Simulating reachability using first-order logic with applications to verification of linked data structures

T. Lev-Ami, N. Immerman, T. Reps, M. Sagiv, S. Srivastava, G. Yorsh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

41 Scopus citations

Abstract

This paper shows how lo harness exisling Iheorcm provers for firslorder logic lo automatically verify safely properlies of imperative programs lhal perform dynamic storage allocation and destructive updating of pointer-valued structure fields. One of the main obstacles is specifying and proving the (absence) of reachability properties among dynamically allocated cells. The main technical contributions are methods for simulating reachability in a conservative way using first-order formulas-the formulas describe a superset of the set of program states that can actually arise. These methods are employed for semi-automatic program verification (i.e., using programmer-supplied loop invariants) on programs such as mark-and-sweep garbage collection and destructive reversal of a singly linked list. (The mark-and-sweep example has been previously reported as being beyond the capabilities of ESC/Java.)

Original languageEnglish (US)
Title of host publicationAutomated Deduction - CADE-20 - 20th International Conference on Automated Deduction, Proceedings
PublisherSpringer Verlag
Pages99-115
Number of pages17
ISBN (Print)3540280057, 9783540280057
DOIs
StatePublished - 2005
Externally publishedYes
Event20th International Conference on Automated Deduction, CADE-20 - Tallinn, Estonia
Duration: Jul 22 2005Jul 27 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3632 LNAI
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other20th International Conference on Automated Deduction, CADE-20
Country/TerritoryEstonia
CityTallinn
Period7/22/057/27/05

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Simulating reachability using first-order logic with applications to verification of linked data structures'. Together they form a unique fingerprint.

Cite this