Checking Properties Described by State Machines: On Synergy of Instrumentation, Slicing, and Symbolic Execution
Authors | |
---|---|
Year of publication | 2012 |
Type | Article in Proceedings |
Conference | Formal Methods for Industrial Critical systems: 17th International Workshop, FMICS 2012 |
MU Faculty or unit | |
Citation | |
Web | http://www.springerlink.com/content/p027081716330416/ |
Doi | http://dx.doi.org/10.1007/978-3-642-32469-7_14 |
Field | Informatics |
Keywords | Bug finding; Symbolic execution; Program slicing; FSM property specification; Code instrumentation |
Attached files | |
Description | We introduce a novel technique for checking properties described by finite state machines. The technique is based on a synergy of three well-known methods: instrumentation, program slicing, and symbolic execution. More precisely, we instrument a given program with a code that tracks runs of state machines representing various properties. Next we slice the program to reduce its size without affecting runs of state machines. And then we symbolically execute the sliced program to find real violations of the checked properties, i.e. real bugs. Depending on the kind of symbolic execution, the technique can be applied as a stand-alone bug finding technique, or to weed out some false positives from an output of another bug-finding tool. We provide several examples demonstrating the practical applicability of our technique. |
Related projects: |