148 6.4.2 États mémoire symboliques abstraits, p.154 ,
alors : si n x = puits alors retourner segf, si n x = null retourner le même ems Sinon on transforme G de façon légèrement différente du cas concret. Les noeuds n tels que s(n) = n x vérifient alors s(n) = puits. Soit k x = c(n x ) et k ? c(N ) un nouveau compteur. Alors c (n x ) = k , et ? = ?k x .(? ? k = k x ? 1) Il faut normaliser l'arc (n x , s(n x )) Le résultat f a (ems) est minimal ,
? si g est de la forme IsNull(x) alors ems = f a ((G, c, ?| IsNull(x) )), ? si g est de la forme ¬IsNull(x) alors ems = f a ((G, c, ?| ¬IsNull(x) )), ? si ems = segf ou ems = ? alors ems = ? ; ? pour les ems généraux ,
on veut décider s'il existe un graphe mémoire G ? EM S tel que G soit une fuite mémoire ,
La concrétisation d'un ems atomique minimal ems = (G, c, ?) contient des fuites mémoire si et seulement si G est une fuite mémoire ,
Symbolic verification of lossy channel systems : Application to the bounded retransmission protocol, Proc. 5th Int. Conf. Tools and Algorithms for the Construction and Analysis of Systems (TA- CAS'99), pp.208-222, 1999. ,
Symbolic Techniques for Parametric Reasoning about Counter and Clock Systems, Proc. 12th Int. Conf. Computer Aided Verification (CAV'2000), pp.419-434, 2000. ,
DOI : 10.1007/10722167_32
TReX: A Tool for Reachability Analysis of Complex Systems, Proc. 13th Int. Conf. Computer Aided Verification (CAV'2001), pp.368-372, 2001. ,
DOI : 10.1007/3-540-44585-4_34
URL : https://hal.archives-ouvertes.fr/hal-00110460
Using Forward Reachability Analysis for Verification of Lossy Channel Systems, Formal Methods in System Design, vol.25, issue.1, pp.39-65, 2004. ,
DOI : 10.1023/B:FORM.0000033962.51898.1a
The algorithmic analysis of hybrid systems, Theoretical Computer Science, vol.138, issue.1, pp.3-34, 1995. ,
DOI : 10.1016/0304-3975(94)00202-T
A theory of timed automata, Theoretical Computer Science, vol.126, issue.2, pp.183-235, 1994. ,
DOI : 10.1016/0304-3975(94)90010-8
Efficient Symbolic Representations for Arithmetic Constraints in Verification, International Journal of Foundations of Computer Science, vol.14, issue.04, 2002. ,
DOI : 10.1142/S0129054103001911
Efficient Image Computation in Infinite State Model Checking, Proc. 15th Int. Conf. Computer Aided Verification (CAV'2003), pp.249-261, 2003. ,
DOI : 10.1007/978-3-540-45069-6_26
Widening Arithmetic Automata, Proc. 16th Int. Conf. Computer Aided Verification, pp.321-333, 2004. ,
DOI : 10.1007/978-3-540-27813-9_25
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.614
An improved reachability analysis method for strongly linear hybrid systems (extended abstract), Proc. 9th Int. Conf. Computer Aided Verification (CAV '97, pp.167-178, 1997. ,
DOI : 10.1007/3-540-63166-6_18
Diophantine equations, Presburger arithmetic and finite automata, Proc. 21st Int, pp.30-43, 1996. ,
DOI : 10.1007/3-540-61064-2_27
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.55.5200
An efficient automata approach to some problems on context-free grammars, Information Processing Letters, vol.74, pp.5-6221, 2000. ,
Reachability analysis of pushdown automata: Application to model-checking, Proc. 8th Int. Conf. Concurrency Theory (CONCUR'97, pp.135-150, 1997. ,
DOI : 10.1007/3-540-63141-0_10
Reachability Analysis of (Timed) Petri Nets Using Real Arithmetic, Proc. 10th Int. Conf. Concurrency Theory (CONCUR'99), pp.178-193, 1999. ,
DOI : 10.1007/3-540-48320-9_14
Experimenting acceleration methods for the validation of infinite state systems, Proc. 20th IEEE Int. Conf. in Distributed Computing Systems (IDCS'00), 2000. ,
Composition of Accelerations to Verify Infinite Heterogeneous Systems, Proc. of the 2nd International Symposium on Automated Technology for Verification and Analysis, pp.248-262, 2004. ,
DOI : 10.1007/978-3-540-30476-0_22
FASTer Acceleration of Counter Automata in Practice, Proc. 10th Int. Conf. Tools and Algorithms for the Construction and Analysis of Systems, pp.576-590, 2004. ,
DOI : 10.1007/978-3-540-24730-2_42
FAST: Fast Acceleration of Symbolic Transition Systems, Proc. 15th Int. Conf. Computer Aided Verification (CAV'2003), pp.118-121, 2003. ,
DOI : 10.1007/978-3-540-45069-6_12
URL : https://hal.archives-ouvertes.fr/hal-00084185
Flat Acceleration in Symbolic Model Checking, Proc. of the 3rd International Symposium on Automated Technology for Verification and Analysis (ATVA'2005), 2005. ,
DOI : 10.1007/11562948_35
URL : https://hal.archives-ouvertes.fr/hal-00346302
Toward symbolic verification of programs handling pointers, Proceedings of the 3rd International Workshop on Automated Verification of Infinite-State Systems Electronic Notes in Theoretical Computer Science, 2004. ,
Symbolic model checking of infinite state systems using presburger arithmetic, Proc. 9th Int. Conf. Computer Aided Verification (CAV'97, pp.400-411, 1997. ,
DOI : 10.1007/3-540-63166-6_39
Model-checking concurrent systems with unbounded integer variables: symbolic representations, approximations, and experimental results, ACM Transactions on Programming Languages and Systems, vol.21, issue.4, pp.747-789, 1999. ,
DOI : 10.1145/325478.325480
The power of QDDs (extended abstract), Proc. 4th Int. Symp. Static AnalysisSAS'97), pp.172-186, 1997. ,
DOI : 10.1007/BFb0032741
Symbolic reachability analysis of FIFO-channel systems with nonregular sets of configurations, Theoretical Computer Science, vol.221, issue.1-2, pp.211-250, 1999. ,
DOI : 10.1016/S0304-3975(99)00033-X
Hybrid Acceleration Using Real Vector Automata, Proc. 15th Int. Conf. Computer Aided Verification (CAV'2003), pp.193-205, 2003. ,
DOI : 10.1007/978-3-540-45069-6_19
URL : https://hal.archives-ouvertes.fr/inria-00335915
Logic and p-recognizable sets of integers, Bull. Belg. Math. Soc, vol.1, issue.2, pp.191-238, 1994. ,
Verifying Programs with Dynamic 1-Selector-Linked Structures in Regular Model Checking, Proc. 11th Int. Conf. Tools and Algorithms for the Construction and Analysis of Systems (TACAS'2005), pp.13-29, 2005. ,
DOI : 10.1007/978-3-540-31980-1_2
URL : https://hal.archives-ouvertes.fr/hal-00147978
On decidability within the arithmetic of addition and divisibility, Proc. 8th Int. Conf. Foundations of Software Science and Computation Structures (FOS- SACS'2005), pp.425-439, 2005. ,
NATO Science Series Regular model checking Model checking lossy vector addition systems Parametric verification of a group membership algorithm Formal Techniques in Real-Time and Fault-Tolerant Systems Permutation rewriting and algorithmic verification Symbolic Methods for Exploring Infinite State Spaces On iterating linear transformations over recognizable sets of integers, Proc. of the NATO Advanced Research Workshop Verification of Infinite-State systems with Applications to Security (VISSAS'05) Proc. 12th Int. Conf. Computer Aided Verification Proc. 16th Ann. Symp. Theoretical Aspects of Computer Science (STACS'99) Proc. 7th Int. Symp Proc. 16th IEEE Symp. Logic in Computer Science (LICS 2001)Bou01] A. Bouajjani. Languages, rewriting systems, and verification of infinite-state systems Proc. 28th Int. Coll. Automata, Languages , and Programming (ICALP'2001)BP04] S. Bardin and L. Petrucci. From PNML to counter systems for accelerating Petri nets with FAST Proceedings of the Workshop on Interchange Format for Petri Nets, pp.403-418, 1998. ,
Symbolic verification with periodic sets On communicating finite-state machines Abstract interpretation : A unified lattice model for static analysis of programs by construction or approximation of fixpoints Unreliable channels are easier to verify than perfect channels Automatic discovery of linear restraints among variables of a program Multiple counters automata, safety analysis, and Presburger arithmetic, Symbolic boolean manipulation with ordered binary-decision diagrams. ACM Computing Surveys Proc. 6th Int. Conf. Computer Aided Verification Proc. 4th ACM Symp. Principles of Programming LanguagesCH78] P. Cousot and N. Halbwachs Conference Record of the Fifth annual ACM Symposium on Principles of Programming Languages Proc. 10th Int. Conf. Computer Aided Verification (CAV'98)CJ99] H. Comon and Y. Jurski. Timed automata and the theory of real numbers Proc. Conf. on Concurrency theory Proc. 12th Int. Conf. Computer Aided Verification (CAV'2000), pp.293-318, 1977. ,
Verification of consistency protocols via infinitestate symbolic model checking : A case study, Proc. IFIP Joint Int. Conf. Formal Description Techniques & Protocol Specification , Testing, and Verification (FORTE-PSTV'00) IFIP Conference Proceedings, pp.171-186, 2000. ,
Reset nets between decidability and undecidability, Proc. 25th Int. Coll ,
DOI : 10.1007/BFb0055044
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.57.3693
About Fast and TReX Accelerations, Proceedings of the 4th International Workshop on Automated Verification of Critical Systems Electronic Notes in Theoretical Computer Science, 2004. ,
DOI : 10.1016/j.entcs.2005.04.006
URL : http://doi.org/10.1016/j.entcs.2005.04.006
Covering sharing trees: a compact data structure for parameterized verification, International Journal on Software Tools for Technology Transfer, vol.structure, issue.1???2, pp.2-3268, 2004. ,
DOI : 10.1016/S0022-0000(69)80011-5
On the verification of broadcast protocols, Proceedings. 14th Symposium on Logic in Computer Science (Cat. No. PR00158), pp.352-359, 1999. ,
DOI : 10.1109/LICS.1999.782630
On model checking for nondeterministic infinite-state systems, Proc. 13th IEEE Symp. Logic in Computer Science (LICS'98), pp.70-80, 1998. ,
The minimal coverability graph for Petri nets ,
How to compose Presburgeraccelerations : Applications to broadcast protocols, Proc. 22nd Conf. Found. of Software Technology and Theor. Comp ,
DOI : 10.1007/3-540-36206-1_14
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.9119
A decompositional approach for computing least fixed-points of Datalog programs with Z-counters, FO97b] L. Fribourg and H. Olsén. Proving safety properties of infinite state systems by compilation into Presburger arithmetic, pp.305-335, 1997. ,
Wellabstracted transition systems : Application to FIFO automata Information and Computation Petri nets, flat languages and linear arithmetic Invited lecture Proceedings published as Ref Decidability of reachability problems for classes of two counters automata Van Begin. Expand, Enlarge and Check : new algorithms for the coverability problem of WSTS, Proc. 8th Int. Conf. Concurrency Theory of Lecture Notes in Computer Science Proc. 9th Int. Workshop on Functional and Logic Programming (WFLP'2000) Proc. 17th Ann. Symp. Theoretical Aspects of Computer Science (STACS'2000) Proc. 24th Conf. Found. of Software Technology and Theor. Comp. Sci. (FST&TCS'2004)GRV05] G. Geeraerts, J-F. Raskin, and L. Van Begin. Expand, enlarge and check... made efficient Poceedings of 17th International Conference on Computer Aided Verification ? (CAV 2005), number 3576 in Lecture Notes in Computer Science, pp.213-2271, 1997. ,
Pointer analysis : haven't we solved this problem yet ? In ACM SIGPLAN?SIGSOFT workshop on Program analysis for software tools and engineering, PASTE'01, pp.54-61, 2001. ,
Reversal-bounded multicounter machines and their decision problems, Journal of the ACM, vol.25, pp.116-133, 1978. ,
Counter Machines: Decision Problems and Applications, Proc. 25th Int. Symp. Math. Found. Comp. Sci. (MFCS'2000), pp.426-435, 2000. ,
DOI : 10.1007/978-3-642-60207-8_8
Counter machines and verification problems, Theoretical Computer Science, vol.289, issue.1, pp.165-189, 2002. ,
Symbolic Model Checking : 10 20 States and Beyond, Proc. 5th IEEE Symp. Logic in Computer Science (LICS'90), pp.1-33, 1990. ,
A time trigerred protocol for fault-tolerant real-time systems, IEEE computer, pp.14-23, 1994. ,
On the automata size for Presburger arithmetic, Proceedings of the 19th Annual IEEE Symposium on Logic in Computer Science, pp.110-119, 2004. ,
Symbolic model checking with rich assertional languages, Theoretical Computer Science, vol.256, issue.12, pp.93-112, 2001. ,
MONA IMPLEMENTATION SECRETS, International Journal of Foundations of Computer Science, vol.13, issue.04, pp.571-586, 2002. ,
DOI : 10.1142/S012905410200128X
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.24.1846
Putting static analysis to work for verification, ACM SIGSOFT Software Engineering Notes, vol.25, issue.5, pp.26-38, 2000. ,
DOI : 10.1145/347636.348031
TVLA: A System for Implementing Static Analyses, Proc. 7th Int. Symp. Static Analysis (SAS'2000), pp.280-281, 2000. ,
DOI : 10.1007/978-3-540-45099-3_15
Tackling the Infinite State Space of a Multimedia Control Protocol Service Specification, Proc. 23rd Int. Conf. Application and Theory of Petri Nets, pp.273-293, 2002. ,
DOI : 10.1007/3-540-48068-4_17
The affine hull of a binary automaton is computable in polynomial time, Proc. 5th Int. Workshop on Verification of Infinite State Systems (INFINITY 2003), pp.89-104, 2003. ,
Algorithmique de la vérification des systèmes à compteurs Approximation et accélération. Implémentation de l'outil Fast, CNRS UMR, vol.8643, 2003. ,
A Polynomial-Time Presburger Criterion and Synthesis for Number Decision Diagrams, Proc. 20th Annual IEEE Symposium on Logic in Computer Science (LICS'05), 2005. ,
On Flatness for 2-Dimensional Vector Addition Systems with States, Proc. 15th Int. Conf. Concurrency Theory, pp.402-416, 2004. ,
DOI : 10.1137/0213029
Flat counter automata almost everywhere ! Technical report, 2005. ,
Persitence of Vector Replacement Systems is decidable, Acta Informatica, vol.15, pp.309-318, 1981. ,
Undecidable problems in unreliable computations, Theoretical Computer Science, vol.297, issue.13, pp.337-354, 2003. ,
On finite semigroups of matrices The pointer assertion logic engine Protocol description and analysis based on a state transition model with channel expressions Workshop on Protocol Specification, Testing, and Verification (PSTV '87) Liveness and acceleration in parameterized verification Brain : Backward reachability analysis with integers Parametric shape analysis via 3-valued logic, Proceedings of the ACM SIGPLAN'01 Conference on Programming Language Design and Implementation (PLDI- 01), volume 36.5 of ACM SIGPLAN Notices Proc. 7th IFIP WG6.1 Int Proc. 12th Int. Conf. Computer Aided Verification (CAV'2000)Rev90] P. Z. Revesz. A closed form for Datalog queries with integer order Proc. 3rd Int. Conf. Database Theory (ICDT'90) Proc. 9th Int. Conf. Algebraic Methodology and Software Technology (AMAST'2002)WB98] P. Wolper and B. Boigelot. Verifying systems with infinite but regular state spaces Proc. 10th Int. Conf. Computer Aided Verification (CAV'98), pp.101-111, 1974. ,
On the Construction of Automata from Linear Arithmetic Constraints, Proc. 6th Int. Conf. Tools and Algorithms for the Construction and Analysis of Systems (TACAS'2000), pp.1-19, 2000. ,
DOI : 10.1007/3-540-46419-0_1
A Library for Composite Symbolic Representations, Proc. 7th Int. Conf. Tools and Algorithms for the Construction and Analysis of Systems (TACAS'2001), pp.52-66, 2001. ,
DOI : 10.1007/3-540-45319-9_5
Regular languages, Handbook of Formal Languages, pp.41-110, 1997. ,