Přístupnostní navigace
E-přihláška
Vyhledávání Vyhledat Zavřít
Detail publikace
PERINGER, P. MÜLLER, P. VOJNAR, T.
Originální název
Predator Hunting Party (Competition Contribution)
Typ
článek ve sborníku ve WoS nebo Scopus
Jazyk
angličtina
Originální abstrakt
This paper introduces PredatorHP (Predator Hunting Party), a program verifier built on top of the Predator shape analyser, and discusses its participation in the SV-COMP'15 software verification competition. Predator is a sound shape analyser dealing with C programs with lists implemented via low-level pointer operations. PredatorHP uses Predator to prove programs safe while at the same time using several bounded versions of Predator for bug hunting.
Klíčová slova
formal verification, program analysis, shape analysis, symbolic memory graphs, bug hunting, memory safety, software verification competition
Autoři
PERINGER, P.; MÜLLER, P.; VOJNAR, T.
Rok RIV
2015
Vydáno
13. 4. 2015
Nakladatel
Springer Verlag
Místo
Heidelberg
ISBN
978-3-662-46680-3
Kniha
Proceedings of TACAS'15
Edice
Lecture Notes in Computer Science
Strany od
443
Strany do
446
Strany počet
4
URL
http://link.springer.com/chapter/10.1007%2F978-3-662-46681-0_40
BibTex
@inproceedings{BUT119878, author="Petr {Peringer} and Petr {Müller} and Tomáš {Vojnar}", title="Predator Hunting Party (Competition Contribution)", booktitle="Proceedings of TACAS'15", year="2015", series="Lecture Notes in Computer Science", volume="9035", pages="443--446", publisher="Springer Verlag", address="Heidelberg", doi="10.1007/978-3-662-46681-0\{_}40", isbn="978-3-662-46680-3", url="http://link.springer.com/chapter/10.1007%2F978-3-662-46681-0_40" }