Advances in automatic software verification: SV-COMP 2020

D Beyer - International Conference on Tools and Algorithms for …, 2020 - Springer
This report describes the 2020 Competition on Software Verification (SV-COMP), the 9^ th
edition of a series of comparative evaluations of fully automatic software verifiers for C and …

Legion: Best-first concolic testing

D Liu, G Ernst, T Murray, BIP Rubinstein - Proceedings of the 35th IEEE …, 2020 - dl.acm.org
Concolic execution and fuzzing are two complementary coverage-based testing techniques.
How to achieve the best of both remains an open challenge. To address this research …

DG: Analysis and Slicing of LLVM Bitcode

M Chalupa - International Symposium on Automated Technology for …, 2020 - Springer
DG is a library written in C++ that provides several types of program analysis for LLVM
bitcode. The main parts of DG are a parametric points-to analysis, a call graph construction …

[PDF][PDF] Symbiotic 8: Parallel and targeted test generation

M Chalupa, J Novák, J Strejcek - Fundamental Approaches to …, 2021 - library.oapen.org
The setup of Symbiotic 8 for Test-Comp 2021 brings radical changes in the test generation
for coverage-branches property. Similarly as in Symbiotic 7, we generate tests by running …

DivSIM, an interactive simulator for LLVM bitcode

P Ročkai, J Barnat - International Journal on Software Tools for …, 2022 - Springer
In this paper, we introduce an interactive simulator for programs in the form of LLVM bitcode.
The main features of the simulator include precise control over thread scheduling, automatic …

[HTML][HTML] DG: A program analysis library

M Chalupa - Software Impacts, 2020 - Elsevier
DG is a C++ library providing elements for building program analysis tools. Its main
components are a points-to analysis, a data dependence analysis, a control dependence …

Verification of Programs Sensitive to Heap Layout

H Lauko, L Korenčik, P Ročkai - ACM Transactions on Software …, 2022 - dl.acm.org
Most C and C++ programs use dynamically allocated memory (often known as a heap) to
store and organize their data. In practice, it can be useful to compare addresses of different …

Algorithmic Details behind the Predator Shape Analyser

K Dudka, P Muller, P Peringer, V Šoková… - arXiv preprint arXiv …, 2024 - arxiv.org
This chapter, which is an extended and revised version of the conference paper'Predator:
Byte-Precise Verification of Low-Level List Manipulation', concentrates on a detailed …

[PDF][PDF] Automata in Software Verification and Testing

M HRUŠKA - 2023 - theses.cz
This thesis focuses on applications of automata theory to software quality. In the first part, we
focus on shape analysis which can be used for formal verification of programs manipu lating …

Modelling and verification of multi-agent systems via sequential emulation

L DI STEFANO - 2020 - iris.gssi.it
A multi-agent system (MAS) is a collection of agents, often endowed with individual goals
and a partial view of the whole system, that may be required to achieve complex goals by …