Effective approaches to abstraction refinement for automatic software verification:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
Passau
2017
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext Inhaltsverzeichnis |
Beschreibung: | xxi, 155 Seiten Illustrationen, Diagramme |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044401234 | ||
003 | DE-604 | ||
005 | 20210514 | ||
007 | t | ||
008 | 170706s2017 a||| m||| 00||| eng d | ||
035 | |a (OCoLC)1005977255 | ||
035 | |a (DE-599)BVBBV044401234 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-384 |a DE-473 |a DE-703 |a DE-1051 |a DE-824 |a DE-29 |a DE-12 |a DE-91 |a DE-19 |a DE-1049 |a DE-92 |a DE-739 |a DE-898 |a DE-355 |a DE-706 |a DE-20 |a DE-1102 |a DE-860 |a DE-2174 | ||
084 | |a ST 233 |0 (DE-625)143620: |2 rvk | ||
100 | 1 | |a Löwe, Stefan |e Verfasser |4 aut | |
245 | 1 | 0 | |a Effective approaches to abstraction refinement for automatic software verification |c Stefan Löwe |
264 | 1 | |a Passau |c 2017 | |
300 | |a xxi, 155 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
502 | |b Dissertation |c Universität Passau |d 2017 | ||
650 | 0 | 7 | |a Programmverifikation |0 (DE-588)4135576-3 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Programmverifikation |0 (DE-588)4135576-3 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |o urn:nbn:de:bvb:739-opus4-4815 |
856 | 4 | 1 | |u https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/481 |x Verlag |z kostenfrei |3 Volltext |
856 | 4 | 1 | |u https://nbn-resolving.org/urn:nbn:de:bvb:739-opus4-4815 |x Resolving-System |z kostenfrei |3 Volltext |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029803281&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ebook | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029803281 |
Datensatz im Suchindex
_version_ | 1804177683568918528 |
---|---|
adam_text | Contents
1 Introduction 1
1.1 The Need For Software Verification................................... 1
1.2 Automatic Software Verification...................................... 2
1.3 Contributions........................................................ 3
1.3.1 Value Analysis with CEGAR and Interpolation................... 5
1.3.2 Precise and Efficient Composite Analysis based on CEGAR . 5
1.3.3 Refinements over Infeasible Sliced Prefixes................... 6
1.3.4 Guided Refinement Selection................................... 6
1.3.5 Contribution to SV-COMP’16.................................... 7
1.3.6 Availability of Implementations and Experimental Data ... 7
1.4 Structure of the Thesis.............................................. 7
2 Background 9
2.1 Programs, Control-Flow Automaton, and Semantics...................... 9
2.2 Configurable Program Analysis....................................... 10
2.2.1 Abstract Domain.............................................. 10
2.2.2 Precision ................................................... 11
4
2.2.3 Transfer Relation............................................ 11
2.2.4 Merge Operator .............................................. 11
2.2.5 Stop Operator ............................................... 12
2.2.6 Precision-Adjustment Operator................................ 12
2.3 CPA Algorithm....................................................... 12
2.4 Abstract Reachability Graph......................................... 14
2.5 Counterexample-Guided Abstraction Refinement........................ 15
2.6 Interpolation....................................................... 17
2.7 CPAchecker as Verification Framework
17
3 Value Analysis 21
3.1 Motivation .......................................................... 21
3.2 Related Work......................................................... 24
3.3 Definitions.......................................................... 25
3.4 Value Analysis as CPA................................................ 27
3.4.1 Abstract Domain............................................... 27
3.4.2 Precision .................................................... 27
3.4.3 Transfer Relation............................................. 28
3.4.4 Merge Operator ............................................... 28
3.4.5 Stop Operator ................................................ 28
3.4.G Precision-Adjust ment Operator................................ 28
3.5 Evaluation........................................................... 28
3.5.1 Setup........................................................ 29
3.5.2 Benchmarks.................................................... 29
3.5.3 Configuration................................................. 30
3.5.4 Results ...................................................... 30
3.6 Conclusion .......................................................... 33
3.6.1 Lessons Learned............................................... 33
3.6.2 Challenge..................................................... 34
3.6.3 Proposition................................................... 34
3.6.4 Solution...................................................... 34
4 Value Analysis with CEGAR and Interpolation 35
4.1 Motivation ......................................................... 35
4.2 Related Work......................................................... 38
4.3 State-Space Exploration Algorithm for the Value Domain............... 39
*,
4.4 Precision for the Value Domain....................................... 39
4.5 Feasibility Check for the Value Domain .............................. 40
4.6 Interpolation for the Value Domain................................... 41
4.6.1 Interpolation for Abstract Variable Assignments............... 41
4.6.2 Interpolation for Constraint Sequences....................... 42
4.7 Refinement Based on Value Interpolation............................. 43
4.8 Evaluation.......................................................... 46
4.8.1 Configuration................................................ 46
4.8.2 Results ..................................................... 46
4.8.3 Comparison to the Plain Value Analysis....................... 48
4.9 Conclusion ....................................................... 52
4.9.1 Lessons Learned.............................................. 52
4.9.2 Challenge.................................................... 52
4.9.3 Proposition.................................................. 52
4.9.4 Solution..................................................... 53
5 Value Analysis with Improved CEGAR and Interpolation 55
5.1 Motivation ......................................................... 55
5.2 Reducing the Number of Value Interpolation Queries.................. 55
5.2.1 Iterative, Inductive Interpolation........................... 56
5.2.2 Interpolation over Deepest Infeasible Suffix................. 56
5.2.3 Interpolant-Equality Heuristic............................... 57
5.2.4 Interpolant-Equivalence Heuristic............................ 58
5.2.5 Evaluation of the Optimizations for the Value Interpolation . 58
5.3 Reducing the Number of Refinements ................................. 59
5.4 Evaluation.......................................................... 60
5.4.1 Configuration................................................ 61
5.4.2 Results ..................................................... 61
5.4.3 Comparison to the Plain Value Analysis....................... 62
5.4.4 Level of Non-Determinism..................................... 63
5.5 Versatility of Value-Analysis Refinement............................ 68
5.5.1 Applicability to other Analyses.............................. 68
5.5.2 Regression Verification...................................... 69
5.6 Further Considerations.............................................. 71
5.6.1 Static Refinement ........................................... 71
5.6.2 Global Refinement............................................ 73
5.6.3 Impact-Like Refinement for the Value Analysis................ 76
5.7 Conclusion ........................................................ 78
5.7.1 Lessons Learned.............................................. 78
5.7.2 Challenge.................................................... 79
5.7.3 Proposition.................................................. 79
5.7.4 Solution..................................................... 79
6 Precise and Efficient Composite Analysis based on CEGAR 81
6.1 Motivation ........................................................ 81
6.2 Related Work....................................................... 82
6.3 Composition of a Value Analysis and a Predicate Analysis........... 83
6.4 Evaluation......................................................... 84
6.4.1 Configuration................................................ 84
6.4.2 Results ..................................................... 85
6.5 International Competition on Software Verification 2013........... 87
6.6 Conclusion ........................................................ 89
6.6.1 Lessons Learned.............................................. 89
6.6.2 Challenge.................................................... 89
6.6.3 Proposition.................................................. 89
6.6.4 Solution..................................................... 89
7 Refinements over Infeasible Sliced Prefixes 91
7.1 Motivation ........................................................ 91
7.2 Related Work....................................................... 93
7.3 Introducing Infeasible Sliced Prefixes............................. 94
7.4 Extracting Infeasible Sliced Prefixes ............................. 95
7.5 Refinements over Infeasible Sliced Prefixes........................ 98
7.6 Evaluation......................................................... 99
7.6.1 ■; Infeasible Sliced Prefixes for the Value Analysis....... 100
1
7.6.2 Infeasible Sliced Prefixes for the Predicate Analysis....... 103
7.6.3 Infeasible Sliced Prefixes with Large-Block Encoding........ 106
7.6.4 Further Applications of Infeasible Sliced Prefixes.......... Ill
7.7 Conclusion ...................................................... 112
7.7.1 Lessons Learned............................................ 112
7.7.2 Challenge.................................................. 112
7.7.3 Proposition................................................ 113
7.7.4 Solution................................................... 113
8 Guided Refinement Selection 115
8.1 Motivation ...................................................... 115
8.2 Related Work.................................................... 116
8.3 Heuristics for Guided Refinement Selection ...................... 116
8.3.1 Selection by Domain-Type Score of Path Precision........... 117
8.3.2 Selection by Depth of Pivot Location of Path Precision ... 117
8.3.3 Selection by Width of Path Precision....................... 118
8.3.4 Selection by Length of Infeasible Sliced Prefix............ 119
8.3.5 Composition of Heuristics.................................. 119
8.3.6 Tailor-Made Heuristics using Domain Knowledge.............. 119
8.4 Evaluation of Intra-Analysis Refinement Selection................ 120
8.4.1 Configuration.............................................. 120
8.4.2 Refinement Selection for the Predicate Analysis............ 121
8.4.3 Refinement Selection for the Value Analysis................ 125
8.5 Refinement Selection for Composite Analyses...................... 127
8.6 Evaluation of Inter-Analysis Refinement Selection................ 130
8.6.1 Configuration.............................................. 131
8.6.2 Results . ................................................. 131
4
8.7 Conclusion ...................................................... 132
8.7.1 Lessons Learned............................................ 132
8.7.2 Challenge.................................................. 132
8.7.3 Proposition................................................ 133
9 Contribution to SV-COMP 16 135
9.1 Configuration.................................................... 135
9.2 Results of SV-COMPT6 and beyond.................................. 136
10 Summary and Future Research 141
10.1 Summary................................................... 141
10.2 Future Research .......................................... 143
|
any_adam_object | 1 |
author | Löwe, Stefan |
author_facet | Löwe, Stefan |
author_role | aut |
author_sort | Löwe, Stefan |
author_variant | s l sl |
building | Verbundindex |
bvnumber | BV044401234 |
classification_rvk | ST 233 |
collection | ebook |
ctrlnum | (OCoLC)1005977255 (DE-599)BVBBV044401234 |
discipline | Informatik |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01779nam a2200373 c 4500</leader><controlfield tag="001">BV044401234</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210514 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">170706s2017 a||| m||| 00||| eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1005977255</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044401234</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-384</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1102</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-2174</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 233</subfield><subfield code="0">(DE-625)143620:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Löwe, Stefan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Effective approaches to abstraction refinement for automatic software verification</subfield><subfield code="c">Stefan Löwe</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Passau</subfield><subfield code="c">2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxi, 155 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="b">Dissertation</subfield><subfield code="c">Universität Passau</subfield><subfield code="d">2017</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Programmverifikation</subfield><subfield code="0">(DE-588)4135576-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Programmverifikation</subfield><subfield code="0">(DE-588)4135576-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="o">urn:nbn:de:bvb:739-opus4-4815</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/481</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://nbn-resolving.org/urn:nbn:de:bvb:739-opus4-4815</subfield><subfield code="x">Resolving-System</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029803281&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ebook</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029803281</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV044401234 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:51:58Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029803281 |
oclc_num | 1005977255 |
open_access_boolean | 1 |
owner | DE-384 DE-473 DE-BY-UBG DE-703 DE-1051 DE-824 DE-29 DE-12 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-1049 DE-92 DE-739 DE-898 DE-BY-UBR DE-355 DE-BY-UBR DE-706 DE-20 DE-1102 DE-860 DE-2174 |
owner_facet | DE-384 DE-473 DE-BY-UBG DE-703 DE-1051 DE-824 DE-29 DE-12 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-1049 DE-92 DE-739 DE-898 DE-BY-UBR DE-355 DE-BY-UBR DE-706 DE-20 DE-1102 DE-860 DE-2174 |
physical | xxi, 155 Seiten Illustrationen, Diagramme |
psigel | ebook |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
record_format | marc |
spelling | Löwe, Stefan Verfasser aut Effective approaches to abstraction refinement for automatic software verification Stefan Löwe Passau 2017 xxi, 155 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Dissertation Universität Passau 2017 Programmverifikation (DE-588)4135576-3 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Programmverifikation (DE-588)4135576-3 s DE-604 Erscheint auch als Online-Ausgabe urn:nbn:de:bvb:739-opus4-4815 https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/481 Verlag kostenfrei Volltext https://nbn-resolving.org/urn:nbn:de:bvb:739-opus4-4815 Resolving-System kostenfrei Volltext Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029803281&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Löwe, Stefan Effective approaches to abstraction refinement for automatic software verification Programmverifikation (DE-588)4135576-3 gnd |
subject_GND | (DE-588)4135576-3 (DE-588)4113937-9 |
title | Effective approaches to abstraction refinement for automatic software verification |
title_auth | Effective approaches to abstraction refinement for automatic software verification |
title_exact_search | Effective approaches to abstraction refinement for automatic software verification |
title_full | Effective approaches to abstraction refinement for automatic software verification Stefan Löwe |
title_fullStr | Effective approaches to abstraction refinement for automatic software verification Stefan Löwe |
title_full_unstemmed | Effective approaches to abstraction refinement for automatic software verification Stefan Löwe |
title_short | Effective approaches to abstraction refinement for automatic software verification |
title_sort | effective approaches to abstraction refinement for automatic software verification |
topic | Programmverifikation (DE-588)4135576-3 gnd |
topic_facet | Programmverifikation Hochschulschrift |
url | https://opus4.kobv.de/opus4-uni-passau/frontdoor/index/index/docId/481 https://nbn-resolving.org/urn:nbn:de:bvb:739-opus4-4815 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029803281&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT lowestefan effectiveapproachestoabstractionrefinementforautomaticsoftwareverification |