\n \n \n
\n
\n\n \n \n \n \n \n \n On Stability in a Happens-Before Propagator for Concurrent Programs (Reproducibility Study).\n \n \n \n \n\n\n \n Bajczi, L.; Telbisz, C. F.; Szekeres, D.; and Vörös, A.\n\n\n \n\n\n\n
LECTURE NOTES IN COMPUTER SCIENCE, 15696: 3-19. 2025.\n
\n\n
\n\n
\n\n
\n\n \n \n
pdf\n \n \n \n
slides\n \n \n \n
mtmt\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{MTMT:36122897,\n\ttitle = {On Stability in a Happens-Before Propagator for Concurrent Programs (Reproducibility Study)},\n\tauthor = {Bajczi, Levente and Telbisz, Csanád Ferenc and Szekeres, Dániel and Vörös, András},\n\tdoi = {10.1007/978-3-031-90643-5_1},\n\tjournal-iso = {LNCS},\n\tjournal = {LECTURE NOTES IN COMPUTER SCIENCE},\n\tvolume = {15696},\n\tunique-id = {36122897},\n\tissn = {0302-9743},\n\tabstract = {Analyzing concurrent programs often involves reasoning about happens-before relations, handled by dedicated SMT theory solvers. Recently, preventative propagation rules have been introduced for consistency models to avoid unnecessary computations. This paper analyses the reproducibility of a recently published paper regarding a conflict-avoiding happens-before propagator. We show that the underlying axioms are insufficient for supporting sequential consistency. We find that the algorithm can leave out constraints on event ordering (even considering the original axioms), impacting the accuracy of verification. We show a simple counterexample to the stability claim in the paper. Two revisions of the algorithm are presented, and a proof on the correctness of these approaches respective of the original axioms is shown. The tool implementing the original algorithm is examined to ascertain how it circumvents wrong results. It is found that it deviates from the published algorithm. We show that an unmodified algorithm (via a patch in the implementing tool) causes incorrect results. We also show that our revised algorithm can be implemented efficiently in an independent verification tool.},\n\tyear = {2025},\n\teissn = {1611-3349},\n\tpages = {3-19},\n\torcid-numbers = {Bajczi, Levente/0000-0002-6551-5860; Telbisz, Csanád Ferenc/0000-0002-6260-5908; Szekeres, Dániel/0000-0002-2912-028X},\n\t\n\turl_pdf = {https://csanadtelbisz.github.io/publications/tacas25ocfix.pdf},\n\turl_slides = {https://leventebajczi.github.io/publications/slides/tacas25ocfix.pdf},\n\turl_mtmt = {https://m2.mtmt.hu/api/publication/36122897},\n}\n\n
\n
\n\n\n
\n Analyzing concurrent programs often involves reasoning about happens-before relations, handled by dedicated SMT theory solvers. Recently, preventative propagation rules have been introduced for consistency models to avoid unnecessary computations. This paper analyses the reproducibility of a recently published paper regarding a conflict-avoiding happens-before propagator. We show that the underlying axioms are insufficient for supporting sequential consistency. We find that the algorithm can leave out constraints on event ordering (even considering the original axioms), impacting the accuracy of verification. We show a simple counterexample to the stability claim in the paper. Two revisions of the algorithm are presented, and a proof on the correctness of these approaches respective of the original axioms is shown. The tool implementing the original algorithm is examined to ascertain how it circumvents wrong results. It is found that it deviates from the published algorithm. We show that an unmodified algorithm (via a patch in the implementing tool) causes incorrect results. We also show that our revised algorithm can be implemented efficiently in an independent verification tool.\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Giving Some Pointers for Abstraction-Based Model Checking.\n \n \n \n \n\n\n \n Bajczi, L.; Szekeres, D.; Telbisz, C. F.; and Molnár, V.\n\n\n \n\n\n\n In
Proceedings of the 32nd Minisymposium, pages 5-9, 2025. \n
\n\n
\n\n
\n\n
\n\n \n \n
pdf\n \n \n \n
mtmt\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{MTMT:36176199,\n\ttitle = {Giving Some Pointers for Abstraction-Based Model Checking},\n\tauthor = {Bajczi, Levente and Szekeres, Dániel and Telbisz, Csanád Ferenc and Molnár, Vince},\n\tbooktitle = {Proceedings of the 32nd Minisymposium},\n\tdoi = {10.3311/MINISY2025-002},\n\tunique-id = {36176199},\n\tabstract = {Abstraction-based software model checkers often rely on external analyses or unbounded SMT arrays to reason about pointers, arrays, and dynamic heap manipulation. External analyses are precise but often require the modification of existing verification algorithms, while SMT arrays provide a native solution for solver-based verifiers but require strict type safety often forgone in real-world programs. We propose a novel way of integrating a precise pointer and array analysis as a plug-in for abstraction-based model checking, which does not require the modification of the underlying algorithms. Our solution keeps track of arbitrary predicates over potentially abstract memory locations, moving toward more efficient verification of software code by allowing a fine-grained and precise abstraction of memory accesses.},\n\tyear = {2025},\n\tpages = {5-9},\n\torcid-numbers = {Bajczi, Levente/0000-0002-6551-5860; Szekeres, Dániel/0000-0002-2912-028X; Telbisz, Csanád Ferenc/0000-0002-6260-5908; Molnár, Vince/0000-0002-8204-7595},\n\t\n\turl_pdf = {https://csanadtelbisz.github.io/publications/minisy25pointers.pdf},\n\turl_mtmt = {https://m2.mtmt.hu/api/publication/36176199},\n}\n\n
\n
\n\n\n
\n Abstraction-based software model checkers often rely on external analyses or unbounded SMT arrays to reason about pointers, arrays, and dynamic heap manipulation. External analyses are precise but often require the modification of existing verification algorithms, while SMT arrays provide a native solution for solver-based verifiers but require strict type safety often forgone in real-world programs. We propose a novel way of integrating a precise pointer and array analysis as a plug-in for abstraction-based model checking, which does not require the modification of the underlying algorithms. Our solution keeps track of arbitrary predicates over potentially abstract memory locations, moving toward more efficient verification of software code by allowing a fine-grained and precise abstraction of memory accesses.\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Theta: Various Approaches for Concurrent Program Verification (Competition Contribution).\n \n \n \n \n\n\n \n Telbisz, C. F.; Bajczi, L.; Szekeres, D.; and Vörös, A.\n\n\n \n\n\n\n In volume 15698, pages 260-265, 2025. \n
\n\n
\n\n
\n\n
\n\n \n \n
pdf\n \n \n \n
slides\n \n \n \n
mtmt\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{MTMT:36122885,\n\ttitle = {Theta: Various Approaches for Concurrent Program Verification (Competition Contribution)},\n\tauthor = {Telbisz, Csanád Ferenc and Bajczi, Levente and Szekeres, Dániel and Vörös, András},\n\tdoi = {10.1007/978-3-031-90660-2_22},\n\tjournal-iso = {LNCS},\n\tjournal = {LECTURE NOTES IN COMPUTER SCIENCE},\n\tvolume = {15698},\n\tunique-id = {36122885},\n\tissn = {0302-9743},\n\tabstract = {Theta is a model checking framework with a strong emphasis on effectively handling concurrency in software using abstraction refinement algorithms. In SV-COMP 2025, we complement our existing approach (abstraction-aware partial order reduction) for multi-threaded programs with a happens before propagator-based BMC check, expecting a significant increase in performance. We again utilize our portfolio with dynamic algorithm selection from last year, with improvements regarding solver choice and configuration ordering. In this paper, we detail our algorithmic improvements in Theta regarding the verification of concurrent software.},\n\tyear = {2025},\n\teissn = {1611-3349},\n\tpages = {260-265},\n\torcid-numbers = {Telbisz, Csanád Ferenc/0000-0002-6260-5908; Bajczi, Levente/0000-0002-6551-5860; Szekeres, Dániel/0000-0002-2912-028X},\n\t\n\turl_pdf = {https://csanadtelbisz.github.io/publications/tacas25theta.pdf},\n\turl_slides = {https://csanadtelbisz.github.io/publications/slides/tacas25theta.pdf},\n\turl_mtmt = {https://m2.mtmt.hu/api/publication/36122885},\n}\n\n
\n
\n\n\n
\n Theta is a model checking framework with a strong emphasis on effectively handling concurrency in software using abstraction refinement algorithms. In SV-COMP 2025, we complement our existing approach (abstraction-aware partial order reduction) for multi-threaded programs with a happens before propagator-based BMC check, expecting a significant increase in performance. We again utilize our portfolio with dynamic algorithm selection from last year, with improvements regarding solver choice and configuration ordering. In this paper, we detail our algorithmic improvements in Theta regarding the verification of concurrent software.\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Reasoning with Happens-Before Relations About Concurrent Programs in the THETA Framework.\n \n \n \n \n\n\n \n Telbisz, C. F.; Bajczi, L.; Szekeres, D.; Vörös, A.; and Majzik, I.\n\n\n \n\n\n\n In
2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), pages 43-46, 2025. \n
\n\n
\n\n
\n\n
\n\n \n \n
pdf\n \n \n \n
mtmt\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{MTMT:36267184,\n\ttitle = {Reasoning with Happens-Before Relations About Concurrent Programs in the THETA Framework},\n\tauthor = {Telbisz, Csanád Ferenc and Bajczi, Levente and Szekeres, Dániel and Vörös, András and Majzik, István},\n\tbooktitle = {2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)},\n\tdoi = {10.1109/DSN-W65791.2025.00037},\n\tunique-id = {36267184},\n\tabstract = {The model checking of multi-threaded programs often involves reasoning about the happens-before relation of concurrent program instructions. Several algorithms exist for finding a partial order of instructions that is consistent with ordering constraints of the assumed memory model and that violates a safety property; or for proving that such partial orders do not exist. We present existing and novel bounded model checking approaches reasoning with happens-before relations of concurrent programs. These algorithms are implemented in THETA, a modular model checking framework. We also give a comparative evaluation of our THETA implementations and state-of-the-art verifiers.},\n\tyear = {2025},\n\tpages = {43-46},\n\torcid-numbers = {Telbisz, Csanád Ferenc/0000-0002-6260-5908; Bajczi, Levente/0000-0002-6551-5860; Szekeres, Dániel/0000-0002-2912-028X},\n\t\n\turl_pdf = {https://csanadtelbisz.github.io/publications/verdi25oc.pdf},\n\turl_mtmt = {https://m2.mtmt.hu/api/publication/36267184},\n}\n\n
\n
\n\n\n
\n The model checking of multi-threaded programs often involves reasoning about the happens-before relation of concurrent program instructions. Several algorithms exist for finding a partial order of instructions that is consistent with ordering constraints of the assumed memory model and that violates a safety property; or for proving that such partial orders do not exist. We present existing and novel bounded model checking approaches reasoning with happens-before relations of concurrent programs. These algorithms are implemented in THETA, a modular model checking framework. We also give a comparative evaluation of our THETA implementations and state-of-the-art verifiers.\n
\n\n\n
\n\n\n\n\n\n