skip to main content
research-article

Verification of Ada Programs with AdaHorn

Authors Info & Claims
Published:17 April 2020Publication History
Skip Abstract Section

Abstract

We propose AdaHorn, a model checker for verification of Ada programs with respect to correctness properties given as assertions. AdaHorn translates an Ada program together with its assertion into a set of Constrained Horn Clauses, and feeds it to a Horn constraints solver. We evaluate the performance of AdaHorn on a set of Ada programs inspired by C programs from the software verification competition (SV-COMP). Our experimental results show that AdaHorn outputs correct results in more cases than GNATProve, which is a widely used Ada verification framework.

References

  1. S. T. Taft, R. A. Duff, R. Brukardt, E. Plödereder, P. Leroy, and E. Schonberg, Ada 2012 Reference Manual. Language and Standard Libraries - International Standard ISO/IEC 8652/2012 (E), vol. 8339 of LNCS. Springer, 2013.Google ScholarGoogle Scholar
  2. J. G. P. Barnes, High Integrity Software - The SPARK Approach to Safety and Security. Addison-Wesley, 2003.Google ScholarGoogle Scholar
  3. "Polyspace." https://www.mathworks.com/ products/polyspace.html.Google ScholarGoogle Scholar
  4. A. Gurfinkel, T. Kahsai, A. Komuravelli, and J. A. Navas, "The SeaHorn Verification Framework," vol. 9206 of LNCS, pp. 343--361, Springer, 2015.Google ScholarGoogle Scholar
  5. T. Kahsai, P. Rümmer, H. Sanchez, and M. Schäf, "JayHorn: A Framework for Verifying Java Programs," vol. 9779 of LNCS, pp. 352--358, Springer, 2016.Google ScholarGoogle Scholar
  6. N. Bjørner, A. Gurfinkel, K. L. McMillan, and A. Rybalchenko, "Horn Clause Solvers for Program Verification," vol. 9300 of LNCS, pp. 24--51, Springer, 2015.Google ScholarGoogle Scholar
  7. G. Gange, J. A. Navas, P. Schachte, H. Søndergaard, and P. J. Stuckey, "Horn Clauses as an Intermediate Representation for Program Analysis and Transformation," TPLP, vol. 15, no. 4--5, pp. 526--542, 2015.Google ScholarGoogle Scholar
  8. N. Bjørner, K. L. McMillan, and A. Rybalchenko, "Program Verification as Satisfiability Modulo Theories," in SMT 2012, vol. 20 of EPiC Series in Computing, pp. 3--11, EasyChair, 2012.Google ScholarGoogle Scholar
  9. H. Hojjat, F. Konecný, F. Garnier, R. Iosif, V. Kuncak, and P. Rümmer, "A Verification Toolkit for Numerical Transition Systems - Tool Paper," vol. 7436 of LNCS, pp. 247-- 251, Springer, 2012.Google ScholarGoogle Scholar
  10. L. M. de Moura and N. Bjørner, "Z3: An Efficient SMT Solver," vol. 4963 of LNCS, pp. 337--340, Springer, 2008.Google ScholarGoogle Scholar
  11. A. Burns, B. Dobbing, and G. Romanski, "The Ravenscar Tasking Profile for High Integrity Real-Time Programs," vol. 1411 of LNCS, pp. 263--275, Springer, 1998.Google ScholarGoogle Scholar
  12. Project Hi-Lite / GNATprove, 2014.Google ScholarGoogle Scholar
  13. D. Monniaux and L. Gonnord, "An Encoding of Array Verification Problems into Array-Free Horn Clauses," CoRR, vol. abs/1509.09092, 2015.Google ScholarGoogle Scholar
  14. T. Beyene, S. Chaudhuri, C. Popeea, and A. Rybalchenko, "A constraint-based approach to solving games on infinite graphs," SIGPLAN Not., vol. 49, pp. 221--233, Jan. 2014.Google ScholarGoogle Scholar
  15. T. A. Beyene, C. Popeea, and A. Rybalchenko, "Efficient CTL Verification via Horn Constraints Solving," vol. 219 of EPTCS, pp. 1--14, 2016.Google ScholarGoogle Scholar
  16. N. Bjørner, A. Gurfinkel, K. McMillan, and A. Rybalchenko, Horn Clause Solvers for Program Verification, pp. 24--51. Cham: Springer International Publishing, 2015.Google ScholarGoogle Scholar
  17. C. Barrett, P. Fontaine, and C. Tinelli, "The SMT-LIB Standard: Version 2.6," tech. rep., Department of Computer Science, The University of Iowa, 2017. Available at www.SMT-LIB.org.Google ScholarGoogle Scholar
  18. D. Beyer, "Software Verification with Validation of Results - (Report on SV-COMP 2017)," in TACAS 2017, vol. 10206 of LNCS, pp. 331--349, 2017.Google ScholarGoogle Scholar

Index Terms

(auto-classified)
  1. Verification of Ada Programs with AdaHorn

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!