Sciweavers

CAV
2009
Springer
150views Hardware» more  CAV 2009»
15 years 4 days ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
CAV
2009
Springer
136views Hardware» more  CAV 2009»
15 years 4 days ago
Linear Functional Fixed-points
Joe Hendrix, Nikolaj Bjørner
CAV
2009
Springer
104views Hardware» more  CAV 2009»
15 years 4 days ago
SPEED: Symbolic Complexity Bound Analysis
The SPEED project addresses the problem of computing symbolic computational complexity bounds of procedures in terms of their inputs. We discuss some of the challenges that arise a...
Sumit Gulwani
CAV
2009
Springer
134views Hardware» more  CAV 2009»
15 years 4 days ago
Predecessor Sets of Dynamic Pushdown Networks with Tree-Regular Constraints
Abstract. Dynamic Pushdown Networks (DPNs) are a model for parallel programs with (recursive) procedures and process creation. The goal of this paper is to develop generic techniqu...
Alexander Wenner, Markus Müller-Olm, Peter La...
CAV
2009
Springer
116views Hardware» more  CAV 2009»
15 years 4 days ago
Meta-analysis for Atomicity Violations under Nested Locking
Abstract. We study the problem of determining, given a run of a concurrent program, whether there is any alternate execution of it that violates atomicity, where atomicity is defin...
Azadeh Farzan, P. Madhusudan, Francesco Sorrentino
CAV
2009
Springer
218views Hardware» more  CAV 2009»
15 years 4 days ago
Cuts from Proofs: A Complete and Practical Technique for Solving Linear Inequalities over Integers
Abstract. We propose a novel, sound, and complete Simplex-based algorithm for solving linear inequalities over integers. Our algorithm, which can be viewed as a semantic generaliza...
Isil Dillig, Thomas Dillig, Alex Aiken
CAV
2009
Springer
209views Hardware» more  CAV 2009»
15 years 4 days ago
Static and Precise Detection of Concurrency Errors in Systems Code Using SMT Solvers
Context-bounded analysis is an attractive approach to verification of concurrent programs. Bounding the number of contexts executed per thread not only reduces the asymptotic compl...
Shuvendu K. Lahiri, Shaz Qadeer, Zvonimir Rakamari...
CAV
2009
Springer
126views Hardware» more  CAV 2009»
15 years 4 days ago
Reachability Analysis of Hybrid Systems Using Support Functions
Colas Le Guernic, Antoine Girard
CAV
2009
Springer
157views Hardware» more  CAV 2009»
15 years 4 days ago
Explaining Counterexamples Using Causality
Abstract. When a model does not satisfy a given specification, a counterexample is produced by the model checker to demonstrate the failure. A user must then examine the counterexa...
Ilan Beer, Shoham Ben-David, Hana Chockler, Avigai...
CAV
2009
Springer
163views Hardware» more  CAV 2009»
15 years 4 days ago
Complete Instantiation for Quantified Formulas in Satisfiabiliby Modulo Theories
Quantifier reasoning in Satisfiability Modulo Theories (SMT) is a long-standing challenge. The practical method employed in modern SMT solvers is to instantiate quantified formulas...
Leonardo Mendonça de Moura, Yeting Ge