Learn More
We propose a shape analysis that adapts to some of the complex composite data structures found in industrial systems-level programs. Examples of such data structures include " cyclic doubly-linked lists of acyclic singly-linked lists " , " singly-linked lists of cyclic doubly-linked lists with back-pointers to head nodes " , etc. The analysis introduces the(More)
This paper presents our integration of efficient resolution-based theorem provers into the Jahob data structure verification system. Our experimental results show that this approach enables Jahob to automatically verify the correctness of a range of complex dynamically instantiable data structures, such as hash tables and search trees, without the need for(More)
Automatic type inference is a popular feature of functional programming languages. If a program cannot be typed, the compiler typically reports a single program location in its error message. This location is the point where the type inference failed, but not necessarily the actual source of the error. Other potential error sources are not even considered.(More)
We show that the idea of predicates on heap objects can be cast in the framework of predicate abstraction. This leads to an alternative view on the underlying concepts of three-valued shape analysis by Sagiv, Reps and Wilhelm. Our construction of the abstract post operator is analogous to the corresponding construction for classical predicate abstraction ,(More)
Motivation Motivation Shape Analysis Verify consistency properties of linked data structures. Thomas Wies Field Constraint Analysis 2 / 17 Motivation Motivation Shape Analysis Verify consistency properties of linked data structures. 1 generality: support a large class of data structures 2 predictability: provide completeness guarantees 3 degree of(More)
Depth-bounded processes form the most expressive known fragment of the π-calculus for which interesting verification problems are still decidable. In this paper we develop an adequate domain of limits for the well-structured transition systems that are induced by depth-bounded processes. An immediate consequence of our result is that there exists a forward(More)
We present an abstraction refinement technique for the verification of universally quantified array assertions such as " all elements in the array are sorted ". Our technique can be seamlessly combined with existing software model checking algorithms. We implemented our technique in the ACSAR software model checker and successfully verified quantified array(More)
Cloud computing aims to give users virtually unlimited pay-per-use computing resources without the burden of managing the underlying infrastructure. We claim that, in order to realize the full potential of cloud computing, the user must be presented with a pricing model that offers flexibility at the requirements level, such as a choice between different(More)