The blockchain litmus test
TD Smith - 2017 IEEE International Conference on Big Data …, 2017 - ieeexplore.ieee.org
Bitcoin's underlying blockchain database is a novel approach to recordkeeping that has the
potential to decentralize big data. Bitcoin's success has inspired a multitude of spinoff …
potential to decentralize big data. Bitcoin's success has inspired a multitude of spinoff …
Reliable and reproducible competition results with benchexec and witnesses (report on SV-COMP 2016)
D Beyer - International Conference on Tools and Algorithms for …, 2016 - Springer
Abstract The 5^ th Competition on Software Verification (SV-COMP 2016) continues the
tradition of a thorough comparative evaluation of fully-automatic software verifiers. This …
tradition of a thorough comparative evaluation of fully-automatic software verifiers. This …
Software Verification with Validation of Results: (Report on SV-COMP 2017)
D Beyer - International conference on tools and algorithms for the …, 2017 - Springer
This report describes the 2017 Competition on Software Verification (SV-COMP), the 6^ th
edition of the annual thorough comparative evaluation of fully-automatic software verifiers …
edition of the annual thorough comparative evaluation of fully-automatic software verifiers …
Automatic verification of C and Java programs: SV-COMP 2019
D Beyer - International Conference on Tools and Algorithms for …, 2019 - Springer
This report describes the 2019 Competition on Software Verification (SV-COMP), the 8^ th
edition of a series of comparative evaluations of fully automatic software verifiers for C …
edition of a series of comparative evaluations of fully automatic software verifiers for C …
A unifying view on SMT-based software verification
After many years of successful development of new approaches for software verification,
there is a need to consolidate the knowledge about the different abstract domains and …
there is a need to consolidate the knowledge about the different abstract domains and …
Tests from witnesses: Execution-based validation of verification results
The research community made enormous progress in the past years in developing
algorithms for verifying software, as shown by international competitions. Unfortunately, the …
algorithms for verifying software, as shown by international competitions. Unfortunately, the …
Algorithm selection for software validation based on graph kernels
Algorithm selection is the task of choosing an algorithm from a given set of candidate
algorithms when faced with a particular problem instance. Algorithm selection via machine …
algorithms when faced with a particular problem instance. Algorithm selection via machine …
2LS: Arrays and Loop Unwinding: (Competition Contribution)
Abstract 2LS is a C program analyser built upon the CPROVER infrastructure that can verify
and refute program assertions, memory safety, and termination. Until now, one of the main …
and refute program assertions, memory safety, and termination. Until now, one of the main …
Syntax-guided termination analysis
We present new algorithms for proving program termination and non-termination using
syntax-guided synthesis. They exploit the symbolic encoding of programs and automatically …
syntax-guided synthesis. They exploit the symbolic encoding of programs and automatically …
Verification of distributed systems via sequential emulation
Sequential emulation is a semantics-based technique to automatically reduce property
checking of distributed systems to the analysis of sequential programs. An automated …
checking of distributed systems to the analysis of sequential programs. An automated …