Zum Hauptinhalt springen

Showing 1–36 of 36 results for author: Pasareanu, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.13594  [pdf, other

    cs.LG

    Mechanistically Interpreting a Transformer-based 2-SAT Solver: An Axiomatic Approach

    Authors: Nils Palumbo, Ravi Mangal, Zifan Wang, Saranya Vijayakumar, Corina S. Pasareanu, Somesh Jha

    Abstract: Mechanistic interpretability aims to reverse engineer the computation performed by a neural network in terms of its internal components. Although there is a growing body of research on mechanistic interpretation of neural networks, the notion of a mechanistic interpretation itself is often ad-hoc. Inspired by the notion of abstract interpretation from the program analysis literature that aims to d… ▽ More

    Submitted 18 July, 2024; originally announced July 2024.

  2. arXiv:2407.08730  [pdf, other

    cs.NE

    Evaluating Deep Neural Networks in Deployment (A Comparative and Replicability Study)

    Authors: Eduard Pinconschi, Divya Gopinath, Rui Abreu, Corina S. Pasareanu

    Abstract: As deep neural networks (DNNs) are increasingly used in safety-critical applications, there is a growing concern for their reliability. Even highly trained, high-performant networks are not 100% accurate. However, it is very difficult to predict their behavior during deployment without ground truth. In this paper, we provide a comparative and replicability study on recent approaches that have been… ▽ More

    Submitted 27 July, 2024; v1 submitted 11 July, 2024; originally announced July 2024.

  3. arXiv:2403.19837  [pdf, other

    cs.LG cs.AI cs.CL cs.CV cs.LO

    Concept-based Analysis of Neural Networks via Vision-Language Models

    Authors: Ravi Mangal, Nina Narodytska, Divya Gopinath, Boyue Caroline Hu, Anirban Roy, Susmit Jha, Corina Pasareanu

    Abstract: The analysis of vision-based deep neural networks (DNNs) is highly desirable but it is very challenging due to the difficulty of expressing formal specifications for vision tasks and the lack of efficient verification procedures. In this paper, we propose to leverage emerging multimodal, vision-language, foundation models (VLMs) as a lens through which we can reason about vision models. VLMs have… ▽ More

    Submitted 10 April, 2024; v1 submitted 28 March, 2024; originally announced March 2024.

  4. arXiv:2401.03790  [pdf, other

    cs.LG cs.CR cs.PL cs.SE

    Inferring Properties of Graph Neural Networks

    Authors: Dat Nguyen, Hieu M. Vu, Cong-Thanh Le, Bach Le, David Lo, ThanhVu Nguyen, Corina Pasareanu

    Abstract: We propose GNNInfer, the first automatic property inference technique for GNNs. To tackle the challenge of varying input structures in GNNs, GNNInfer first identifies a set of representative influential structures that contribute significantly towards the prediction of a GNN. Using these structures, GNNInfer converts each pair of an influential structure and the GNN to their equivalent FNN and the… ▽ More

    Submitted 2 March, 2024; v1 submitted 8 January, 2024; originally announced January 2024.

    Comments: 20 pages main paper, 10 pages for appendix

  5. arXiv:2311.13445  [pdf, other

    cs.LG cs.CR

    Transfer Attacks and Defenses for Large Language Models on Coding Tasks

    Authors: Chi Zhang, Zifan Wang, Ravi Mangal, Matt Fredrikson, Limin Jia, Corina Pasareanu

    Abstract: Modern large language models (LLMs), such as ChatGPT, have demonstrated impressive capabilities for coding tasks including writing and reasoning about code. They improve upon previous neural network models of code, such as code2seq or seq2seq, that already demonstrated competitive results when performing tasks such as code summarization and identifying code vulnerabilities. However, these previous… ▽ More

    Submitted 22 November, 2023; originally announced November 2023.

  6. arXiv:2310.09361  [pdf, other

    cs.LG

    Is Certifying $\ell_p$ Robustness Still Worthwhile?

    Authors: Ravi Mangal, Klas Leino, Zifan Wang, Kai Hu, Weicheng Yu, Corina Pasareanu, Anupam Datta, Matt Fredrikson

    Abstract: Over the years, researchers have developed myriad attacks that exploit the ubiquity of adversarial examples, as well as defenses that aim to guard against the security vulnerabilities posed by such attacks. Of particular interest to this paper are defenses that provide provable guarantees against the class of $\ell_p$-bounded attacks. Certified defenses have made significant progress, taking robus… ▽ More

    Submitted 13 October, 2023; originally announced October 2023.

  7. arXiv:2305.18372  [pdf, other

    cs.AI cs.LG

    Assumption Generation for the Verification of Learning-Enabled Autonomous Systems

    Authors: Corina Pasareanu, Ravi Mangal, Divya Gopinath, Huafeng Yu

    Abstract: Providing safety guarantees for autonomous systems is difficult as these systems operate in complex environments that require the use of learning-enabled components, such as deep neural networks (DNNs) for visual perception. DNNs are hard to analyze due to their size (they can have thousands or millions of parameters), lack of formal specifications (DNNs are typically learnt from labeled data, in… ▽ More

    Submitted 27 May, 2023; originally announced May 2023.

  8. arXiv:2302.04634  [pdf, other

    cs.CV cs.AI cs.FL cs.LG

    Closed-loop Analysis of Vision-based Autonomous Systems: A Case Study

    Authors: Corina S. Pasareanu, Ravi Mangal, Divya Gopinath, Sinem Getir Yaman, Calum Imrie, Radu Calinescu, Huafeng Yu

    Abstract: Deep neural networks (DNNs) are increasingly used in safety-critical autonomous systems as perception components processing high-dimensional image data. Formal analysis of these systems is particularly challenging due to the complexity of the perception DNNs, the sensors (cameras), and the environment conditions. We present a case study applying formal probabilistic analysis techniques to an exper… ▽ More

    Submitted 6 February, 2023; originally announced February 2023.

  9. arXiv:2301.06959  [pdf, other

    cs.CR cs.SE

    SECOMlint: A linter for Security Commit Messages

    Authors: Sofia Reis, Corina Pasareanu, Rui Abreu, Hakan Erdogmus

    Abstract: Transparent and efficient vulnerability and patch disclosure are still a challenge in the security community, essentially because of the poor-quality documentation stemming from the lack of standards. SECOM is a recently-proposed standard convention for security commit messages that enables the writing of well-structured and complete commit messages for security patches. The convention prescribes… ▽ More

    Submitted 17 January, 2023; originally announced January 2023.

  10. arXiv:2212.04038  [pdf, other

    cs.SE

    SkipFuzz: Active Learning-based Input Selection for Fuzzing Deep Learning Libraries

    Authors: Hong Jin Kang, Pattarakrit Rattanukul, Stefanus Agus Haryono, Truong Giang Nguyen, Chaiyong Ragkhitwetsagul, Corina Pasareanu, David Lo

    Abstract: Many modern software systems are enabled by deep learning libraries such as TensorFlow and PyTorch. As deep learning is now prevalent, the security of deep learning libraries is a key concern. Fuzzing deep learning libraries presents two challenges. Firstly, to reach the functionality of the libraries, fuzzers have to use inputs from the valid input domain of each API function, which may be unknow… ▽ More

    Submitted 7 December, 2022; originally announced December 2022.

    Comments: 13 pages

  11. arXiv:2208.03407  [pdf, other

    cs.SE cs.AI cs.LG

    An Overview of Structural Coverage Metrics for Testing Neural Networks

    Authors: Muhammad Usman, Youcheng Sun, Divya Gopinath, Rishi Dange, Luca Manolache, Corina S. Pasareanu

    Abstract: Deep neural network (DNN) models, including those used in safety-critical domains, need to be thoroughly tested to ensure that they can reliably perform well in different scenarios. In this article, we provide an overview of structural coverage metrics for testing DNN models, including neuron coverage (NC), k-multisection neuron coverage (kMNC), top-k neuron coverage (TKNC), neuron boundary covera… ▽ More

    Submitted 5 August, 2022; originally announced August 2022.

  12. arXiv:2207.10534  [pdf, other

    cs.FL

    Assume, Guarantee or Repair -- A Regular Framework for Non Regular Properties (full version)

    Authors: Hadar Frenkel, Orna Grumberg, Corina S. Pasareanu, Sarai Sheinvald

    Abstract: We present Assume-Guarantee-Repair (AGR) - a novel framework which verifies that a program satisfies a set of properties and also repairs the program in case the verification fails. We consider communicating programs - these are simple C-like programs, extended with synchronous actions over communication channels. Our method, which consists of a learning-based approach to assume-guarantee reasonin… ▽ More

    Submitted 21 July, 2022; originally announced July 2022.

  13. arXiv:2206.03669  [pdf, other

    cs.LG cs.AI cs.LO

    Toward Certified Robustness Against Real-World Distribution Shifts

    Authors: Haoze Wu, Teruhiro Tagomori, Alexander Robey, Fengjun Yang, Nikolai Matni, George Pappas, Hamed Hassani, Corina Pasareanu, Clark Barrett

    Abstract: We consider the problem of certifying the robustness of deep neural networks against real-world distribution shifts. To do so, we bridge the gap between hand-crafted specifications and realistic deployment settings by proposing a novel neural-symbolic verification framework, in which we train a generative model to learn perturbations from data and define specifications with respect to the output o… ▽ More

    Submitted 6 March, 2023; v1 submitted 8 June, 2022; originally announced June 2022.

    Comments: SatML'23. Keywords: certified robustness, distribution shift, generative models, S-shaped activations, CEGAR

  14. arXiv:2206.00278  [pdf, other

    cs.LG

    On the Perils of Cascading Robust Classifiers

    Authors: Ravi Mangal, Zifan Wang, Chi Zhang, Klas Leino, Corina Pasareanu, Matt Fredrikson

    Abstract: Ensembling certifiably robust neural networks is a promising approach for improving the \emph{certified robust accuracy} of neural models. Black-box ensembles that assume only query-access to the constituent models (and their robustness certifiers) during prediction are particularly attractive due to their modular structure. Cascading ensembles are a popular instance of black-box ensembles that ap… ▽ More

    Submitted 19 October, 2022; v1 submitted 1 June, 2022; originally announced June 2022.

  15. arXiv:2205.03894  [pdf, ps, other

    cs.CR cs.AI

    VPN: Verification of Poisoning in Neural Networks

    Authors: Youcheng Sun, Muhammad Usman, Divya Gopinath, Corina S. Păsăreanu

    Abstract: Neural networks are successfully used in a variety of applications, many of them having safety and security concerns. As a result researchers have proposed formal verification techniques for verifying neural network properties. While previous efforts have mainly focused on checking local robustness in neural networks, we instead study another neural network security issue, namely data poisoning. I… ▽ More

    Submitted 8 May, 2022; originally announced May 2022.

  16. arXiv:2202.03360  [pdf, other

    cs.LG

    Discrete-Event Controller Synthesis for Autonomous Systems with Deep-Learning Perception Components

    Authors: Radu Calinescu, Calum Imrie, Ravi Mangal, Genaína Nunes Rodrigues, Corina Păsăreanu, Misael Alpizar Santana, Gricel Vázquez

    Abstract: We present DeepDECS, a new method for the synthesis of correct-by-construction discrete-event controllers for autonomous systems that use deep neural network (DNN) classifiers for the perception step of their decision-making processes. Despite major advances in deep learning in recent years, providing safety guarantees for these systems remains very challenging. Our controller synthesis method add… ▽ More

    Submitted 27 March, 2023; v1 submitted 7 February, 2022; originally announced February 2022.

    Comments: 18 pages 6 Figures 2 Tables

    ACM Class: D.2.2; D.2.4; G.3; I.2.0; I.2.6

  17. arXiv:2202.01179  [pdf, other

    cs.CR cs.CV

    AntidoteRT: Run-time Detection and Correction of Poison Attacks on Neural Networks

    Authors: Muhammad Usman, Youcheng Sun, Divya Gopinath, Corina S. Pasareanu

    Abstract: We study backdoor poisoning attacks against image classification networks, whereby an attacker inserts a trigger into a subset of the training data, in such a way that at test time, this trigger causes the classifier to predict some target class. %There are several techniques proposed in the literature that aim to detect the attack but only a few also propose to defend against it, and they typical… ▽ More

    Submitted 31 January, 2022; originally announced February 2022.

  18. arXiv:2110.12588  [pdf, other

    cs.LG cs.AI cs.SE

    QuantifyML: How Good is my Machine Learning Model?

    Authors: Muhammad Usman, Divya Gopinath, Corina S. Păsăreanu

    Abstract: The efficacy of machine learning models is typically determined by computing their accuracy on test data sets. However, this may often be misleading, since the test data may not be representative of the problem that is being studied. With QuantifyML we aim to precisely quantify the extent to which machine learning models have learned and generalized from the given data. Given a trained model, Quan… ▽ More

    Submitted 24 October, 2021; originally announced October 2021.

    Comments: In Proceedings FMAS 2021, arXiv:2110.11527

    Journal ref: EPTCS 348, 2021, pp. 92-100

  19. arXiv:2107.11445  [pdf, other

    cs.LG cs.NE

    Self-Correcting Neural Networks For Safe Classification

    Authors: Klas Leino, Aymeric Fromherz, Ravi Mangal, Matt Fredrikson, Bryan Parno, Corina Păsăreanu

    Abstract: Classifiers learnt from data are increasingly being used as components in systems where safety is a critical concern. In this work, we present a formal notion of safety for classifiers via constraints called safe-ordering constraints. These constraints relate requirements on the order of the classes output by a classifier to conditions on its input, and are expressive enough to encode various inte… ▽ More

    Submitted 9 June, 2022; v1 submitted 23 July, 2021; originally announced July 2021.

  20. arXiv:2106.01367  [pdf, other

    cs.CR cs.AI cs.LG cs.PL cs.SE

    On using distributed representations of source code for the detection of C security vulnerabilities

    Authors: David Coimbra, Sofia Reis, Rui Abreu, Corina Păsăreanu, Hakan Erdogmus

    Abstract: This paper presents an evaluation of the code representation model Code2vec when trained on the task of detecting security vulnerabilities in C source code. We leverage the open-source library astminer to extract path-contexts from the abstract syntax trees of a corpus of labeled C functions. Code2vec is trained on the resulting path-contexts with the task of classifying a function as vulnerable o… ▽ More

    Submitted 1 June, 2021; originally announced June 2021.

    Comments: Submitted to DX 2021

  21. arXiv:2103.12535  [pdf, other

    cs.LG cs.AI

    NNrepair: Constraint-based Repair of Neural Network Classifiers

    Authors: Muhammad Usman, Divya Gopinath, Youcheng Sun, Yannic Noller, Corina Pasareanu

    Abstract: We present NNrepair, a constraint-based technique for repairing neural network classifiers. The technique aims to fix the logic of the network at an intermediate layer or at the last layer. NNrepair first uses fault localization to find potentially faulty network parameters (such as the weights) and then performs repair using constraint solving to apply small modifications to the parameters to rem… ▽ More

    Submitted 14 June, 2021; v1 submitted 23 March, 2021; originally announced March 2021.

  22. arXiv:2103.01629  [pdf, other

    cs.LG

    DeepCert: Verification of Contextually Relevant Robustness for Neural Network Image Classifiers

    Authors: Colin Paterson, Haoze Wu, John Grese, Radu Calinescu, Corina S. Pasareanu, Clark Barrett

    Abstract: We introduce DeepCert, a tool-supported method for verifying the robustness of deep neural network (DNN) image classifiers to contextually relevant perturbations such as blur, haze, and changes in image contrast. While the robustness of DNN classifiers has been the subject of intense research in recent years, the solutions delivered by this research focus on verifying DNN robustness to small pertu… ▽ More

    Submitted 2 March, 2021; originally announced March 2021.

  23. arXiv:2103.00124  [pdf, other

    cs.LG cs.AI cs.SE

    NEUROSPF: A tool for the Symbolic Analysis of Neural Networks

    Authors: Muhammad Usman, Yannic Noller, Corina Pasareanu, Youcheng Sun, Divya Gopinath

    Abstract: This paper presents NEUROSPF, a tool for the symbolic analysis of neural networks. Given a trained neural network model, the tool extracts the architecture and model parameters and translates them into a Java representation that is amenable for analysis using the Symbolic PathFinder symbolic execution tool. Notably, NEUROSPF encodes specialized peer classes for parsing the model's parameters, ther… ▽ More

    Submitted 26 February, 2021; originally announced March 2021.

  24. arXiv:2004.08440  [pdf, other

    cs.LO cs.AI cs.LG

    Parallelization Techniques for Verifying Neural Networks

    Authors: Haoze Wu, Alex Ozdemir, Aleksandar Zeljić, Ahmed Irfan, Kyle Julian, Divya Gopinath, Sadjad Fouladi, Guy Katz, Corina Pasareanu, Clark Barrett

    Abstract: Inspired by recent successes with parallel optimization techniques for solving Boolean satisfiability, we investigate a set of strategies and heuristics that aim to leverage parallel computing to improve the scalability of neural network verification. We introduce an algorithm based on partitioning the verification problem in an iterative manner and explore two partitioning strategies, that work b… ▽ More

    Submitted 21 August, 2020; v1 submitted 17 April, 2020; originally announced April 2020.

  25. arXiv:2002.04742  [pdf, other

    cs.LG stat.ML

    Fast Geometric Projections for Local Robustness Certification

    Authors: Aymeric Fromherz, Klas Leino, Matt Fredrikson, Bryan Parno, Corina Păsăreanu

    Abstract: Local robustness ensures that a model classifies all inputs within an $\ell_2$-ball consistently, which precludes various forms of adversarial inputs. In this paper, we present a fast procedure for checking local robustness in feed-forward neural networks with piecewise-linear activation functions. Such networks partition the input space into a set of convex polyhedral regions in which the network… ▽ More

    Submitted 18 February, 2021; v1 submitted 11 February, 2020; originally announced February 2020.

    Comments: Appearing in ICLR 2021

  26. arXiv:1912.00289  [pdf, other

    cs.CV

    A Programmatic and Semantic Approach to Explaining and DebuggingNeural Network Based Object Detectors

    Authors: Edward Kim, Divya Gopinath, Corina Pasareanu, Sanjit Seshia

    Abstract: Even as deep neural networks have become very effective for tasks in vision and perception, it remains difficult to explain and debug their behavior. In this paper, we present a programmatic and semantic approach to explaining, understanding, and debugging the correct and incorrect behaviors of a neural network-based perception system. Our approach is semantic in that it employs a high-level repre… ▽ More

    Submitted 16 June, 2020; v1 submitted 30 November, 2019; originally announced December 2019.

    Journal ref: CVPR (2020)

  27. arXiv:1904.13215  [pdf, other

    cs.LG cs.AI cs.FL

    Property Inference for Deep Neural Networks

    Authors: Divya Gopinath, Hayes Converse, Corina S. Pasareanu, Ankur Taly

    Abstract: We present techniques for automatically inferring formal properties of feed-forward neural networks. We observe that a significant part (if not all) of the logic of feed forward networks is captured in the activation status ('on' or 'off') of its neurons. We propose to extract patterns based on neuron decisions as preconditions that imply certain desirable output property e.g., the prediction bein… ▽ More

    Submitted 10 September, 2020; v1 submitted 29 April, 2019; originally announced April 2019.

    Comments: Errata: This version updates the ASE'19 conference version by correcting the definition of the three properties that were checked for ACASXU

  28. arXiv:1811.07005  [pdf, other

    cs.CR cs.SE

    DifFuzz: Differential Fuzzing for Side-Channel Analysis

    Authors: Shirin Nilizadeh, Yannic Noller, Corina S. Pasareanu

    Abstract: Side-channel attacks allow an adversary to uncover secret program data by observing the behavior of a program with respect to a resource, such as execution time, consumed memory or response size. Side-channel vulnerabilities are difficult to reason about as they involve analyzing the correlations between resource usage over multiple program paths. We present DifFuzz, a fuzzing-based approach for d… ▽ More

    Submitted 26 February, 2019; v1 submitted 16 November, 2018; originally announced November 2018.

  29. arXiv:1810.08303  [pdf, other

    cs.AI cs.LG

    Compositional Verification for Autonomous Systems with Deep Learning Components

    Authors: Corina S. Pasareanu, Divya Gopinath, Huafeng Yu

    Abstract: As autonomy becomes prevalent in many applications, ranging from recommendation systems to fully autonomous vehicles, there is an increased need to provide safety guarantees for such systems. The problem is difficult, as these are large, complex systems which operate in uncertain environments, requiring data-driven machine-learning components. However, learning techniques such as Deep Neural Netwo… ▽ More

    Submitted 18 October, 2018; originally announced October 2018.

  30. arXiv:1807.10439  [pdf, other

    cs.SE cs.CR

    Symbolic Execution for Deep Neural Networks

    Authors: Divya Gopinath, Kaiyuan Wang, Mengshi Zhang, Corina S. Pasareanu, Sarfraz Khurshid

    Abstract: Deep Neural Networks (DNN) are increasingly used in a variety of applications, many of them with substantial safety and security concerns. This paper introduces DeepCheck, a new approach for validating DNNs based on core ideas from program analysis, specifically from symbolic execution. The idea is to translate a DNN into an imperative program, thereby enabling program analysis to assist with DNN… ▽ More

    Submitted 27 July, 2018; originally announced July 2018.

  31. Badger: Complexity Analysis with Fuzzing and Symbolic Execution

    Authors: Yannic Noller, Rody Kersten, Corina S. Păsăreanu

    Abstract: Hybrid testing approaches that involve fuzz testing and symbolic execution have shown promising results in achieving high code coverage, uncovering subtle errors and vulnerabilities in a variety of software applications. In this paper we describe Badger - a new hybrid approach for complexity analysis, with the goal of discovering vulnerabilities which occur when the worst-case time or space comple… ▽ More

    Submitted 8 June, 2018; originally announced June 2018.

    Journal ref: In Proceedings of 27th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'18). ACM, New York, NY, USA, 11 pages, 2018

  32. arXiv:1710.00486  [pdf, other

    cs.NE cs.LG stat.ML

    DeepSafe: A Data-driven Approach for Checking Adversarial Robustness in Neural Networks

    Authors: Divya Gopinath, Guy Katz, Corina S. Pasareanu, Clark Barrett

    Abstract: Deep neural networks have become widely used, obtaining remarkable results in domains such as computer vision, speech recognition, natural language processing, audio recognition, social network filtering, machine translation, and bio-informatics, where they have produced results comparable to human experts. However, these networks can be easily fooled by adversarial perturbations: minimal changes… ▽ More

    Submitted 30 January, 2020; v1 submitted 2 October, 2017; originally announced October 2017.

  33. Abstraction and Learning for Infinite-State Compositional Verification

    Authors: Dimitra Giannakopoulou, Corina S. Păsăreanu

    Abstract: Despite many advances that enable the application of model checking techniques to the verification of large systems, the state-explosion problem remains the main challenge for scalability. Compositional verification addresses this challenge by decomposing the verification of a large system into the verification of its components. Recent techniques use learning-based approaches to automate composit… ▽ More

    Submitted 19 September, 2013; originally announced September 2013.

    Comments: In Proceedings Festschrift for Dave Schmidt, arXiv:1309.4557

    Journal ref: EPTCS 129, 2013, pp. 211-228

  34. Learning Probabilistic Systems from Tree Samples

    Authors: Anvesh Komuravelli, Corina S. Pasareanu, Edmund M. Clarke

    Abstract: We consider the problem of learning a non-deterministic probabilistic system consistent with a given finite set of positive and negative tree samples. Consistency is defined with respect to strong simulation conformance. We propose learning algorithms that use traditional and a new "stochastic" state-space partitioning, the latter resulting in the minimum number of states. We then use them to solv… ▽ More

    Submitted 20 July, 2012; originally announced July 2012.

    Comments: 14 pages, conference paper with full proofs

    Journal ref: LICS, pp. 441-450, IEEE, 2012

  35. Assume-Guarantee Abstraction Refinement for Probabilistic Systems

    Authors: Anvesh Komuravelli, Corina S. Pasareanu, Edmund M. Clarke

    Abstract: We describe an automated technique for assume-guarantee style checking of strong simulation between a system and a specification, both expressed as non-deterministic Labeled Probabilistic Transition Systems (LPTSes). We first characterize counterexamples to strong simulation as "stochastic" trees and show that simpler structures are insufficient. Then, we use these trees in an abstraction refineme… ▽ More

    Submitted 20 July, 2012; originally announced July 2012.

    Comments: 23 pages, conference paper with full proofs

    Journal ref: CAV, vol. 7358 of LNCS, pp. 310-326. Springer-Verlag. 2012

  36. Predicate Abstraction with Under-approximation Refinement

    Authors: Corina S. Pasareanu, Radek Pelanek, Willem Visser

    Abstract: We propose an abstraction-based model checking method which relies on refinement of an under-approximation of the feasible behaviors of the system under analysis. The method preserves errors to safety properties, since all analyzed behaviors are feasible by definition. The method does not require an abstract transition relation to be generated, but instead executes the concrete transitions while… ▽ More

    Submitted 26 February, 2007; v1 submitted 22 January, 2007; originally announced January 2007.

    Comments: 22 pages, 3 figures, accepted for publication in Logical Methods in Computer Science journal (special issue CAV 2005)

    ACM Class: D.2.4; F.3.1

    Journal ref: Logical Methods in Computer Science, Volume 3, Issue 1 (February 26, 2007) lmcs:2227