On the verification problem for weak memory models
We address the verification problem of finite-state concurrent programs running under weak
memory models. These models capture the reordering of program (read and write) …
memory models. These models capture the reordering of program (read and write) …
An SMT-based approach to coverability analysis
J Esparza, R Ledesma-Garza, R Majumdar… - … 2014, Held as Part of the …, 2014 - Springer
Abstract Model checkers based on Petri net coverability have been used successfully in
recent years to verify safety properties of concurrent shared-memory or asynchronous …
recent years to verify safety properties of concurrent shared-memory or asynchronous …
Context-bounded analysis for concurrent programs with dynamic creation of threads
Context-bounded analysis has been shown to be both efficient and effective at finding bugs
in concurrent programs. According to its original definition, context-bounded analysis …
in concurrent programs. According to its original definition, context-bounded analysis …
All for the Price of Few: (Parameterized Verification through View Abstraction)
PA Abdulla, F Haziza, L Holík - … , VMCAI 2013, Rome, Italy, January 20-22 …, 2013 - Springer
We present a simple and efficient framework for automatic verification of systems with a
parameteric number of communicating processes. The processes may be organized in …
parameteric number of communicating processes. The processes may be organized in …
Interprocedural analysis of asynchronous programs
R Jhala, R Majumdar - ACM SIGPLAN Notices, 2007 - dl.acm.org
An asynchronous program is one that contains procedure calls which are not immediately
executed from the callsite, but stored and" dispatched" in a non-deterministic order by an …
executed from the callsite, but stored and" dispatched" in a non-deterministic order by an …
Forward analysis for WSTS, part I: Completions
A Finkel, J Goubault-Larrecq - arXiv preprint arXiv:0902.1587, 2009 - arxiv.org
Well-structured transition systems provide the right foundation to compute a finite basis of
the set of predecessors of the upward closure of a state. The dual problem, to compute a …
the set of predecessors of the upward closure of a state. The dual problem, to compute a …
Forward analysis for WSTS, part II: Complete WSTS
A Finkel, J Goubault-Larrecq - Logical Methods in Computer …, 2012 - lmcs.episciences.org
We describe a simple, conceptual forward analysis procedure for infinity-complete WSTS S.
This computes the so-called clover of a state. When S is the completion of a WSTS X, the …
This computes the so-called clover of a state. When S is the completion of a WSTS X, the …
[HTML][HTML] Parameterized verification through view abstraction
We present a simple and efficient framework for automatic verification of systems with a
parametric number of communicating processes. The processes may be organized in …
parametric number of communicating processes. The processes may be organized in …
Keeping a crowd safe: On the complexity of parameterized verification (invited talk)
J Esparza - 31st International Symposium on Theoretical Aspects …, 2014 - drops.dagstuhl.de
We survey some results on the automatic verification of parameterized programs without
identities. These are systems composed of arbitrarily many components, all of them running …
identities. These are systems composed of arbitrarily many components, all of them running …
Expand, enlarge and check: New algorithms for the coverability problem of WSTS
G Geeraerts, JF Raskin, L Van Begin - Journal of Computer and system …, 2006 - Elsevier
In this paper, we present a general algorithmic schema called 'Expand, Enlarge and
Check'from which new algorithms for the coverability problem of WSTS can be constructed …
Check'from which new algorithms for the coverability problem of WSTS can be constructed …