Clover: Clo sed-Loop Ver ifiable Code Generation
The use of large language models for code generation is a rapidly growing trend in software
development. However, without effective methods for ensuring the correctness of generated …
development. However, without effective methods for ensuring the correctness of generated …
Detecting Buggy Contracts via Smart Testing
Smart contracts are susceptible to critical vulnerabilities. Hybrid dynamic analyses, such as
concolic execution assisted fuzzing and foundation model assisted fuzzing, have emerged …
concolic execution assisted fuzzing and foundation model assisted fuzzing, have emerged …
Python Symbolic Execution with LLM-powered Code Generation
Symbolic execution is a key technology in software testing, which generates test cases by
collecting symbolic path constraints and then solving constraints with SMT solvers. Symbolic …
collecting symbolic path constraints and then solving constraints with SMT solvers. Symbolic …
LLM Meets Bounded Model Checking: Neuro-symbolic Loop Invariant Inference
Loop invariant inference, a key component in program verification, is a challenging task due
to the inherent undecidability and complex loop behaviors in practice. Recently, machine …
to the inherent undecidability and complex loop behaviors in practice. Recently, machine …
Towards Neural Synthesis for SMT-Assisted Proof-Oriented Programming
Proof-oriented programs mix computational content with proofs of program correctness.
However, the human effort involved in programming and proving is still substantial, despite …
However, the human effort involved in programming and proving is still substantial, despite …
Automated Proof Generation for Rust Code via Self-Evolution
Ensuring correctness is crucial for code generation. Formal verification offers a definitive
assurance of correctness, but demands substantial human effort in proof construction and …
assurance of correctness, but demands substantial human effort in proof construction and …
A Vulnerability Propagation Impact Analysis Approach Based on Code Semantics with LLM
X Long, J Ai, J Zhao, Y Huang - 2024 11th International …, 2024 - ieeexplore.ieee.org
Vulnerability propagation in software systems is always one of the most important problems
in software reliability analysis. Previous methods primarily relied on the calling relationships …
in software reliability analysis. Previous methods primarily relied on the calling relationships …