Model checking

EM Clarke - Foundations of Software Technology and Theoretical …, 1997 - Springer
Abstract Model checking is an automatic technique for verifying finite-state reactive systems,
such as sequential circuit designs and communication protocols. Specifications are …

Bounded model checking

A Biere - Handbook of satisfiability, 2021 - ebooks.iospress.nl
One of the most important industrial applications of SAT is currently Bounded Model
Checking (BMC). This technique is typically used for formal hardware verification in the …

Interpolation and SAT-based model checking

KL McMillan - … Aided Verification: 15th International Conference, CAV …, 2003 - Springer
We consider a fully SAT-based method of unbounded symbolic model checking based on
computing Craig interpolants. In benchmark studies using a set of large industrial circuit …

A systematic literature review on counterexample explanation

AP Kaleeswaran, A Nordmann, T Vogel… - Information and Software …, 2022 - Elsevier
Context: Safety is of paramount importance for cyber–physical systems in domains such as
automotive, robotics, and avionics. Formal methods such as model checking are one way to …

Termination proofs for systems code

B Cook, A Podelski, A Rybalchenko - ACM Sigplan Notices, 2006 - dl.acm.org
Program termination is central to the process of ensuring that systems code can always
react. We describe a new program termination prover that performs a path-sensitive and …

[책][B] Unfoldings: a partial-order approach to model checking

J Esparza, K Heljanko - 2008 - books.google.com
Model checking is a prominent technique used in the hardware and software industries for
automatic verification. While it is very successful in finding subtle bugs in distributed …

[PDF][PDF] Towards scalable verification of deep reinforcement learning

G Amir, M Schapira, G Katz - 2021 formal methods in computer …, 2021 - library.oapen.org
Deep neural networks (DNNs) have gained significant popularity in recent years, becoming
the state of the art in a variety of domains. In particular, deep reinforcement learning (DRL) …

Mostly automated verification of liveness properties for distributed protocols with ranking functions

J Yao, R Tao, R Gu, J Nieh - Proceedings of the ACM on Programming …, 2024 - dl.acm.org
Distributed protocols have long been formulated in terms of their safety and liveness
properties. Much recent work has focused on automatically verifying the safety properties of …

Linear encodings of bounded LTL model checking

A Biere, K Heljanko, T Junttila… - Logical Methods in …, 2006 - lmcs.episciences.org
We consider the problem of bounded model checking (BMC) for linear temporal logic (LTL).
We present several efficient encodings that have size linear in the bound. Furthermore, we …

Error explanation with distance metrics

A Groce, S Chaki, D Kroening, O Strichman - International Journal on …, 2006 - Springer
In the event that a system does not satisfy a specification, a model checker will typically
automatically produce a counterexample trace that shows a particular instance of the …