Adaptation in natural and artificial systems
Adaptation in natural and artificial systems
Dynamic Parameter Encoding for Genetic Algorithms
Machine Learning
An attack on the Needham-Schroeder public-key authentication protocol
Information Processing Letters
Model checking for programming languages using VeriSoft
Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Proceedings of the 1998 ACM SIGSOFT international symposium on Software testing and analysis
Model checking
Using encryption for authentication in large networks of computers
Communications of the ACM
Directed explicit model checking with HSF-SPIN
SPIN '01 Proceedings of the 8th international SPIN workshop on Model checking of software
Genetic Algorithms in Search, Optimization and Machine Learning
Genetic Algorithms in Search, Optimization and Machine Learning
Partial-Order Methods for the Verification of Concurrent Systems: An Approach to the State-Explosion Problem
Testing an Intentional Naming Scheme Using Genetic Algorithms
TACAS 2001 Proceedings of the 7th International Conference on Tools and Algorithms for the Construction and Analysis of Systems
Model Checking in Practice: An Analysis of the ACCESS.bus Protocol using SPIN
FME '96 Proceedings of the Third International Symposium of Formal Methods Europe on Industrial Benefit and Advances in Formal Methods
Verification of the Futurebus+ Cache Coherence Protocol
CHDL '93 Proceedings of the 11th IFIP WG10.2 International Conference sponsored by IFIP WG10.2 and in cooperation with IEEE COMPSOC on Computer Hardware Description Languages and their Applications
Protocol Development Success Stories: Part 1
Proceedings of the IFIP TC6/WG6.1 Twelth International Symposium on Protocol Specification, Testing and Verification XII
Identification of Potentially Infeasible Program Paths by Monitoring the Search for Test Data
ASE '00 Proceedings of the 15th IEEE international conference on Automated software engineering
Prioritized model checking
Parameter control in evolutionary algorithms
IEEE Transactions on Evolutionary Computation
Model checking Java programs using structural heuristics
ISSTA '02 Proceedings of the 2002 ACM SIGSOFT international symposium on Software testing and analysis
Heuristic-guided counterexample search in FLAVERS
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering
DART: directed automated random testing
Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation
Enhancing random walk state space exploration
Proceedings of the 10th international workshop on Formal methods for industrial critical systems
Software Model Checking: The VeriSoft Approach
Formal Methods in System Design
Using heuristic search for finding deadlocks in concurrent systems
Information and Computation
Efficient assertion based verification using TLM
Proceedings of the conference on Design, automation and test in Europe: Proceedings
DELFIN+: An efficient deadlock detection tool for CCS processes
Journal of Computer and System Sciences
Formal Verification of Concurrent Systems via Directed Model Checking
Electronic Notes in Theoretical Computer Science (ENTCS)
ACOhg: dealing with huge graphs
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Finding safety errors with ACO
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Proceedings of the 10th annual conference companion on Genetic and evolutionary computation
Automatic, evolutionary test data generation for dynamic software testing
Journal of Systems and Software
Distributed Extended Beam Search for Quantitative Model Checking
Model Checking and Artificial Intelligence
Applying Evolutionary Computation Methods to Formal Testing and Model Checking
IWANN '09 Proceedings of the 10th International Work-Conference on Artificial Neural Networks: Part I: Bio-Inspired Systems: Computational and Ambient Intelligence
GAMBIT: effective unit testing for concurrency libraries
Proceedings of the 15th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming
Using heuristic search for finding deadlocks in concurrent systems
Information and Computation
SPIN'03 Proceedings of the 10th international conference on Model checking software
Pruning state spaces with extended beam search
ATVA'07 Proceedings of the 5th international conference on Automated technology for verification and analysis
Spatial visualization of the heart in case of ectopic beats and fibrillation
PSIVT'07 Proceedings of the 2nd Pacific Rim conference on Advances in image and video technology
Intelligent optimization analysis of residual strain for photosensitive resin
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
A patient specific electro-mechanical model of the heart
Computer Methods and Programs in Biomedicine
Design and verification of systemc transaction-level models
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
FlagRemover: A testability transformation for transforming loop-assigned flags
ACM Transactions on Software Engineering and Methodology (TOSEM)
IWANN'11 Proceedings of the 11th international conference on Artificial neural networks conference on Advances in computational intelligence - Volume Part II
Finding bugs in network protocols using simulation code and protocol-specific heuristics
ICFEM'05 Proceedings of the 7th international conference on Formal Methods and Software Engineering
Verifying cryptographic code in c: some experience and the csec challenge
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
Computational verification of C protocol implementations by symbolic execution
Proceedings of the 2012 ACM conference on Computer and communications security
Hi-index | 0.00 |
We present a novel frameworkfor exploring very large state spaces of concurrent reactive systems. Our frameworkexploits application-independent heuristics using genetic algorithms to guide a state-space search towards error states. We have implemented this frameworkin conjunction with VeriSoft, a tool for exploring the state spaces of software applications composed of several concurrent processes executing arbitrary code. We present experimental results obtained with several examples of programs, including a C implementation of a publickey authentication protocol.We discuss heuristics and properties of state spaces that help a genetic search detect deadlocks and assertion violations. For finding errors in very large state spaces, our experiments show that a genetic search using simple heuristics can significantly outperform random and systematic searches.