A Theory for Control-Flow Graph Exploration
暂无分享,去创建一个
[1] Frank Wolter,et al. Monodic fragments of first-order temporal logics: 2000-2001 A.D , 2001, LPAR.
[2] Jochen Hoenicke,et al. Doomed program points , 2010, Formal Methods Syst. Des..
[3] Jochen Hoenicke,et al. Towards Bounded Infeasible Code Detection , 2012, ArXiv.
[4] K. Rustan M. Leino,et al. A Polymorphic Intermediate Verification Language: Design and Logical Encoding , 2010, TACAS.
[5] Dawson R. Engler,et al. Bugs as deviant behavior: a general approach to inferring errors in systems code , 2001, SOSP.
[6] Martin Schäf,et al. Reconstructing Paths for Reachable Code , 2013, ICFEM.
[7] Ran Raz,et al. A sub-constant error-probability low-degree test, and a sub-constant error-probability PCP characterization of NP , 1997, STOC '97.
[8] Rajeev Alur,et al. A Temporal Logic of Nested Calls and Returns , 2004, TACAS.
[9] Cesare Tinelli,et al. Solving SAT and SAT Modulo Theories: From an abstract Davis--Putnam--Logemann--Loveland procedure to DPLL(T) , 2006, JACM.
[10] K. Rustan M. Leino,et al. Weakest-precondition of unstructured programs , 2005, PASTE '05.
[11] Daniel Kroening,et al. Software Verification Using k-Induction , 2011, SAS.
[12] Martin Schäf,et al. Infeasible Code Detection , 2012, VSTTE.
[13] Cormac Flanagan,et al. Detecting inconsistencies via universal reachability analysis , 2012, ISSTA 2012.
[14] David S. Johnson,et al. Approximation algorithms for combinatorial problems , 1973, STOC.
[15] Philipp Rümmer,et al. A Constraint Sequent Calculus for First-Order Logic with Linear Integer Arithmetic , 2008, LPAR.
[16] David Hovemeyer,et al. Finding bugs is easy , 2004, SIGP.