Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
CBMC - MaRDI portal

CBMC

From MaRDI portal
Software:21698



swMATH9719MaRDI QIDQ21698


No author found.





Related Items (76)

Extracting Symbolic Transitions from TLA$$^{+}$$+ SpecificationsInductive benchmarks for automated reasoningSymbolic computation via program transformationQuantifying software reliability via model-countingVerified cryptographic code for everybodyNot all bugs are created equal, but robust reachability can tell the differenceCoqQFBV: a scalable certified SMT quantifier-free bit-vector solverURSA: A System for Uniform Reduction to SATA compiler for MSVL and its applicationsSAT-Based Model CheckingCombining Model Checking and Data-Flow AnalysisTransfer of Model Checking to Industrial PracticeWhy does Astrée scale up?SATenstein: automatically building local search SAT solvers from componentsVerification of Concurrent Programs on Weak Memory ModelsVerification by gambling on program slicesLCTD: test-guided proofs for C programs on LLVMShape Neutral Analysis of Graph-based Data-structuresCompositional Sequentialization of Periodic ProgramsVST-Floyd: a separation logic tool to verify correctness of C programsSatisfiability Checking: Theory and ApplicationsOn black-box optimization in divide-and-conquer SAT solvingSystem-level state equality detection for the formal dynamic verification of legacy distributed applicationsIncremental bounded model checking for embedded softwareVerifying a scheduling protocol of safety-critical systemsFinding and fixing faultsOn compiling Boolean circuits optimized for secure multi-party computationMatching Multiplications in Bit-Vector FormulasPartitioned Memory Models for Program AnalysisDoomed program pointsFairness modulo theory: a new approach to LTL software model checkingSymbolic predictive analysis for concurrent programsA unifying view on SMT-based software verificationA taxonomy of exact methods for partial Max-SATEstablishing flight software reliability: testing, model checking, constraint-solving, monitoring and learningFrom non-preemptive to preemptive scheduling using synchronization synthesisSequentialization Using TimestampsLoop Summarization Using Abstract TransformersApproximate Invariant Property Checking Using Term-Height Reduction for a Subset of First-Order LogicAn automatic method for the dynamic construction of abstractions of states of a formal modelAn extension of lazy abstraction with interpolation for programs with arraysDeciding floating-point logic with abstract conflict driven clause learningBudget-bounded model-checking pushdown systemsThe configurable SAT solver challenge (CSSC)Efficient SAT-based bounded model checking for software verificationApplying Software Model Checking Techniques for Behavioral UML ModelsSMT-based model checking for recursive programsLoop summarization using state and transition invariantsScalable and precise refinement of cache timing analysis via path-sensitive verificationEmpirical software metrics for benchmarking of verification toolsInformation Theory and Security: Quantitative Information FlowCPBPV: a constraint-programming framework for bounded program verificationSharpening constraint programming approaches for bit-vector theoryA formal methods approach to predicting new features of the eukaryotic vesicle traffic systemDSValidatorA bounded model checker for three-valued abstractions of concurrent software systemsA compositional behavioral modeling framework for embedded system design and conformance checkingEmbedded software verification using symbolic execution and uninterpreted functionsMutation-Based Test Case Generation for Simulink ModelsRegression verification for multi-threaded programs (with extensions to locks and dynamic thread creation)Translating Xd-C programs to MSVL programsTransfer Function Synthesis without Quantifier EliminationTransfer Function Synthesis without Quantifier EliminationUnnamed ItemExploiting Binary Floating-Point Representations for Constraint PropagationEfficient bounded model checking of heap-manipulating programs using tight field boundsModel checking boot code from AWS data centersAutomatically verifying temporal properties of pointer programs with cyclic proofUnder-approximating loops in C programs for fast counterexample detectionAutomated formal synthesis of provably safe digital controllers for continuous plantsAutomatic analysis of DMA races using model checking and \(k\)-inductionAbstract semantic diffing of evolving concurrent programsTools and Algorithms for the Construction and Analysis of SystemsData compression for proof replayVerifying Whiley programs with BoogieThe \textsc{MergeSat} solver


This page was built for software: CBMC