Infeasible code detection

Cristiano Bertolini*, Martin Schäf, Pascal Schweitzer

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Citations (Scopus)

    Abstract

    A piece of code in a computer program is infeasible if it cannot be part of any normally-terminating execution of the program. We develop an algorithm for the automatic detection of all infeasible code in a program. We first translate the task of determining all infeasible code into the problem of finding all statements that can be covered by a feasible path. We prove that in order to identify all coverable statements, it is sufficient to find all coverable statements within a certain minimal subset. For this, our algorithm repeatedly queries an oracle, asking for the infeasibility of specific sets of control-flow paths. We present a sound implementation of the proposed algorithm on top of the Boogie program verifier utilizing a theorem prover to provide the oracle required by the algorithm. We show experimentally a drastic decrease in the number of theorem prover queries compared to existing approaches, resulting in an overall speedup of the entire computation.

    Original languageEnglish
    Title of host publicationVerified Software
    Subtitle of host publicationTheories, Tools, Experiments - 4th International Conference, VSTTE 2012, Proceedings
    Pages310-325
    Number of pages16
    DOIs
    Publication statusPublished - 2012
    Event4th International Conference on Verified Software: Theories, Tool and Experiments, VSTTE 2012 - Philadelphia, PA, United States
    Duration: 28 Jan 201229 Jan 2012

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume7152 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference4th International Conference on Verified Software: Theories, Tool and Experiments, VSTTE 2012
    Country/TerritoryUnited States
    CityPhiladelphia, PA
    Period28/01/1229/01/12

    Fingerprint

    Dive into the research topics of 'Infeasible code detection'. Together they form a unique fingerprint.

    Cite this