ESBMC 5.0: an industrial-strength C model checker

MR Gadelha, FR Monteiro, J Morse… - Proceedings of the 33rd …, 2018 - dl.acm.org
ESBMC is a mature, permissively licensed open-source context-bounded model checker for
the verification of single-and multi-threaded C programs. It can verify both predefined safety …

LLBMC: Bounded Model Checking of C and C++ Programs Using a Compiler IR

F Merz, S Falke, C Sinz - … Conference on Verified Software: Tools, Theories …, 2012 - Springer
Bounded model checking (BMC) of C and C++ programs is challenging due to the complex
and intricate syntax and semantics of these programming languages. The BMC tool LLBMC …

Survey on automated symbolic verification and its application for synthesising cyber‐physical systems

LC Cordeiro, EB de Lima Filho… - IET Cyber‐Physical …, 2020 - Wiley Online Library
Dependency on the correct operation of embedded systems is rapidly growing, mainly due
to their wide range of applications. Their structures are becoming more complex and …

SMT-based verification of solidity smart contracts

L Alt, C Reitwiessner - … Applications of Formal Methods, Verification and …, 2018 - Springer
Ethereum smart contracts are programs that run inside a public distributed database called a
blockchain. These smart contracts are used to handle tokens of value, can be accessed and …

Boosting k-Induction with Continuously-Refined Invariants

D Beyer, M Dangl, P Wendler - International Conference on Computer …, 2015 - Springer
Abstract k-induction is a promising technique to extend bounded model checking from
falsification to verification. In software verification, k-induction works only if auxiliary …

A unifying view on SMT-based software verification

D Beyer, M Dangl, P Wendler - Journal of automated reasoning, 2018 - Springer
After many years of successful development of new approaches for software verification,
there is a need to consolidate the knowledge about the different abstract domains and …

Handling loops in bounded model checking of C programs via k-induction

MYR Gadelha, HI Ismail, LC Cordeiro - International journal on software …, 2017 - Springer
The first attempts to apply the k-induction method to software verification are only recent. In
this paper, we present a novel proof by induction algorithm, which is built on the top of a …

Safety Verification and Refutation by k-Invariants and k-Induction

M Brain, S Joshi, D Kroening, P Schrammel - International Static Analysis …, 2015 - Springer
Most software verification tools can be classified into one of a number of established
families, each of which has their own focus and strengths. For example, concrete …

Proteus: Computing disjunctive loop summary via path dependency analysis

X Xie, B Chen, Y Liu, W Le, X Li - Proceedings of the 2016 24th ACM …, 2016 - dl.acm.org
Loops are challenging structures for program analysis, especially when loops contain
multiple paths with complex interleaving executions among these paths. In this paper, we …

Property-directed k-induction

D Jovanović, B Dutertre - 2016 Formal Methods in Computer …, 2016 - ieeexplore.ieee.org
IC3 and k-induction are commonly used in automated analysis of infinite-state systems. We
present a reformulation of IC3 that separates reachability checking from induction reasoning …