Benchmark Verification Tasks

All verification tasks are available for web browsing and for download via the following Git repository: (for SV-COMP 2025 visit the tag 'svcomp25'): https://gitlab.com/sosy-lab/benchmarking/sv-benchmarks

This edition of the competition on software verification is based on the following categories of verification tasks. The verification tasks were contributed by several research and development groups. After the submission deadline for verification tasks, a group of people (organizer and participants) were working on improving the quality of the verification tasks. That means that after the sets were made public, some programs were removed (not qualified, no property encoded, unknown architecture), and some programs got technically improved (CIL simplifications, compiler warnings, memory model). These changes have improved the overall quality of the final set of programs for the competition, and have not changed the intended verification result; all changes are tracked in the public repository.
Thanks to all participants who contributed programs, sent patches, and commented on the sets.

As announced in the rules and definitions, the verification tasks are not necessarily preprocessed with CIL (which was a restriction for the first SV-COMP). For each verification task, we specify whether it assume a 32-bit or a 64-bit architecture.

For illustration, a structured overview (2025) shows the categories below. Rankings will be provided for the first- and second-level categories, and FalsificationOverall, which is not shown in the figure.

The authorative definition of the category structure (from which this web page is generated) is maintained in the repository for the benchmark definitions (https://gitlab.com/sosy-lab/sv-comp/bench-defs).

1. C.ReachSafety

unreach-call

The verification tasks consist of the programs that match

with the specification:


  

unreach-call

The verification tasks consist of the programs that match

with the specification:


  

unreach-call

The verification tasks consist of the programs that match

with the specification:


  

unreach-call

The verification tasks consist of the programs that match

with the specification:


  

unreach-call

The verification tasks consist of the programs that match

with the specification:


  

unreach-call

The verification tasks consist of the programs that match

with the specification:


  

unreach-call

The verification tasks consist of the programs that match

with the specification:


  

unreach-call

The verification tasks consist of the programs that match

with the specification:


  

unreach-call

The verification tasks consist of the programs that match

with the specification:


  

unreach-call

The verification tasks consist of the programs that match

with the specification:


  

unreach-call

The verification tasks consist of the programs that match

with the specification:


  

unreach-call

The verification tasks consist of the programs that match

with the specification:


  

unreach-call

The verification tasks consist of the programs that match

with the specification:


  

unreach-call

The verification tasks consist of the programs that match

with the specification:



2. C.MemSafety

valid-memcleanup

The verification tasks consist of the programs that match

with the specification:


  

valid-memsafety

The verification tasks consist of the programs that match

with the specification:


  

valid-memsafety

The verification tasks consist of the programs that match

with the specification:


  

valid-memsafety

The verification tasks consist of the programs that match

with the specification:


  

valid-memsafety

The verification tasks consist of the programs that match

with the specification:


  

valid-memsafety

The verification tasks consist of the programs that match

with the specification:



3. C.Concurrency

no-data-race

The verification tasks consist of the programs that match

with the specification:


  

no-overflow

The verification tasks consist of the programs that match

with the specification:


  

unreach-call

The verification tasks consist of the programs that match

with the specification:


  

valid-memsafety

The verification tasks consist of the programs that match

with the specification:



4. C.NoOverflows

no-overflow

The verification tasks consist of the programs that match

with the specification:


  

no-overflow

The verification tasks consist of the programs that match

with the specification:



5. C.Termination

termination

The verification tasks consist of the programs that match

with the specification:


  

termination

The verification tasks consist of the programs that match

with the specification:


  

termination

The verification tasks consist of the programs that match

with the specification:


  

termination

The verification tasks consist of the programs that match

with the specification:



6. C.SoftwareSystems

This category consists of several sets of verification tasks. Each of these sets is an own sub-category. While the categories above are collections of rather `academic', or synthesized, example verification tasks, this category aims to represent verification tasks from real software systems.

no-overflow

The verification tasks consist of the programs that match

with the specification:


  

no-overflow

The verification tasks consist of the programs that match

with the specification:


  

no-overflow

The verification tasks consist of the programs that match

with the specification:


  

termination

The verification tasks consist of the programs that match

with the specification:


  

unreach-call

The verification tasks consist of the programs that match

with the specification:


  

unreach-call

The verification tasks consist of the programs that match

with the specification:


  

unreach-call

The verification tasks consist of the programs that match

with the specification:


  

unreach-call

The verification tasks consist of the programs that match

with the specification:


  

unreach-call

The verification tasks consist of the programs that match

with the specification:


  

unreach-call

The verification tasks consist of the programs that match

with the specification:


  

valid-memcleanup

The verification tasks consist of the programs that match

with the specification:


  

valid-memsafety

The verification tasks consist of the programs that match

with the specification:


  

valid-memsafety

The verification tasks consist of the programs that match

with the specification:


  

valid-memsafety

The verification tasks consist of the programs that match

with the specification:


  

valid-memsafety

The verification tasks consist of the programs that match

with the specification:



7. C.ValidationCrafted

This category contains validation tasks that were crafted to test certain features of validators.

unreach-call

The verification tasks consist of the programs that match

with the specification:


  

unreach-call

The verification tasks consist of the programs that match

with the specification:


  

termination

The verification tasks consist of the programs that match

with the specification:



8. C.Overall

The category C.Overall contains all verification tasks of all above categories. Each above-mentioned main category is an own sub-category in category C.Overall. (The weighting schema is explained on the rules page.)

ReachSafety

The verification tasks consist of the programs that match

with the specification:


  

MemSafety

The verification tasks consist of the programs that match

with the specification:


  

Concurrency

The verification tasks consist of the programs that match

with the specification:


  

NoOverflows

The verification tasks consist of the programs that match

with the specification:


  

Termination

The verification tasks consist of the programs that match

with the specification:


  

SoftwareSystems

The verification tasks consist of the programs that match

with the specification:


  

ValidationCrafted

The verification tasks consist of the programs that match

with the specification:



9. C.FalseOverall

The category C.FalseOverall consists of all verification tasks and the results "correct TRUE" and "incorrect TRUE" are not counted. (The weighting schema is the same as for C.Overall.)

ReachSafety

The verification tasks consist of the programs that match

with the specification:


  

MemSafety

The verification tasks consist of the programs that match

with the specification:


  

Concurrency

The verification tasks consist of the programs that match

with the specification:


  

NoOverflows

The verification tasks consist of the programs that match

with the specification:


  

Termination

The verification tasks consist of the programs that match

with the specification:


  

SoftwareSystems

The verification tasks consist of the programs that match

with the specification:



10. C.TrueOverall

The category C.TrueOverall consists of all verification tasks and the results "correct FALSE" and "incorrect FALSE" are not counted. (The weighting schema is the same as for C.Overall.)

ReachSafety

The verification tasks consist of the programs that match

with the specification:


  

MemSafety

The verification tasks consist of the programs that match

with the specification:


  

Concurrency

The verification tasks consist of the programs that match

with the specification:


  

NoOverflows

The verification tasks consist of the programs that match

with the specification:


  

Termination

The verification tasks consist of the programs that match

with the specification:


  

SoftwareSystems

The verification tasks consist of the programs that match

with the specification:



11. C.Huawei-Concurrency-Challenges

no-data-race

The verification tasks consist of the programs that match

with the specification:


  

no-overflow

The verification tasks consist of the programs that match

with the specification:


  

unreach-call

The verification tasks consist of the programs that match

with the specification:


  

valid-memsafety

The verification tasks consist of the programs that match

with the specification:



12. Java.Overall

no-runtime-exception

The verification tasks consist of the programs that match

with the specification:


  

valid-assert

The verification tasks consist of the programs that match

with the specification: