CFP last date
20 May 2024
Reseach Article

Verifying Safety Properties Related to Reachability Problems in Software Programs

Published on March 2012 by Era Johri
International Conference and Workshop on Emerging Trends in Technology
Foundation of Computer Science USA
ICWET2012 - Number 3
March 2012
Authors: Era Johri
8cffe628-1857-49c8-a1c2-2c79c426d450

Era Johri . Verifying Safety Properties Related to Reachability Problems in Software Programs. International Conference and Workshop on Emerging Trends in Technology. ICWET2012, 3 (March 2012), 7-10.

@article{
author = { Era Johri },
title = { Verifying Safety Properties Related to Reachability Problems in Software Programs },
journal = { International Conference and Workshop on Emerging Trends in Technology },
issue_date = { March 2012 },
volume = { ICWET2012 },
number = { 3 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 7-10 },
numpages = 4,
url = { /proceedings/icwet2012/number3/5327-1018/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference and Workshop on Emerging Trends in Technology
%A Era Johri
%T Verifying Safety Properties Related to Reachability Problems in Software Programs
%J International Conference and Workshop on Emerging Trends in Technology
%@ 0975-8887
%V ICWET2012
%N 3
%P 7-10
%D 2012
%I International Journal of Computer Applications
Abstract

With the success of formal verification techniques like equivalence checking and model checking for hardware designs, there has been growing interest in applying such techniques for formal analysis and automatic verification of software programs. The majority of work carried out in the formal methods community throughout the last three decades has been devoted to special languages designed to make it easier to experiment with mechanized formal methods such as theorem provers, proof checkers and model checkers. With this philosophy, in this paper, it is proposed to develop a verification and testing environment for checking user given safety properties in C Programs, which uses model checking. The reachability properties for verification have to be considered in particular whether certain labeled statements are reachable or not in a program. Also, checkers are included for a set of standard programming bugs such as array bound violations, NULL pointer dereferences, use of uninitialized variables, memory leaks, lock/unlock violations, division by zero etc.

References
  1. Dijkstra, E.W., ``Guarded commands, nondeterminacy and formal derivation of programs.'' CACM 18, 8 (1975), 453457.
  2. Holzmann, G.J., ``Algorithms for automated protocol verification"
  3. Dijkstra, E.W., ``Solution to a problem in concurrent programming control.'' CACM 8, 9 (1965), 569.
  4. Holzmann, G.J., ``Algorithms for automated protocol verification.'' AT&T Technical Journal 69, 1(Jan/Feb 1990).
  5. Holzmann, G.J., The Spin Model Checker: Primer and Reference Manual (2003) AddisonWesley
Index Terms

Computer Science
Information Sciences

Keywords

Lex and Yaac SPIN Formal Methods