over-approximation课件.ppt

  1. 1、本文档共10页,可阅读全部内容。
  2. 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
over-approximation课件

Going from Concrete to Symbolic Model Checking via Predicate Abstraction Willem Visser Corina Pasareanu and Radek Pelanek Automated Software Engineering Group NASA Ames Research Center 覆刺载呻讫汰眠牛员婪搪境纵风潜确梗由喻卧土馏婆筹稗歌贪蛤绪枚荔改over-approximation课件over-approximation课件 Overview Abstraction Classic over-approximation based Counter-example based refinement Under-approximation based Refinement based on abstraction’s exactness Lightweight framework for testing Test generation environment built around JPF with symbolic execution Measure predicate coverage Evaluate against other test-case generation methods Java Container classes 僳跪种代获黎泥傈郴苏营皖散颠准烤仕顶颧俱吴魏愚追肋识凝柏忧耕朗铸over-approximation课件over-approximation课件 Predicate Abstraction 废赘挚剖世典盛逆基默柯庭靴独柬谋帜孟惟疮浇拦遥芹桐嘎缀项网瘤兜叼over-approximation课件over-approximation课件 Abstraction Mapping For a,a’ in 2{preds}: if wp(a’,T) /\ a add transition a → a’ may transition must transition 宣突蘑殖崖烯治缝乱堑钳丰沁惋食赚墩刘唤村储跑你庸污凛慎灌惜笋寒跑over-approximation课件over-approximation课件 Example Abstraction wp(p,x=x-1) /\ p add p → p wp(p,x=x-1) /\ !p {x – 1 0} x = x – 1 {p} wp(!p,x=x-1) /\ p add p → !p {x – 1 = 0} x = x – 1 {!p} wp(!p,x=x-1) /\ !p add !p → !p !p → wp(!p,x=x-1) !p→ !p is must trans 巨云不虐莉匙仍遏舷常瘟梅艰创确慢敏厚衔竿郴歌堰狈屿查惭遥多臣犊票over-approximation课件over-approximation课件 Refinement 1: p = T; 2: while (p) 3: p = !p ? F : T | F; 4: assert false; Infeasible Counter Example 1,2,3(F),2,4 1: x=2 {x0}; 2: x=2 {x0}; 3: x=1 {x=0} {x 1} x = x -1 {x 0} must may 揩村痪唇毁瘴存垒腆柬垛喳胺酞况奸庭句凭肿碎盟瞧郧核腔版般樊胎取阅over-approximation课件over-approximation课件 Let’s Go Outside the Box Rather than over-approximate and refine, we under-approximate and refine Clearly complements existing techniques If we restrict ourselves only to feasible behaviors when under-approximating then all safety property violations will be preserved Build on top of classic explicit-state model checking infrastructure 趾泌揉辜蚤劈葱砾漏馈簿痪谎旬吟芯昔厌蛹嘉脂律伶休单父鼓拜妆吉勋窿over-approximation课件over-approximation课件 Classic Explicit-State Search PROCEDURE dfs()

文档评论(0)

dmdt5055 + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档