Conference paper

MÜLLER Petr, PERINGER Petr and VOJNAR Tomáš. Predator Hunting Party (Competition Contribution). In: Proceedings of TACAS'15. Heidelberg: Springer Verlag, 2015, pp. 443-446. ISBN 978-3-662-46680-3. Available from: http://link.springer.com/chapter/10.1007%2F978-3-662-46681-0_40
Publication language:english
Original title:Predator Hunting Party (Competition Contribution)
Title (cs):Lovecká párty Predátorů (soutěžní příspěvek)
Pages:443-446
Proceedings:Proceedings of TACAS'15
Conference:European Joint Conferences on Theory and Practice of Software -- ETAPS'15 (TACAS'15)
Series:LNCS 9035
Place:Heidelberg, DE
Year:2015
URL:http://link.springer.com/chapter/10.1007%2F978-3-662-46681-0_40
ISBN:978-3-662-46680-3
Publisher:Springer Verlag
Keywords
formal verification, program analysis, shape analysis, symbolic memory graphs, bug hunting, memory safety, software verification competition
Annotation
This paper introduces PredatorHP (Predator Hunting Party), a program verifier built on top of the Predator shape analyser, and discusses its participation in the SV-COMP'15 software verification competition. Predator is a sound shape analyser dealing with C programs with lists implemented via low-level pointer operations. PredatorHP uses Predator to prove programs safe while at the same time using several bounded versions of Predator for bug hunting.
BibTeX:
@INPROCEEDINGS{
   author = {Petr M{\"{u}}ller and Petr Peringer and Tom{\'{a}}{\v{s}}
	Vojnar},
   title = {Predator Hunting Party (Competition Contribution)},
   pages = {443--446},
   booktitle = {Proceedings of TACAS'15},
   series = {LNCS 9035},
   year = {2015},
   location = {Heidelberg, DE},
   publisher = {Springer Verlag},
   ISBN = {978-3-662-46680-3},
   language = {english},
   url = {http://www.fit.vutbr.cz/research/view_pub.php.en.iso-8859-2?id=10920}
}

Your IPv4 address: 54.225.47.94
Switch to IPv6 connection

DNSSEC [dnssec]