Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
SMT-based verification of solidity smart contracts
L Alt, C Reitwiessner - … Applications of Formal Methods, Verification and …, 2018 - Springer
Ethereum smart contracts are programs that run inside a public distributed database called a
blockchain. These smart contracts are used to handle tokens of value, can be accessed and …
blockchain. These smart contracts are used to handle tokens of value, can be accessed and …
Decomposing software verification using distributed summary synthesis
There are many approaches for automated software verification, but they are either
imprecise, do not scale well to large systems, or do not sufficiently leverage parallelization …
imprecise, do not scale well to large systems, or do not sufficiently leverage parallelization …
Transition power abstractions for deep counterexample detection
While model checking safety of infinite-state systems by inferring state invariants has
steadily improved recently, most verification tools still rely on a technique based on bounded …
steadily improved recently, most verification tools still rely on a technique based on bounded …
Target-driven compositional concolic testing with function summary refinement for effective bug detection
Concolic testing is popular in unit testing because it can detect bugs quickly in a relatively
small search space. But, in system-level testing, it suffers from the symbolic path explosion …
small search space. But, in system-level testing, it suffers from the symbolic path explosion …
Proof-guided underapproximation widening for bounded model checking
Abstract Bounded Model Checking (BMC) is a popularly used strategy for program
verification and it has been explored extensively over the past decade. Despite such a long …
verification and it has been explored extensively over the past decade. Despite such a long …
CPA-Daemon: Mitigating Tool Restarts for Java-Based Verifiers
We present cpa-Daemon, a microservice for continuous software verification of C code. cpa-
Daemon provides full access to the verifier CPAchecker, but adds a clear network interface …
Daemon provides full access to the verifier CPAchecker, but adds a clear network interface …
Difference verification with conditions
Modern software-verification tools need to support development processes that involve
frequent changes. Existing approaches for incremental verification hard-code specific …
frequent changes. Existing approaches for incremental verification hard-code specific …
LRA interpolants from no man's land
Interpolation is becoming a standard technique for over-approximating state spaces in
software model checking with Satisfiability Modulo Theories (SMT). In particular when …
software model checking with Satisfiability Modulo Theories (SMT). In particular when …
Duality-based interpolation for quantifier-free equalities and uninterpreted functions
Interpolating, ie, computing safe over-approximations for a system represented by a logical
formula, is at the core of symbolic model-checking. One of the central tools in modeling …
formula, is at the core of symbolic model-checking. One of the central tools in modeling …
[PDF][PDF] Incremental verification by SMT-based summary repair
We present UPPROVER, a bounded model checker designed to incrementally verify
software while it is being gradually developed, refactored, or optimized. In contrast to its …
software while it is being gradually developed, refactored, or optimized. In contrast to its …