Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1787497guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
HVC'07: Proceedings of the 3rd international Haifa verification conference on Hardware and software: verification and testing
2007 Proceeding
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
Conference:
Haifa Israel October 23 - 25, 2007
ISBN:
978-3-540-77964-3
Published:
23 October 2007

Reflects downloads up to 01 Nov 2024Bibliometrics
Abstract

No abstract available.

Proceeding Downloads

Skip Table Of Content Section
SECTION: Invited talks
Article
Simulation vs. formal: absorb what is useful; reject what is useless
Pages 1–7

This short paper is the result of the invited talk I gave at the 2007 Haifa Verification Conference. Its purpose is to briefly summarize the main points of my talk and to provide background references. The original talk abstract was, "Dynamic ...

Article
Scaling commercial verification to larger systems
Pages 8–13

Simulation test coverage does not scale gracefully with growing system design size. Component interactions grow exponentially with the number of system components, while conventional system test at best can increase coverage as a linear function of ...

Article
From hardware verification to software verification: re-use and re-learn
Pages 14–15

With the growing maturity in hardware verification methods, there has been great interest in applying them to verification of software programs. Aside from issues of scale and complexity, there are many differences between the two domains in the ...

Article
Where do bugs come from?
Page 16

A program fails. How can we locate the cause? A new generation of program analysis techniques automatically determines failure causes even in the absence of any specification - in the input, in the set of code changes, or in the program state: "GCC ...

SECTION: HVC award
SECTION: Hardware verification
Article
On the characterization of until as a fixed point under clocked semantics
Pages 19–33

Modern hardware designs are typically based on multiple clocks. While a singly-clocked hardware design is easily described in standard temporal logics, describing a multiply-clocked design is cumbersome. Thus, it is desirable to have an easier way to ...

Article
Reactivity in systemC transaction-level models
Pages 34–50

SystemC is a popular language used in modeling systemonchip implementations. To support this task at a high level of abstraction, transaction-level modeling (TLM) libraries have been recently developped. While TLM libraries are useful, it is difficult ...

SECTION: Model checking
Article
Verifying parametrised hardware designs via counter automata
Pages 51–68

The paper presents a new approach to formal verification of generic (i.e. parametrised) hardware designs specified in VHDL. The proposed approach is based on a translation of such designs to counter automata and on exploiting the recent advances ...

Article
How fast and fat is your probabilistic model checker? an experimental performance comparison
Pages 69–85

This paper studies the efficiency of several probabilistic model checkers by comparing verification times and peak memory usage for a set of standard case studies. The study considers the model checkers ETMCC, MRMC, PRISM (sparse and hybrid mode), YMER ...

SECTION: Dynamic hardware verification
Article
Constraint patterns and search procedures for CP-based random test generation
Pages 86–103

Constraint Programming (CP) technology has been extensively used in Random Functional Test Generation during the recent years. However, while the existing CP methodologies are well tuned for traditional combinatorial applications e.g. logistics or ...

Article
Using virtual coverage to hit hard-to-reach events
Pages 104–119

Reaching hard-to-reach coverage events is a difficult task that requires both time and expertise. Data-driven Coverage Directed Generation (CDG) can assist in the task when the coverage events are part of a structured coverage model, but is a-priori ...

SECTION: Merging formal and testing
Article
Test case generation for ultimately periodic paths
Pages 120–135

Software verification is a hard yet important challenge. In general, the problem is undecidable. Nevertheless, it is still beneficial to look at solutions that either restrict the generality or are heuristic in nature (and do not guarantee to terminate)...

Article
Dynamic testing via automata learning
Pages 136–152

This paper presents dynamic testing, a method that exploits automata learning to systematically test (black box) systems almost without prerequisites. Based on interface descriptions, our method successively explores the system under test (SUT), while ...

SECTION: Formal verification for software
Article
On the architecture of system verification environments
Pages 153–168

Implementations of computer systems comprise many layers and employ a variety of programming languages. Building such systems requires support of an often complex, accompanying tool chain.

The Verisoft project deals with the formal pervasive ...

Article
Exploiting shared structure in software verification conditions
Pages 169–184

Despite many advances, today's software model checkers and extended static checkers still do not scale well to large code bases, when verifying properties that depend on complex interprocedural flow of data. An obvious approach to improve performance is ...

Article
Delayed nondeterminism in model checking embedded systems assembly code
Pages 185–201

This paper presents an approach to the efficient verification of embedded systems. Such systems usually operate in uncertain environments, giving rise to a high degree of nondeterminism in the corresponding formal models, which in turn aggravates the ...

Article
A complete bounded model checking algorithm for pushdown systems
Pages 202–217

Pushdown systems (PDSs) consist of a stack and a finite state machine and are frequently used to model abstractions of software. They correspond to sequential recursive programs with finite-domain variables. This paper presents a novel algorithm for ...

SECTION: Software testing
Article
Locating regression bugs
Pages 218–234

A regression bug is a bug which causes a feature that worked correctly to stop working after a certain event (system upgrade, system patching, daylight saving time switch, etc.). Very often an encompassed bug fix included in a patch causes the ...

Article
The advantages of post-link code coverage
Pages 235–251

Code coverage is often defined as a measure of the degree to which the source code of a program has been tested [19]. Various metrics for measuring code coverage exist. The vast majority of these metrics require instrumenting the source code to produce ...

Article
GenUTest: a unit test and mock aspect generation tool
Pages 252–266

Unit testing plays a major role in the software development process. It enables the immediate detection of bugs introduced into a unit whenever code changes occur. Hence, unit tests provide a safety net of regression tests and validation tests which ...

Contributors
  • IBM Research - Haifa

Recommendations