{ETHBMC}: A bounded model checker for smart contracts
The introduction of smart contracts has significantly advanced the state-of-the-art in
cryptocurrencies. Smart contracts are programs who live on the blockchain, governing the …
cryptocurrencies. Smart contracts are programs who live on the blockchain, governing the …
Jasmin: High-assurance and high-speed cryptography
Jasmin is a framework for develo** high-speed and high-assurance cryptographic
software. The framework is structured around the Jasmin programming language and its …
software. The framework is structured around the Jasmin programming language and its …
{Push-Button} Verification of File Systems via Crash Refinement
The file system is an essential operating system component for persisting data on storage
devices. Writing bug-free file systems is non-trivial, as they must correctly implement and …
devices. Writing bug-free file systems is non-trivial, as they must correctly implement and …
Binsec/rel: Efficient relational symbolic execution for constant-time at binary-level
The constant-time programming discipline (CT) is an efficient countermeasure against timing
side-channel attacks, requiring the control flow and the memory accesses to be independent …
side-channel attacks, requiring the control flow and the memory accesses to be independent …
Btor2 , BtorMC and Boolector 3.0
We describe Btor2, a word-level model checking format for capturing models of hardware
and potentially software in a bit-precise manner. This simple, line-based and easy to parse …
and potentially software in a bit-precise manner. This simple, line-based and easy to parse …
Learning to solve SMT formulas
We present a new approach for learning to solve SMT formulas. We phrase the challenge of
solving SMT formulas as a tree search problem where at each step a transformation is …
solving SMT formulas as a tree search problem where at each step a transformation is …
Mind the gap-A closer look at the security of block ciphers against differential cryptanalysis
Resistance against differential cryptanalysis is an important design criteria for any modern
block cipher and most designs rely on finding some upper bound on probability of single …
block cipher and most designs rely on finding some upper bound on probability of single …
ESBMC v6.0: Verifying C Programs Using k-Induction and Invariant Inference: (Competition Contribution)
Abstract ESBMC v6. 0 employs ak-induction algorithm to both falsify and prove safety
properties in C programs. We have developed a new interval-invariant generator that pre …
properties in C programs. We have developed a new interval-invariant generator that pre …
Bug synthesis: Challenging bug-finding tools with deep faults
In spite of decades of research in bug detection tools, there is a surprising dearth of ground-
truth corpora that can be used to evaluate the efficacy of such tools. Recently, systems such …
truth corpora that can be used to evaluate the efficacy of such tools. Recently, systems such …
[PDF][PDF] Schwaemm and esch: lightweight authenticated encryption and hashing using the sparkle permutation family
With the advent of the Internet of Things (IoT), a myriad of devices are being connected to
one another in order to exchange information. This information has to be secured …
one another in order to exchange information. This information has to be secured …