Formal methods: Practice and experience
Formal methods use mathematical models for analysis and verification at any part of the
program life-cycle. We describe the state of the art in the industrial use of formal methods …
program life-cycle. We describe the state of the art in the industrial use of formal methods …
Software model checking
R Jhala, R Majumdar - ACM Computing Surveys (CSUR), 2009 - dl.acm.org
Software model checking Page 1 21 Software Model Checking RANJIT JHALA University of
California, San Diego and RUPAK MAJUMDAR University of California, Los Angeles We survey …
California, San Diego and RUPAK MAJUMDAR University of California, Los Angeles We survey …
Differentiable abstract interpretation for provably robust neural networks
We introduce a scalable method for training robust neural networks based on abstract
interpretation. We present several abstract transformers which balance efficiency with …
interpretation. We present several abstract transformers which balance efficiency with …
Nutbaas: A blockchain-as-a-service platform
Blockchain, originated from Bitcoin system, has drawn intense attention from the academic
community because of its decentralization, persistency, anonymity and auditability. In the …
community because of its decentralization, persistency, anonymity and auditability. In the …
Beacon: Directed grey-box fuzzing with provable path pruning
Unlike coverage-based fuzzing that gives equal attention to every part of a code, directed
fuzzing aims to direct a fuzzer to a specific target in the code, eg, the code with potential …
fuzzing aims to direct a fuzzer to a specific target in the code, eg, the code with potential …
S2E: A platform for in-vivo multi-path analysis of software systems
This paper presents S2E, a platform for analyzing the properties and behavior of software
systems. We demonstrate S2E's use in develo** practical tools for comprehensive …
systems. We demonstrate S2E's use in develo** practical tools for comprehensive …
SoftBound: Highly compatible and complete spatial memory safety for C
The serious bugs and security vulnerabilities facilitated by C/C++'s lack of bounds checking
are well known, yet C and C++ remain in widespread use. Unfortunately, C's arbitrary …
are well known, yet C and C++ remain in widespread use. Unfortunately, C's arbitrary …
The octagon abstract domain
A Miné - Higher-order and symbolic computation, 2006 - Springer
This article presents the octagon abstract domain, a relational numerical abstract domain for
static analysis by abstract interpretation. It allows representing conjunctions of constraints of …
static analysis by abstract interpretation. It allows representing conjunctions of constraints of …
Verismart: A highly precise safety verifier for ethereum smart contracts
We present VERISMART, a highly precise verifier for ensuring arithmetic safety of Ethereum
smart contracts. Writing safe smart contracts without unintended behavior is critically …
smart contracts. Writing safe smart contracts without unintended behavior is critically …
Test-case reduction for C compiler bugs
To report a compiler bug, one must often find a small test case that triggers the bug. The
existing approach to automated test-case reduction, delta debugging, works by removing …
existing approach to automated test-case reduction, delta debugging, works by removing …