Software Verification with Validation of Results (Report on SV-COMP 2017)

被引:60
作者
Beyer, Dirk [1 ]
机构
[1] Ludwig Maximilians Univ Munchen, Munich, Germany
来源
TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, TACAS 2017, PT II | 2017年 / 10206卷
关键词
BOUNDED MODEL CHECKING;
D O I
10.1007/978-3-662-54580-5_20
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This report describes the 2017 Competition on Software Verification (SV-COMP), the 6th edition of the annual thorough comparative evaluation of fully-automatic software verifiers. The goal is to reflect the current state of the art in software verification in terms of effectiveness and efficiency. The major achievement of the 6th edition of SV-COMP is that the verification results were validated in most categories. The verifiers have to produce verification witnesses, which contain hints that a validator can later use to reproduce the verification result. The answer of a verifier counts only if the validator confirms the verification result. SV-COMP uses two independent, publicly available witness validators. For 2017, a new category structure was introduced that now orders the verification tasks according to the property to verify on the top level, and by the type of programs (e.g., which kind of data types are used) on a second level. The categories Overflows and Termination were heavily extended, and the category SoftwareSystems now contains also verification tasks from the software system BusyBox. The competition used 8 908 verification tasks that each consisted of a C program and a property (reachability, memory safety, termination). SV-COMP 2017 had 32 participating verification systems from 12 countries.
引用
收藏
页码:331 / 349
页数:19
相关论文
共 37 条
[21]   VerifyThis 2012 A Program Verification Competition [J].
Huisman, Marieke ;
Klebanov, Vladimir ;
Monahan, Rosemary .
INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2015, 17 (06) :647-657
[22]   Lazy-CSeq: A Context-Bounded Model Checking Tool for Multi-Threaded C-Programs [J].
Inverso, Omar ;
Nguyen, Truc L. ;
Fischer, Bernd ;
La Torre, Salvatore ;
Parlato, Gennaro .
2015 30TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2015, :807-812
[23]  
Jonas M., 2017, LNCS 2, V10206, P390
[24]   Optimized PredatorHP and the SV-COMP Heap and Memory Safety Benchmark (Competition Contribution) [J].
Kotoun, Michal ;
Peringer, Petr ;
Sokova, Veronika ;
Vojnar, Tomas .
TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS (TACAS 2016), 2016, 9636 :942-945
[25]  
Kroening Daniel, 2014, TOOLS ALGORITHMS CON, V8413, P389, DOI [10.1007/978- 3-642- 54862-8_26, 10.1007/978-3-642-54862-8_26, DOI 10.1007/978-3-642-54862-8_26]
[26]  
Le T.C., 2017, LNCS 2, V10206, P370
[27]  
Legay A, 2017, LNCS 2, V10206, P355
[28]  
Morse J., 2014, TACAS, V8413, P405
[29]   Lazy-CSeq 2.0: Combining Lazy Sequentialization with Abstract Interpretation [J].
Nguyen, Truc L. ;
Inverso, Omar ;
Fischer, Bernd ;
La Torre, Salvatore ;
Parlato, Gennaro .
TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, TACAS 2017, PT II, 2017, 10206 :375-379
[30]   Lazy Sequentialization for the Safety Verification of Unbounded Concurrent Programs [J].
Nguyen, Truc L. ;
Fischer, Bernd ;
La Torre, Salvatore ;
Parlato, Gennaro .
AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, ATVA 2016, 2016, 9938 :174-191