Zum Hauptinhalt springen

Showing 1–4 of 4 results for author: Peringer, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.18491  [pdf, other

    cs.SE cs.PL

    Algorithmic Details behind the Predator Shape Analyser

    Authors: Kamil Dudka, Petr Muller, Petr Peringer, Veronika Šoková, Tomáš Vojnar

    Abstract: This chapter, which is an extended and revised version of the conference paper 'Predator: Byte-Precise Verification of Low-Level List Manipulation', concentrates on a detailed description of the algorithms behind the Predator shape analyser based on abstract interpretation and symbolic memory graphs. Predator is particularly suited for formal analysis and verification of sequential non-recursive C… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

    Comments: Book chapter preview

  2. arXiv:2205.02590  [pdf, other

    cs.LO cs.PL

    Low-Level Bi-Abduction

    Authors: Lukáš Holík, Petr Peringer, Adam Rogalewicz, Veronika Šoková, Tomáš Vojnar, Florian Zuleger

    Abstract: The paper proposes a new static analysis designed to handle open programs, i.e., fragments of programs, with dynamic pointer-linked data structures - in particular, various kinds of lists - that employ advanced low-level pointer operations. The goal is to allow such programs be analysed without a need of writing analysis harnesses that would first initialise the structures being handled. The appro… ▽ More

    Submitted 5 May, 2022; originally announced May 2022.

    Comments: Published in European Conference on Object-Oriented Programming ECOOP 2022

  3. arXiv:1909.07152  [pdf, other

    cs.SE

    PredatorHP Attacks Interval-Sized Regions

    Authors: Michal Kotoun, Petr Peringer, Veronika Šoková, Tomáš Vojnar

    Abstract: This paper describes shortly the basic principles of the PredatorHP (Predator Hunting Party) shape analyzer and presents its recent improvements. One of the most visible changes is the way PredatorHP handles interval-sized memory regions, which is particularly useful for dealing with arrays whose size is not fixed in advance. Further, the paper characterizes PredatorHP's participation in SV-COMP 2… ▽ More

    Submitted 16 September, 2019; originally announced September 2019.

    Comments: System description for contribution to Software Verification Competition SV-COMP'19

  4. arXiv:1510.07995  [pdf, other

    cs.PL

    From Low-Level Pointers to High-Level Containers

    Authors: Kamil Dudka, Lukáš Holík, Petr Peringer, Marek Trtík, Tomáš Vojnar

    Abstract: We propose a method that transforms a C program manipulating containers using low-level pointer statements into an equivalent program where the containers are manipulated via calls of standard high-level container operations like push_back or pop_front. The input of our method is a C program annotated by a special form of shape invariants which can be obtained from current automatic shape analyser… ▽ More

    Submitted 27 October, 2015; originally announced October 2015.

    Comments: An extended version of a VMCAI'16 paper

    Report number: FIT BUT Technical Report Series, Technical Report No. FIT-TR-2015-03