Software model checking
R Jhala, R Majumdar - ACM Computing Surveys (CSUR), 2009 - dl.acm.org
Software model checking Page 1 21 Software Model Checking RANJIT JHALA University of
California, San Diego and RUPAK MAJUMDAR University of California, Los Angeles We survey …
California, San Diego and RUPAK MAJUMDAR University of California, Los Angeles We survey …
A survey of automated techniques for formal software verification
V D'silva, D Kroening… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
The quality and the correctness of software are often the greatest concern in electronic
systems. Formal verification tools can provide a guarantee that a design is free of specific …
systems. Formal verification tools can provide a guarantee that a design is free of specific …
Formal security analysis of neural networks using symbolic intervals
Due to the increasing deployment of Deep Neural Networks (DNNs) in real-world security-
critical domains including autonomous vehicles and collision avoidance systems, formally …
critical domains including autonomous vehicles and collision avoidance systems, formally …
Verx: Safety verification of smart contracts
A Permenev, D Dimitrov, P Tsankov… - … IEEE symposium on …, 2020 - ieeexplore.ieee.org
We present VerX, the first automated verifier able to prove functional properties of Ethereum
smart contracts. VerX addresses an important problem as all real-world contracts must …
smart contracts. VerX addresses an important problem as all real-world contracts must …
Beacon: Directed grey-box fuzzing with provable path pruning
Unlike coverage-based fuzzing that gives equal attention to every part of a code, directed
fuzzing aims to direct a fuzzer to a specific target in the code, eg, the code with potential …
fuzzing aims to direct a fuzzer to a specific target in the code, eg, the code with potential …
Pscout: analyzing the android permission specification
Modern smartphone operating systems (OSs) have been developed with a greater
emphasis on security and protecting privacy. One of the mechanisms these systems use to …
emphasis on security and protecting privacy. One of the mechanisms these systems use to …
Model checking
EM Clarke - Foundations of Software Technology and Theoretical …, 1997 - Springer
Abstract Model checking is an automatic technique for verifying finite-state reactive systems,
such as sequential circuit designs and communication protocols. Specifications are …
such as sequential circuit designs and communication protocols. Specifications are …
DART: Directed automated random testing
P Godefroid, N Klarlund, K Sen - … of the 2005 ACM SIGPLAN conference …, 2005 - dl.acm.org
We present a new tool, named DART, for automatically testing software that combines three
main techniques:(1) automated extraction of the interface of a program with its external …
main techniques:(1) automated extraction of the interface of a program with its external …
CUTE: A concolic unit testing engine for C
In unit testing, a program is decomposed into units which are collections of functions. A part
of unit can be tested by generating inputs for a single entry function. The entry function may …
of unit can be tested by generating inputs for a single entry function. The entry function may …
CPAchecker: A Tool for Configurable Software Verification
D Beyer, ME Keremoglu - … Conference, CAV 2011, Snowbird, UT, USA …, 2011 - Springer
Configurable software verification is a recent concept for expressing different program
analysis and model checking approaches in one single formalism. This paper presents …
analysis and model checking approaches in one single formalism. This paper presents …