Set propagation techniques for reachability analysis

M Althoff, G Frehse, A Girard - Annual Review of Control …, 2021 - annualreviews.org
Reachability analysis consists in computing the set of states that are reachable by a
dynamical system from all initial states and for all admissible inputs and parameters. It is a …

The algorithmic analysis of hybrid systems

R Alur, C Courcoubetis, N Halbwachs… - Theoretical computer …, 1995 - Elsevier
We present a general framework for the formal specification and algorithmic analysis of
hybrid systems. A hybrid system consists of a discrete program with an analog environment …

Construction of abstract state graphs with PVS

S Graf, H Saidi - … Aided Verification: 9th International Conference, CAV' …, 1997 - Springer
In this paper, we propose a method for the automatic construction of an abstract state graph
of an arbitrary system using the Pvs theorem prover. Given a parallel composition of …

[PDF][PDF] What's decidable about hybrid automata?

TA Henzinger, PW Kopke, A Puri… - Proceedings of the twenty …, 1995 - dl.acm.org
Hybrid automata model systems with both digital and analog components, such az
embedded control programs. Many verification tasks for such programs can be expressed as …

HyTech: A model checker for hybrid systems

TA Henzinger, PH Ho, H Wong-Toi - … , CAV'97 Haifa, Israel, June 22–25 …, 1997 - Springer
A hybrid system consists of a collection of digital programs that interact with each other and
with an analog environment. Examples of hybrid systems include medical equipment …

The Parma Polyhedra Library: Toward a complete set of numerical abstractions for the analysis and verification of hardware and software systems

R Bagnara, PM Hill, E Zaffanella - Science of Computer Programming, 2008 - Elsevier
Since its inception as a student project in 2001, initially just for the handling (as the name
implies) of convex polyhedra, the Parma Polyhedra Library has been continuously improved …

[PDF][PDF] A first step towards automated detection of buffer overrun vulnerabilities.

DA Wagner, JS Foster, EA Brewer, A Aiken - NDSS, 2000 - cs.umd.edu
We describe a new technique for finding potential buffer overrun vulnerabilities in security-
critical C code. The key to success is to use static analysis: we formulate detection of buffer …

Automatic symbolic verification of embedded systems

R Alur, TA Henzinger, PH Ho - IEEE Transactions on Software …, 1996 - ieeexplore.ieee.org
Presents a model-checking procedure and its implementation for the automatic verification
of embedded systems. The system components are described as hybrid automata …

On hybrid Petri nets

R David, H Alla - Discrete Event Dynamic Systems, 2001 - Springer
Petrinets (PNs) are widely used to model discrete event dynamic systems (computer
systems, manufacturing systems, communication systems, etc). Continuous Petri nets (in …

Algorithmic analysis of nonlinear hybrid systems

TA Henzinger, PH Ho… - IEEE transactions on …, 1998 - ieeexplore.ieee.org
We present two methods for translating nonlinear hybrid systems into linear hybrid
automata. Properties of the nonlinear systems can then be inferred from the automatic …