safety faults in device drivers are one of the leading causes of crashes in operating systems code. In principle, shape analysis tools can be used to prove the absence of t...
Hongseok Yang, Oukseh Lee, Josh Berdine, Cristiano...
CAV
2008
Springer
161views Hardware» more  CAV 2008»
13 years 7 months ago
Constraint-Based Approach for Analysis of Hybrid Systems
Abstract. This paper presents a constraint-based technique for discovering a rich class of inductive invariants (boolean combinations of polynomial inequalities of bounded degree) ...
Sumit Gulwani, Ashish Tiwari
CAV
2008
Springer
157views Hardware» more  CAV 2008»
13 years 7 months ago
Effective Program Verification for Relaxed Memory Models
Program verification for relaxed memory models is hard. The high degree of nondeterminism in such models challenges standard verification techniques. This paper proposes a new veri...
Sebastian Burckhardt, Madanlal Musuvathi
CAV
2008
Springer
122views Hardware» more  CAV 2008»
13 years 7 months ago
Thread Quantification for Concurrent Shape Analysis
In this paper we address the problem of shape analysis for concurrent programs. We present new algorithms, based on abstract interpretation, for automatically verifying properties ...
Josh Berdine, Tal Lev-Ami, Roman Manevich, G. Rama...
CAV
2008
Springer
125views Hardware» more  CAV 2008»
13 years 7 months ago
A Practical Approach to Word Level Model Checking of Industrial Netlists
In this paper we present a word-level model checking method that attempts to speed up safety property checking of industrial netlists. Our aim is to construct an algorithm that all...
Per Bjesse
CAV
2008
Springer
113views Hardware» more  CAV 2008»
13 years 7 months ago
Producing Short Counterexamples Using "Crucial Events"
Ideally, a model checking tool should successfully tackle state space explosion for complete system validation, while providing short counterexamples when an error exists. Techniqu...
Sujatha Kashyap, Vijay K. Garg
CAV
2008
Springer
96views Hardware» more  CAV 2008»
13 years 7 months ago
Conflict-Tolerant Features
Deepak D'Souza, Madhu Gopinathan