Finding more property violations in model checking via the restart policy

  • Mengtao Geng
  • , Xiaoyu Zhang
  • , Jianwen Li*
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Model checking is an efficient formal verification technique that has been applied to a wide spectrum of applications in software engineering. Popular model checking algorithms include Bounded Model Checking (BMC) and Incremental Construction of Inductive Clauses for Indubitable Correctness/Property Directed Reachability(IC3/PDR). The recently proposed Complementary Approximate Reachability (CAR) model checking algorithm has a performance close to BMC in bug-finding, while its depth-first strategy sometimes leads the algorithm to a trap, which will waste lots of computation. In this paper, we enhance the recently proposed Complementary Approximate Reachability (CAR) model checking algorithm by integrating the restart policy, which yields a restartable CAR model (abbreviated as r-CAR). The restart policy can help avoid the trap problem caused by the depth-first strategy and has played an important role in modern SAT-solving algorithms to search for a satisfactory solution. As the bug-finding in model checking is reducible to a similar search problem, the restart policy can be useful to enhance the bug-finding capability. We made an extensive experiment to evaluate the new algorithm. Our results show that out of the 749 industrial instances, r-CAR is able to find 13 instances that the state-of-the-art BMC technique cannot find and can solve more than 11 instances than the original CAR. The new algorithm successfully contributes to the current model-checking portfolio in practice.

Original languageEnglish
Article number2957
JournalElectronics (Switzerland)
Volume10
Issue number23
DOIs
StatePublished - 1 Dec 2021

Keywords

  • BMC
  • Bug-finding
  • CAR
  • Model checking
  • SAT

Fingerprint

Dive into the research topics of 'Finding more property violations in model checking via the restart policy'. Together they form a unique fingerprint.

Cite this