Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2006
We present a tool, called cascade, to check assertions in C programs as part of a multi-stage verification strategy. cascade takes as input a C program and a control file (the output of an earlier stage) that specifies one or more assertions to be checked together with (optionally) some restrictions on program behaviors. For each assertion, cascade produces either a concrete trace violating the assertion or a deduction (proof) that the assertion cannot be violated.
Fifth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2007)
Verification of C Programs Using Automated Reasoning2007 •
This paper presents a formal approach to detect vulnerabilities in a C program using the B formal method. Vulnerabilities denote faults that may be introduced uninten-tionally into programs making them behave incorrectly. Such faults (or programing errors) may lead to unpredictable be-havior and even worse well-motivated attackers may exploit them later to cause real damage. Basically, the proposed approach consists in translating the vulnerable aspects of a C program into a B specification. On this B specification proof and model checking activities are performed in order to detect the presence or absence of vulnerabilities. Com-pared to the existing vulnerability detection techniques, a proof-based approach permits to eliminate false alarms and denial of service attacks.
International Journal on Software Tools for Technology Transfer
Verification and refutation of C programs based on k-induction and invariant inference2020 •
DepthK is a source-to-source transformation tool that employs bounded model checking (BMC) to verify and falsify safety properties in single- and multi-threaded C programs, without manual annotation of loop invariants. Here, we describe and evaluate a proof-by-induction algorithm that combines k-induction with invariant inference to prove and refute safety properties. We apply two invariant generators to produce program invariants and feed these into a k-induction-based verification algorithm implemented in DepthK, which uses the efficient SMT-based context-bounded model checker (ESBMC) as sequential verification back-end. A set of C benchmarks from the International Competition on Software Verification (SV-COMP) and embedded-system applications extracted from the available literature are used to evaluate the effectiveness of the proposed approach. Experimental results show that k-induction with invariants can handle a wide variety of safety properties, in typical programs with loop...
Journal of Automated Reasoning
HOL-Boogie—An Interactive Prover-Backend for the Verifying C Compiler2010 •
Investigaciones Históricas, época moderna y contemporánea
El golpe de Casado en Madrid: estado de la cuestión y mitos resueltos 80 años después2019 •
ASÉBEIA Estudios sobre la irreligiosidad en Grecia Studies in Greek Irreligiosity
Jenofonte contra la impiedad2020 •
Digital Applications in Archaeology and Cultural Heritage
Exploring cultural heritage and archaeological research from a VR-based approach https://authors.elsevier.com/c/1iXE~7szec0XeV2024 •
2024 •
Revista Cultura Científica
Aplicación de la metodología RAMCODES en el control de compactación de capas granulares de pavimento flexible2023 •
Bulletin of the American Physical Society
Flow field near Contact Lines : Role of Inertia2019 •
Bulletin of the American Physical Society
Stellar and gas kinematics in the lenticular galaxy NGC 34892018 •
The ISME journal
Microbiome niche modification drives diurnal rumen community assembly, overpowering individual variability and diet effects2018 •
Journal of Hand Surgery (European Volume)
The 13th Triennial Congress of the IFSSH2017 •
Jurnal Peternakan Lahan Kering
Keuntungan Usaha Ternak Babi Peternakan Rakyat di Kabupaten Alor