Stable distributions, pseudorandom generators, embeddings, and data stream computation

P Indyk - Journal of the ACM (JACM), 2006‏ - dl.acm.org
In this article, we show several results obtained by combining the use of stable distributions
with pseudorandom generators for bounded space. In particular:---We show that, for any …

Directed symbolic execution

KK Ma, K Yit Phang, JS Foster, M Hicks - Static Analysis: 18th International …, 2011‏ - Springer
In this paper, we study the problem of automatically finding program executions that reach a
particular target line. This problem arises in many debugging scenarios; for example, a …

Compositional may-must program analysis: unleashing the power of alternation

P Godefroid, AV Nori, SK Rajamani… - Proceedings of the 37th …, 2010‏ - dl.acm.org
Program analysis tools typically compute two types of information:(1) may information that is
true of all program executions and is used to prove the absence of bugs in the program, and …

Polynomial reachability witnesses via Stellensätze

A Asadi, K Chatterjee, H Fu, AK Goharshady… - Proceedings of the …, 2021‏ - dl.acm.org
We consider the fundamental problem of reachability analysis over imperative programs
with real variables. Previous works that tackle reachability are either unable to handle …

Model checking concurrent Linux device drivers

T Witkowski, N Blanc, D Kroening… - Proceedings of the 22nd …, 2007‏ - dl.acm.org
The S lam toolkit demonstrates that predicate abstraction enables automated verification of
real world Windows device drivers. Our predicate abstraction-based tool DDV erify enables …

Proving nontermination via safety

HY Chen, B Cook, C Fuhs, K Nimkar… - … 2014, Held as Part of the …, 2014‏ - Springer
We show how the problem of nontermination proving can be reduced to a question of
underapproximation search guided by a safety prover. This reduction leads to new …

Whale: An Interpolation-Based Algorithm for Inter-procedural Verification

A Albarghouthi, A Gurfinkel, M Chechik - International Workshop on …, 2012‏ - Springer
In software verification, Craig interpolation has proven to be a powerful technique for
computing and refining abstractions. In this paper, we propose an interpolation-based …

Pre-deployment security assessment for cloud services through semantic reasoning

C Cauli, M Li, N Piterman, O Tkachuk - … , CAV 2021, Virtual Event, July 20 …, 2021‏ - Springer
Over the past ten years, the adoption of cloud services has grown rapidly, leading to the
introduction of automated deployment tools to address the scale and complexity of the …

Verification of evolving software via component substitutability analysis

S Chaki, E Clarke, N Sharygina, N Sinha - Formal Methods in System …, 2008‏ - Springer
This paper presents an automated and compositional procedure to solve the substitutability
problem in the context of evolving software systems. Our solution contributes two techniques …

A meta-heuristic solution for automated refutation of complex software systems specified through graph transformations

V Rafe, M Moradi, R Yousefian, A Nikanjam - Applied Soft Computing, 2015‏ - Elsevier
One of the best approaches for verifying software systems (especially safety critical systems)
is the model checking in which all reachable states are generated from an initial state. All of …