522 research outputs found

    Memory usage verification using Hip/Sleek.

    Get PDF
    Embedded systems often come with constrained memory footprints. It is therefore essential to ensure that software running on such platforms fulfils memory usage specifications at compile-time, to prevent memory-related software failure after deployment. Previous proposals on memory usage verification are not satisfactory as they usually can only handle restricted subsets of programs, especially when shared mutable data structures are involved. In this paper, we propose a simple but novel solution. We instrument programs with explicit memory operations so that memory usage verification can be done along with the verification of other properties, using an automated verification system Hip/Sleek developed recently by Chin et al.[10,19]. The instrumentation can be done automatically and is proven sound with respect to an underlying semantics. One immediate benefit is that we do not need to develop from scratch a specific system for memory usage verification. Another benefit is that we can verify more programs, especially those involving shared mutable data structures, which previous systems failed to handle, as evidenced by our experimental results

    Deciding Entailments in Inductive Separation Logic with Tree Automata

    Full text link
    Separation Logic (SL) with inductive definitions is a natural formalism for specifying complex recursive data structures, used in compositional verification of programs manipulating such structures. The key ingredient of any automated verification procedure based on SL is the decidability of the entailment problem. In this work, we reduce the entailment problem for a non-trivial subset of SL describing trees (and beyond) to the language inclusion of tree automata (TA). Our reduction provides tight complexity bounds for the problem and shows that entailment in our fragment is EXPTIME-complete. For practical purposes, we leverage from recent advances in automata theory, such as inclusion checking for non-deterministic TA avoiding explicit determinization. We implemented our method and present promising preliminary experimental results

    Crowfoot: a verifier for higher-order store programs

    Get PDF
    We present Crowfoot, an automatic verification tool for imperative programs that manipulate procedures dynamically at runtime; these programs use a heap that can store not only data but also code (commands or procedures). Such heaps are often called higher-order store, and allow for instance the creation of new recursions on the fly. One can use higher-order store to model phenomena such as runtime loading and unloading of code, runtime update of code and runtime code generation. Crowfoot's assertion language, based on separation logic, features nested Hoare triples which describe the behaviour of procedures stored on the heap. The tool addresses complex issues like deep frame rules and recursion through the store, and is the first verification tool based on recent developments in the mathematical foundations of Hoare logics with nested triples

    Verifying Heap-Manipulating Programs with Unknown Procedure Calls

    Get PDF
    10.1007/978-3-642-16901-4_13Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)6447 LNCS171-18

    The Tree Width of Separation Logic with Recursive Definitions

    Full text link
    Separation Logic is a widely used formalism for describing dynamically allocated linked data structures, such as lists, trees, etc. The decidability status of various fragments of the logic constitutes a long standing open problem. Current results report on techniques to decide satisfiability and validity of entailments for Separation Logic(s) over lists (possibly with data). In this paper we establish a more general decidability result. We prove that any Separation Logic formula using rather general recursively defined predicates is decidable for satisfiability, and moreover, entailments between such formulae are decidable for validity. These predicates are general enough to define (doubly-) linked lists, trees, and structures more general than trees, such as trees whose leaves are chained in a list. The decidability proofs are by reduction to decidability of Monadic Second Order Logic on graphs with bounded tree width.Comment: 30 pages, 2 figure

    Meso to macro connections to capture fatigue damage in cemented materials

    Get PDF
    Available online 16 August 2023Fatigue-induced damage is a common issue in cemented materials, involving the progressive formation and complicated propagation of fatigue cracks. These cracks typically localise on weak or fracture planes, leading to inhomogeneous deformation within the material. Thus, accurately predicting the fatigue phenomenon becomes challenging due to the material’s inhomogeneity and the complex evolution of cracks, from initiation to propagation and eventual failure. To address this challenge, this paper presents a constitutive model that accounts for strain discontinuity across fracture planes by employing kinematic enrichment. This enhancement facilitates interaction between the material responses of cracks and the outer bulk, thereby contributing to the overall macro behaviour of the materials. Moreover, the proposed model incorporates a new cohesive-frictional fatigue model that couples damage mechanics and bounding surface plasticity to describe the fatigue behaviour of fracture planes/cracks. Since the proposed model features a characteristic length scale, it exhibits size-dependent behaviour and helps overcome the issue of mesh dependence. The model’s validity is demonstrated through its ability to capture nonlinear fatigue damage under constant/variable cyclic loading and to simulate the propagation of fatigue fracture process zones. Furthermore, the model effectively captures the significant influence of stress amplitudes on the fatigue lives of materials, making it an essential tool for predicting and mitigating fatigue-induced damage in cemented materials.Vinh T. Le, Ha H. Bui, Giang D. Nguyen, Jayantha Kodikara, Didier Bodin, James Grenfel

    Structured specifications for better verification of heap-manipulating programs

    Get PDF
    Abstract. Conventional specifications typically have a flat structure that is based primarily on the underlying logic. Such specifications lack structures that could have provided better guidance to the verification process. In this work, we propose to add three new structures to a specification framework for separation logic to achieve a more precise and better guided verification for pointer-based programs. The newly introduced structures empower users with more control over the verification process in the following ways: (i) case analysis can be invoked to take advantage of disjointness conditions in the logic. (ii) early, as opposed to late, instantiation can minimise on the use of existential quantification. (iii) formulae that are staged provide better reuse of the verification process. Initial experiments have shown that structured specifications can lead to more precise verification without incurring any performance overhead.

    Naïve CD8 + T cell derived tumor-specific cytotoxic effectors as a potential remedy for overcoming TGF-β immunosuppression in the tumor microenvironment

    Get PDF
    Despite of the potential implications for cancer immunotherapy, conventional approaches using in vitro expanded CD8 + T cells have suboptimal outcomes, mostly due to loss of functionality from cellular exhaustion. We therefore investigated the phenotypic and functional differences among in vitro activated CD8 + T cells of three different sources, namely naïve (NT eff), memory (MT eff) and tumor-infiltrating lymphocytes (TIL eff) from human and mice, to better understand mechanisms behind potent effector functions and potential for overcoming current limitations. In line with the greater proliferation activity and longer telomere lengths of NT eff populations, cells of naïve origin exhibited significantly less amounts of T cell exhaustion markers than those of MT eff and TIL eff, and moreover, acquired distinct expression patterns of memory-promoting transcription factors, T-bet and Eomes, induced in a rapid and sustainable manner. NT eff cells appeared to have lower expression of Foxp1 and were refractory to apoptosis upon TGF-β conditioning, implying better survival potential and resistance to tumor-induced immune suppression. Of CD8 + T cell pools activated to tumor-specific CTLs, naïve cell generated effectors possessed the most potent cytotoxic activity, validating implications for use in rational design of adoptive immunotherapy11091sciescopu
    corecore