Deductive software verification-the key book
• There are IDEs for KeY, including an Eclipse extension, that make it easy to keep track of
proof obligations in larger projects [Hentschel et al., 2014c].• A stripped down version of …
proof obligations in larger projects [Hentschel et al., 2014c].• A stripped down version of …
Analysis and transformation of constrained Horn clauses for program verification
This paper surveys recent work on applying analysis and transformation techniques that
originate in the field of constraint logic programming (CLP) to the problem of verifying …
originate in the field of constraint logic programming (CLP) to the problem of verifying …
Semantic program alignment for equivalence checking
We introduce a robust semantics-driven technique for program equivalence checking. Given
two functions we find a trace alignment over a set of concrete executions of both programs …
two functions we find a trace alignment over a set of concrete executions of both programs …
Timing side-channel mitigation via automated program repair
H Ruan, Y Noller, S Tizpaz-Niari… - ACM Transactions on …, 2024 - dl.acm.org
Side-channel vulnerability detection has gained prominence recently due to Spectre and
Meltdown attacks. Techniques for side-channel detection range from fuzz testing to program …
Meltdown attacks. Techniques for side-channel detection range from fuzz testing to program …
Relational cost analysis
Establishing quantitative bounds on the execution cost of programs is essential in many
areas of computer science such as complexity analysis, compiler optimizations, security and …
areas of computer science such as complexity analysis, compiler optimizations, security and …
[HTML][HTML] Formal Verification of Code Conversion: A Comprehensive Survey
AT Mahmoud, AA Mohammed, M Ayman, W Medhat… - Technologies, 2024 - mdpi.com
Code conversion, encompassing translation, optimization, and generation, is becoming
increasingly critical in information systems and the software industry. Traditional validation …
increasingly critical in information systems and the software industry. Traditional validation …
ARDiff: scaling program equivalence checking via iterative abstraction and refinement of common code
Equivalence checking techniques help establish whether two versions of a program exhibit
the same behavior. The majority of popular techniques for formally proving/refuting …
the same behavior. The majority of popular techniques for formally proving/refuting …
Property directed self composition
We address the problem of verifying k-safety properties: properties that refer to k interacting
executions of a program. A prominent way to verify k-safety properties is by self composition …
executions of a program. A prominent way to verify k-safety properties is by self composition …
Verified three-way program merge
Even though many programmers rely on 3-way merge tools to integrate changes from
different branches, such tools can introduce subtle bugs in the integration process. This …
different branches, such tools can introduce subtle bugs in the integration process. This …