PLDI 2016 Tutorial Automata-Based String Analysis

Size: px
Start display at page:

Download "PLDI 2016 Tutorial Automata-Based String Analysis"

Transcription

1 PLDI 2016 Tutorial Automata-Based String Analysis Tevfik Bultan, Abdulbaki Aydin, Lucas Bang Verification Laboratory Department of Computer Science

2 Common Usages of Strings } Input validation and sanitization } Database query generation } Formatted data generation } Dynamic code generation 2

3 Symbolic Execution Example 1 public void site_exec(string cmd) { 2 String p = "home/ftp/bin"; 3 int j, sp = cmd.indexof( ); 5 if (sp == -1) { 6 j = cmd.lastindexof( / ); 7 } else { 8 j = cmd.lastindexof( /, sp); 9 } 11 String r = cmd.substring(j); 12 int l = r.length() + p.length(); 14 if (l > 32) { 15 return; 16 } 18 String buf = p + r; 19 boolean t = buf.contains("%n"); 21 if (t == true) { 22 throw new Exception("THREAT"); 23 } 25 execute(buf); 26 return; 27 } 3

4 Model Counting String Constraint Solver INPUT OUTPUT string constraint: C Automata-Based model Counting string constraint solver (ABC) counting function: f c length bound: k # of strings with length k for which C evaluates to true Aydin et al., Automata-based Model Counting for String Constraints. (CAV 15) 4

5 Model Counting String Constraint Solver INPUT OUTPUT string constraint: C Automata-Based model Counting string constraint solver (ABC) counting function: f c length bound: k # of strings with length k for which C evaluates to true Aydin et al., Automata-based Model Counting for String Constraints. (CAV 15) 5

6 String Constraint Language 6

7 Example String Expressions String Expression Constraint Language s.length() length(s) s.isempty() length(s) == 0 Java s.startswith(t,n) s.indexof(t,n) 0 n n s begins(substring(s,n, s ),t) indexof(substring(s,n, s ),t) PHP s.replaceall(p,r) strrpos(s, t) substr_replace(s, t,i,j) strip_tags(s) mysql_real_escape _string(s) replaceall(s,p,r) lastindexof(s,t) substring(s,0,i).t.substring(s,j, s ) replaceall(s,("<a>" "<p>"...),"")...replaceall(s,replaceall(s, \\", \\\\")," ", \ ")... 7

8 Model Counting String Constraint Solver INPUT OUTPUT string constraint: C Automata-Based model Counting string constraint solver (ABC) counting function: f c length bound: k # of strings with length k for which C evaluates to true Aydin et al., Automata-based Model Counting for String Constraints. (CAV 15) 8

9 String Automata Construction C x 01 LEN x = 2 9

10 String Automata Construction C x 01 LEN x = 2 10

11 String Automata Construction C x 01 LEN x = 2 11

12 String Automata Construction C x 01 LEN x = 2 12

13 String Automata Construction C x 01 LEN x = 2 13

14 String Automata Construction C x 01 LEN x = 2 14

15 String Automata Construction C x 01 LEN x = 2 15

16 String Automata Construction C x 01 LEN x = 2 16

17 String Automata Construction C x 01 LEN x = 2 17

18 String Automata Construction C x 01 LEN x = 2 18

19 String Automata Construction C x 01 LEN x = 2 19

20 String Automata Construction C x 01 LEN x = 2 20

21 String Automata Construction C x 01 LEN x = 2 21

22 String Automata Construction C x 01 LEN x = 2 22

23 String Automata Construction C x 01 LEN x = 2 23

24 String Automata Construction C x 01 LEN x = 2 24

25 String Automata Construction C x 01 LEN x = 2 25

26 String Automata Construction C x 01 LEN x = 2 26

27 String Automata Construction C x 01 LEN x = 2 27

28 String Automata Construction C x 01 LEN x = 2 28

29 String Automata Construction C x 01 LEN x = 2 29

30 String Automata Construction C x 01 LEN x = 2 00, 10, 11 30

31 Integer Constraints 31

32 Integer Automata Construction C x = 1 x + y = 1 32

33 Integer Automata Construction C x = 1 x + y = 1 C 9 x + 0 y + 1 = 0 [1 0 1] C? x + y 1 = 0 [1 1 1] 33

34 Integer Automata Construction C x = 1 x + y = 1 C 9 x + 0 y + 1 = 0 [1 0 1] C? x + y 1 = 0 [1 1 1] C 9 C? } Using automata construction techniques described in: C. Bartzis and Tevfik Bultan. Efficient symbolic representations for arithmetic constraints in verification. Int. J. Found. Comput. Sci.,

35 Integer Automata Construction C x = 1 x + y = 1 (111, 010) = ( 1, 2) } Conjunction and disjunction is handled by automata product, negation is handled by automata complement 35

36 Mixing String LIA Constraints 36

37 Mixing String LIA Constraints length s = x x = 2y } We can try to solve using string constraint solving } Integer variables are represented with unary automaton } A H = L Σ H, A K = L λ, A M = L λ, A?M = L λ } A H A OPQRST ; L Σ H L λ } L λ = L λ L λ = L(λ ) } s = abc \, x = 1, y = 2 37

38 Mixing String LIA Constraints length s = x x = 2y } We can do better by using multi-track binary integer automaton } There will be three integer variables: length s, x, y 38

39 Mixing String LIA Constraints length s = x x = 2y } Using automata techniques described in: F. Yu, T. Bultan, O. H. Ibarra. Symbolic String Verification: Combining String Analysis and Size Analysis. TACAS 09 39

40 Mixing String LIA Constraints length s = x x = 2y 40

41 Mixing String LIA Constraints length s = x x = 2y 41

42 Relational String Constraints 42

43 Relational String Constraint Example s = t s t } Single track string automata results in SAT (w/ optimizations) } Assume Σ = {a, b, c} s = t L(A s ) L(A t ) s t L(A s ) L(A t ) a b c a b c a b c a b c 43

44 Relational String Constraint Example s = t s t } Multi-track string automata can keep relations s = t L(A s ) L(A t ) s t L(A s ) L(A t ) a b c a b c a b c a b c (a, a) b, b c, c (a, b) (a, c) b, a b, a c, a c, b 44

45 Relational String Constraint Example s = t s t } Each track represents values of one string variable s = t s t 45

46 Word Equations } Let X (the first track), Y (the second track), be two string variables } λ is the padding symbol X = Y. cc } X = Y. C, X = C. Y, C = X. Y can be precisely represented with multi-track automaton } X = Y. Z is non-linear, can be represented with over- or under-approximation

47 Model Counting String Constraints Solver INPUT OUTPUT string constraint: C Automata-Based model Counting string constraint solver (ABC) counting function: f c length bound: k # of strings with length k for which C evaluates to true Aydin et al., Automata-based Model Counting for String Constraints. (CAV 15) 47

48 ABC Tool Symbolic Execution Tools input constraint bound k SAT/UNSAT f k, #solutions Compilation Automata Construction SMTLIB Parser Formula Transformer Driver Integer Constraint Solver String Constraint Solver Model Counter Formula Optimizer Dependency Analyzer ABC Automata Manipulation Library LIBSTRANGER MONA Mathematica 48

49 Experimental Evaluation } We conducted experiments on 3 benchmark sets } A java benchmark with wide range of string operations } Kaluza Small & Kaluza Big benchmarks for satisfiability check Frequency of Operations Per 1000 Formulas. = LENGTH REPLACEALL, BEGINS SUBSTRING, ENDS CONTAINS, INDEXOF Kausler Kaluza Small Kaluza Big

50 Satisfiability Check Comparison } Compared with CVC4 } Used SMT-lib format of Kaluza benchmarks from CVC4 ABC-CVC4 sat-sat ABC-CVC4 unsat-unsat ABC-CVC4 sat-unsat ABC-CVC4 unsat-sat ABC-CVC4 sat-timeout sat/small sat/big unsat/small unsat/big } Constraint solver performance for Kaluza benchmarks ABC Avg. Time (seconds) CVC4 Avg. Time (seconds) big small

51 Kauser s Benchmark } Extracted from 7 real-world server-side Java applications } Constraints were generated by extracting program path constraints through dynamic symbolic execution } CVC4 1.4 stable version was not able to handle Kauser s benchmark # of satisfiable path constraints Avg. # of BDD Nodes (each 16 bytes) Avg. Running Time (seconds) } Automata representation we use encodes the transition relation as a binary decision diagram 51

52 Model Counting String Constraints Solver INPUT OUTPUT string constraint: C Automata-Based model Counting string constraint solver (ABC) counting function: f c length bound: k # of strings with length k for which C evaluates to true Aydin et al., Automata-based Model Counting for String Constraints. (CAV 15) 52

Automata-based Model Counting for String Constraints. Abdulbaki Aydin, Lucas Bang, Tevfik Bultan

Automata-based Model Counting for String Constraints. Abdulbaki Aydin, Lucas Bang, Tevfik Bultan Automata-based Model Counting for String Constraints Abdulbaki Aydin, Lucas Bang, Tevfik Bultan https://vlab.cs.ucsb.edu Model Counting for String Constraints Automata-Based model Counter (ABC) 2 Can you

More information

Symbolic String Verification: Combining String Analysis and Size Analysis

Symbolic String Verification: Combining String Analysis and Size Analysis Symbolic String Verification: Combining String Analysis and Size Analysis Fang Yu Tevfik Bultan Oscar H. Ibarra Deptartment of Computer Science University of California Santa Barbara, USA {yuf, bultan,

More information

Action Language Verifier, Extended

Action Language Verifier, Extended Action Language Verifier, Extended Tuba Yavuz-Kahveci 1, Constantinos Bartzis 2, and Tevfik Bultan 3 1 University of Florida 2 Carnegie Mellon University 3 UC, Santa Barbara 1 Introduction Action Language

More information

Symbolic String Verification: An Automata-based Approach

Symbolic String Verification: An Automata-based Approach : An Automata-based Approach Fang Yu Tevfik Bultan Marco Cova Oscar H. Ibarra Dept. of Computer Science University of California Santa Barbara, USA {yuf, bultan, marco, ibarra}@cs.ucsb.edu August 11, 2008

More information

CS 267: Automated Verification. Lecture 13: Bounded Model Checking. Instructor: Tevfik Bultan

CS 267: Automated Verification. Lecture 13: Bounded Model Checking. Instructor: Tevfik Bultan CS 267: Automated Verification Lecture 13: Bounded Model Checking Instructor: Tevfik Bultan Remember Symbolic Model Checking Represent sets of states and the transition relation as Boolean logic formulas

More information

HAMPI A Solver for String Theories

HAMPI A Solver for String Theories HAMPI A Solver for String Theories Vijay Ganesh MIT (With Adam Kiezun, Philip Guo, Pieter Hooimeijer and Mike Ernst) Dagstuhl, 2010 Motivation for String Theories String-manipulating programs ü String

More information

Automata-based Model Counting String Constraint Solver for Vulnerability Analysis

Automata-based Model Counting String Constraint Solver for Vulnerability Analysis University of California Santa Barbara Automata-based Model Counting String Constraint Solver for Vulnerability Analysis A dissertation submitted in partial satisfaction of the requirements for the degree

More information

Z3str3: A String Solver with Theory-aware Heuristics

Z3str3: A String Solver with Theory-aware Heuristics Z3str3: A String Solver with Theory-aware Heuristics Murphy Berzish and Vijay Ganesh University of Waterloo Waterloo Canada Yunhui Zheng IBM Research Yorktown Heights USA Abstract We present a new string

More information

Relational String Verification Using Multi-track Automata

Relational String Verification Using Multi-track Automata Relational String Verification Using Multi-track Automata Fang Yu, Tevfik Bultan, and Oscar H. Ibarra Department of Computer Science, University of California, Santa Barbara, CA, USA {yuf, bultan, ibarra}@cs.ucsb.edu

More information

String Abstractions for String Verification

String Abstractions for String Verification String Abstractions for String Verification Fang Yu 1, Tevfik Bultan 2, and Ben Hardekopf 2 1 Department of Management Information Systems National Chengchi University, Taipei, Taiwan yuf@nccu.edu.tw 2

More information

Attack Synthesis for Strings using Meta-heuristics

Attack Synthesis for Strings using Meta-heuristics Attack Synthesis for Strings using Meta-heuristics JPF Workshop 2018 Seemanta Saha*, Ismet Burak Kadron*, William Eiers*, Lucas Bang+, Tevfik Bultan* * University of California Santa Barbara + Harvey Mudd

More information

n HW7 due in about ten days n HW8 will be optional n No CLASS or office hours on Tuesday n I will catch up on grading next week!

n HW7 due in about ten days n HW8 will be optional n No CLASS or office hours on Tuesday n I will catch up on grading next week! Announcements SMT Solvers, Symbolic Execution n HW7 due in about ten days n HW8 will be optional n No CLASS or office hours on Tuesday n I will catch up on grading next week! n Presentations n Some of

More information

COUNTEREXAMPLE-GUIDED MODEL SYNTHESIS

COUNTEREXAMPLE-GUIDED MODEL SYNTHESIS COUNTEREXAMPLE-GUIDED MODEL SYNTHESIS Mathias Preiner, Aina Niemetz and Armin Biere Institute for Formal Models and Verification (FMV) Johannes Kepler University, Linz, Austria http://fmv.jku.at/ TACAS

More information

Lecture 10: Nested Depth First Search, Counter- Example Generation Revisited, Bit-State Hashing, On-The-Fly Model Checking

Lecture 10: Nested Depth First Search, Counter- Example Generation Revisited, Bit-State Hashing, On-The-Fly Model Checking CS 267: Automated Verification Lecture 10: Nested Depth First Search, Counter- Example Generation Revisited, Bit-State Hashing, On-The-Fly Model Checking Instructor: Tevfik Bultan Buchi Automata Language

More information

LEARNING TO INSTANTIATE QUANTIFIERS

LEARNING TO INSTANTIATE QUANTIFIERS LEARNING TO INSTANTIATE QUANTIFIERS Armin Biere 1 joint work with Mathias Preiner 1,2, Aina Niemetz 1,2 TACAS 17, SMT 17, PhD Thesis Mathias Preiner in 2017 1 Johannes Kepler University Linz 2 Stanford

More information

COUNTEREXAMPLE-GUIDED MODEL SYNTHESIS

COUNTEREXAMPLE-GUIDED MODEL SYNTHESIS COUNTEREXAMPLE-GUIDED MODEL SYNTHESIS Mathias Preiner, Aina Niemetz and Armin Biere Johannes Kepler University Stanford University SMT Workshop July 22-23, 2017 Heidelberg, Germany Introduction Counterexample-Guided

More information

Advance Innovative Information Technology - PART I

Advance Innovative Information Technology - PART I Composite Advance Innovative Information Technology - PART I Fang Yu Software Security Lab. Department of Management Information Systems College of Commerce, National Chengchi University http://soslab.nccu.edu.tw

More information

COUNTEREXAMPLE-GUIDED MODEL SYNTHESIS

COUNTEREXAMPLE-GUIDED MODEL SYNTHESIS COUNTEREXAMPLE-GUIDED MODEL SYNTHESIS Mathias Preiner?y, Aina Niemetz?y and Armin Biere?? Johannes Kepler University y Stanford University SMT Workshop July 22-23, 2017 Heidelberg, Germany Introduction

More information

Basic operators, Arithmetic, Relational, Bitwise, Logical, Assignment, Conditional operators. JAVA Standard Edition

Basic operators, Arithmetic, Relational, Bitwise, Logical, Assignment, Conditional operators. JAVA Standard Edition Basic operators, Arithmetic, Relational, Bitwise, Logical, Assignment, Conditional operators JAVA Standard Edition Java - Basic Operators Java provides a rich set of operators to manipulate variables.

More information

Symbolic Automata: The Toolkit

Symbolic Automata: The Toolkit Symbolic Automata: The Toolkit Margus Veanes and Nikolaj Bjørner Microsoft Research, Redmond, WA Abstract. The symbolic automata toolkit lifts classical automata analysis to work modulo rich alphabet theories.

More information

VS 3 : SMT Solvers for Program Verification

VS 3 : SMT Solvers for Program Verification VS 3 : SMT Solvers for Program Verification Saurabh Srivastava 1,, Sumit Gulwani 2, and Jeffrey S. Foster 1 1 University of Maryland, College Park, {saurabhs,jfoster}@cs.umd.edu 2 Microsoft Research, Redmond,

More information

An Introduction to Satisfiability Modulo Theories

An Introduction to Satisfiability Modulo Theories An Introduction to Satisfiability Modulo Theories Philipp Rümmer Uppsala University Philipp.Ruemmer@it.uu.se February 13, 2019 1/28 Outline From theory... From DPLL to DPLL(T) Slides courtesy of Alberto

More information

Satisfiability Modulo Theories: ABsolver

Satisfiability Modulo Theories: ABsolver Satisfiability Modulo Theories: ABsolver Michael Tautschnig Joint work with: Andreas Bauer Martin Leucker Christian Schallhart Michael Tautschnig 1 Outline 1. Introduction Michael Tautschnig 2 Outline

More information

Scaling Up DPLL(T) String Solvers Using Context-Dependent Simplification

Scaling Up DPLL(T) String Solvers Using Context-Dependent Simplification Scaling Up DPLL(T) String s Using Context-Dependent Simplification Andrew Reynolds, Maverick Woo, Clark Barrett, David Brumley, Tianyi Liang, Cesare Tinelli CAV 2017 1 Importance of String s Automated

More information

Automata Based String Analysis for Vulnerability Detection

Automata Based String Analysis for Vulnerability Detection Automata Based String Analysis for Vulnerability Detection 1 Automata-based String Analysis Finite State Automata can be used to characterize sets of string values Automata based string analysis Associate

More information

Model Checking and Its Applications

Model Checking and Its Applications Model Checking and Its Applications Orna Grumberg Technion, Israel Verification and Deduction Mentoring Workshop July 13, 2018 1 Personal data Ph.d. in (non-automated) verification Postdoc in Model Checking

More information

Verifying C & C++ with ESBMC

Verifying C & C++ with ESBMC Verifying C & C++ with ESBMC Denis A Nicole dan@ecs.soton.ac.uk CyberSecuritySoton.org [w] @CybSecSoton [fb & tw] ESBMC ESBMC, the Efficient SMT-Based Context-Bounded Model Checker was originally developed

More information

Ranking Functions for Loops with Disjunctive Exit-Conditions

Ranking Functions for Loops with Disjunctive Exit-Conditions Ranking Functions for Loops with Disjunctive Exit-Conditions Rody Kersten 1 Marko van Eekelen 1,2 1 Institute for Computing and Information Sciences (icis), Radboud University Nijmegen 2 School for Computer

More information

BDD-based software verification

BDD-based software verification Int J Softw Tools Technol Transfer (2014) 16:507 518 DOI 10.1007/s10009-014-0334-1 RERS BDD-based software verification Applications to event-condition-action systems Dirk Beyer Andreas Stahlbauer Published

More information

Relational String Verification Using Multitrack

Relational String Verification Using Multitrack Relational String Verification Using Multitrack Automata Relational String Analysis Earlier work on string analysis use multiple single-track DFAs during symbolic reachability analysis One DFA per variable

More information

Verifying Temporal Properties via Dynamic Program Execution. Zhenhua Duan Xidian University, China

Verifying Temporal Properties via Dynamic Program Execution. Zhenhua Duan Xidian University, China Verifying Temporal Properties via Dynamic Program Execution Zhenhua Duan Xidian University, China Main Points Background & Motivation MSVL and Compiler PPTL Unified Program Verification Tool Demo Conclusion

More information

SMT-Based Bounded Model Checking for Embedded ANSI-C Software. Lucas Cordeiro, Bernd Fischer, Joao Marques-Silva

SMT-Based Bounded Model Checking for Embedded ANSI-C Software. Lucas Cordeiro, Bernd Fischer, Joao Marques-Silva SMT-Based Bounded Model Checking for Embedded ANSI-C Software Lucas Cordeiro, Bernd Fischer, Joao Marques-Silva b.fischer@ecs.soton.ac.uk Bounded Model Checking (BMC) Basic Idea: check negation of given

More information

Bounded Model Checking with Parametric Data Structures

Bounded Model Checking with Parametric Data Structures Bounded Model Checking with Marc Herbstritt (joint work with Erika Ábrahám, Bernd Becker, Martin Steffen) www.avacs.org August 15 2006 4th International Workshop on Bounded Model Checking Context Automated

More information

Decision Procedures in the Theory of Bit-Vectors

Decision Procedures in the Theory of Bit-Vectors Decision Procedures in the Theory of Bit-Vectors Sukanya Basu Guided by: Prof. Supratik Chakraborty Department of Computer Science and Engineering, Indian Institute of Technology, Bombay May 1, 2010 Sukanya

More information

Boolean Representations and Combinatorial Equivalence

Boolean Representations and Combinatorial Equivalence Chapter 2 Boolean Representations and Combinatorial Equivalence This chapter introduces different representations of Boolean functions. It then discusses the applications of these representations for proving

More information

MIDTERM EXAM (Solutions)

MIDTERM EXAM (Solutions) MIDTERM EXAM (Solutions) Total Score: 100, Max. Score: 83, Min. Score: 26, Avg. Score: 57.3 1. (10 pts.) List all major categories of programming languages, outline their definitive characteristics and

More information

Symbolic and Concolic Execution of Programs

Symbolic and Concolic Execution of Programs Symbolic and Concolic Execution of Programs Information Security, CS 526 Omar Chowdhury 10/7/2015 Information Security, CS 526 1 Reading for this lecture Symbolic execution and program testing - James

More information

F-Soft: Software Verification Platform

F-Soft: Software Verification Platform F-Soft: Software Verification Platform F. Ivančić, Z. Yang, M.K. Ganai, A. Gupta, I. Shlyakhter, and P. Ashar NEC Laboratories America, 4 Independence Way, Suite 200, Princeton, NJ 08540 fsoft@nec-labs.com

More information

Minimum Satisfying Assignments for SMT. Işıl Dillig, Tom Dillig Ken McMillan Alex Aiken College of William & Mary Microsoft Research Stanford U.

Minimum Satisfying Assignments for SMT. Işıl Dillig, Tom Dillig Ken McMillan Alex Aiken College of William & Mary Microsoft Research Stanford U. Minimum Satisfying Assignments for SMT Işıl Dillig, Tom Dillig Ken McMillan Alex Aiken College of William & Mary Microsoft Research Stanford U. 1 / 20 Satisfiability Modulo Theories (SMT) Today, SMT solvers

More information

JAVA OPERATORS GENERAL

JAVA OPERATORS GENERAL JAVA OPERATORS GENERAL Java provides a rich set of operators to manipulate variables. We can divide all the Java operators into the following groups: Arithmetic Operators Relational Operators Bitwise Operators

More information

Complete Instantiation of Quantified Formulas in Satisfiability Modulo Theories. ACSys Seminar

Complete Instantiation of Quantified Formulas in Satisfiability Modulo Theories. ACSys Seminar Complete Instantiation of Quantified Formulas in Satisfiability Modulo Theories Yeting Ge Leonardo de Moura ACSys Seminar 2008.12 Motivation SMT solvers have been successful Quantified smt formulas are

More information

Generating Small Countermodels. Andrew Reynolds Intel August 30, 2012

Generating Small Countermodels. Andrew Reynolds Intel August 30, 2012 Generating Small Countermodels using SMT Andrew Reynolds Intel August 30, 2012 Acknowledgements Intel Corporation AmitGoel, Sava Krstic University of Iowa Cesare Tinelli, Francois Bobot New York University

More information

: A Bounded Model Checking Tool to Verify Qt Applications

: A Bounded Model Checking Tool to Verify Qt Applications 23 rd International SPIN symposium on Model Checking of Software : A Bounded Model Checking Tool to Verify Qt Applications Mário A. P. Garcia, Felipe R. Monteiro, Lucas C. Cordeiro, and Eddie B. de Lima

More information

Automatic Verification of String Manipulating Programs

Automatic Verification of String Manipulating Programs Motivation About This Work Automatic Verification of String Manipulating Programs Fang Yu VLab, Department of Computer Science University of California, Santa Barbara, USA May 19, 2010 1 /76 Web Application

More information

HySAT. what you can use it for how it works example from application domain final remarks. Christian Herde /12

HySAT. what you can use it for how it works example from application domain final remarks. Christian Herde /12 CP2007: Presentation of recent CP solvers HySAT what you can use it for how it works example from application domain final remarks Christian Herde 25.09.2007 /2 What you can use it for Satisfiability checker

More information

Deductive Methods, Bounded Model Checking

Deductive Methods, Bounded Model Checking Deductive Methods, Bounded Model Checking http://d3s.mff.cuni.cz Pavel Parízek CHARLES UNIVERSITY IN PRAGUE faculty of mathematics and physics Deductive methods Pavel Parízek Deductive Methods, Bounded

More information

Synthesis using Variable Elimination

Synthesis using Variable Elimination Synthesis using Variable Elimination Viktor Kuncak EPF Lausanne http://lara.epfl.ch/w/impro Implicit Programming at All Levels Opportunities for implicit programming in Development within an IDE InSynth

More information

BDD-Based Software Verification

BDD-Based Software Verification Software Tools for Technology Transfer manuscript No. (will be inserted by the editor) BDD-Based Software Verification Applications to Event-Condition-Action Systems Dirk Beyer and Andreas Stahlbauer University

More information

1. [5 points each] True or False. If the question is currently open, write O or Open.

1. [5 points each] True or False. If the question is currently open, write O or Open. University of Nevada, Las Vegas Computer Science 456/656 Spring 2018 Practice for the Final on May 9, 2018 The entire examination is 775 points. The real final will be much shorter. Name: No books, notes,

More information

More on Verification and Model Checking

More on Verification and Model Checking More on Verification and Model Checking Wednesday Oct 07, 2015 Philipp Rümmer Uppsala University Philipp.Ruemmer@it.uu.se 1/60 Course fair! 2/60 Exam st October 21, 8:00 13:00 If you want to participate,

More information

Mixed Integer Linear Programming

Mixed Integer Linear Programming Mixed Integer Linear Programming Part I Prof. Davide M. Raimondo A linear program.. A linear program.. A linear program.. Does not take into account possible fixed costs related to the acquisition of new

More information

BDD-Based Software Model Checking with CPAchecker

BDD-Based Software Model Checking with CPAchecker BDD-Based Software Model Checking with CPAchecker Dirk Beyer and Andreas Stahlbauer University of Passau, Germany Abstract. In symbolic software model checking, most approaches use predicates as symbolic

More information

Chapter 6 Primitive types

Chapter 6 Primitive types Chapter 6 Primitive types Lesson page 6-1. Primitive types Question 1. There are an infinite number of integers, so it would be too ineffient to have a type integer that would contain all of them. Question

More information

Java provides a rich set of operators to manipulate variables. We can divide all the Java operators into the following groups:

Java provides a rich set of operators to manipulate variables. We can divide all the Java operators into the following groups: Basic Operators Java provides a rich set of operators to manipulate variables. We can divide all the Java operators into the following groups: Arithmetic Operators Relational Operators Bitwise Operators

More information

Embedded Software Verification Challenges and Solutions. Static Program Analysis

Embedded Software Verification Challenges and Solutions. Static Program Analysis Embedded Software Verification Challenges and Solutions Static Program Analysis Chao Wang chaowang@nec-labs.com NEC Labs America Princeton, NJ ICCAD Tutorial November 11, 2008 www.nec-labs.com 1 Outline

More information

Introduction to Programming Using Java (98-388)

Introduction to Programming Using Java (98-388) Introduction to Programming Using Java (98-388) Understand Java fundamentals Describe the use of main in a Java application Signature of main, why it is static; how to consume an instance of your own class;

More information

CHAPTER 3 Expressions, Functions, Output

CHAPTER 3 Expressions, Functions, Output CHAPTER 3 Expressions, Functions, Output More Data Types: Integral Number Types short, long, int (all represent integer values with no fractional part). Computer Representation of integer numbers - Number

More information

GNATprove a Spark2014 verifying compiler Florian Schanda, Altran UK

GNATprove a Spark2014 verifying compiler Florian Schanda, Altran UK 1 GNATprove a Spark2014 verifying compiler Florian Schanda, Altran UK Tool architecture User view Source gnatprove Verdict 2 Tool architecture More detailed view... Source Encoding CVC4 gnat2why gnatwhy3

More information

Parallel and Distributed Computing

Parallel and Distributed Computing Parallel and Distributed Computing Project Assignment MAX-SAT SOLVER Version 1.0 (07/03/2016) 2015/2016 2nd Semester CONTENTS Contents 1 Introduction 2 2 Problem Description 2 2.1 Illustrative Example...................................

More information

Bitwise Data Manipulation. Bitwise operations More on integers

Bitwise Data Manipulation. Bitwise operations More on integers Bitwise Data Manipulation Bitwise operations More on integers bitwise operators ex Bitwise operators on fixed-width bit vectors. AND & OR XOR ^ NOT ~ 01101001 & 01010101 01000001 01101001 01010101 01101001

More information

Computer Organization and Levels of Abstraction

Computer Organization and Levels of Abstraction Computer Organization and Levels of Abstraction Announcements Today: PS 7 Lab 8: Sound Lab tonight bring machines and headphones! PA 7 Tomorrow: Lab 9 Friday: PS8 Today (Short) Floating point review Boolean

More information

Object-Oriented Programming. Topic 2: Fundamental Programming Structures in Java

Object-Oriented Programming. Topic 2: Fundamental Programming Structures in Java Electrical and Computer Engineering Object-Oriented Topic 2: Fundamental Structures in Java Maj Joel Young Joel.Young@afit.edu 8-Sep-03 Maj Joel Young Java Identifiers Identifiers Used to name local variables

More information

Small Formulas for Large Programs: On-line Constraint Simplification In Scalable Static Analysis

Small Formulas for Large Programs: On-line Constraint Simplification In Scalable Static Analysis Small Formulas for Large Programs: On-line Constraint Simplification In Scalable Static Analysis Isil Dillig, Thomas Dillig, Alex Aiken Stanford University Scalability and Formula Size Many program analysis

More information

Model Checking Revision: Model Checking for Infinite Systems Revision: Traffic Light Controller (TLC) Revision: 1.12

Model Checking Revision: Model Checking for Infinite Systems Revision: Traffic Light Controller (TLC) Revision: 1.12 Model Checking mc Revision:.2 Model Checking for Infinite Systems mc 2 Revision:.2 check algorithmically temporal / sequential properties fixpoint algorithms with symbolic representations: systems are

More information

OpenMath and SMT-LIB

OpenMath and SMT-LIB James, Matthew England, Roberto Sebastiani & Patrick Trentin 1 Universities of Bath/Coventry/Trento/Trento J.H.@bath.ac.uk 17 July 2017 1 Thanks to EU H2020-FETOPEN-2016-2017-CSA project SC 2 (712689)

More information

Finite Model Generation for Isabelle/HOL Using a SAT Solver

Finite Model Generation for Isabelle/HOL Using a SAT Solver Finite Model Generation for / Using a SAT Solver Tjark Weber webertj@in.tum.de Technische Universität München Winterhütte, März 2004 Finite Model Generation for / p.1/21 is a generic proof assistant: Highly

More information

Decision Procedures. An Algorithmic Point of View. Decision Procedures for Propositional Logic. D. Kroening O. Strichman.

Decision Procedures. An Algorithmic Point of View. Decision Procedures for Propositional Logic. D. Kroening O. Strichman. Decision Procedures An Algorithmic Point of View Decision Procedures for Propositional Logic D. Kroening O. Strichman ETH/Technion Version 1.0, 2007 Part I Decision Procedures for Propositional Logic Outline

More information

Decision Procedures. An Algorithmic Point of View. Bit-Vectors. D. Kroening O. Strichman. Version 1.0, ETH/Technion

Decision Procedures. An Algorithmic Point of View. Bit-Vectors. D. Kroening O. Strichman. Version 1.0, ETH/Technion Decision Procedures An Algorithmic Point of View Bit-Vectors D. Kroening O. Strichman ETH/Technion Version 1.0, 2007 Part VI Bit-Vectors Outline 1 Introduction to Bit-Vector Logic 2 Syntax 3 Semantics

More information

University of Nevada, Las Vegas Computer Science 456/656 Fall 2016

University of Nevada, Las Vegas Computer Science 456/656 Fall 2016 University of Nevada, Las Vegas Computer Science 456/656 Fall 2016 The entire examination is 925 points. The real final will be much shorter. Name: No books, notes, scratch paper, or calculators. Use pen

More information

THE INTEGER DATA TYPES. Laura Marik Spring 2012 C++ Course Notes (Provided by Jason Minski)

THE INTEGER DATA TYPES. Laura Marik Spring 2012 C++ Course Notes (Provided by Jason Minski) THE INTEGER DATA TYPES STORAGE OF INTEGER TYPES IN MEMORY All data types are stored in binary in memory. The type that you give a value indicates to the machine what encoding to use to store the data in

More information

COSC 243. Data Representation 3. Lecture 3 - Data Representation 3 1. COSC 243 (Computer Architecture)

COSC 243. Data Representation 3. Lecture 3 - Data Representation 3 1. COSC 243 (Computer Architecture) COSC 243 Data Representation 3 Lecture 3 - Data Representation 3 1 Data Representation Test Material Lectures 1, 2, and 3 Tutorials 1b, 2a, and 2b During Tutorial a Next Week 12 th and 13 th March If you

More information

Efficiently Reasoning about Programs

Efficiently Reasoning about Programs Efficiently Reasoning about Programs Neil Immerman College of Computer and Information Sciences University of Massachusetts, Amherst Amherst, MA, USA people.cs.umass.edu/ immerman co-r.e. complete Halt

More information

HECTOR: Formal System-Level to RTL Equivalence Checking

HECTOR: Formal System-Level to RTL Equivalence Checking ATG SoC HECTOR: Formal System-Level to RTL Equivalence Checking Alfred Koelbl, Sergey Berezin, Reily Jacoby, Jerry Burch, William Nicholls, Carl Pixley Advanced Technology Group Synopsys, Inc. June 2008

More information

Applying Multi-Core Model Checking to Hardware-Software Partitioning in Embedded Systems

Applying Multi-Core Model Checking to Hardware-Software Partitioning in Embedded Systems V Brazilian Symposium on Computing Systems Engineering Applying Multi-Core Model Checking to Hardware-Software Partitioning in Embedded Systems Alessandro Trindade, Hussama Ismail, and Lucas Cordeiro Foz

More information

Automata-Based Symbolic String Analysis for Vulnerability Detection

Automata-Based Symbolic String Analysis for Vulnerability Detection Noname manuscript No. (will be inserted by the editor) Automata-Based Symbolic String Analysis for Vulnerability Detection Fang Yu Muath Alkhalaf Tevfik Bultan Oscar H. Ibarra Received: date / Accepted:

More information

EECS 219C: Formal Methods Syntax-Guided Synthesis (selected/adapted slides from FMCAD 13 tutorial by R. Alur) Sanjit A. Seshia EECS, UC Berkeley

EECS 219C: Formal Methods Syntax-Guided Synthesis (selected/adapted slides from FMCAD 13 tutorial by R. Alur) Sanjit A. Seshia EECS, UC Berkeley EECS 219C: Formal Methods Syntax-Guided Synthesis (selected/adapted slides from FMCAD 13 tutorial by R. Alur) Sanjit A. Seshia EECS, UC Berkeley Solving SyGuS Is SyGuS same as solving SMT formulas with

More information

JPF SE: A Symbolic Execution Extension to Java PathFinder

JPF SE: A Symbolic Execution Extension to Java PathFinder JPF SE: A Symbolic Execution Extension to Java PathFinder Saswat Anand 1,CorinaS.Păsăreanu 2, and Willem Visser 2 1 College of Computing, Georgia Institute of Technology saswat@cc.gatech.edu 2 QSS and

More information

Cuts from Proofs: A Complete and Practical Technique for Solving Linear Inequalities over Integers

Cuts from Proofs: A Complete and Practical Technique for Solving Linear Inequalities over Integers Cuts from Proofs: A Complete and Practical Technique for Solving Linear Inequalities over Integers Isil Dillig, Thomas Dillig, and Alex Aiken Computer Science Department Stanford University Linear Arithmetic

More information

Counterexample-Driven Genetic Programming

Counterexample-Driven Genetic Programming Counterexample-Driven Genetic Programming Iwo Błądek, Krzysztof Krawiec Institute of Computing Science, Poznań University of Technology Poznań, 12.12.2017 I. Błądek, K. Krawiec Counterexample-Driven Genetic

More information

NO WARRANTY. Use of any trademarks in this presentation is not intended in any way to infringe on the rights of the trademark holder.

NO WARRANTY. Use of any trademarks in this presentation is not intended in any way to infringe on the rights of the trademark holder. NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY AND ITS SOFTWARE ENGINEERING INSTITUTE IS FURNISHED ON AN AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED

More information

Chapter 10 Part 1: Reduction

Chapter 10 Part 1: Reduction //06 Polynomial-Time Reduction Suppose we could solve Y in polynomial-time. What else could we solve in polynomial time? don't confuse with reduces from Chapter 0 Part : Reduction Reduction. Problem X

More information

The Pointer Assertion Logic Engine

The Pointer Assertion Logic Engine The Pointer Assertion Logic Engine [PLDI 01] Anders Mφller Michael I. Schwartzbach Presented by K. Vikram Cornell University Introduction Pointer manipulation is hard Find bugs, optimize code General Approach

More information

Boolean Functions (Formulas) and Propositional Logic

Boolean Functions (Formulas) and Propositional Logic EECS 219C: Computer-Aided Verification Boolean Satisfiability Solving Part I: Basics Sanjit A. Seshia EECS, UC Berkeley Boolean Functions (Formulas) and Propositional Logic Variables: x 1, x 2, x 3,, x

More information

Bits, Bytes and Integers

Bits, Bytes and Integers Bits, Bytes and Integers Computer Systems Organization (Spring 2016) CSCI-UA 201, Section 2 Instructor: Joanna Klukowska Slides adapted from Randal E. Bryant and David R. O Hallaron (CMU) Mohamed Zahran

More information

Expressions and Data Types CSC 121 Spring 2015 Howard Rosenthal

Expressions and Data Types CSC 121 Spring 2015 Howard Rosenthal Expressions and Data Types CSC 121 Spring 2015 Howard Rosenthal Lesson Goals Understand the basic constructs of a Java Program Understand how to use basic identifiers Understand simple Java data types

More information

Computer Organization and Levels of Abstraction

Computer Organization and Levels of Abstraction Computer Organization and Levels of Abstraction Announcements PS8 Due today PS9 Due July 22 Sound Lab tonight bring machines and headphones! Binary Search Today Review of binary floating point notation

More information

Seminar in Software Engineering Presented by Dima Pavlov, November 2010

Seminar in Software Engineering Presented by Dima Pavlov, November 2010 Seminar in Software Engineering-236800 Presented by Dima Pavlov, November 2010 1. Introduction 2. Overview CBMC and SAT 3. CBMC Loop Unwinding 4. Running CBMC 5. Lets Compare 6. How does it work? 7. Conclusions

More information

The SMT-LIB 2 Standard: Overview and Proposed New Theories

The SMT-LIB 2 Standard: Overview and Proposed New Theories 1 / 23 The SMT-LIB 2 Standard: Overview and Proposed New Theories Philipp Rümmer Oxford University Computing Laboratory philr@comlab.ox.ac.uk Third Workshop on Formal and Automated Theorem Proving and

More information

Where we are going (today)

Where we are going (today) Where we are going (today) Q: How do we arrange bits in the memory of the computer? (why do we care? we want the computer to store many individual numbers) A: bytes and words 10110000 00001110 01000010

More information

Integration of SMT-LIB Support into Maple

Integration of SMT-LIB Support into Maple Integration of SMT-LIB Support into Maple SMT-CAS Integration Some SMT solvers presently incorporate computer algebra techniques in their theory solvers. Examples: verit [3], SMT-RAT [4] Alternate avenue

More information

OpenSMT2. A Parallel, Interpolating SMT Solver. Antti Hyvärinen, Matteo Marescotti, Leonardo Alt, Sepideh Asadi, and Natasha Sharygina

OpenSMT2. A Parallel, Interpolating SMT Solver. Antti Hyvärinen, Matteo Marescotti, Leonardo Alt, Sepideh Asadi, and Natasha Sharygina OpenSMT2 A Parallel, Interpolating SMT Solver Antti Hyvärinen, Matteo Marescotti, Leonardo Alt, Sepideh Asadi, and Natasha Sharygina Why another SMT solver? Model checking OpenSMT Interpolation Parallel

More information

MultiSE: Multi-path Symbolic Execution using Value Summaries

MultiSE: Multi-path Symbolic Execution using Value Summaries MultiSE: Multi-path Symbolic Execution using Value Summaries Koushik Sen, George Necula, Liang Gong, Wontae Choi EECS Department, University of California, Berkeley, USA { ksen, necula, gongliang13, wtchoi

More information

Chapter Ten String Manipulation and Menus

Chapter Ten String Manipulation and Menus Microsoft Visual Basic 2015: Reloaded Sixth Edition Chapter Ten String Manipulation and Menus Objectives After studying this chapter, you should be able to: Determine the number of characters in a string

More information

Efficiently Solving Bit-Vector Problems Using Model Checkers

Efficiently Solving Bit-Vector Problems Using Model Checkers Efficiently Solving Bit-Vector Problems Using Model Checkers Institute for Formal Models and Verification Johannes Kepler University, Linz, Austria http://fmv.jku.at SMT 2013 July 8 - July 9, 2013 Helsinki,

More information

Z3str2: An Efficient Solver for Strings, Regular Expressions, and Length Constraints

Z3str2: An Efficient Solver for Strings, Regular Expressions, and Length Constraints Noname manuscript No. (will be inserted by the editor) Z3str2: An Efficient Solver for Strings, Regular Expressions, and Length Constraints unhui Zheng Vijay Ganesh Sanu Subramanian Omer Tripp Murphy Berzish

More information

Seminar decision procedures: Certification of SAT and unsat proofs

Seminar decision procedures: Certification of SAT and unsat proofs Seminar decision procedures: Certification of SAT and unsat proofs Wolfgang Nicka Technische Universität München June 14, 2016 Boolean satisfiability problem Term The boolean satisfiability problem (SAT)

More information

PLDI 2016 Tutorial Automata-Based String Analysis

PLDI 2016 Tutorial Automata-Based String Analysis PLDI 2016 Tutorial Automata-Based String Analysis Tevfik Bultan, Abdulbaki Aydin, Lucas Bang Verification Laboratory (VLab) University of California, Santa Barbara, USA bultan@cs.ucsb.edu, baki@cs.ucsb.edu,

More information

Validating Plans with Durative Actions via Integrating Boolean and Numerical Constraints

Validating Plans with Durative Actions via Integrating Boolean and Numerical Constraints Validating Plans with Durative Actions via Integrating Boolean and Numerical Constraints Roman Barták Charles University in Prague, Faculty of Mathematics and Physics Institute for Theoretical Computer

More information

Operators. Java operators are classified into three categories:

Operators. Java operators are classified into three categories: Operators Operators are symbols that perform arithmetic and logical operations on operands and provide a meaningful result. Operands are data values (variables or constants) which are involved in operations.

More information

Rethinking Automated Theorem Provers?

Rethinking Automated Theorem Provers? Rethinking Automated Theorem Provers? David J. Pearce School of Engineering and Computer Science Victoria University of Wellington @WhileyDave http://whiley.org http://github.com/whiley Background Verification:

More information