{"status":"public","conference":{"location":"Copenhagen, Denmark","start_date":"2002-07-27","end_date":"2002-07-31","name":"CAV: Computer Aided Verification"},"author":[{"last_name":"Henzinger","orcid":"0000−0002−2985−7724","first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Henzinger, Thomas A"},{"full_name":"Necula, George","first_name":"George","last_name":"Necula"},{"full_name":"Jhala, Ranjit","first_name":"Ranjit","last_name":"Jhala"},{"full_name":"Sutre, Grégoire","first_name":"Grégoire","last_name":"Sutre"},{"full_name":"Majumdar, Ritankar","last_name":"Majumdar","first_name":"Ritankar"},{"last_name":"Weimer","first_name":"Westley","full_name":"Weimer, Westley"}],"oa_version":"None","alternative_title":["LNCS"],"date_updated":"2023-06-05T08:11:32Z","publist_id":"258","type":"conference","doi":"10.1007/3-540-45657-0_45","page":"526 - 538","acknowledgement":"This work was supported in part by the NSF ITR grants CCR-0085949, CCR-0081588, the NSF Career grant CCR-9875171, the DARPA PCES grant F33615-00-C-1693, the MARCO GSRC grant 98-DT-660, the SRC contract 99-TJ-683, a Microsoft fellowship, and gifts from AT&T Research and Microsoft Research.","quality_controlled":"1","title":"Temporal safety proofs for systems code","intvolume":" 2404","date_published":"2002-06-19T00:00:00Z","extern":"1","citation":{"ista":"Henzinger TA, Necula G, Jhala R, Sutre G, Majumdar R, Weimer W. 2002. Temporal safety proofs for systems code. Proceedings of the 14th International Conference on Computer Aided Verification. CAV: Computer Aided Verification, LNCS, vol. 2404, 526–538.","apa":"Henzinger, T. A., Necula, G., Jhala, R., Sutre, G., Majumdar, R., & Weimer, W. (2002). Temporal safety proofs for systems code. In Proceedings of the 14th International Conference on Computer Aided Verification (Vol. 2404, pp. 526–538). Copenhagen, Denmark: Springer. https://doi.org/10.1007/3-540-45657-0_45","chicago":"Henzinger, Thomas A, George Necula, Ranjit Jhala, Grégoire Sutre, Ritankar Majumdar, and Westley Weimer. “Temporal Safety Proofs for Systems Code.” In Proceedings of the 14th International Conference on Computer Aided Verification, 2404:526–38. Springer, 2002. https://doi.org/10.1007/3-540-45657-0_45.","ieee":"T. A. Henzinger, G. Necula, R. Jhala, G. Sutre, R. Majumdar, and W. Weimer, “Temporal safety proofs for systems code,” in Proceedings of the 14th International Conference on Computer Aided Verification, Copenhagen, Denmark, 2002, vol. 2404, pp. 526–538.","ama":"Henzinger TA, Necula G, Jhala R, Sutre G, Majumdar R, Weimer W. Temporal safety proofs for systems code. In: Proceedings of the 14th International Conference on Computer Aided Verification. Vol 2404. Springer; 2002:526-538. doi:10.1007/3-540-45657-0_45","short":"T.A. Henzinger, G. Necula, R. Jhala, G. Sutre, R. Majumdar, W. Weimer, in:, Proceedings of the 14th International Conference on Computer Aided Verification, Springer, 2002, pp. 526–538.","mla":"Henzinger, Thomas A., et al. “Temporal Safety Proofs for Systems Code.” Proceedings of the 14th International Conference on Computer Aided Verification, vol. 2404, Springer, 2002, pp. 526–38, doi:10.1007/3-540-45657-0_45."},"month":"06","year":"2002","publication_identifier":{"isbn":["9783540439974"]},"date_created":"2018-12-11T12:09:01Z","abstract":[{"lang":"eng","text":"We present a methodology and tool for verifying and certifying systems code. The verification is based on the lazy-abstraction paradigm for intertwining the following three logical steps: construct a predicate abstraction from the code, model check the abstraction, and automatically refine the abstraction based on counterexample analysis. The certification is based on the proof-carrying code paradigm. Lazy abstraction enables the automatic construction of small proof certificates. The methodology is implemented in Blast, the Berkeley Lazy Abstraction Software verification Tool. We describe our experience applying Blast to Linux and Windows device drivers. Given the C code for a driver and for a temporal-safety monitor, Blast automatically generates an easily checkable correctness certificate if the driver satisfies the specification, and an error trace otherwise."}],"volume":2404,"_id":"4472","scopus_import":"1","publication_status":"published","language":[{"iso":"eng"}],"publication":"Proceedings of the 14th International Conference on Computer Aided Verification","user_id":"ea97e931-d5af-11eb-85d4-e6957dddbf17","article_processing_charge":"No","publisher":"Springer","day":"19"}