Deductive software verification-the key book

W Ahrendt, B Beckert, R Bubel, R Hähnle… - Lecture notes in …, 2016 - Springer
• There are IDEs for KeY, including an Eclipse extension, that make it easy to keep track of
proof obligations in larger projects [Hentschel et al., 2014c].• A stripped down version of …

Analysis and transformation of constrained Horn clauses for program verification

E De Angelis, F Fioravanti, JP Gallagher… - Theory and Practice of …, 2022 - cambridge.org
This paper surveys recent work on applying analysis and transformation techniques that
originate in the field of constraint logic programming (CLP) to the problem of verifying …

Semantic program alignment for equivalence checking

B Churchill, O Padon, R Sharma, A Aiken - Proceedings of the 40th ACM …, 2019 - dl.acm.org
We introduce a robust semantics-driven technique for program equivalence checking. Given
two functions we find a trace alignment over a set of concrete executions of both programs …

Timing side-channel mitigation via automated program repair

H Ruan, Y Noller, S Tizpaz-Niari… - ACM Transactions on …, 2024 - dl.acm.org
Side-channel vulnerability detection has gained prominence recently due to Spectre and
Meltdown attacks. Techniques for side-channel detection range from fuzz testing to program …

Relational cost analysis

E Çiçek, G Barthe, M Gaboardi, D Garg… - ACM SIGPLAN …, 2017 - dl.acm.org
Establishing quantitative bounds on the execution cost of programs is essential in many
areas of computer science such as complexity analysis, compiler optimizations, security and …

Modular product programs

M Eilers, P Müller, S Hitz - ACM Transactions on Programming …, 2019 - dl.acm.org
Many interesting program properties like determinism or information flow security are
hyperproperties, that is, they relate multiple executions of the same program …

[HTML][HTML] Formal Verification of Code Conversion: A Comprehensive Survey

AT Mahmoud, AA Mohammed, M Ayman, W Medhat… - Technologies, 2024 - mdpi.com
Code conversion, encompassing translation, optimization, and generation, is becoming
increasingly critical in information systems and the software industry. Traditional validation …

ARDiff: scaling program equivalence checking via iterative abstraction and refinement of common code

S Badihi, F Akinotcho, Y Li, J Rubin - Proceedings of the 28th ACM joint …, 2020 - dl.acm.org
Equivalence checking techniques help establish whether two versions of a program exhibit
the same behavior. The majority of popular techniques for formally proving/refuting …

Property directed self composition

R Shemer, A Gurfinkel, S Shoham, Y Vizel - … CAV 2019, New York City, NY …, 2019 - Springer
We address the problem of verifying k-safety properties: properties that refer to k interacting
executions of a program. A prominent way to verify k-safety properties is by self composition …

Verified three-way program merge

M Sousa, I Dillig, SK Lahiri - Proceedings of the ACM on Programming …, 2018 - dl.acm.org
Even though many programmers rely on 3-way merge tools to integrate changes from
different branches, such tools can introduce subtle bugs in the integration process. This …