Formal methods: Practice and experience

J Woodcock, PG Larsen, J Bicarregui… - ACM computing surveys …, 2009 - dl.acm.org
Formal methods use mathematical models for analysis and verification at any part of the
program life-cycle. We describe the state of the art in the industrial use of formal methods …

Software model checking

R Jhala, R Majumdar - ACM Computing Surveys (CSUR), 2009 - dl.acm.org
Software model checking Page 1 21 Software Model Checking RANJIT JHALA University of
California, San Diego and RUPAK MAJUMDAR University of California, Los Angeles We survey …

Differentiable abstract interpretation for provably robust neural networks

M Mirman, T Gehr, M Vechev - International Conference on …, 2018 - proceedings.mlr.press
We introduce a scalable method for training robust neural networks based on abstract
interpretation. We present several abstract transformers which balance efficiency with …

Nutbaas: A blockchain-as-a-service platform

W Zheng, Z Zheng, X Chen, K Dai, P Li, R Chen - Ieee Access, 2019 - ieeexplore.ieee.org
Blockchain, originated from Bitcoin system, has drawn intense attention from the academic
community because of its decentralization, persistency, anonymity and auditability. In the …

Beacon: Directed grey-box fuzzing with provable path pruning

H Huang, Y Guo, Q Shi, P Yao, R Wu… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Unlike coverage-based fuzzing that gives equal attention to every part of a code, directed
fuzzing aims to direct a fuzzer to a specific target in the code, eg, the code with potential …

S2E: A platform for in-vivo multi-path analysis of software systems

V Chipounov, V Kuznetsov, G Candea - Acm Sigplan Notices, 2011 - dl.acm.org
This paper presents S2E, a platform for analyzing the properties and behavior of software
systems. We demonstrate S2E's use in develo** practical tools for comprehensive …

SoftBound: Highly compatible and complete spatial memory safety for C

S Nagarakatte, J Zhao, MMK Martin… - Proceedings of the 30th …, 2009 - dl.acm.org
The serious bugs and security vulnerabilities facilitated by C/C++'s lack of bounds checking
are well known, yet C and C++ remain in widespread use. Unfortunately, C's arbitrary …

The octagon abstract domain

A Miné - Higher-order and symbolic computation, 2006 - Springer
This article presents the octagon abstract domain, a relational numerical abstract domain for
static analysis by abstract interpretation. It allows representing conjunctions of constraints of …

Verismart: A highly precise safety verifier for ethereum smart contracts

S So, M Lee, J Park, H Lee, H Oh - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
We present VERISMART, a highly precise verifier for ensuring arithmetic safety of Ethereum
smart contracts. Writing safe smart contracts without unintended behavior is critically …

Test-case reduction for C compiler bugs

J Regehr, Y Chen, P Cuoq, E Eide, C Ellison… - Proceedings of the 33rd …, 2012 - dl.acm.org
To report a compiler bug, one must often find a small test case that triggers the bug. The
existing approach to automated test-case reduction, delta debugging, works by removing …