Detail publikace

Predator Hunting Party (Competition Contribution)

PERINGER, P. MÜLLER, P. VOJNAR, T.

Originální název

Predator Hunting Party (Competition Contribution)

Typ

článek ve sborníku ve WoS nebo Scopus

Jazyk

angličtina

Originální abstrakt

This paper introduces PredatorHP (Predator Hunting Party), a program verifier built on top of the Predator shape analyser, and discusses its participation in the SV-COMP'15 software verification competition. Predator is a sound shape analyser dealing with C programs with lists implemented via low-level pointer operations. PredatorHP uses Predator to prove programs safe while at the same time using several bounded versions of Predator for bug hunting.

Klíčová slova

formal verification, program analysis, shape analysis, symbolic memory graphs, bug hunting, memory safety, software verification competition

Autoři

PERINGER, P.; MÜLLER, P.; VOJNAR, T.

Rok RIV

2015

Vydáno

13. 4. 2015

Nakladatel

Springer Verlag

Místo

Heidelberg

ISBN

978-3-662-46680-3

Kniha

Proceedings of TACAS'15

Edice

Lecture Notes in Computer Science

Strany od

443

Strany do

446

Strany počet

4

URL

BibTex

@inproceedings{BUT119878,
  author="Petr {Peringer} and Petr {Müller} and Tomáš {Vojnar}",
  title="Predator Hunting Party (Competition Contribution)",
  booktitle="Proceedings of TACAS'15",
  year="2015",
  series="Lecture Notes in Computer Science",
  volume="9035",
  pages="443--446",
  publisher="Springer Verlag",
  address="Heidelberg",
  doi="10.1007/978-3-662-46681-0\{_}40",
  isbn="978-3-662-46680-3",
  url="http://link.springer.com/chapter/10.1007%2F978-3-662-46681-0_40"
}