Scalable Bit-Blasting with Abstractions

Aina Niemetz, Mathias Preiner, Yoni Zohar

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The dominant state-of-the-art approach for solving bit-vector formulas in Satisfiability Modulo Theories (SMT) is bit-blasting, an eager reduction to propositional logic. Bit-blasting is surprisingly efficient in practice but does not generally scale well with increasing bit-widths, especially when bit-vector arithmetic is present. In this paper, we present a novel CEGAR-style abstraction-refinement procedure for the theory of fixed-size bit-vectors that significantly improves the scalability of bit-blasting. We provide lemma schemes for various arithmetic bit-vector operators and an abduction-based framework for synthesizing refinement lemmas. We extended the state-of-the-art SMT solver Bitwuzla with our abstraction-refinement approach and show that it significantly improves solver performance on a variety of benchmark sets, including industrial benchmarks that arise from smart contract verification.

Original languageEnglish
Title of host publicationComputer Aided Verification - 36th International Conference, CAV 2024, Proceedings
EditorsArie Gurfinkel, Vijay Ganesh
PublisherSpringer Science and Business Media Deutschland GmbH
Pages178-200
Number of pages23
ISBN (Print)9783031656262
DOIs
StatePublished - 2024
Event36th International Conference on Computer Aided Verification, CAV 2024 - Montreal, Canada
Duration: 24 Jul 202427 Jul 2024

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume14681 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference36th International Conference on Computer Aided Verification, CAV 2024
Country/TerritoryCanada
CityMontreal
Period24/07/2427/07/24

Bibliographical note

Publisher Copyright:
© The Author(s) 2024.

Fingerprint

Dive into the research topics of 'Scalable Bit-Blasting with Abstractions'. Together they form a unique fingerprint.

Cite this