Checking Properties Described by State Machines: On Synergy of Instrumentation, Slicing, and Symbolic Execution

Investor logo

Warning

This publication doesn't include Faculty of Arts. It includes Faculty of Informatics. Official publication website can be found on muni.cz.
Authors

SLABÝ Jiří STREJČEK Jan TRTÍK Marek

Year of publication 2012
Type Article in Proceedings
Conference Formal Methods for Industrial Critical systems: 17th International Workshop, FMICS 2012
MU Faculty or unit

Faculty of Informatics

Citation
Web http://www.springerlink.com/content/p027081716330416/
Doi http://dx.doi.org/10.1007/978-3-642-32469-7_14
Field Informatics
Keywords Bug finding; Symbolic execution; Program slicing; FSM property specification; Code instrumentation
Attached files
Description We introduce a novel technique for checking properties described by finite state machines. The technique is based on a synergy of three well-known methods: instrumentation, program slicing, and symbolic execution. More precisely, we instrument a given program with a code that tracks runs of state machines representing various properties. Next we slice the program to reduce its size without affecting runs of state machines. And then we symbolically execute the sliced program to find real violations of the checked properties, i.e. real bugs. Depending on the kind of symbolic execution, the technique can be applied as a stand-alone bug finding technique, or to weed out some false positives from an output of another bug-finding tool. We provide several examples demonstrating the practical applicability of our technique.
Related projects:

You are running an old browser version. We recommend updating your browser to its latest version.