“They're not that hard to mitigate”: What cryptographic library developers think about timing attacks

J Jancar, M Fourné, DDA Braga, M Sabt… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Timing attacks are among the most devastating side-channel attacks, allowing remote
attackers to retrieve secret material, including cryptographic keys, with relative ease. In …

The prusti project: Formal verification for rust

V Astrauskas, A Bílý, J Fiala, Z Grannan… - NASA Formal Methods …, 2022 - Springer
Rust is a modern systems programming language designed to offer both performance and
static safety. A key distinguishing feature is a strong type system, which enforces by default …

Property-based testing in practice

H Goldstein, JW Cutler, D Dickstein, BC Pierce… - Proceedings of the …, 2024 - dl.acm.org
Property-based testing (PBT) is a testing methodology where users write executable formal
specifications of software components and an automated harness checks these …

Verifying dynamic trait objects in Rust

A VanHattum, D Schwartz-Narbonne, N Chong… - Proceedings of the 44th …, 2022 - dl.acm.org
Rust has risen in prominence as a systems programming language in large part due to its
focus on reliability. The language's advanced type system and borrow checker eliminate …

Co-audit: tools to help humans double-check AI-generated content

AD Gordon, C Negreanu, J Cambronero… - arxiv preprint arxiv …, 2023 - arxiv.org
Users are increasingly being warned to check AI-generated content for correctness. Still, as
LLMs (and other generative models) generate more complex output, such as summaries …

A user study for evaluation of formal verification results and their explanation at Bosch

AP Kaleeswaran, A Nordmann, T Vogel… - Empirical Software …, 2023 - Springer
Context Ensuring safety for any sophisticated system is getting more complex due to the
rising number of features and functionalities. This calls for formal methods to entrust …

KBX: Verified Model Synchronization via Formal Bidirectional Transformation

J Zhao, Y Zhao, P Yao, F Zeng, B Zhan… - ACM Transactions on …, 2024 - dl.acm.org
Complex safety-critical systems require multiple models for a comprehensive description,
resulting in error-prone development and laborious verification. Bidirectional transformation …

Using reactive synthesis: An end-to-end exploratory case study

D Ma'Ayan, S Maoz - 2023 IEEE/ACM 45th International …, 2023 - ieeexplore.ieee.org
Reactive synthesis is an automated procedure to obtain a correct-by-construction reactive
system from its temporal logic specification. Despite its attractiveness and major research …

Scalable Relational Analysis via Relational Bound Propagation

C Stevens, H Bagheri - Proceedings of the IEEE/ACM 46th International …, 2024 - dl.acm.org
Bounded formal analysis techniques (such as bounded model checking) are incredibly
powerful tools for today's software engineers. However, such techniques often suffer from …

Propproof: Free model-checking harnesses from PBT

Y Takashima - Proceedings of the 31st ACM Joint European Software …, 2023 - dl.acm.org
Property-based testing (PBT) is often used by Rust developers to test functional correctness
properties of their code. Since PBT uses randomized testing, its guarantees are limited: it …