Abstract. Proofs of linearizability of concurrent data structures generally rely on identifying linearization points to establish a simulation argument between the implementation a...
POR beat Counter Abstraction: Parameterized Model Checking of Threshold-Based Distributed Algorithms Igor Konnov, Helmut Veith, and Josef Widder TU Wien (Vienna University of Techn...
Abstract. SAE Aerospace Information Report 6110, “Contiguous Aircraft/System Development Process Example,” follows the development of a complex wheel brake system (WBS) using p...
Marco Bozzano, Alessandro Cimatti, Anthony Fernand...
Abstract. We present an approach to program repair and its application to programs with recursive functions over unbounded data types. Our approach formulates program repair in the...
Fresh re-keying is a type of protocol which aims at splitting the task of protecting an encryption/authentication scheme against side-channel attacks in two parts. One part, a re-k...
Abstract. Rank estimation is an important tool for side-channel evaluations laboratories. It allows determining the remaining security after an attack has been performed, quantifi...
Abstract. This paper addresses the problem of safely navigating a mobile robot with limited sensing capability and limited information about stationary obstacles. We consider two s...
Dung Phan, Junxing Yang, Denise Ratasich, Radu Gro...
Abstract. Although runtime monitoring is a promising technique to improve the verification of complex safety-critical systems, the general design trend towards utilizing black-box...
Aaron Kane, Omar Chowdhury, Anupam Datta, Philip K...
Continuous and hybrid behaviors naturally arise from many dynamical systems. In this tutorial, we present state-of-the-art techniques for qualitative and quantitative reasoning abo...