Notice
This is not the latest version of this item. The latest version can be found at:https://dspace.mit.edu/handle/1721.1/103950.2
Trigger Selection Strategies to Stabilize Program Verifiers
dc.contributor.author | Leino, K. Rustan M. | |
dc.contributor.author | Pit-Claudel, Clement F. | |
dc.date.accessioned | 2016-08-17T20:11:11Z | |
dc.date.available | 2016-08-17T20:11:11Z | |
dc.date.issued | 2016-07 | |
dc.identifier.isbn | 978-3-319-41527-7 | |
dc.identifier.isbn | 978-3-319-41528-4 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.issn | 1611-3349 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/103950 | |
dc.description.abstract | SMT-based program verifiers often suffer from the so-called butterfly effect, in which minor modifications to the program source cause significant instabilities in verification times, which in turn may lead to spurious verification failures and a degraded user experience. This paper identifies matching loops (ill-behaved quantifiers causing an SMT solver to repeatedly instantiate a small set of quantified formulas) as a significant contributor to these instabilities, and describes some techniques to detect and prevent them. At their core, the contributed techniques move the trigger selection logic away from the SMT solver and into the high-level verifier: this move allows authors of verifiers to annotate, rewrite, and analyze user-written quantifiers to improve the solver’s performance, using information that is easily available at the source level but would be hard to extract from the heavily encoded terms that the solver works with. The paper demonstrates three core techniques (quantifier splitting, trigger sharing, and matching loop detection) by extending the Dafny verifier with its own trigger selection routine, and demonstrates significant predictability and performance gains on both Dafny’s test suite and large verification efforts using Dafny. | en_US |
dc.language.iso | en_US | |
dc.publisher | Springer International Publishing | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1007/978-3-319-41528-4_20 | en_US |
dc.rights | Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. | en_US |
dc.source | Pit-Claudel | en_US |
dc.title | Trigger Selection Strategies to Stabilize Program Verifiers | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Leino, K. R. M., and Clément Pit-Claudel. “Trigger Selection Strategies to Stabilize Program Verifiers.” Lecture Notes in Computer Science Vol. 9779, (2016): 361–381. | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
dc.contributor.mitauthor | Pit-Claudel, Clement F. | en_US |
dc.relation.journal | Computer Aided Verification | en_US |
dc.eprint.version | Author's final manuscript | en_US |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
eprint.status | http://purl.org/eprint/status/PeerReviewed | en_US |
dspace.embargo.terms | N | en_US |
dc.identifier.orcid | https://orcid.org/0000-0002-1900-3901 | |
mit.license | PUBLISHER_POLICY | en_US |