GI LogoGI Logo
  • Login
Digital Library
    • All of DSpace

      • Communities & Collections
      • Titles
      • Authors
      • By Issue Date
      • Subjects
    • This Collection

      • Titles
      • Authors
      • By Issue Date
      • Subjects
Digital Library Gesellschaft für Informatik e.V.
GI-DL
    • English
    • Deutsch
  • English 
    • English
    • Deutsch
View Item 
  •   DSpace Home
  • Lecture Notes in Informatics
  • Proceedings
  • Software Engineering
  • P252 - Software Engineering 2016
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.
  •   DSpace Home
  • Lecture Notes in Informatics
  • Proceedings
  • Software Engineering
  • P252 - Software Engineering 2016
  • View Item

Verification Witnesses

Author:
Beyer, Dirk [DBLP] ;
Dangl, Matthias [DBLP] ;
Dietsch, Daniel [DBLP] ;
Heizmann, Matthias [DBLP] ;
Stahlbauer, Andreas [DBLP]
Abstract
It is commonly understood that a verification tool should provide a counterex-ample to witness a specification violation. Until recently, software verifiers dumped error witnesses in proprietary formats, which are often neither humannor machine-readable, and an exchange of witnesses between different verifiers was impossible. We have defined an exchange format for error witnesses that is easy to write and read by verification tools (for further processing, e.g., witness validation). To eliminate manual inspection of false alarms, we develop the notion of stepwise testification: in a first step, a verifier finds a problematic program path and, in addition to the verification result FALSE, constructs a witness for this path; in the next step, another verifier re-verifies that the witness indeed violates the specification. This process can have more than two steps, each reducing the state space around the error path, making it easier to validate the witness in a later step. An obvious application for testification is the setting where we have two verifiers: one that is efficient but imprecise and another one that is precise but expensive. The technique of error-witness-driven program analysis is implemented in two state-of-the-art verification tools, CPACHECKER and ULTIMATE AUTOMIZER.
  • Citation
  • BibTeX
Beyer, D., Dangl, M., Dietsch, D., Heizmann, M. & Stahlbauer, A., (2016). Verification Witnesses. In: Knoop, J. & Zdun, U. (Hrsg.), Software Engineering 2016. Bonn: Gesellschaft für Informatik e.V.. (S. 105-106).
@inproceedings{mci/Beyer2016,
author = {Beyer, Dirk AND Dangl, Matthias AND Dietsch, Daniel AND Heizmann, Matthias AND Stahlbauer, Andreas},
title = {Verification Witnesses},
booktitle = {Software Engineering 2016},
year = {2016},
editor = {Knoop, Jens AND Zdun, Uwe} ,
pages = { 105-106 },
publisher = {Gesellschaft für Informatik e.V.},
address = {Bonn}
}
DateienGroesseFormatAnzeige
105.pdf50.86Kb PDF View/Open

Haben Sie fehlerhafte Angaben entdeckt? Sagen Sie uns Bescheid: Send Feedback

More Info

ISBN: 978-3-88579-646-6
ISSN: 1617-5468
xmlui.MetaDataDisplay.field.date: 2016
Language: en (en)
Content Type: Text/Conference Paper
Collections
  • P252 - Software Engineering 2016 [58]

Show full item record


About uns | FAQ | Help | Imprint | Datenschutz

Gesellschaft für Informatik e.V. (GI), Kontakt: Geschäftsstelle der GI
Diese Digital Library basiert auf DSpace.

 

 


About uns | FAQ | Help | Imprint | Datenschutz

Gesellschaft für Informatik e.V. (GI), Kontakt: Geschäftsstelle der GI
Diese Digital Library basiert auf DSpace.