\n \n \n
\n
\n\n \n \n \n \n \n \n NetworCat: applying analysis techniques of shared memory software on message-passing distributed systems.\n \n \n \n \n\n\n \n Bajczi, L.; and Molnár, V.\n\n\n \n\n\n\n
SOFTWARE AND SYSTEMS MODELING. 2025.\n
\n\n
\n\n
\n\n
\n\n \n \n
pdf\n \n \n \n
mtmt\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{MTMT:35762171,\n\ttitle = {{NetworCat: applying analysis techniques of shared memory software on message-passing distributed systems}},\n\tauthor = {Bajczi, Levente and Molnár, Vince},\n\tdoi = {10.1007/s10270-024-01258-x},\n\tjournal-iso = {SOFTW SYST MODEL},\n\tjournal = {SOFTWARE AND SYSTEMS MODELING},\n\tunique-id = {35762171},\n\tissn = {1619-1366},\n\tabstract = {Communication models are a key aspect in the design and implementation of distributed system architectures. Application logic must consider the guarantees of these models, which fundamentally influence its correctness. Modern multi-core processor architectures face a similar problem when it comes to accessing shared memory: the guarantees of an architecture have a fundamental impact on the observable behavior of software. The formalization of these guarantees in a declarative way has led to powerful tools and algorithms to define reusable constraints on patterns of memory access events and their relationships, enabling the efficient description and automatic formal analysis of software properties with respect to a specific architecture. The Cat memory modeling language provides a standard means of specifying these constraints. Despite the parallels, the axiomatic modeling and analysis of communication models in distributed systems remain a relatively unexplored area. In this paper, we address this gap and demonstrate how communication models can be mapped to the Cat language. We create a standard library of reusable patterns and demonstrate our approach, called NetworCat , on the simple examples of UDP and TCP, and we also present its applicability to the vastly configurable OMG-DDS service. This adaptation-based approach enables the use of ever-improving verification tools built for shared memory concurrency on distributed systems. We believe this not only benefits distributed system analyses by broadening the toolset for verification but also positively impacts the field of memory-model-aware verification by widening its audience to another domain.},\n\tyear = {2025},\n\teissn = {1619-1374},\n\torcid-numbers = {Bajczi, Levente/0000-0002-6551-5860; Molnár, Vince/0000-0002-8204-7595},\n\n url_pdf = {https://leventebajczi.github.io/publications/sosym25networcat.pdf},\n\turl_mtmt = {https://m2.mtmt.hu/api/publication/35762171},\n}\n\n\n
\n\n\n
\n Communication models are a key aspect in the design and implementation of distributed system architectures. Application logic must consider the guarantees of these models, which fundamentally influence its correctness. Modern multi-core processor architectures face a similar problem when it comes to accessing shared memory: the guarantees of an architecture have a fundamental impact on the observable behavior of software. The formalization of these guarantees in a declarative way has led to powerful tools and algorithms to define reusable constraints on patterns of memory access events and their relationships, enabling the efficient description and automatic formal analysis of software properties with respect to a specific architecture. The Cat memory modeling language provides a standard means of specifying these constraints. Despite the parallels, the axiomatic modeling and analysis of communication models in distributed systems remain a relatively unexplored area. In this paper, we address this gap and demonstrate how communication models can be mapped to the Cat language. We create a standard library of reusable patterns and demonstrate our approach, called NetworCat , on the simple examples of UDP and TCP, and we also present its applicability to the vastly configurable OMG-DDS service. This adaptation-based approach enables the use of ever-improving verification tools built for shared memory concurrency on distributed systems. We believe this not only benefits distributed system analyses by broadening the toolset for verification but also positively impacts the field of memory-model-aware verification by widening its audience to another domain.\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Theta: Various Approaches for Concurrent Program Verification (Competition Contribution).\n \n \n \n \n\n\n \n Telbisz, C. F.; Bajczi, L.; Szekeres, D.; and Vörös, A.\n\n\n \n\n\n\n
LECTURE NOTES IN COMPUTER SCIENCE, 15698: 260-265. 2025.\n
\n\n
\n\n
\n\n
\n\n \n \n
pdf\n \n \n \n
poster\n \n \n \n
mtmt\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{MTMT:36122885,\n\ttitle = {Theta: Various Approaches for Concurrent Program Verification (Competition Contribution)},\n\tauthor = {Telbisz, Csanád Ferenc and Bajczi, Levente and Szekeres, Dániel and Vörös, András},\n\tdoi = {10.1007/978-3-031-90660-2_22},\n\tjournal-iso = {LNCS},\n\tjournal = {LECTURE NOTES IN COMPUTER SCIENCE},\n\tvolume = {15698},\n\tunique-id = {36122885},\n\tissn = {0302-9743},\n\tabstract = {Theta is a model checking framework with a strong emphasis on effectively handling concurrency in software using abstraction refinement algorithms. In SV-COMP 2025, we complement our existing approach (abstraction-aware partial order reduction) for multi-threaded programs with a happens before propagator-based BMC check, expecting a significant increase in performance. We again utilize our portfolio with dynamic algorithm selection from last year, with improvements regarding solver choice and configuration ordering. In this paper, we detail our algorithmic improvements in Theta regarding the verification of concurrent software.},\n\tyear = {2025},\n\teissn = {1611-3349},\n\tpages = {260-265},\n\torcid-numbers = {Telbisz, Csanád Ferenc/0000-0002-6260-5908; Bajczi, Levente/0000-0002-6551-5860; Szekeres, Dániel/0000-0002-2912-028X},\n\n\n url_pdf = {https://leventebajczi.github.io/publications/tacas25theta.pdf},\n\turl_poster = {https://leventebajczi.github.io/publications/posters/tacas25.pdf},\n\turl_mtmt = {https://m2.mtmt.hu/api/publication/36122885},\t\n}\n\n\n
\n\n\n
\n Theta is a model checking framework with a strong emphasis on effectively handling concurrency in software using abstraction refinement algorithms. In SV-COMP 2025, we complement our existing approach (abstraction-aware partial order reduction) for multi-threaded programs with a happens before propagator-based BMC check, expecting a significant increase in performance. We again utilize our portfolio with dynamic algorithm selection from last year, with improvements regarding solver choice and configuration ordering. In this paper, we detail our algorithmic improvements in Theta regarding the verification of concurrent software.\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n SV-COMP’25 Reproduction Report (Competition Contribution).\n \n \n \n \n\n\n \n Bajczi, L.; Ádám, Z.; and Micskei, Z. I.\n\n\n \n\n\n\n
LECTURE NOTES IN COMPUTER SCIENCE, 15698: 187-191. 2025.\n
\n\n
\n\n
\n\n
\n\n \n \n
pdf\n \n \n \n
slides\n \n \n \n
mtmt\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{MTMT:36122888,\n\ttitle = {SV-COMP’25 Reproduction Report (Competition Contribution)},\n\tauthor = {Bajczi, Levente and Ádám, Zsófia and Micskei, Zoltán Imre},\n\tdoi = {10.1007/978-3-031-90660-2_10},\n\tjournal-iso = {LNCS},\n\tjournal = {LECTURE NOTES IN COMPUTER SCIENCE},\n\tvolume = {15698},\n\tunique-id = {36122888},\n\tissn = {0302-9743},\n\tabstract = {The International Competition on Software Verification (SV-COMP) has been an important driver of progress in the formal verification community, fostering tool development, benchmarking, and reproducibility. As the competition grows in scale and complexity, a reproducibility study is essential to evaluate its robustness across environments, uncover hidden dependencies, and ensure long-term sustainability. This work aims to reaffirm the reliability of SV-COMP’s results, provide insights for similar competitions, and facilitate the adoption of its infrastructure beyond the competition. We reproduced the verification and validation results of active participants, including score and ranking calculations for the verification track. We found several problems prohibiting reusability and reproducibility of some participating tools, but we did not find serious issues with the competition infrastructure itself.},\n\tyear = {2025},\n\teissn = {1611-3349},\n\tpages = {187-191},\n\torcid-numbers = {Bajczi, Levente/0000-0002-6551-5860; Ádám, Zsófia/0000-0003-2354-1750; Micskei, Zoltán Imre/0000-0003-1846-261X},\n\n\n url_pdf = {https://leventebajczi.github.io/publications/tacas25repro.pdf},\n\turl_slides = {https://leventebajczi.github.io/publications/slides/tacas25repro.pdf},\n\turl_mtmt = {https://m2.mtmt.hu/api/publication/36122888},\t\n}\n\n\n
\n\n\n
\n The International Competition on Software Verification (SV-COMP) has been an important driver of progress in the formal verification community, fostering tool development, benchmarking, and reproducibility. As the competition grows in scale and complexity, a reproducibility study is essential to evaluate its robustness across environments, uncover hidden dependencies, and ensure long-term sustainability. This work aims to reaffirm the reliability of SV-COMP’s results, provide insights for similar competitions, and facilitate the adoption of its infrastructure beyond the competition. We reproduced the verification and validation results of active participants, including score and ranking calculations for the verification track. We found several problems prohibiting reusability and reproducibility of some participating tools, but we did not find serious issues with the competition infrastructure itself.\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n EmergenTheta: Variations on Symbolic Transition Systems (Competition Contribution).\n \n \n \n \n\n\n \n Mondok, M.; Bajczi, L.; Szekeres, D.; and Molnár, V.\n\n\n \n\n\n\n
LECTURE NOTES IN COMPUTER SCIENCE, 15698: 217-222. 2025.\n
\n\n
\n\n
\n\n
\n\n \n \n
pdf\n \n \n \n
slides\n \n \n \n
mtmt\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{MTMT:36122891,\n\ttitle = {{EmergenTheta: Variations on Symbolic Transition Systems (Competition Contribution)}},\n\tauthor = {Mondok, Milán and Bajczi, Levente and Szekeres, Dániel and Molnár, Vince},\n\tdoi = {10.1007/978-3-031-90660-2_15},\n\tjournal-iso = {LNCS},\n\tjournal = {LECTURE NOTES IN COMPUTER SCIENCE},\n\tvolume = {15698},\n\tunique-id = {36122891},\n\tissn = {0302-9743},\n\tabstract = {EmergenTheta is our sandbox for experimental analyses. After its successful debut in SV-COMP’24, we kept some well-performing but still under-tested configurations, and complemented them with a new saturation algorithm over decision diagrams, and two ways of extending their verification power: wrapping them in a lightweight, counterexample-guided abstraction refinement (CEGAR) loop based on implicit predicate abstraction; and backwards traversal of the state space. All such analyses now rely on a common interface to the underlying symbolic transition system, integrating seamlessly into the existing Theta framework. Using this combination of proven analyses and novel extensions, EmergenTheta outperformed our expectations in SV-COMP’25.},\n\tyear = {2025},\n\teissn = {1611-3349},\n\tpages = {217-222},\n\torcid-numbers = {Mondok, Milán/0000-0001-5396-2172; Bajczi, Levente/0000-0002-6551-5860; Szekeres, Dániel/0000-0002-2912-028X; Molnár, Vince/0000-0002-8204-7595},\n\n url_pdf = {https://leventebajczi.github.io/publications/tacas25etheta.pdf},\n\turl_slides = {https://leventebajczi.github.io/publications/slides/tacas25etheta.pdf},\n\turl_mtmt = {https://m2.mtmt.hu/api/publication/36122891},\t\n}\n\n\n
\n\n\n
\n EmergenTheta is our sandbox for experimental analyses. After its successful debut in SV-COMP’24, we kept some well-performing but still under-tested configurations, and complemented them with a new saturation algorithm over decision diagrams, and two ways of extending their verification power: wrapping them in a lightweight, counterexample-guided abstraction refinement (CEGAR) loop based on implicit predicate abstraction; and backwards traversal of the state space. All such analyses now rely on a common interface to the underlying symbolic transition system, integrating seamlessly into the existing Theta framework. Using this combination of proven analyses and novel extensions, EmergenTheta outperformed our expectations in SV-COMP’25.\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n On Stability in a Happens-Before Propagator for Concurrent Programs (Reproducibility Study).\n \n \n \n \n\n\n \n Bajczi, L.; Telbisz, C. F.; Szekeres, D.; and Vörös, A.\n\n\n \n\n\n\n
LECTURE NOTES IN COMPUTER SCIENCE, 15696: 3-19. 2025.\n
\n\n
\n\n
\n\n
\n\n \n \n
pdf\n \n \n \n
slides\n \n \n \n
mtmt\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{MTMT:36122897,\n\ttitle = {On Stability in a Happens-Before Propagator for Concurrent Programs (Reproducibility Study)},\n\tauthor = {Bajczi, Levente and Telbisz, Csanád Ferenc and Szekeres, Dániel and Vörös, András},\n\tdoi = {10.1007/978-3-031-90643-5_1},\n\tjournal-iso = {LNCS},\n\tjournal = {LECTURE NOTES IN COMPUTER SCIENCE},\n\tvolume = {15696},\n\tunique-id = {36122897},\n\tissn = {0302-9743},\n\tabstract = {Analyzing concurrent programs often involves reasoning about happens-before relations, handled by dedicated SMT theory solvers. Recently, preventative propagation rules have been introduced for consistency models to avoid unnecessary computations. This paper analyses the reproducibility of a recently published paper regarding a conflict-avoiding happens-before propagator. We show that the underlying axioms are insufficient for supporting sequential consistency. We find that the algorithm can leave out constraints on event ordering (even considering the original axioms), impacting the accuracy of verification. We show a simple counterexample to the stability claim in the paper. Two revisions of the algorithm are presented, and a proof on the correctness of these approaches respective of the original axioms is shown. The tool implementing the original algorithm is examined to ascertain how it circumvents wrong results. It is found that it deviates from the published algorithm. We show that an unmodified algorithm (via a patch in the implementing tool) causes incorrect results. We also show that our revised algorithm can be implemented efficiently in an independent verification tool.},\n\tyear = {2025},\n\teissn = {1611-3349},\n\tpages = {3-19},\n\torcid-numbers = {Bajczi, Levente/0000-0002-6551-5860; Telbisz, Csanád Ferenc/0000-0002-6260-5908; Szekeres, Dániel/0000-0002-2912-028X},\n\n url_pdf = {https://leventebajczi.github.io/publications/tacas25ocfix.pdf},\n\turl_slides = {https://leventebajczi.github.io/publications/slides/tacas25ocfix.pdf},\n\turl_mtmt = {https://m2.mtmt.hu/api/publication/36122897},\t\n}\n\n\n
\n\n\n
\n Analyzing concurrent programs often involves reasoning about happens-before relations, handled by dedicated SMT theory solvers. Recently, preventative propagation rules have been introduced for consistency models to avoid unnecessary computations. This paper analyses the reproducibility of a recently published paper regarding a conflict-avoiding happens-before propagator. We show that the underlying axioms are insufficient for supporting sequential consistency. We find that the algorithm can leave out constraints on event ordering (even considering the original axioms), impacting the accuracy of verification. We show a simple counterexample to the stability claim in the paper. Two revisions of the algorithm are presented, and a proof on the correctness of these approaches respective of the original axioms is shown. The tool implementing the original algorithm is examined to ascertain how it circumvents wrong results. It is found that it deviates from the published algorithm. We show that an unmodified algorithm (via a patch in the implementing tool) causes incorrect results. We also show that our revised algorithm can be implemented efficiently in an independent verification tool.\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Giving Some Pointers for Abstraction-Based Model Checking.\n \n \n \n \n\n\n \n Bajczi, L.; Szekeres, D.; Telbisz, C. F.; and Molnár, V.\n\n\n \n\n\n\n In
Proceedings of the 32nd Minisymposium, pages 5-9, 2025. \n
\n\n
\n\n
\n\n
\n\n \n \n
pdf\n \n \n \n
slides\n \n \n \n
mtmt\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{MTMT:36176199,\n\ttitle = {Giving Some Pointers for Abstraction-Based Model Checking},\n\tauthor = {Bajczi, Levente and Szekeres, Dániel and Telbisz, Csanád Ferenc and Molnár, Vince},\n\tbooktitle = {Proceedings of the 32nd Minisymposium},\n\tdoi = {10.3311/MINISY2025-002},\n\tunique-id = {36176199},\n\tabstract = {Abstraction-based software model checkers often rely on external analyses or unbounded SMT arrays to reason about pointers, arrays, and dynamic heap manipulation. External analyses are precise but often require the modification of existing verification algorithms, while SMT arrays provide a native solution for solver-based verifiers but require strict type safety often forgone in real-world programs. We propose a novel way of integrating a precise pointer and array analysis as a plug-in for abstraction-based model checking, which does not require the modification of the underlying algorithms. Our solution keeps track of arbitrary predicates over potentially abstract memory locations, moving toward more efficient verification of software code by allowing a fine-grained and precise abstraction of memory accesses.},\n\tyear = {2025},\n\tpages = {5-9},\n\torcid-numbers = {Bajczi, Levente/0000-0002-6551-5860; Szekeres, Dániel/0000-0002-2912-028X; Telbisz, Csanád Ferenc/0000-0002-6260-5908; Molnár, Vince/0000-0002-8204-7595},\n\n\turl_pdf = {https://leventebajczi.github.io/publications/minisy25ptr.pdf},\n\turl_slides = {https://leventebajczi.github.io/publications/slides/minisy25ptr.pdf},\n\turl_mtmt = {https://m2.mtmt.hu/api/publication/36176199},\n}\n\n\n
\n\n\n
\n Abstraction-based software model checkers often rely on external analyses or unbounded SMT arrays to reason about pointers, arrays, and dynamic heap manipulation. External analyses are precise but often require the modification of existing verification algorithms, while SMT arrays provide a native solution for solver-based verifiers but require strict type safety often forgone in real-world programs. We propose a novel way of integrating a precise pointer and array analysis as a plug-in for abstraction-based model checking, which does not require the modification of the underlying algorithms. Our solution keeps track of arbitrary predicates over potentially abstract memory locations, moving toward more efficient verification of software code by allowing a fine-grained and precise abstraction of memory accesses.\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Theta as a Horn Solver.\n \n \n \n \n\n\n \n Bajczi, L.; Mondok, M.; and Molnár, V.\n\n\n \n\n\n\n
ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 434: 27-39. 2025.\n
\n\n
\n\n
\n\n
\n\n \n \n
pdf\n \n \n \n
slides\n \n \n \n
mtmt\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{MTMT:36427979,\n\ttitle = {Theta as a Horn Solver},\n\tauthor = {Bajczi, Levente and Mondok, Milán and Molnár, Vince},\n\tdoi = {10.4204/EPTCS.434.5},\n\tjournal-iso = {ELECTRON PROC THEOR COMPUT SCI},\n\tjournal = {ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE},\n\tvolume = {434},\n\tunique-id = {36427979},\n\tabstract = {THETA is a verification framework that has participated in the CHC-COMP competition since 2023. While its core approach – based on transforming constrained Horn clauses (CHCs) into control-flow automata (CFAs) for analysis – has remained mostly unchanged, THETA’s verification techniques, design trade-offs, and limitations have remained mostly unexplored in the context of CHCs. This paper fills that gap: we provide a detailed description of the algorithms employed by Theta, highlighting the unique features that distinguish it from other CHC solvers. We also analyze the strengths and weaknesses of the tool in the context of CHC-COMP benchmarks. Notably, in the 2025 edition of the competition, Theta’s performance was impacted by a configuration issue, leading to suboptimal results. To provide a clearer picture of Theta’s actual capabilities, we re-execute the tool on the competition benchmarks under corrected settings and report on the resulting performance. © Bajczi et al.},\n\tyear = {2025},\n\teissn = {2075-2180},\n\tpages = {27-39},\n\torcid-numbers = {Bajczi, Levente/0000-0002-6551-5860; Mondok, Milán/0000-0001-5396-2172; Molnár, Vince/0000-0002-8204-7595},\n\n\turl_pdf = {https://leventebajczi.github.io/publications/hcvs25theta.pdf},\n\turl_slides = {https://leventebajczi.github.io/publications/slides/hcvs25theta.pdf},\n\turl_mtmt = {https://m2.mtmt.hu/api/publication/36427979},\n}\n\n\n
\n\n\n
\n THETA is a verification framework that has participated in the CHC-COMP competition since 2023. While its core approach – based on transforming constrained Horn clauses (CHCs) into control-flow automata (CFAs) for analysis – has remained mostly unchanged, THETA’s verification techniques, design trade-offs, and limitations have remained mostly unexplored in the context of CHCs. This paper fills that gap: we provide a detailed description of the algorithms employed by Theta, highlighting the unique features that distinguish it from other CHC solvers. We also analyze the strengths and weaknesses of the tool in the context of CHC-COMP benchmarks. Notably, in the 2025 edition of the competition, Theta’s performance was impacted by a configuration issue, leading to suboptimal results. To provide a clearer picture of Theta’s actual capabilities, we re-execute the tool on the competition benchmarks under corrected settings and report on the resulting performance. © Bajczi et al.\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n CHCVerif: A Portfolio-Based Solver for Constrained Horn Clauses.\n \n \n \n \n\n\n \n Dobos-Kovács, M.; Bajczi, L.; and Vörös, A.\n\n\n \n\n\n\n
ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 434: 40-51. 2025.\n
\n\n
\n\n
\n\n
\n\n \n \n
pdf\n \n \n \n
slides\n \n \n \n
mtmt\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{MTMT:36429902,\n\ttitle = {CHCVerif: A Portfolio-Based Solver for Constrained Horn Clauses},\n\tauthor = {Dobos-Kovács, Mihály and Bajczi, Levente and Vörös, András},\n\tdoi = {10.4204/EPTCS.434.6},\n\tjournal-iso = {ELECTRON PROC THEOR COMPUT SCI},\n\tjournal = {ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE},\n\tvolume = {434},\n\tunique-id = {36429902},\n\tabstract = {Constrained Horn Clauses (CHCs) are widely adopted as intermediate representations for a variety of verification tasks, including safety checking, invariant synthesis, and inter procedural analysis. This paper introduces CHCVERIF, a portfolio-based CHC solver that adopts a software verification approach for solving CHCs. This approach enables us to reuse mature software verification tools to tackle CHC benchmarks, particularly those involving bitvectors and low-level semantics. Our evaluation shows that while the method enjoys only moderate success with linear integer arithmetic, it achieves modest success on bitvector benchmarks. Moreover, our results demonstrate the viability and potential of using software verification tools as backends for CHC solving, particularly when supported by a carefully constructed portfolio. © Dobos-Kovács et al.},\n\tyear = {2025},\n\teissn = {2075-2180},\n\tpages = {40-51},\n\torcid-numbers = {Dobos-Kovács, Mihály/0000-0002-0064-2965; Bajczi, Levente/0000-0002-6551-5860},\n\n\turl_pdf = {https://leventebajczi.github.io/publications/hcvs25chcverif.pdf},\n\turl_slides = {https://leventebajczi.github.io/publications/slides/hcvs25chcverif.pdf},\n\turl_mtmt = {https://m2.mtmt.hu/api/publication/36429902},\n}\n\n\n
\n\n\n
\n Constrained Horn Clauses (CHCs) are widely adopted as intermediate representations for a variety of verification tasks, including safety checking, invariant synthesis, and inter procedural analysis. This paper introduces CHCVERIF, a portfolio-based CHC solver that adopts a software verification approach for solving CHCs. This approach enables us to reuse mature software verification tools to tackle CHC benchmarks, particularly those involving bitvectors and low-level semantics. Our evaluation shows that while the method enjoys only moderate success with linear integer arithmetic, it achieves modest success on bitvector benchmarks. Moreover, our results demonstrate the viability and potential of using software verification tools as backends for CHC solving, particularly when supported by a carefully constructed portfolio. © Dobos-Kovács et al.\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Reasoning with Happens-Before Relations About Concurrent Programs in the THETA Framework.\n \n \n \n \n\n\n \n Telbisz, C. F.; Bajczi, L.; Szekeres, D.; Vörös, A.; and Majzik, I.\n\n\n \n\n\n\n In
2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), pages 43-46, 2025. \n
\n\n
\n\n
\n\n
\n\n \n \n
pdf\n \n \n \n
slides\n \n \n \n
mtmt\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{MTMT:36267184,\n\ttitle = {Reasoning with Happens-Before Relations About Concurrent Programs in the THETA Framework},\n\tauthor = {Telbisz, Csanád Ferenc and Bajczi, Levente and Szekeres, Dániel and Vörös, András and Majzik, István},\n\tbooktitle = {2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)},\n\tdoi = {10.1109/DSN-W65791.2025.00037},\n\tunique-id = {36267184},\n\tabstract = {The model checking of multi-threaded programs often involves reasoning about the happens-before relation of concurrent program instructions. Several algorithms exist for finding a partial order of instructions that is consistent with ordering constraints of the assumed memory model and that violates a safety property; or for proving that such partial orders do not exist. We present existing and novel bounded model checking approaches reasoning with happens-before relations of concurrent programs. These algorithms are implemented in THETA, a modular model checking framework. We also give a comparative evaluation of our THETA implementations and state-of-the-art verifiers.},\n\tyear = {2025},\n\tpages = {43-46},\n\torcid-numbers = {Telbisz, Csanád Ferenc/0000-0002-6260-5908; Bajczi, Levente/0000-0002-6551-5860; Szekeres, Dániel/0000-0002-2912-028X},\n\n\turl_pdf = {https://leventebajczi.github.io/publications/verdi25oc.pdf},\n\turl_slides = {https://leventebajczi.github.io/publications/slides/verdi25oc.pdf},\n\turl_mtmt = {https://m2.mtmt.hu/api/publication/36267184},\n}\n\n\n
\n\n\n
\n The model checking of multi-threaded programs often involves reasoning about the happens-before relation of concurrent program instructions. Several algorithms exist for finding a partial order of instructions that is consistent with ordering constraints of the assumed memory model and that violates a safety property; or for proving that such partial orders do not exist. We present existing and novel bounded model checking approaches reasoning with happens-before relations of concurrent programs. These algorithms are implemented in THETA, a modular model checking framework. We also give a comparative evaluation of our THETA implementations and state-of-the-art verifiers.\n
\n\n\n
\n\n\n
\n\n\n\n\n\n