\n \n \n
\n
\n\n \n \n \n \n \n \n ConcurrentWitness2Test: Test-Harnessing the Power of Concurrency (Competition Contribution).\n \n \n \n \n\n\n \n Bajczi, L.; Ádám, Z.; and Micskei, Z. I.\n\n\n \n\n\n\n In
Tools and Algorithms for the Construction and Analysis of Systems, pages 330-334, 2024. \n
\n\n
\n\n
\n\n
\n\n \n \n
pdf\n \n \n \n
slides\n \n \n \n
mtmt\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{MTMT:34768972,\n\ttitle = {ConcurrentWitness2Test: Test-Harnessing the Power of Concurrency (Competition Contribution)},\n\tauthor = {Bajczi, Levente and Ádám, Zsófia and Micskei, Zoltán Imre},\n\tbooktitle = {Tools and Algorithms for the Construction and Analysis of Systems},\n\tdoi = {10.1007/978-3-031-57256-2_16},\n\tunique-id = {34768972},\n\tabstract = {ConcurrentWitness2Test is a violation witness validator for concurrent software. Taking both nondeterminism of data and interleaving-based nondeterminism into account, the tool aims to use the metadata described in the violation witnesses to synthesize an executable test harness. While plagued by some initial challenges yet to overcome, the validation performance of ConcurrentWitness2Test corroborates the usefulness of the proposed approach.},\n\tyear = {2024},\n\tpages = {330-334},\n\torcid-numbers = {Bajczi, Levente/0000-0002-6551-5860; Ádám, Zsófia/0000-0003-2354-1750; Micskei, Zoltán Imre/0000-0003-1846-261X},\n\n url_pdf = {https://leventebajczi.github.io/publications/tacas24cwt.pdf},\n url_slides = {https://leventebajczi.github.io/publications/slides/tacas24cwt.pdf},\n url_mtmt = {https://m2.mtmt.hu/api/publication/34768972},\n}\n\n
\n
\n\n\n
\n ConcurrentWitness2Test is a violation witness validator for concurrent software. Taking both nondeterminism of data and interleaving-based nondeterminism into account, the tool aims to use the metadata described in the violation witnesses to synthesize an executable test harness. While plagued by some initial challenges yet to overcome, the validation performance of ConcurrentWitness2Test corroborates the usefulness of the proposed approach.\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Theta: Abstraction Based Techniques for Verifying Concurrency (Competition Contribution).\n \n \n \n \n\n\n \n Bajczi, L.; Telbisz, C.; Somorjai, M.; Ádám, Z.; Dobos-Kovács, M.; Szekeres, D.; Mondok, M.; and Molnár, V.\n\n\n \n\n\n\n In
Tools and Algorithms for the Construction and Analysis of Systems, pages 412-417, 2024. \n
\n\n
\n\n
\n\n
\n\n \n \n
pdf\n \n \n \n
slides\n \n \n \n
mtmt\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{MTMT:34768428,\n\ttitle = {Theta: Abstraction Based Techniques for Verifying Concurrency (Competition Contribution)},\n\tauthor = {Bajczi, Levente and Telbisz, Csanád and Somorjai, Márk and Ádám, Zsófia and Dobos-Kovács, Mihály and Szekeres, Dániel and Mondok, Milán and Molnár, Vince},\n\tbooktitle = {Tools and Algorithms for the Construction and Analysis of Systems},\n\tdoi = {10.1007/978-3-031-57256-2_30},\n\tunique-id = {34768428},\n\tabstract = {Theta is a model checking framework, with a strong emphasis on effectively handling concurrency in software using abstraction refinement algorithms. In SV-COMP 2024, we use 1) an abstraction-aware partial order reduction; 2) a dynamic statement reduction technique; and 3) enhanced support for call stacks to handle recursive programs. We integrate these techniques in an improved architecture with inherent support for portfolio-based verification using dynamic algorithm selection, with a diverse selection of supported SMT solvers as well. In this paper we detail the advances of Theta regarding concurrent and recursive software support.},\n\tyear = {2024},\n\tpages = {412-417},\n\torcid-numbers = {Bajczi, Levente/0000-0002-6551-5860; Telbisz, Csanád/0000-0002-6260-5908; Ádám, Zsófia/0000-0003-2354-1750; Dobos-Kovács, Mihály/0000-0002-0064-2965; Szekeres, Dániel/0000-0002-2912-028X; Mondok, Milán/0000-0001-5396-2172; Molnár, Vince/0000-0002-8204-7595},\n\n url_pdf = {https://leventebajczi.github.io/publications/tacas24theta.pdf},\n url_slides = {https://leventebajczi.github.io/publications/slides/tacas24theta.pdf},\n url_mtmt = {https://m2.mtmt.hu/api/publication/34768428},\n}\n\n
\n
\n\n\n
\n Theta is a model checking framework, with a strong emphasis on effectively handling concurrency in software using abstraction refinement algorithms. In SV-COMP 2024, we use 1) an abstraction-aware partial order reduction; 2) a dynamic statement reduction technique; and 3) enhanced support for call stacks to handle recursive programs. We integrate these techniques in an improved architecture with inherent support for portfolio-based verification using dynamic algorithm selection, with a diverse selection of supported SMT solvers as well. In this paper we detail the advances of Theta regarding concurrent and recursive software support.\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n EmergenTheta: Verification Beyond Abstraction Refinement (Competition Contribution).\n \n \n \n \n\n\n \n Bajczi, L.; Szekeres, D.; Mondok, M.; Ádám, Z.; Somorjai, M.; Telbisz, C.; Dobos-Kovács, M.; and Molnár, V.\n\n\n \n\n\n\n In
Tools and Algorithms for the Construction and Analysis of Systems, pages 371-375, 2024. \n
\n\n
\n\n
\n\n
\n\n \n \n
pdf\n \n \n \n
slides\n \n \n \n
mtmt\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{MTMT:34768422,\n\ttitle = {EmergenTheta: Verification Beyond Abstraction Refinement (Competition Contribution)},\n\tauthor = {Bajczi, Levente and Szekeres, Dániel and Mondok, Milán and Ádám, Zsófia and Somorjai, Márk and Telbisz, Csanád and Dobos-Kovács, Mihály and Molnár, Vince},\n\tbooktitle = {Tools and Algorithms for the Construction and Analysis of Systems},\n\tdoi = {10.1007/978-3-031-57256-2_23},\n\tunique-id = {34768422},\n\tabstract = {Theta is a model checking framework conventionally based on abstraction refinement techniques. While abstraction is useful for a large number of verification problems, the over-reliance on the technique led to Theta being unable to meaningfully adapt. Identifying this problem in previous years of SV-COMP has led us to create EmergenTheta , a sandbox for the new approaches we want Theta to support. By differentiating between mature and emerging techniques, we can experiment more freely without hurting the reliability of the overall framework. In this paper we detail the development route to EmergenTheta , and its first debut on SV-COMP’24 in the ReachSafety category.},\n\tyear = {2024},\n\tpages = {371-375},\n\torcid-numbers = {Bajczi, Levente/0000-0002-6551-5860; Szekeres, Dániel/0000-0002-2912-028X; Mondok, Milán/0000-0001-5396-2172; Ádám, Zsófia/0000-0003-2354-1750; Telbisz, Csanád/0000-0002-6260-5908; Dobos-Kovács, Mihály/0000-0002-0064-2965; Molnár, Vince/0000-0002-8204-7595},\n\n url_pdf = {https://leventebajczi.github.io/publications/tacas24etheta.pdf},\n url_slides = {https://leventebajczi.github.io/publications/slides/tacas24etheta.pdf},\n url_mtmt = {https://m2.mtmt.hu/api/publication/34768422},\n}\n\n
\n
\n\n\n
\n Theta is a model checking framework conventionally based on abstraction refinement techniques. While abstraction is useful for a large number of verification problems, the over-reliance on the technique led to Theta being unable to meaningfully adapt. Identifying this problem in previous years of SV-COMP has led us to create EmergenTheta , a sandbox for the new approaches we want Theta to support. By differentiating between mature and emerging techniques, we can experiment more freely without hurting the reliability of the overall framework. In this paper we detail the development route to EmergenTheta , and its first debut on SV-COMP’24 in the ReachSafety category.\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Verbesserung der MBSE-Ausbildung durch Versionskontrolle und automatisiertes Feedback.\n \n \n \n \n\n\n \n Bajczi, L.; Szekeres, D.; Siegl, D.; and Molnár, V.\n\n\n \n\n\n\n In
Tag des Systems Engineering, pages 161-169, 2024. \n
\n\n
\n\n
\n\n
\n\n \n \n
pdf\n \n \n \n
slides\n \n \n \n
mtmt\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{MTMT:35617761,\n\ttitle = {Verbesserung der MBSE-Ausbildung durch Versionskontrolle und automatisiertes Feedback},\n\tauthor = {Bajczi, Levente and Szekeres, Dániel and Siegl, Daniel and Molnár, Vince},\n\tbooktitle = {Tag des Systems Engineering},\n\tunique-id = {35617761},\n\tyear = {2024},\n\tpages = {161-169},\n\torcid-numbers = {Bajczi, Levente/0000-0002-6551-5860; Szekeres, Dániel/0000-0002-2912-028X; Molnár, Vince/0000-0002-8204-7595},\n\n url_pdf = {https://leventebajczi.github.io/publications/tdse24verbesserung.pdf},\n url_slides = {https://leventebajczi.github.io/publications/slides/tdse24verbesserung.pdf},\n url_mtmt = {https://m2.mtmt.hu/api/publication/35617761},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Enhancing MBSE Education with Version Control and Automated Feedback.\n \n \n \n \n\n\n \n Bajczi, L.; Szekeres, D.; Siegl, D.; and Molnár, V.\n\n\n \n\n\n\n 2024.\n
\n\n
\n\n
\n\n
\n\n \n \n
pdf\n \n \n \n
slides\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@misc{bajczi2024enhancingmbseeducationversion,\n\ttitle={Enhancing MBSE Education with Version Control and Automated Feedback}, \n\tauthor={Levente Bajczi and Dániel Szekeres and Daniel Siegl and Vince Molnár},\n\tyear={2024},\n\teprint={2409.15294},\n\tarchivePrefix={arXiv},\n\tprimaryClass={cs.CY},\n\n\turl_pdf = {https://leventebajczi.github.io/publications/tdse24enhancing.pdf},\n url_slides = {https://leventebajczi.github.io/publications/slides/tdse24verbesserung.pdf},\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Solving Constrained Horn Clauses as C Programs with CHC2C.\n \n \n \n \n\n\n \n Bajczi, L.; and Molnár, V.\n\n\n \n\n\n\n
LECTURE NOTES IN COMPUTER SCIENCE, 14624: 146-163. 2024.\n
\n\n
\n\n
\n\n
\n\n \n \n
pdf\n \n \n \n
slides\n \n \n \n
mtmt\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n \n \n\n\n\n
\n
@article{MTMT:34853031,\n\ttitle = {Solving Constrained Horn Clauses as C Programs with CHC2C},\n\tauthor = {Bajczi, Levente and Molnár, Vince},\n\tdoi = {10.1007/978-3-031-66149-5_8},\n\tjournal-iso = {LNCS},\n\tjournal = {LECTURE NOTES IN COMPUTER SCIENCE},\n\tvolume = {14624},\n\tunique-id = {34853031},\n\tissn = {0302-9743},\n\tabstract = {Solving Constrained Horn Clauses (CHC) is necessitated by numerous fields in formal methods, from verifying software and smart contracts to modeling systems, yet the competitive scene for academic tools remains fairly sparse, especially compared to more popular fields such as software verification. Comparative evaluation as a competition, such as SV-COMP or CHC-COMP, sparks a more cohesive community around fields in formal methods. Lately, a trend has been emerging with tools such as Btor2C that bridge multiple fields together, thus widening this cohesion. Following that example, we propose and perform an experiment, where we use CHC-to-C transformation to apply software verification tools to linear CHC problems. In the process, we help both fields by diversifying the scene of CHC solvers and providing new and valuable benchmarks to aid the development of software verification tools. Using these benchmarks, we uncovered a previously hidden bug in multiple verification tools that can lead to false positive results. By analysing the results of the experiment, we can confidently make a recommendation for developers of software verifiers to consider supporting CHCs via our pre-verification transformation.},\n\tkeywords = {verification; formal methods; Computer Science, Software Engineering; CHC},\n\tyear = {2024},\n\teissn = {1611-3349},\n\tpages = {146-163},\n\torcid-numbers = {Bajczi, Levente/0000-0002-6551-5860; Molnár, Vince/0000-0002-8204-7595},\n\n\n url_pdf = {https://leventebajczi.github.io/publications/spin24chc2c.pdf},\n url_slides = {https://leventebajczi.github.io/publications/slides/spin24chc2c.pdf},\n\turl_mtmt = {https://m2.mtmt.hu/api/publication/34853031},\t\n}\n\n
\n
\n\n\n
\n Solving Constrained Horn Clauses (CHC) is necessitated by numerous fields in formal methods, from verifying software and smart contracts to modeling systems, yet the competitive scene for academic tools remains fairly sparse, especially compared to more popular fields such as software verification. Comparative evaluation as a competition, such as SV-COMP or CHC-COMP, sparks a more cohesive community around fields in formal methods. Lately, a trend has been emerging with tools such as Btor2C that bridge multiple fields together, thus widening this cohesion. Following that example, we propose and perform an experiment, where we use CHC-to-C transformation to apply software verification tools to linear CHC problems. In the process, we help both fields by diversifying the scene of CHC solvers and providing new and valuable benchmarks to aid the development of software verification tools. Using these benchmarks, we uncovered a previously hidden bug in multiple verification tools that can lead to false positive results. By analysing the results of the experiment, we can confidently make a recommendation for developers of software verifiers to consider supporting CHCs via our pre-verification transformation.\n
\n\n\n
\n\n\n\n\n\n