Semantics and application to program verification

Static analysis project


The goal of the project is to implement a small static analyzer by abstract interpretation for a simple language.

The analyzer will be based on the same numeric abstract domains as the ones seen in the course and lab sessions. But, it will compute the abstract semantics using a different iteration method. In the project, the program is first converted into a control-flow graph by a front-end. Then, abstract values corresponding to sets of possible memory environments are attached to graph nodes (program locations) and propagated along the graph arcs (program instructions) until stabilization. This makes it easy to support non-structured control-flow (such as gotos) as well as inter-procedural analysis.

The analyzer comprises three parts:

See also the presentation slides for the project.

Expected work

The project comprises a set of core features that you are required to implement, described in part 2 below. In addition, you have to select and implement at least one of the extensions proposed in part 3 below. You may implement additional extensions if you wish. However, if you wish to implement your own extension instead of the proposed ones, you must discuss it first with the teachers.

You can work on the project alone, or in groups of 2 persons. In the later case, we are naturally expecting to see more features in your analyzer (such as several extensions).

You should send the result of your project by email to the teachers. It should comprise:

The analyzer itself, when built with make, is expected to be a stand-alone program that takes as argument a source file containing a main function, analyzes it (including the initialization code and the body of the main function), and outputs:

1 - Language and front-end

The language syntax is a simple subset of C, a description of the syntax is available.

Please download the sources of the front-end.

The front-end works as follows:

The file shows how to parse a file, translate it into a graph, and print the resulting graph. By typing make, you get a program that takes as argument a source file and that outputs information about the graph as well as a graph file.

Please read the description of the control-flow graph data-structure. The data-structure is defined in the file In the following, you will only need to manipulate control-flow graphs; hence, most of can be ignored (only the definition of the operators is reused in

2 - Core features


You must implement an iterator, able to traverse the control-flow graph and compute an abstract information at each node. Note that you don't need to support procedure calls as a core feature: this is one of several possible extensions. However, you must support arbitrary gotos, inclusing backward gotos (which can be used to disguise loops).

The iterator should be generic in the choice of the abstract domain: i.e., a functor parameterized by a module obeying the DOMAIN signature discussed below. Make sure that your iterator always terminates (employing widening if needed).


We suggest employing a classic worklist algorithm, which maintains a map from nodes to abstract values as well as a set of nodes to update. At each step, a node is extracted from the worklist and updated. The update consists in:

Other iteration algorithms exist, in particular those proposed by François Bourdoncle.

In case of loops or backward gotos, the control-flow graph will have cycles, causing the same nodes to be considered many times. In order for the algorithm to finish in finite time and be efficient in practice, you will need to apply widening at selected widening points to enforce convergence. It is sufficient that any cycle in the control-flow graph has at least one node where widening is applied. You can for instance select as widening nodes all loop heads and the destination of backward gotos.

Abstract domains

You must implement at least two numeric abstract domains seen in the course:


In order to test your iterator before you design your abstract domains, you can start by implementing a concrete domain first as we did in the practical sessions, i.e., a domain manipulating sets of program environments without any abstraction. Note that, in this case, the analyzer may not always terminate. The concrete interpretation is optional.

The file proposes a signature DOMAIN for abstract (or concrete) domains. In particular:

We suggest that you first program abstract domains able to abstract sets of integers (e.g., a single interval), following the signature VALUE_DOMAIN in An abstract environment is then:

The VALUE_DOMAIN signature suggests defining operators unary and binary to evaluate, in the abstract, the effect of various numeric operators, such as addition, multiplication, etc. They can be directly used to implement assign required by DOMAIN. This is simply a generalization of interval arithmetic to arbitrary, non-necessarily interval, abstractions of sets of values. You are required to support all 5 operations +, -, *, /, % in assignments in a precise way (i.e., don't always return the top element).

Modeling a guard is more difficult: given the expected result of the operator, such as the fact that x<y is true, we must use this information to refine the information we have on the variables x and y. This is the purpose of the compare operation in the sigature VALUE_DOMAIN. More precisely, compare x y op r returns a pair x',y' of abstract environments that refine the arguments x and y: x' abstracts the subset of integer values i from x such that there exists a value j in y satisfying i op j; and likewise for y'. In case of more complex expressions, featuring arithmetic operators, such as x+y<z, once an abstract information on the value of x+y is deduced from the fact that it is smaller than z, the information must be propagated to derive information on x and y. This is the role of the bwd_unary and bwd_binary operators. For instance, similarly to compare, bwd_binary x y op r returns a pair of abstract environments x',y' that refine the argument x, y: x' abstracts the subset of values i from x such that, for some value j in y, i op j is in r; and likewise for y'. The full algorithm on an arbitrary expression works in two phases: it first annotates the expression tree by bottom-up evaluation (from leaves to root) using unary and binary; and then refines the values by top-down propagation (from root to leaves) using bwd_unary and bwd_binary. The algorithm is actually a standard constraint programming algorithm known as HC4-revise; it is described in this article (see Algorithms 2, 3 and 4). As the guards are more complex, you are only required to support +, -, and * in a precise way. For other operators, you can soundly set x',y' to x,y (i.e., no refinement). However, you are required to support all the boolean operators !, &&, || in guards.

As hinted above, the implementation of a DOMAIN for constants and for intervals can be derived in a generic way from that of a VALUE_DOMAIN. We thus suggest to implement a functor taking a VALUE_DOMAIN module as argument and returning a VALUE module, and program separately an instance of VALUE_DOMAIN implementing constants and another one representing intervals.

3 - Extensions

You must implement at least one of the following extensions.

Backward analysis

The analysis considered in part 2 is forward: given the memory environment at the beginning of the program, an abstraction of the environments reachable during program execution is computed. The analysis outputs a map from graph nodes to abstract invariants. A backward analysis starts form this map, and considers some target location in the middle of the program and a target abstract environment. It then traces backward the program execution from the target location to refine the result of the forward analysis by only considering executions that will reach the target location with the target environment.

In this extension, we target the environments that do not satisfy an assertion. The analysis will thus help discovering which program executions cause the assertion to fail. You should provide examples illustrating how your backward analysis achieves this.


Building a backward analysis requires two changes with respect to a forward analysis:

Inter-procedural analysis

This extension consists in implementing the support for function calls.

To simplify, you can assume that there are not recursive calls. Hence, at any point of the execution, there exists at most a single instance of each local variable and formal function argument (as opposed to a stack of such variables, required to implement recursivity). This is compatible with the way programs are translated into graphs in the front-end: all variables and function arguments are considered as global variables. Supporting recursivity is more complex and requires some changes to the front-end.

You should provide a few examples and discuss the results of your analysis on these examples.


We suggest implementing a simple inter-procedural analysis where abstract environments flow from call sites (source nodes of a call instruction arc) to the entry node of the called function, and back from the exit node of the called function to the return site (destination nodes of a call instruction arc).

Polyhedral analysis

This extension requires you to implement an analysis using the polyhedra abstract domain. You will use the Apron library that already implements all the polyhedral abstract operators, and use to implement a module obeying the DOMAIN signature that can be plugged into your iterator (you are not asked to reimplement polyhedral operators yourself).

Relational analyses such as polyhedra are especially useful in the presence of loops, where a relational invariant must be found (which is not possible with non-relational domains such as intervals). You should provide a few examples illustrating this point and discuss the results of your analysis on these examples, comparing in particular the polyhedral and interval analyses.

Disjunctive analysis

This extension requires you to implement an abstract domain functor able to represent disjunctions of abstract elements of a base domain, for instance, associate several intervals to a variable. This is especially useful to avoid loosing precision at control-flow joins, and to represent non-convex invariants. We will see in the course several ways to design a disjunctive domain, and you can choose whichever way you wish (disjunctive completion, state partitioning, trace partitioning).

Resources and Bibliography



On the HC4-revise algorithm used to implement abstract guards:

On backwards analysis:

On polyhedral analyses and Apron:

On disjunctive analyses:

Author: Antoine Miné