Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-642-31424-7_59guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

CSolve: verifying c with liquid types

Published: 07 July 2012 Publication History

Abstract

We present CSolve, an automated verifier for C programs based on Liquid Type inference. We show how CSolve verifies memory safety through an example and describe its architecture and interface.

References

[1]
Bengtson, J., Bhargavan, K., Fournet, C., Gordon, A.D., Maffeis, S.: Refinement types for secure implementations. In: CSF (2008).
[2]
Condit, J., Harren, M., Anderson, Z., Gay, D.M., Necula, G.C.: Dependent Types for Low-Level Programming. In: De Nicola, R. (ed.) ESOP 2007. LNCS, vol. 4421, pp. 520-535. Springer, Heidelberg (2007).
[3]
de Moura, L., Bjørner, N.S.: Z3: An Efficient SMT Solver. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 337-340. Springer, Heidelberg (2008).
[4]
Necula, G.C., McPeak, S., Rahul, S.P., Weimer, W.: CIL: Intermediate Language and Tools for Analysis and Transformation of C Programs. In: CC 2002. LNCS, vol. 2304, pp. 213-228. Springer, Heidelberg (2002).
[5]
Rondon, P., Kawaguchi, M., Jhala, R.: Liquid types. In: PLDI (2008).
[6]
Rondon, P., Kawaguchi, M., Jhala, R.: Low-level liquid types. In: POPL, pp. 131-144 (2010).
[7]
Xi, H., Pfenning, F.: Dependent types in practical programming. In: POPL (1999).

Cited By

View all
  • (2024)Ownership Types for Verification of Programs with Pointer ArithmeticProceedings of the 2024 ACM SIGPLAN International Workshop on Partial Evaluation and Program Manipulation10.1145/3635800.3636965(94-106)Online publication date: 11-Jan-2024
  • (2024)Indexed Types for a Statically Safe WebAssemblyProceedings of the ACM on Programming Languages10.1145/36329228:POPL(2395-2424)Online publication date: 5-Jan-2024
  • (2020)Liquid resource typesProceedings of the ACM on Programming Languages10.1145/34089884:ICFP(1-29)Online publication date: 3-Aug-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
CAV'12: Proceedings of the 24th international conference on Computer Aided Verification
July 2012
789 pages
ISBN:9783642314230
  • Editors:
  • P. Madhusudan,
  • Sanjit A. Seshia

Sponsors

  • NEC Labs: NEC Labs
  • IBMR: IBM Research
  • Intel: Intel
  • Microsoft Research: Microsoft Research

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 07 July 2012

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Ownership Types for Verification of Programs with Pointer ArithmeticProceedings of the 2024 ACM SIGPLAN International Workshop on Partial Evaluation and Program Manipulation10.1145/3635800.3636965(94-106)Online publication date: 11-Jan-2024
  • (2024)Indexed Types for a Statically Safe WebAssemblyProceedings of the ACM on Programming Languages10.1145/36329228:POPL(2395-2424)Online publication date: 5-Jan-2024
  • (2020)Liquid resource typesProceedings of the ACM on Programming Languages10.1145/34089884:ICFP(1-29)Online publication date: 3-Aug-2020
  • (2017)Verifying Invariants of Lock-Free Data Structures with Rely-Guarantee and Refinement TypesACM Transactions on Programming Languages and Systems10.1145/306485039:3(1-54)Online publication date: 10-May-2017
  • (2014)Verifying security patchesProceedings of the 2014 International Workshop on Privacy & Security in Programming10.1145/2687148.2687151(11-18)Online publication date: 21-Oct-2014

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media