{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T23:06:13Z","timestamp":1765667173615,"version":"3.41.0"},"reference-count":57,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2017,4,30]],"date-time":"2017-04-30T00:00:00Z","timestamp":1493510400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Austrian Science Fund (FWF) international project","award":["I963"],"award-info":[{"award-number":["I963"]}]},{"name":"Marie Sk\u0142odowska-Curie action \u201cHORIP\u201d","award":["H2020-MSCA-IF-2014, 658162"],"award-info":[{"award-number":["H2020-MSCA-IF-2014, 658162"]}]},{"name":"Nagoya University's Graduate Program for Real-World Data Circulation Leaders from MEXT, Japan"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput. Logic"],"published-print":{"date-parts":[[2017,4,30]]},"abstract":"<jats:p>This article aims to develop a verification method for procedural programs via a transformation into logically constrained term rewriting systems (LCTRSs). To this end, we extend transformation methods based on integer term rewriting systems to handle arbitrary data types, global variables, function calls, and arrays, and to encode safety checks. Then we adapt existing rewriting induction methods to LCTRSs and propose a simple yet effective method to generalize equations. We show that we can automatically verify memory safety and prove correctness of realistic functions. Our approach proves equivalence between two implementations; thus, in contrast to other works, we do not require an explicit specification in a separate specification language.<\/jats:p>","DOI":"10.1145\/3060143","type":"journal-article","created":{"date-parts":[[2017,6,5]],"date-time":"2017-06-05T12:50:00Z","timestamp":1496667000000},"page":"1-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Verifying Procedural Programs via Constrained Rewriting Induction"],"prefix":"10.1145","volume":"18","author":[{"given":"Carsten","family":"Fuhs","sequence":"first","affiliation":[{"name":"Birkbeck, University of London, London, United Kingdom"}]},{"given":"Cynthia","family":"Kop","sequence":"additional","affiliation":[{"name":"University of Innsbruck and University of Copenhagen, K\u00f8benhavn, S, Denmark"}]},{"given":"Naoki","family":"Nishida","sequence":"additional","affiliation":[{"name":"Nagoya University, Nagoya, Japan"}]}],"member":"320","published-online":{"date-parts":[[2017,6,2]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1363686.1363779"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69611-7_8"},{"volume-title":"Proceedings of the 2003 WCRE Conference (WCRE\u201903)","year":"2003","author":"Alias Christophe","key":"e_1_2_1_3_1"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1471068406002869"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(79)90034-3"},{"volume-title":"Term Rewriting and All That","author":"Baader Franz","key":"e_1_2_1_6_1"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0960129511000193"},{"volume-title":"Proceedings of the 1992 CADE Conference (CADE\u201992)","author":"David","key":"e_1_2_1_8_1"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/FMCAD.2009.5351147"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1006\/jsco.1996.0076"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71070-7_44"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49674-9_22"},{"volume-title":"Handbook of Automated Reasoning","author":"Bundy Alan","key":"e_1_2_1_14_1"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511543326"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(93)90079-Q"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17524-9_1"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02959-2_22"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31365-3_20"},{"volume-title":"Proceedings of the 2011 RTA Conference (RTA\u201911)","year":"2011","author":"Falke Stephan","key":"e_1_2_1_22_1"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642987"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02348-4_3"},{"key":"e_1_2_1_25_1","first-page":"100","article-title":"Approach to procedural-program verification based on implicit induction of constrained term rewriting systems","volume":"1","author":"Furuichi Yuki","year":"2008","journal-title":"IPSJ Transactions on Programming"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-016-9388-y"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlap.2006.11.001"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00236-008-0075-2"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1472"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1926385.1926424"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38574-2_20"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(82)90006-X"},{"volume-title":"Logic in Computer Science: Modelling and Reasoning About Systems","author":"Huth Michael","key":"e_1_2_1_33_1"},{"volume-title":"Proceedings of the 2003 TPHOLs Conference (TPHOLs\u201903)","author":"Kapur Deepak","key":"e_1_2_1_34_1"},{"volume-title":"Proceedings of the 1996 CADE Conference (CADE\u201996)","year":"1996","author":"Kapur Deepak","key":"e_1_2_1_35_1"},{"key":"e_1_2_1_36_1","first-page":"1","article-title":"Comparison between inductionless induction and rewriting induction","volume":"17","author":"Koike Hirotaka","year":"2000","journal-title":"Computer Software"},{"volume-title":"Proceedings of the 2013 WST Conference (WST\u201913)","year":"2013","author":"Kop Cynthia","key":"e_1_2_1_37_1"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40885-4_24"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12736-1_18"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48899-7_38"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542513"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31424-7_54"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-015-0366-1"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/367177.367199"},{"key":"e_1_2_1_46_1","first-page":"173","article-title":"Lemma generation method in rewriting induction for constrained term rewriting systems","volume":"28","author":"Nakabayashi Naoki","year":"2010","journal-title":"Computer Software"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349314"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217856.1217859"},{"volume-title":"Proceedings of the 2010 RTA Conference (RTA\u201910)","year":"2010","author":"Otto Carsten","key":"e_1_2_1_49_1"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/646482.691453"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/648229.752322"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032603.2032616"},{"key":"e_1_2_1_53_1","first-page":"80","article-title":"Rewriting induction for constrained term rewriting systems","volume":"2","author":"Sakata Tsubasa","year":"2009","journal-title":"IPSJ Transactions on Programming"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.11.019"},{"volume-title":"Competition on Software Verification. Retrieved","year":"2017","author":"SV-COMP.","key":"e_1_2_1_55_1"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/11547662_24"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2004.05.022"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2362389.2362390"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.12.005"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622737.1622747"}],"container-title":["ACM Transactions on Computational Logic"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3060143","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3060143","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:19Z","timestamp":1750215799000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3060143"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,30]]},"references-count":57,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,4,30]]}},"alternative-id":["10.1145\/3060143"],"URL":"https:\/\/doi.org\/10.1145\/3060143","relation":{},"ISSN":["1529-3785","1557-945X"],"issn-type":[{"type":"print","value":"1529-3785"},{"type":"electronic","value":"1557-945X"}],"subject":[],"published":{"date-parts":[[2017,4,30]]},"assertion":[{"value":"2015-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-06-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}