Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1434628guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
VSTTE '08: Proceedings of the 2nd international conference on Verified Software: Theories, Tools, Experiments
2008 Proceeding
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
Conference:
Toronto Canada October 6 - 9, 2008
ISBN:
978-3-540-87872-8
Published:
06 October 2008

Reflects downloads up to 09 Feb 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
Section: Keynote Talks (Abstracts)
Article
Readable Formal Proofs

The need to integrate the processes of programming and program verification requires notations for formal proofs that are easily readable. We discuss this problem in the context of Hoare logic and separation logic.

It has long been the custom to describe ...

Article
From Verification to Synthesis

One of the most significant developments in the area of design verification over the last decade is the development of of algorithmic methods for verifying temporal specification of finite-state designs [2]. A frequent criticism against this approach, ...

Article
Verification, Least-Fixpoint Checking, Abstraction

We consider verification algorithms in a wide sense. The out-come of a verification algorithm can be a definite (yes or no) answer, a "don't know" answer, or a conditional answer or no answer at all (divergence). We obtain these kinds of verification ...

Article
Combining Tests and Proofs

Proof methods (or static analysis) and test methods (or dynamic analysis) have complementary strengths. While static analysis has the potential to obtain high coverage, it typically suffers from imprecision (and imprecision is needed to scale the ...

Section: Logics
Article
Propositional Dynamic Logic for Recursive Procedures

We present a simple and natural deductive formalism <em>μ</em>PDL for propositional dynamic logic for recursive procedures, including simultaneous recursion. Though PDL with recursive programs is known to be highly undecidable, natural deductive ...

Article
Mapped Separation Logic

We present Mapped Separation Logic, an instance of Separation Logic for reasoning about virtual memory. Our logic is formalised in the Isabelle/HOL theorem prover and it allows reasoning on properties about page tables, direct physical memory access, ...

Article
Unguessable Atoms: A Logical Foundation for Security

We show how a type of atoms, which behave like urelements, and a new proposition that expresses the independence of a term from an atom can be added to any logical system after imposing minor restrictions on definitions and computations. Working in ...

Article
Combining Domain-Specific and Foundational Logics to Verify Complete Software Systems

A major challenge for verifying <em>complete</em>software systems is their complexity. A complete software system consists of program modules that use many language features and span different abstraction levels (e.g. user code and run-time system code)...

Section: Tools
Article
JML4: Towards an Industrial Grade IVE for Java and Next Generation Research Platform for JML

Tool support for the Java Modeling Language (JML) is a very pressing problem. A main issue with current tools is their architecture: the cost of keeping up with the evolution of Java is prohibitively high: e.g., Java 5 has yet to be fully supported. ...

Article
Incremental Benchmarks for Software Verification Tools and Techniques

This paper proposes an initial catalog of easy-to-state, relatively simple, and incrementally more and more challenging benchmark problems for the Verified Software Initiative. These benchmarks support assessment of verification tools and techniques to ...

Section: Case Studies
Article
Verified Protection Model of the seL4 Microkernel

This paper presents a machine-checked high-level security analysis of seL4--an evolution of the L4 kernel series targeted to secure, embedded devices. We provide an abstract specification of the seL4 access control system together with a formal proof ...

Article
Verification of the Deutsch-Schorr-Waite Marking Algorithm with Modal Logic

We have proposed an abstraction technique that uses the formulas of variants of the modal <em>μ</em>-calculus as a method for analyzing pointer manipulating programs. In this paper, the method is applied to verify the correctness of the Deutsch-Schorr-...

Article
Bounded Verification of Voting Software

We present a case-study in which vote-tallying software is analyzed using a <em>bounded verification</em>technique, whereby all executions of a procedure are exhaustively examined within a finite space given by a bound on the size of the heap and the ...

Section: Methodology
Article
Expression Decomposition in a Rely/Guarantee Context

This paper describes a technique of expression decomposition which allows the use of rely/guarantee development rules that do not assume atomic expression evaluation. This decomposition provides a means of addressing the fact that the logical meaning of ...

Article
A Verification Approach for System-Level Concurrent Programs

Though the verification of operating systems is an active research field, a verification method is still missing that provides both, the proximity to practically used programming languages such as C <em>and</em>a realistic model of concurrency, i.e. a ...

Article
Boogie Meets Regions: A Verification Experience Report

We use region logic specifications to verify several programs exhbiting the classic hard problem for object-oriented systems: the framing of heap updates. We use BoogiePL and its associated SMT solver, Z3, to prove both implementations and client code.

Article
Flexible Immutability with Frozen Objects

Object immutability is a familiar concept that allows safe sharing of objects. Existing language support for immutability is based on immutable classes. However, class-based approaches are restrictive because programmers can neither make instances of ...

Section: Verisoft
Article
The Verisoft Approach to Systems Verification

The Verisoft project aims at the pervasive formal verification from the application layer over the system level software, comprising a microkernel and a compiler, down to the hardware. The different layers of the system give rise to various abstraction ...

Article
Formal Functional Verification of Device Drivers

We report on the formal functional verification of a simple device driver for an ATAPI hard disk in Isabelle/HOL. The proof is based on a functional model of the hard disk, which has been integrated into the instruction set architecture of a verified ...

Article
Verified Process-Context Switch for C-Programmed Kernels

A context switch -- an act of saving and restoring the state of a CPU such that multiple processes can share a single CPU resource -- is an essential feature of multitasking operating systems. Commonly computationally intensive and necessarily accessing ...

Section: Paper from VSTTE 2005
Article
Where Is the Value in a Program Verifier?

This paper addresses the assumption that software verification is valuable. Using experience from the assessment of safety critical software it makes observations of where the value of a Program Verifier might be and how it relates to the use of Formal ...

Contributors
  • SRI International
  • Aarhus University

Recommendations