Bogor/Kiasan: A k-bounded Symbolic Execution for Checking Strong Heap Properties of Open Systems (original) (raw)

Verifying Heap-Manipulating Programs In An SMT Framework⋆

Roberto Bruttomesso

… for Verification and …, 2007

View PDFchevron_right

Model and Proof Generation for Heap-Manipulating Programs

Cristina David

Lecture Notes in Computer Science, 2014

View PDFchevron_right

A logic and decision procedure for verification of heap-manipulating programs

Zvonimir Rakamaric

2006

View PDFchevron_right

Structuring the verification of heap-manipulating programs

Aleksandar Nanevski

ACM SIGPLAN Notices, 2010

View PDFchevron_right

What can the GC compute efficiently?: A language for heap assertions at GC time

Yannis Smaragdakis

2010

View PDFchevron_right

Structured Specifications for Better Verification of Heap-Manipulating Programs

Shengchao Qin

FM 2011: Formal Methods, 2011

View PDFchevron_right

Symbolic execution of programs with heap inputs

Mauro Pezze'

Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

View PDFchevron_right

Contract-based verification and test case generation for open systems

Xianghua Deng

2007

View PDFchevron_right

Automatic Assume/Guarantee Reasoning for Heap-Manipulating Programs: Ongoing Work

Thomas Reps

Electronic Notes in Theoretical Computer Science, 2005

View PDFchevron_right

Verification of Programs Sensitive to Heap Layout

Henrich Lauko

ACM Transactions on Software Engineering and Methodology

View PDFchevron_right

Automatic Assume/Guarantee Reasoning for Heap-Manipulating Programs

Thomas Reps

Electronic Notes in Theoretical Computer Science, 2005

View PDFchevron_right

Reasoning about Heap Manipulating Programs using Automata Techniques

Supratik Chakraborty

Modern Applications of Automata Theory, 2012

View PDFchevron_right

Automatic assume/guarantee reasoning for heap-manupilating programs

Thomas Reps

Electronic Notes in Theoretical Computer Science, 2005

View PDFchevron_right

Gradual verification of recursive heap data structures

Cameron Wong

Proceedings of the ACM on Programming Languages, 2020

View PDFchevron_right

Modular reasoning about heap paths via effectively propositional formulas

Aleksandar Nanevski

View PDFchevron_right

Verifying Temporal Heap Properties Specified via Evolution Logic

Thomas Reps, Reinhard Wilhelm

Logic Journal of IGPL, 2006

View PDFchevron_right

An inference-rule-based decision procedure for verification of heap-manipulating programs with mutable data and cyclic data structures

Zvonimir Rakamaric

Verification, Model Checking, and …, 2007

View PDFchevron_right

Efficient and formal generalized symbolic execution

Jooyong Yi

Automated Software Engineering, 2011

View PDFchevron_right

Under-Constrained Symbolic Execution: Correctness Checking for Real Code

david ramos

2015

View PDFchevron_right

Satisfiability Modulo Heap-Based Programs

Wei Ngan Chin

Computer Aided Verification, 2016

View PDFchevron_right

Automatic Verification of Dynamic Data-Dependent Programs

Muhsin Atto

2010

View PDFchevron_right

Automatic certification of heap consumption

Alberto Momigliano

Logic for Programming, …, 2005

View PDFchevron_right

Toward Symbolic Verification of Programs Handling Pointers

S. Bardin

2004

View PDFchevron_right

Symbolic execution with abstraction

SANDEEP ANAND

International Journal on Software Tools for Technology Transfer, 2008

View PDFchevron_right

Lightweight reasoning about program correctness

Marsha Chechik

2002

View PDFchevron_right

Trace-based verification of imperative programs with I/O

Gregory Malecha

Journal of Symbolic Computation, 2011

View PDFchevron_right

Model Checking Dynamic Memory Allocation in Operating Systems

Pedro Merino

Journal of Automated Reasoning, 2009

View PDFchevron_right

Propositional Reasoning about Safety and Termination of Heap-Manipulating Programs

Matt Lewis

Lecture Notes in Computer Science, 2015

View PDFchevron_right

Symbolic Execution with Abstract Subsumption Checking

SANDEEP ANAND

Model Checking Software, 2006

View PDFchevron_right

Verifying LTL Properties of Bytecode with Symbolic Execution}

Mauro Pezze'

2008

View PDFchevron_right