作者: 不公開 時(shí)間: 2025-3-21 21:41 作者: 凈禮 時(shí)間: 2025-3-22 03:28 作者: 死亡 時(shí)間: 2025-3-22 07:52
: An Efficient Bug-Finding Tool Based on Approximate Reachability, a new SAT-based model checking framework inspired by classical reachability analysis. The tool gives a “bottom-line” performance measure for comparing future extensions to the framework. We demonstrate the performance of . on challenging benchmarks from the Hardware Model Checking Competition. Our作者: Morsel 時(shí)間: 2025-3-22 09:04
StringFuzz: A Fuzzer for String Solverstances generated by StringFuzz in SMT-LIB 2.0/2.5 format. We systematically compare Z3str3, CVC4, Z3str2, and Norn on groups of such instances, and identify those that are particularly challenging for some solvers. We briefly explain our observations and show how StringFuzz helped discover causes of作者: 財(cái)政 時(shí)間: 2025-3-22 16:20
Permission Inference for Array Programs inference techniques for this information provide only partial solutions for the important class of array-manipulating programs. In this paper, we present a static analysis that infers the memory footprint of an array program in terms of permission pre- and postconditions as used, for example, in s作者: 財(cái)政 時(shí)間: 2025-3-22 17:55 作者: 可用 時(shí)間: 2025-3-23 00:15
Automata vs Linear-Programming Discounted-Sum Inclusion the like. Such systems are typically represented by formalisms such as weighted logics or weighted automata. Despite its significance in analyzing the quality of computing systems, the study of quantitative inclusion has mostly been conducted from a theoretical standpoint. In this work, we conduct 作者: 平 時(shí)間: 2025-3-23 04:57
Model Checking Indistinguishability of Randomized Security Protocolsutomated verification of protocol designs have been developed. Unfortunately, these tools don’t have the ability to model and reason about protocols with randomization, which are becoming increasingly prevalent in systems providing privacy and anonymity guarantees. The security guarantees of these s作者: Dysarthria 時(shí)間: 2025-3-23 06:24
Lazy Self-composition for Security Verificationons in verifying security properties in programs. In this paper we present . self-composition, an approach for verifying secure information flow. It is based on self-composition, where two copies of a program are created on which a safety property is checked. However, rather than an eager duplicatio作者: 暴露他抗議 時(shí)間: 2025-3-23 11:43 作者: IVORY 時(shí)間: 2025-3-23 14:52 作者: 易改變 時(shí)間: 2025-3-23 19:59
Attracting Tangles to Solve Parity Gamesu-calculus. They are also interesting from the theory perspective, because they are widely believed to admit a polynomial solution, but so far no such algorithm is known..We propose a new algorithm to solve parity games based on learning tangles, which are strongly connected subgraphs for which one 作者: 集合 時(shí)間: 2025-3-24 01:58 作者: Project 時(shí)間: 2025-3-24 05:42 作者: 工作 時(shí)間: 2025-3-24 08:32 作者: Heresy 時(shí)間: 2025-3-24 11:31 作者: 謙卑 時(shí)間: 2025-3-24 15:05
StringFuzz: A Fuzzer for String Solverstances generated by StringFuzz in SMT-LIB 2.0/2.5 format. We systematically compare Z3str3, CVC4, Z3str2, and Norn on groups of such instances, and identify those that are particularly challenging for some solvers. We briefly explain our observations and show how StringFuzz helped discover causes of performance degradations in Z3str3.作者: Stricture 時(shí)間: 2025-3-24 19:32
https://doi.org/10.1007/978-3-319-96142-2artificial intelligence; data security; decision theory; evolutionary algorithms; formal logic; formal me作者: 玉米 時(shí)間: 2025-3-25 02:11
978-3-319-96141-5The Editor(s) (if applicable) and The Author(s) 2018作者: Mendicant 時(shí)間: 2025-3-25 03:43
https://doi.org/10.1007/978-3-8349-9070-9In this paper we describe the . prover, a tool for security protocol analysis. It decides equivalence properties modelled as trace equivalence of two processes in a dialect of the applied pi calculus.作者: Dedication 時(shí)間: 2025-3-25 08:02 作者: diathermy 時(shí)間: 2025-3-25 15:33
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/233381.jpg作者: Cloudburst 時(shí)間: 2025-3-25 17:48
Computer Aided Verification978-3-319-96142-2Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 血統(tǒng) 時(shí)間: 2025-3-25 23:50 作者: Dungeon 時(shí)間: 2025-3-26 02:49 作者: Aggregate 時(shí)間: 2025-3-26 06:52
https://doi.org/10.1007/978-3-8349-9070-9r falsify safety properties of infinite state models. It is portable, easy to install, performance competitive with other state-of-the-art model checkers, and has features designed to improve the results presented to users: . for proofs and . for test-case generation. It serves as the back-end for various industrial applications.作者: 鉆孔 時(shí)間: 2025-3-26 12:05 作者: Respond 時(shí)間: 2025-3-26 15:39
https://doi.org/10.1007/978-3-8349-9070-9employing a user-defined graph grammar. LTL model checking is then applied to this state space, supporting both structural and functional correctness properties. The analysis is fully automated, procedure-modular, and provides informative visual feedback including counterexamples in the case of prop作者: Consensus 時(shí)間: 2025-3-26 19:13
https://doi.org/10.1007/978-3-8349-9070-9 constraints and specific quantifier instantiation patterns to make the constraint solving process efficient. Our experimental evaluation shows that . scales to real world Python programs and outperforms state-of-the-art tools.作者: 剝皮 時(shí)間: 2025-3-26 21:06
https://doi.org/10.1007/978-3-8349-9070-9r falsify safety properties of infinite state models. It is portable, easy to install, performance competitive with other state-of-the-art model checkers, and has features designed to improve the results presented to users: . for proofs and . for test-case generation. It serves as the back-end for v作者: Juvenile 時(shí)間: 2025-3-27 03:38 作者: conjunctivitis 時(shí)間: 2025-3-27 06:24 作者: 開始發(fā)作 時(shí)間: 2025-3-27 11:09
https://doi.org/10.1007/978-3-8349-9070-9 inference techniques for this information provide only partial solutions for the important class of array-manipulating programs. In this paper, we present a static analysis that infers the memory footprint of an array program in terms of permission pre- and postconditions as used, for example, in s作者: FUSC 時(shí)間: 2025-3-27 15:18 作者: Increment 時(shí)間: 2025-3-27 18:44 作者: Reverie 時(shí)間: 2025-3-28 00:23
Internationales Projektmanagementutomated verification of protocol designs have been developed. Unfortunately, these tools don’t have the ability to model and reason about protocols with randomization, which are becoming increasingly prevalent in systems providing privacy and anonymity guarantees. The security guarantees of these s作者: enchant 時(shí)間: 2025-3-28 02:58
Internationales Projektmanagementons in verifying security properties in programs. In this paper we present . self-composition, an approach for verifying secure information flow. It is based on self-composition, where two copies of a program are created on which a safety property is checked. However, rather than an eager duplicatio作者: Deadpan 時(shí)間: 2025-3-28 09:21 作者: notice 時(shí)間: 2025-3-28 10:27 作者: Bronchial-Tubes 時(shí)間: 2025-3-28 16:09 作者: 定點(diǎn) 時(shí)間: 2025-3-28 19:00 作者: 郊外 時(shí)間: 2025-3-28 23:32
0302-9743 systems, static analysis, theory and security, SAT, SMT and decisions procedures, concurrency, and CPS, hardware, industrial applications..978-3-319-96141-5978-3-319-96142-2Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Proclaim 時(shí)間: 2025-3-29 05:02 作者: 挖掘 時(shí)間: 2025-3-29 11:14
Internationales Projektmanagementusing a model generated by lazy self-composition. The second is a method based on bounded model checking, where taint queries are generated dynamically during program unrolling to guide lazy self-composition and to conclude an adequate bound for correctness. We have implemented these methods on top 作者: 愉快么 時(shí)間: 2025-3-29 13:23 作者: dry-eye 時(shí)間: 2025-3-29 18:00
Die Bewertung von Arzt- und Zahnarztpraxensystem. While explicit algorithms for graphs and MDPs with Streett objectives have been widely studied, there has been no improvement of the basic symbolic algorithms. The worst-case numbers of symbolic steps required for the basic symbolic algorithms are as follows: quadratic for graphs and cubic f作者: dapper 時(shí)間: 2025-3-29 20:05
Automata vs Linear-Programming Discounted-Sum Inclusion two algorithms renders a superior implementation..In this work we present the first implementations of these algorithms, and perform extensive experimentation to compare between the two approaches. Our empirical analysis shows how the two approaches complement each other. This is a nuanced picture 作者: SAGE 時(shí)間: 2025-3-30 00:44
Lazy Self-composition for Security Verificationusing a model generated by lazy self-composition. The second is a method based on bounded model checking, where taint queries are generated dynamically during program unrolling to guide lazy self-composition and to conclude an adequate bound for correctness. We have implemented these methods on top 作者: 我沒有命令 時(shí)間: 2025-3-30 06:09 作者: Adrenal-Glands 時(shí)間: 2025-3-30 09:14
Symbolic Algorithms for Graphs and Markov Decision Processes with Fairness Objectivessystem. While explicit algorithms for graphs and MDPs with Streett objectives have been widely studied, there has been no improvement of the basic symbolic algorithms. The worst-case numbers of symbolic steps required for the basic symbolic algorithms are as follows: quadratic for graphs and cubic f作者: 不吉祥的女人 時(shí)間: 2025-3-30 14:52 作者: intuition 時(shí)間: 2025-3-30 19:30 作者: AXIOM 時(shí)間: 2025-3-30 22:54
Internationales Projektmanagementues are implemented in the Stochastic Protocol ANalayzer (.) and evaluated on several examples. As part of our evaluation, we conduct the first automated analysis of an electronic voting protocol based on the 3-ballot design.