A survey of automated techniques for formal software verification

V D'silva, D Kroening… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
The quality and the correctness of software are often the greatest concern in electronic
systems. Formal verification tools can provide a guarantee that a design is free of specific …

Satisfiability solvers

CP Gomes, H Kautz, A Sabharwal, B Selman - Foundations of Artificial …, 2008 - Elsevier
Publisher Summary The past few years have seen enormous progress in the performance of
Boolean satisfiability (SAT) solvers. Despite the worst-case exponential run time of all known …

Slither: a static analysis framework for smart contracts

J Feist, G Grieco, A Groce - 2019 IEEE/ACM 2nd International …, 2019 - ieeexplore.ieee.org
This paper describes Slither, a static analysis framework designed to provide rich
information about Ethereum smart contracts. It works by converting Solidity smart contracts …

Soteria: Automated {IoT} safety and security analysis

ZB Celik, P McDaniel, G Tan - 2018 USENIX annual technical …, 2018 - usenix.org
Broadly defined as the Internet of Things (IoT), the growth of commodity devices that
integrate physical processes with digital systems have changed the way we live, play and …

The nuXmv Symbolic Model Checker

R Cavada, A Cimatti, M Dorigatti, A Griggio… - … 2014, Held as Part of the …, 2014 - Springer
This paper describes the nuXmv symbolic model checker for finite-and infinite-state
synchronous transition systems. nuXmv is the evolution of the nuXmv open source model …

A general approach to network configuration verification

R Beckett, A Gupta, R Mahajan, D Walker - … of the Conference of the ACM …, 2017 - dl.acm.org
We present Minesweeper, a tool to verify that a network satisfies a wide range of intended
properties such as reachability or isolation among nodes, waypointing, black holes …

Model predictive control from signal temporal logic specifications: A case study

V Raman, M Maasoumy, A Donzé - Proceedings of the 4th ACM SIGBED …, 2014 - dl.acm.org
This paper describes current work on framing the model predictive control (MPC) of cyber-
physical systems as synthesis from signal temporal logic (STL) specifications. We provide a …

CBMC–C Bounded Model Checker: (Competition Contribution)

D Kroening, M Tautschnig - Tools and Algorithms for the Construction and …, 2014 - Springer
CBMC implements bit-precise bounded model checking for C programs and has been
developed and maintained for more than ten years. CBMC verifies the absence of violated …

Model checking

EM Clarke - Foundations of Software Technology and Theoretical …, 1997 - Springer
Abstract Model checking is an automatic technique for verifying finite-state reactive systems,
such as sequential circuit designs and communication protocols. Specifications are …

[LIBRO][B] An introduction to multiagent systems

M Wooldridge - 2009 - books.google.com
The study of multi-agent systems (MAS) focuses on systems in which many intelligent agents
interact with each other. These agents are considered to be autonomous entities such as …