{ETHBMC}: A bounded model checker for smart contracts

J Frank, C Aschermann, T Holz - 29th USENIX Security Symposium …, 2020 - usenix.org
The introduction of smart contracts has significantly advanced the state-of-the-art in
cryptocurrencies. Smart contracts are programs who live on the blockchain, governing the …

Jasmin: High-assurance and high-speed cryptography

JB Almeida, M Barbosa, G Barthe, A Blot… - Proceedings of the …, 2017 - dl.acm.org
Jasmin is a framework for develo** high-speed and high-assurance cryptographic
software. The framework is structured around the Jasmin programming language and its …

{Push-Button} Verification of File Systems via Crash Refinement

H Sigurbjarnarson, J Bornholt, E Torlak… - 12th USENIX Symposium …, 2016 - usenix.org
The file system is an essential operating system component for persisting data on storage
devices. Writing bug-free file systems is non-trivial, as they must correctly implement and …

Binsec/rel: Efficient relational symbolic execution for constant-time at binary-level

LA Daniel, S Bardin, T Rezk - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The constant-time programming discipline (CT) is an efficient countermeasure against timing
side-channel attacks, requiring the control flow and the memory accesses to be independent …

Btor2 , BtorMC and Boolector 3.0

A Niemetz, M Preiner, C Wolf, A Biere - International Conference on …, 2018 - Springer
We describe Btor2, a word-level model checking format for capturing models of hardware
and potentially software in a bit-precise manner. This simple, line-based and easy to parse …

Learning to solve SMT formulas

M Balunovic, P Bielik, M Vechev - Advances in Neural …, 2018 - proceedings.neurips.cc
We present a new approach for learning to solve SMT formulas. We phrase the challenge of
solving SMT formulas as a tree search problem where at each step a transformation is …

Mind the gap-A closer look at the security of block ciphers against differential cryptanalysis

R Ankele, S Kölbl - International Conference on Selected Areas in …, 2018 - Springer
Resistance against differential cryptanalysis is an important design criteria for any modern
block cipher and most designs rely on finding some upper bound on probability of single …

ESBMC v6.0: Verifying C Programs Using k-Induction and Invariant Inference: (Competition Contribution)

MR Gadelha, F Monteiro, L Cordeiro… - Tools and Algorithms for …, 2019 - Springer
Abstract ESBMC v6. 0 employs ak-induction algorithm to both falsify and prove safety
properties in C programs. We have developed a new interval-invariant generator that pre …

Bug synthesis: Challenging bug-finding tools with deep faults

S Roy, A Pandey, B Dolan-Gavitt, Y Hu - … of the 2018 26th ACM Joint …, 2018 - dl.acm.org
In spite of decades of research in bug detection tools, there is a surprising dearth of ground-
truth corpora that can be used to evaluate the efficacy of such tools. Recently, systems such …

[PDF][PDF] Schwaemm and esch: lightweight authenticated encryption and hashing using the sparkle permutation family

C Beierle, A Biryukov, LC dos Santos, J Großschädl… - NIST round, 2019 - csrc.nist.gov
With the advent of the Internet of Things (IoT), a myriad of devices are being connected to
one another in order to exchange information. This information has to be secured …