Conference paper

MÜLLER Petr, PERINGER Petr and VOJNAR Tomáš. Predator Hunting Party (Competition Contribution). In: Proceedings of TACAS'15. Heidelberg: Springer Verlag, 2015, pp. 443-446. ISBN 978-3-662-46680-3. Available from:
Publication language:english
Original title:Predator Hunting Party (Competition Contribution)
Title (cs):Lovecká párty Predátorů (soutěžní příspěvek)
Proceedings:Proceedings of TACAS'15
Conference:European Joint Conferences on Theory and Practice of Software -- ETAPS'15 (TACAS'15)
Series:LNCS 9035
Place:Heidelberg, DE
Publisher:Springer Verlag
formal verification, program analysis, shape analysis, symbolic memory graphs, bug hunting, memory safety, software verification competition
This paper introduces PredatorHP (Predator Hunting Party), a program verifier built on top of the Predator shape analyser, and discusses its participation in the SV-COMP'15 software verification competition. Predator is a sound shape analyser dealing with C programs with lists implemented via low-level pointer operations. PredatorHP uses Predator to prove programs safe while at the same time using several bounded versions of Predator for bug hunting.
   author = {Petr M{\"{u}}ller and Petr Peringer and Tom{\'{a}}{\v{s}}
   title = {Predator Hunting Party (Competition Contribution)},
   pages = {443--446},
   booktitle = {Proceedings of TACAS'15},
   series = {LNCS 9035},
   year = {2015},
   location = {Heidelberg, DE},
   publisher = {Springer Verlag},
   ISBN = {978-3-662-46680-3},
   language = {english},
   url = {}

Your IPv4 address:
Switch to IPv6 connection

DNSSEC [dnssec]