Computer Aided Verification : : 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I.
Saved in:
Superior document: | Lecture Notes in Computer Science Series ; v.13371 |
---|---|
: | |
TeilnehmendeR: | |
Place / Publishing House: | Cham : : Springer International Publishing AG,, 2022. ©2022. |
Year of Publication: | 2022 |
Edition: | 1st ed. |
Language: | English |
Series: | Lecture Notes in Computer Science Series
|
Online Access: | |
Physical Description: | 1 online resource (563 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
5007070218 |
---|---|
ctrlnum |
(MiAaPQ)5007070218 (Au-PeEL)EBL7070218 (OCoLC)1341275496 |
collection |
bib_alma |
record_format |
marc |
spelling |
Shoham, Sharon. Computer Aided Verification : 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I. 1st ed. Cham : Springer International Publishing AG, 2022. ©2022. 1 online resource (563 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Lecture Notes in Computer Science Series ; v.13371 Intro -- Preface -- Organization -- Contents - Part I -- Contents - Part II -- Invited Papers -- A Billion SMT Queries a Day (Invited Paper) -- 1 Introduction -- 2 Eliminate Writing Specifications -- 2.1 Generating Possible Specifications (Findings) -- 3 Domain-Specific Abstractions -- 4 SMT Solving at Cloud Scale -- 4.1 Monotonicity in Runtimes Across Solver Versions -- 4.2 Stability of the Solvers -- 4.3 Concluding Remarks -- References -- Program Verification with Constrained Horn Clauses (Invited Paper) -- 1 Introduction -- 2 Logic of Constrained Horn Clauses -- 3 Solving CHC Modulo Theories -- References -- Formal Methods for Probabilistic Programs -- Data-Driven Invariant Learning for Probabilistic Programs -- 1 Introduction -- 2 Preliminaries -- 3 Algorithm Overview -- 4 Learning Exact Invariants -- 4.1 Generate Features (getFeatures) -- 4.2 Sample Initial States (sampleStates) -- 4.3 Sample Training Data (sampleTraces) -- 4.4 Learning a Model Tree (learnInv) -- 4.5 Extracting Expectations from Models (extractInv) -- 4.6 Verify Extracted Expectations (verifyInv) -- 5 Learning Sub-invariants -- 5.1 Sample Training Data (sampleTraces) -- 5.2 Learning a Neural Model Tree (learnInv) -- 5.3 Verify Extracted Expectations (verifyInv) -- 6 Evaluations -- 6.1 R1: Evaluation of the Exact Invariant Method -- 6.2 R2: Evaluation of the Sub-invariant Method -- 7 Related Work -- References -- Sound and Complete Certificates for Quantitative Termination Analysis of Probabilistic Programs -- 1 Introduction -- 2 Overview -- 3 Preliminaries -- 4 A Sound and Complete Characterization of SIs -- 5 Stochastic Invariants for LBPT -- 6 Automated Template-Based Synthesis Algorithm -- 7 Experimental Results -- 8 Related Works -- 9 Conclusion -- References -- Does a Program Yield the Right Distribution? -- 1 Introduction -- 2 Generating Functions. 2.1 The Ring of Formal Power Series -- 2.2 Probability Generating Functions -- 3 ReDiP: A Probabilistic Programming Language -- 3.1 Program States and Variables -- 3.2 Syntax of ReDiP -- 3.3 The Statement x += iid(D, y) -- 4 Interpreting ReDiP with PGF -- 4.1 A Domain for Distribution Transformation -- 4.2 From Programs to PGF Transformers -- 4.3 Probabilistic Termination -- 5 Reasoning About Loops -- 5.1 Fixed Point Induction -- 5.2 Deciding Equivalence of Loop-free Programs -- 6 Case Studies -- 7 Related Work -- 8 Conclusion and Future Work -- References -- Abstraction-Refinement for Hierarchical Probabilistic Models -- 1 Introduction -- 2 Overview -- 3 Formal Problem Statement -- 3.1 Background -- 3.2 Hierarchical MDPs -- 3.3 Optimal Local Subpolicies and Beyond -- 4 Solving hMDPs with Abstraction-Refinement -- 4.1 The Macro-MDP Formulation -- 4.2 The Uncertain Macro-MDP Formulation -- 4.3 Set-Based SubMDP Analysis -- 4.4 Templates for Set-Based subMDP Analysis -- 5 Implementing the Abstraction-Refinement Loop -- 6 Experiments -- 7 Related Work -- 8 Conclusion -- References -- Formal Methods for Neural Networks -- Shared Certificates for Neural Network Verification -- 1 Introduction -- 2 Background -- 3 Proof Sharing with Templates -- 3.1 Motivation: Proof Subsumption -- 3.2 Proof Sharing with Templates -- 4 Efficient Verification via Proof Sharing -- 4.1 Choice of Abstract Domain -- 4.2 Template Generation -- 4.3 Robustness to Adversarial Patches -- 4.4 Geometric Robustness -- 4.5 Requirements for Proof Sharing -- 5 Experimental Evaluation -- 5.1 Experimental Setup -- 5.2 Robustness Against Adversarial Patches -- 5.3 Robustness Against Geometric Perturbations -- 5.4 Discussion -- 6 Related Work -- 7 Conclusion -- References -- Example Guided Synthesis of Linear Approximations for Neural Network Verification -- 1 Introduction. 2 Preliminaries -- 2.1 Neural Networks -- 2.2 Existing Neural Network Verification Techniques and Limitations -- 3 Problem Statement and Challenges -- 3.1 The Synthesis Problem -- 3.2 Challenges and Our Solution -- 4 Our Approach -- 4.1 Partitioning the Input Interval Space (Ix) -- 4.2 Learning the Function g(l, u) -- 4.3 Ensuring Soundness of the Linear Approximations -- 4.4 Efficient Lookup of the Linear Bounds -- 5 Evaluation -- 5.1 Benchmarks -- 5.2 Experimental Results -- 6 Related Work -- 7 Conclusions -- References -- Verifying Neural Networks Against Backdoor Attacks -- 1 Introduction -- 2 Problem Definition -- 3 Verifying Backdoor Absence -- 3.1 Overall Algorithm -- 3.2 Verifying Backdoor Absence Against a Set of Images -- 3.3 Abstract Interpretation -- 3.4 Generating Backdoor Triggers -- 3.5 Correctness and Complexity -- 3.6 Discussion -- 4 Implementation and Evaluation -- 5 Related Work -- 6 Conclusion -- References -- Trainify: A CEGAR-Driven Training and Verification Framework for Safe Deep Reinforcement Learning -- 1 Introduction -- 2 Deep Reinforcement Learning (DRL) -- 3 Model Checking of DRL Systems -- 3.1 The Model Checking Problem -- 3.2 Challenges in Model Checking DRL Systems -- 4 The CEGAR-Driven DRL Approach -- 4.1 The Framework -- 4.2 Training on Abstract States -- 4.3 Model Checking Trained DRL Systems -- 4.4 Counterexample-Guided Refinement -- 5 Implementation and Evaluation -- 5.1 Implementation -- 5.2 Benchmarks and Experimental Settings -- 5.3 Reliability and Verifiability Comparison -- 5.4 Performance Comparison -- 6 Related Work -- 7 Discussion and Conclusion -- References -- Neural Network Robustness as a Verification Property: A Principled Case Study -- 1 Introduction -- 2 Existing Training Techniques and Definitions of Robustness -- 3 Robustness in Evaluation, Attack and Verification. 4 Relative Comparison of Definitions of Robustness -- 4.1 Standard and Lipschitz Robustness -- 4.2 (Strong) Classification Robustness -- 4.3 Standard vs Classification Robustness -- 5 Other Properties of Robustness Definitions -- 6 Conclusions -- References -- Software Verification and Model Checking -- The Lattice-Theoretic Essence of Property Directed Reachability Analysis*-12pt -- 1 Introduction -- 2 Fixed-points in Complete Lattices -- 3 Lattice-Theoretic Reconstruction of PDR -- 3.1 Positive LT-PDR: Sequential Positive Witnesses -- 3.2 Negative PDR: Sequential Negative Witnesses -- 3.3 LT-PDR: Integrating Positive and Negative -- 4 Structural Theory of PDR by Category Theory -- 4.1 Categorical Modeling of Dynamics and Predicate Transformers -- 4.2 Structural Theory of PDR from Transition Systems -- 5 Known and New PDR Algorithms as Instances -- 5.1 LT-PDRs for Kripke Structures: PDRF-Krand PDRIB-Kr -- 5.2 LT-PDR for MDPs: PDRIB-MDP -- 5.3 LT-PDR for Markov Reward Models: PDRMRM -- 6 Implementation and Evaluation -- 7 Conclusions and Future Work -- References -- Affine Loop Invariant Generation via Matrix Algebra -- 1 Introduction -- 1.1 Related Work -- 2 Preliminaries -- 3 Affine Invariants via Farkas' Lemma -- 4 Single-Branch Affine Loops with Deterministic Updates -- 4.1 Derived Constraints from the Farkas Tables -- 4.2 Loops with Tautological Guard -- 4.3 Loops with Guard: Single-Constraint Case -- 4.4 Loops with Guard: Multi-constraint Case -- 5 Generalizations -- 5.1 Affine Loops with Non-deterministic Updates -- 5.2 An Extension to Bidirectional Affine Invariants -- 5.3 Other Possible Generalizations -- 6 Approximation of Eigenvectors through Continuity -- 7 Experimental Results -- References -- Data-driven Numerical Invariant Synthesis with Automatic Generation of Attributes -- 1 Introduction. 2 Safety Verification Using Learning of Invariants -- 2.1 Linear Constraints and Safety Verification -- 2.2 The ICE Learning Framework -- 2.3 ICE-DT: Invariant Learning Using Decision Trees -- 3 Linear Formulas as Abstract Objects -- 4 Generating Attributes from Sample Separators -- 4.1 Abstract Sample Separators -- 4.2 Computing a Join-Maximal Abstract Separator -- 4.3 Integrating Separator Computation in ICE-DT -- 4.4 Computing Separators Incrementally -- 5 Experiments -- 6 Conclusion -- References -- Proof-Guided Underapproximation Widening for Bounded Model Checking -- 1 Introduction -- 2 Background -- 2.1 Language Model -- 2.2 VC Generation for a Procedure -- 2.3 Static Versus Dynamic Inlining -- 2.4 Verification with Stratified Inlining -- 2.5 Overapproximation Refinement Guided Stratified Inlining -- 3 Overview -- 3.1 Underapproximation Widening -- 4 Algorithms -- 4.1 Underapproximation Widening Guided Stratified Inlining (UnderWidenSI) -- 4.2 Portfolio Technique -- 5 Experimental Results -- 5.1 Corral Versus Legion -- 5.2 Performance of Legion+ -- 6 Related Work -- 7 Conclusion -- References -- SolCMC: Solidity Compiler's Model Checker -- 1 Introduction -- 2 Solidity Model Checking -- 2.1 The CHC Verification Engine -- 2.2 Horn Encoding -- 3 User Features -- 4 Real World Experiments -- 4.1 CHC Solver Options -- 4.2 Deposit Contract -- 4.3 ERC777 -- 4.4 Discussion -- 5 Conclusions and Future Work -- References -- Hyperproperties and Security -- Software Verification of Hyperproperties Beyond k-Safety -- 1 Introduction -- 1.1 Verification Beyond k-Safety -- 1.2 Contributions and Structure -- 2 Overview: Reductions and Quantification as a Game -- 2.1 Reductions as a Game -- 2.2 Beyond k-Safety: Quantification as a Game -- 3 Preliminaries -- 4 Observation-Based HyperLTL -- 5 Reductions as a Game -- 6 Verification Beyond k-Safety. 6.1 Existential Trace Quantification as a Game. Description based on publisher supplied metadata and other sources. Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. Electronic books. Vizel, Yakir. Print version: Shoham, Sharon Computer Aided Verification Cham : Springer International Publishing AG,c2022 9783031131844 ProQuest (Firm) Lecture Notes in Computer Science Series https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=7070218 Click to View |
language |
English |
format |
eBook |
author |
Shoham, Sharon. |
spellingShingle |
Shoham, Sharon. Computer Aided Verification : 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I. Lecture Notes in Computer Science Series ; Intro -- Preface -- Organization -- Contents - Part I -- Contents - Part II -- Invited Papers -- A Billion SMT Queries a Day (Invited Paper) -- 1 Introduction -- 2 Eliminate Writing Specifications -- 2.1 Generating Possible Specifications (Findings) -- 3 Domain-Specific Abstractions -- 4 SMT Solving at Cloud Scale -- 4.1 Monotonicity in Runtimes Across Solver Versions -- 4.2 Stability of the Solvers -- 4.3 Concluding Remarks -- References -- Program Verification with Constrained Horn Clauses (Invited Paper) -- 1 Introduction -- 2 Logic of Constrained Horn Clauses -- 3 Solving CHC Modulo Theories -- References -- Formal Methods for Probabilistic Programs -- Data-Driven Invariant Learning for Probabilistic Programs -- 1 Introduction -- 2 Preliminaries -- 3 Algorithm Overview -- 4 Learning Exact Invariants -- 4.1 Generate Features (getFeatures) -- 4.2 Sample Initial States (sampleStates) -- 4.3 Sample Training Data (sampleTraces) -- 4.4 Learning a Model Tree (learnInv) -- 4.5 Extracting Expectations from Models (extractInv) -- 4.6 Verify Extracted Expectations (verifyInv) -- 5 Learning Sub-invariants -- 5.1 Sample Training Data (sampleTraces) -- 5.2 Learning a Neural Model Tree (learnInv) -- 5.3 Verify Extracted Expectations (verifyInv) -- 6 Evaluations -- 6.1 R1: Evaluation of the Exact Invariant Method -- 6.2 R2: Evaluation of the Sub-invariant Method -- 7 Related Work -- References -- Sound and Complete Certificates for Quantitative Termination Analysis of Probabilistic Programs -- 1 Introduction -- 2 Overview -- 3 Preliminaries -- 4 A Sound and Complete Characterization of SIs -- 5 Stochastic Invariants for LBPT -- 6 Automated Template-Based Synthesis Algorithm -- 7 Experimental Results -- 8 Related Works -- 9 Conclusion -- References -- Does a Program Yield the Right Distribution? -- 1 Introduction -- 2 Generating Functions. 2.1 The Ring of Formal Power Series -- 2.2 Probability Generating Functions -- 3 ReDiP: A Probabilistic Programming Language -- 3.1 Program States and Variables -- 3.2 Syntax of ReDiP -- 3.3 The Statement x += iid(D, y) -- 4 Interpreting ReDiP with PGF -- 4.1 A Domain for Distribution Transformation -- 4.2 From Programs to PGF Transformers -- 4.3 Probabilistic Termination -- 5 Reasoning About Loops -- 5.1 Fixed Point Induction -- 5.2 Deciding Equivalence of Loop-free Programs -- 6 Case Studies -- 7 Related Work -- 8 Conclusion and Future Work -- References -- Abstraction-Refinement for Hierarchical Probabilistic Models -- 1 Introduction -- 2 Overview -- 3 Formal Problem Statement -- 3.1 Background -- 3.2 Hierarchical MDPs -- 3.3 Optimal Local Subpolicies and Beyond -- 4 Solving hMDPs with Abstraction-Refinement -- 4.1 The Macro-MDP Formulation -- 4.2 The Uncertain Macro-MDP Formulation -- 4.3 Set-Based SubMDP Analysis -- 4.4 Templates for Set-Based subMDP Analysis -- 5 Implementing the Abstraction-Refinement Loop -- 6 Experiments -- 7 Related Work -- 8 Conclusion -- References -- Formal Methods for Neural Networks -- Shared Certificates for Neural Network Verification -- 1 Introduction -- 2 Background -- 3 Proof Sharing with Templates -- 3.1 Motivation: Proof Subsumption -- 3.2 Proof Sharing with Templates -- 4 Efficient Verification via Proof Sharing -- 4.1 Choice of Abstract Domain -- 4.2 Template Generation -- 4.3 Robustness to Adversarial Patches -- 4.4 Geometric Robustness -- 4.5 Requirements for Proof Sharing -- 5 Experimental Evaluation -- 5.1 Experimental Setup -- 5.2 Robustness Against Adversarial Patches -- 5.3 Robustness Against Geometric Perturbations -- 5.4 Discussion -- 6 Related Work -- 7 Conclusion -- References -- Example Guided Synthesis of Linear Approximations for Neural Network Verification -- 1 Introduction. 2 Preliminaries -- 2.1 Neural Networks -- 2.2 Existing Neural Network Verification Techniques and Limitations -- 3 Problem Statement and Challenges -- 3.1 The Synthesis Problem -- 3.2 Challenges and Our Solution -- 4 Our Approach -- 4.1 Partitioning the Input Interval Space (Ix) -- 4.2 Learning the Function g(l, u) -- 4.3 Ensuring Soundness of the Linear Approximations -- 4.4 Efficient Lookup of the Linear Bounds -- 5 Evaluation -- 5.1 Benchmarks -- 5.2 Experimental Results -- 6 Related Work -- 7 Conclusions -- References -- Verifying Neural Networks Against Backdoor Attacks -- 1 Introduction -- 2 Problem Definition -- 3 Verifying Backdoor Absence -- 3.1 Overall Algorithm -- 3.2 Verifying Backdoor Absence Against a Set of Images -- 3.3 Abstract Interpretation -- 3.4 Generating Backdoor Triggers -- 3.5 Correctness and Complexity -- 3.6 Discussion -- 4 Implementation and Evaluation -- 5 Related Work -- 6 Conclusion -- References -- Trainify: A CEGAR-Driven Training and Verification Framework for Safe Deep Reinforcement Learning -- 1 Introduction -- 2 Deep Reinforcement Learning (DRL) -- 3 Model Checking of DRL Systems -- 3.1 The Model Checking Problem -- 3.2 Challenges in Model Checking DRL Systems -- 4 The CEGAR-Driven DRL Approach -- 4.1 The Framework -- 4.2 Training on Abstract States -- 4.3 Model Checking Trained DRL Systems -- 4.4 Counterexample-Guided Refinement -- 5 Implementation and Evaluation -- 5.1 Implementation -- 5.2 Benchmarks and Experimental Settings -- 5.3 Reliability and Verifiability Comparison -- 5.4 Performance Comparison -- 6 Related Work -- 7 Discussion and Conclusion -- References -- Neural Network Robustness as a Verification Property: A Principled Case Study -- 1 Introduction -- 2 Existing Training Techniques and Definitions of Robustness -- 3 Robustness in Evaluation, Attack and Verification. 4 Relative Comparison of Definitions of Robustness -- 4.1 Standard and Lipschitz Robustness -- 4.2 (Strong) Classification Robustness -- 4.3 Standard vs Classification Robustness -- 5 Other Properties of Robustness Definitions -- 6 Conclusions -- References -- Software Verification and Model Checking -- The Lattice-Theoretic Essence of Property Directed Reachability Analysis*-12pt -- 1 Introduction -- 2 Fixed-points in Complete Lattices -- 3 Lattice-Theoretic Reconstruction of PDR -- 3.1 Positive LT-PDR: Sequential Positive Witnesses -- 3.2 Negative PDR: Sequential Negative Witnesses -- 3.3 LT-PDR: Integrating Positive and Negative -- 4 Structural Theory of PDR by Category Theory -- 4.1 Categorical Modeling of Dynamics and Predicate Transformers -- 4.2 Structural Theory of PDR from Transition Systems -- 5 Known and New PDR Algorithms as Instances -- 5.1 LT-PDRs for Kripke Structures: PDRF-Krand PDRIB-Kr -- 5.2 LT-PDR for MDPs: PDRIB-MDP -- 5.3 LT-PDR for Markov Reward Models: PDRMRM -- 6 Implementation and Evaluation -- 7 Conclusions and Future Work -- References -- Affine Loop Invariant Generation via Matrix Algebra -- 1 Introduction -- 1.1 Related Work -- 2 Preliminaries -- 3 Affine Invariants via Farkas' Lemma -- 4 Single-Branch Affine Loops with Deterministic Updates -- 4.1 Derived Constraints from the Farkas Tables -- 4.2 Loops with Tautological Guard -- 4.3 Loops with Guard: Single-Constraint Case -- 4.4 Loops with Guard: Multi-constraint Case -- 5 Generalizations -- 5.1 Affine Loops with Non-deterministic Updates -- 5.2 An Extension to Bidirectional Affine Invariants -- 5.3 Other Possible Generalizations -- 6 Approximation of Eigenvectors through Continuity -- 7 Experimental Results -- References -- Data-driven Numerical Invariant Synthesis with Automatic Generation of Attributes -- 1 Introduction. 2 Safety Verification Using Learning of Invariants -- 2.1 Linear Constraints and Safety Verification -- 2.2 The ICE Learning Framework -- 2.3 ICE-DT: Invariant Learning Using Decision Trees -- 3 Linear Formulas as Abstract Objects -- 4 Generating Attributes from Sample Separators -- 4.1 Abstract Sample Separators -- 4.2 Computing a Join-Maximal Abstract Separator -- 4.3 Integrating Separator Computation in ICE-DT -- 4.4 Computing Separators Incrementally -- 5 Experiments -- 6 Conclusion -- References -- Proof-Guided Underapproximation Widening for Bounded Model Checking -- 1 Introduction -- 2 Background -- 2.1 Language Model -- 2.2 VC Generation for a Procedure -- 2.3 Static Versus Dynamic Inlining -- 2.4 Verification with Stratified Inlining -- 2.5 Overapproximation Refinement Guided Stratified Inlining -- 3 Overview -- 3.1 Underapproximation Widening -- 4 Algorithms -- 4.1 Underapproximation Widening Guided Stratified Inlining (UnderWidenSI) -- 4.2 Portfolio Technique -- 5 Experimental Results -- 5.1 Corral Versus Legion -- 5.2 Performance of Legion+ -- 6 Related Work -- 7 Conclusion -- References -- SolCMC: Solidity Compiler's Model Checker -- 1 Introduction -- 2 Solidity Model Checking -- 2.1 The CHC Verification Engine -- 2.2 Horn Encoding -- 3 User Features -- 4 Real World Experiments -- 4.1 CHC Solver Options -- 4.2 Deposit Contract -- 4.3 ERC777 -- 4.4 Discussion -- 5 Conclusions and Future Work -- References -- Hyperproperties and Security -- Software Verification of Hyperproperties Beyond k-Safety -- 1 Introduction -- 1.1 Verification Beyond k-Safety -- 1.2 Contributions and Structure -- 2 Overview: Reductions and Quantification as a Game -- 2.1 Reductions as a Game -- 2.2 Beyond k-Safety: Quantification as a Game -- 3 Preliminaries -- 4 Observation-Based HyperLTL -- 5 Reductions as a Game -- 6 Verification Beyond k-Safety. 6.1 Existential Trace Quantification as a Game. |
author_facet |
Shoham, Sharon. Vizel, Yakir. |
author_variant |
s s ss |
author2 |
Vizel, Yakir. |
author2_variant |
y v yv |
author2_role |
TeilnehmendeR |
author_sort |
Shoham, Sharon. |
title |
Computer Aided Verification : 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I. |
title_sub |
34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I. |
title_full |
Computer Aided Verification : 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I. |
title_fullStr |
Computer Aided Verification : 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I. |
title_full_unstemmed |
Computer Aided Verification : 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I. |
title_auth |
Computer Aided Verification : 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I. |
title_new |
Computer Aided Verification : |
title_sort |
computer aided verification : 34th international conference, cav 2022, haifa, israel, august 7-10, 2022, proceedings, part i. |
series |
Lecture Notes in Computer Science Series ; |
series2 |
Lecture Notes in Computer Science Series ; |
publisher |
Springer International Publishing AG, |
publishDate |
2022 |
physical |
1 online resource (563 pages) |
edition |
1st ed. |
contents |
Intro -- Preface -- Organization -- Contents - Part I -- Contents - Part II -- Invited Papers -- A Billion SMT Queries a Day (Invited Paper) -- 1 Introduction -- 2 Eliminate Writing Specifications -- 2.1 Generating Possible Specifications (Findings) -- 3 Domain-Specific Abstractions -- 4 SMT Solving at Cloud Scale -- 4.1 Monotonicity in Runtimes Across Solver Versions -- 4.2 Stability of the Solvers -- 4.3 Concluding Remarks -- References -- Program Verification with Constrained Horn Clauses (Invited Paper) -- 1 Introduction -- 2 Logic of Constrained Horn Clauses -- 3 Solving CHC Modulo Theories -- References -- Formal Methods for Probabilistic Programs -- Data-Driven Invariant Learning for Probabilistic Programs -- 1 Introduction -- 2 Preliminaries -- 3 Algorithm Overview -- 4 Learning Exact Invariants -- 4.1 Generate Features (getFeatures) -- 4.2 Sample Initial States (sampleStates) -- 4.3 Sample Training Data (sampleTraces) -- 4.4 Learning a Model Tree (learnInv) -- 4.5 Extracting Expectations from Models (extractInv) -- 4.6 Verify Extracted Expectations (verifyInv) -- 5 Learning Sub-invariants -- 5.1 Sample Training Data (sampleTraces) -- 5.2 Learning a Neural Model Tree (learnInv) -- 5.3 Verify Extracted Expectations (verifyInv) -- 6 Evaluations -- 6.1 R1: Evaluation of the Exact Invariant Method -- 6.2 R2: Evaluation of the Sub-invariant Method -- 7 Related Work -- References -- Sound and Complete Certificates for Quantitative Termination Analysis of Probabilistic Programs -- 1 Introduction -- 2 Overview -- 3 Preliminaries -- 4 A Sound and Complete Characterization of SIs -- 5 Stochastic Invariants for LBPT -- 6 Automated Template-Based Synthesis Algorithm -- 7 Experimental Results -- 8 Related Works -- 9 Conclusion -- References -- Does a Program Yield the Right Distribution? -- 1 Introduction -- 2 Generating Functions. 2.1 The Ring of Formal Power Series -- 2.2 Probability Generating Functions -- 3 ReDiP: A Probabilistic Programming Language -- 3.1 Program States and Variables -- 3.2 Syntax of ReDiP -- 3.3 The Statement x += iid(D, y) -- 4 Interpreting ReDiP with PGF -- 4.1 A Domain for Distribution Transformation -- 4.2 From Programs to PGF Transformers -- 4.3 Probabilistic Termination -- 5 Reasoning About Loops -- 5.1 Fixed Point Induction -- 5.2 Deciding Equivalence of Loop-free Programs -- 6 Case Studies -- 7 Related Work -- 8 Conclusion and Future Work -- References -- Abstraction-Refinement for Hierarchical Probabilistic Models -- 1 Introduction -- 2 Overview -- 3 Formal Problem Statement -- 3.1 Background -- 3.2 Hierarchical MDPs -- 3.3 Optimal Local Subpolicies and Beyond -- 4 Solving hMDPs with Abstraction-Refinement -- 4.1 The Macro-MDP Formulation -- 4.2 The Uncertain Macro-MDP Formulation -- 4.3 Set-Based SubMDP Analysis -- 4.4 Templates for Set-Based subMDP Analysis -- 5 Implementing the Abstraction-Refinement Loop -- 6 Experiments -- 7 Related Work -- 8 Conclusion -- References -- Formal Methods for Neural Networks -- Shared Certificates for Neural Network Verification -- 1 Introduction -- 2 Background -- 3 Proof Sharing with Templates -- 3.1 Motivation: Proof Subsumption -- 3.2 Proof Sharing with Templates -- 4 Efficient Verification via Proof Sharing -- 4.1 Choice of Abstract Domain -- 4.2 Template Generation -- 4.3 Robustness to Adversarial Patches -- 4.4 Geometric Robustness -- 4.5 Requirements for Proof Sharing -- 5 Experimental Evaluation -- 5.1 Experimental Setup -- 5.2 Robustness Against Adversarial Patches -- 5.3 Robustness Against Geometric Perturbations -- 5.4 Discussion -- 6 Related Work -- 7 Conclusion -- References -- Example Guided Synthesis of Linear Approximations for Neural Network Verification -- 1 Introduction. 2 Preliminaries -- 2.1 Neural Networks -- 2.2 Existing Neural Network Verification Techniques and Limitations -- 3 Problem Statement and Challenges -- 3.1 The Synthesis Problem -- 3.2 Challenges and Our Solution -- 4 Our Approach -- 4.1 Partitioning the Input Interval Space (Ix) -- 4.2 Learning the Function g(l, u) -- 4.3 Ensuring Soundness of the Linear Approximations -- 4.4 Efficient Lookup of the Linear Bounds -- 5 Evaluation -- 5.1 Benchmarks -- 5.2 Experimental Results -- 6 Related Work -- 7 Conclusions -- References -- Verifying Neural Networks Against Backdoor Attacks -- 1 Introduction -- 2 Problem Definition -- 3 Verifying Backdoor Absence -- 3.1 Overall Algorithm -- 3.2 Verifying Backdoor Absence Against a Set of Images -- 3.3 Abstract Interpretation -- 3.4 Generating Backdoor Triggers -- 3.5 Correctness and Complexity -- 3.6 Discussion -- 4 Implementation and Evaluation -- 5 Related Work -- 6 Conclusion -- References -- Trainify: A CEGAR-Driven Training and Verification Framework for Safe Deep Reinforcement Learning -- 1 Introduction -- 2 Deep Reinforcement Learning (DRL) -- 3 Model Checking of DRL Systems -- 3.1 The Model Checking Problem -- 3.2 Challenges in Model Checking DRL Systems -- 4 The CEGAR-Driven DRL Approach -- 4.1 The Framework -- 4.2 Training on Abstract States -- 4.3 Model Checking Trained DRL Systems -- 4.4 Counterexample-Guided Refinement -- 5 Implementation and Evaluation -- 5.1 Implementation -- 5.2 Benchmarks and Experimental Settings -- 5.3 Reliability and Verifiability Comparison -- 5.4 Performance Comparison -- 6 Related Work -- 7 Discussion and Conclusion -- References -- Neural Network Robustness as a Verification Property: A Principled Case Study -- 1 Introduction -- 2 Existing Training Techniques and Definitions of Robustness -- 3 Robustness in Evaluation, Attack and Verification. 4 Relative Comparison of Definitions of Robustness -- 4.1 Standard and Lipschitz Robustness -- 4.2 (Strong) Classification Robustness -- 4.3 Standard vs Classification Robustness -- 5 Other Properties of Robustness Definitions -- 6 Conclusions -- References -- Software Verification and Model Checking -- The Lattice-Theoretic Essence of Property Directed Reachability Analysis*-12pt -- 1 Introduction -- 2 Fixed-points in Complete Lattices -- 3 Lattice-Theoretic Reconstruction of PDR -- 3.1 Positive LT-PDR: Sequential Positive Witnesses -- 3.2 Negative PDR: Sequential Negative Witnesses -- 3.3 LT-PDR: Integrating Positive and Negative -- 4 Structural Theory of PDR by Category Theory -- 4.1 Categorical Modeling of Dynamics and Predicate Transformers -- 4.2 Structural Theory of PDR from Transition Systems -- 5 Known and New PDR Algorithms as Instances -- 5.1 LT-PDRs for Kripke Structures: PDRF-Krand PDRIB-Kr -- 5.2 LT-PDR for MDPs: PDRIB-MDP -- 5.3 LT-PDR for Markov Reward Models: PDRMRM -- 6 Implementation and Evaluation -- 7 Conclusions and Future Work -- References -- Affine Loop Invariant Generation via Matrix Algebra -- 1 Introduction -- 1.1 Related Work -- 2 Preliminaries -- 3 Affine Invariants via Farkas' Lemma -- 4 Single-Branch Affine Loops with Deterministic Updates -- 4.1 Derived Constraints from the Farkas Tables -- 4.2 Loops with Tautological Guard -- 4.3 Loops with Guard: Single-Constraint Case -- 4.4 Loops with Guard: Multi-constraint Case -- 5 Generalizations -- 5.1 Affine Loops with Non-deterministic Updates -- 5.2 An Extension to Bidirectional Affine Invariants -- 5.3 Other Possible Generalizations -- 6 Approximation of Eigenvectors through Continuity -- 7 Experimental Results -- References -- Data-driven Numerical Invariant Synthesis with Automatic Generation of Attributes -- 1 Introduction. 2 Safety Verification Using Learning of Invariants -- 2.1 Linear Constraints and Safety Verification -- 2.2 The ICE Learning Framework -- 2.3 ICE-DT: Invariant Learning Using Decision Trees -- 3 Linear Formulas as Abstract Objects -- 4 Generating Attributes from Sample Separators -- 4.1 Abstract Sample Separators -- 4.2 Computing a Join-Maximal Abstract Separator -- 4.3 Integrating Separator Computation in ICE-DT -- 4.4 Computing Separators Incrementally -- 5 Experiments -- 6 Conclusion -- References -- Proof-Guided Underapproximation Widening for Bounded Model Checking -- 1 Introduction -- 2 Background -- 2.1 Language Model -- 2.2 VC Generation for a Procedure -- 2.3 Static Versus Dynamic Inlining -- 2.4 Verification with Stratified Inlining -- 2.5 Overapproximation Refinement Guided Stratified Inlining -- 3 Overview -- 3.1 Underapproximation Widening -- 4 Algorithms -- 4.1 Underapproximation Widening Guided Stratified Inlining (UnderWidenSI) -- 4.2 Portfolio Technique -- 5 Experimental Results -- 5.1 Corral Versus Legion -- 5.2 Performance of Legion+ -- 6 Related Work -- 7 Conclusion -- References -- SolCMC: Solidity Compiler's Model Checker -- 1 Introduction -- 2 Solidity Model Checking -- 2.1 The CHC Verification Engine -- 2.2 Horn Encoding -- 3 User Features -- 4 Real World Experiments -- 4.1 CHC Solver Options -- 4.2 Deposit Contract -- 4.3 ERC777 -- 4.4 Discussion -- 5 Conclusions and Future Work -- References -- Hyperproperties and Security -- Software Verification of Hyperproperties Beyond k-Safety -- 1 Introduction -- 1.1 Verification Beyond k-Safety -- 1.2 Contributions and Structure -- 2 Overview: Reductions and Quantification as a Game -- 2.1 Reductions as a Game -- 2.2 Beyond k-Safety: Quantification as a Game -- 3 Preliminaries -- 4 Observation-Based HyperLTL -- 5 Reductions as a Game -- 6 Verification Beyond k-Safety. 6.1 Existential Trace Quantification as a Game. |
isbn |
9783031131851 9783031131844 |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.758 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=7070218 |
illustrated |
Not Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.14 |
dewey-sort |
15.14 |
dewey-raw |
005.14 |
dewey-search |
005.14 |
oclc_num |
1341275496 |
work_keys_str_mv |
AT shohamsharon computeraidedverification34thinternationalconferencecav2022haifaisraelaugust7102022proceedingsparti AT vizelyakir computeraidedverification34thinternationalconferencecav2022haifaisraelaugust7102022proceedingsparti |
status_str |
n |
ids_txt_mv |
(MiAaPQ)5007070218 (Au-PeEL)EBL7070218 (OCoLC)1341275496 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Lecture Notes in Computer Science Series ; v.13371 |
is_hierarchy_title |
Computer Aided Verification : 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I. |
container_title |
Lecture Notes in Computer Science Series ; v.13371 |
author2_original_writing_str_mv |
noLinkedField |
marc_error |
Info : MARC8 translation shorter than ISO-8859-1, choosing MARC8. --- [ 856 : z ] |
_version_ |
1792331064116510721 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>11152nam a22004813i 4500</leader><controlfield tag="001">5007070218</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20240229073847.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">240229s2022 xx o ||||0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031131851</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9783031131844</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5007070218</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL7070218</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1341275496</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.758</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.14</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shoham, Sharon.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer Aided Verification :</subfield><subfield code="b">34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham :</subfield><subfield code="b">Springer International Publishing AG,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (563 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science Series ;</subfield><subfield code="v">v.13371</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro -- Preface -- Organization -- Contents - Part I -- Contents - Part II -- Invited Papers -- A Billion SMT Queries a Day (Invited Paper) -- 1 Introduction -- 2 Eliminate Writing Specifications -- 2.1 Generating Possible Specifications (Findings) -- 3 Domain-Specific Abstractions -- 4 SMT Solving at Cloud Scale -- 4.1 Monotonicity in Runtimes Across Solver Versions -- 4.2 Stability of the Solvers -- 4.3 Concluding Remarks -- References -- Program Verification with Constrained Horn Clauses (Invited Paper) -- 1 Introduction -- 2 Logic of Constrained Horn Clauses -- 3 Solving CHC Modulo Theories -- References -- Formal Methods for Probabilistic Programs -- Data-Driven Invariant Learning for Probabilistic Programs -- 1 Introduction -- 2 Preliminaries -- 3 Algorithm Overview -- 4 Learning Exact Invariants -- 4.1 Generate Features (getFeatures) -- 4.2 Sample Initial States (sampleStates) -- 4.3 Sample Training Data (sampleTraces) -- 4.4 Learning a Model Tree (learnInv) -- 4.5 Extracting Expectations from Models (extractInv) -- 4.6 Verify Extracted Expectations (verifyInv) -- 5 Learning Sub-invariants -- 5.1 Sample Training Data (sampleTraces) -- 5.2 Learning a Neural Model Tree (learnInv) -- 5.3 Verify Extracted Expectations (verifyInv) -- 6 Evaluations -- 6.1 R1: Evaluation of the Exact Invariant Method -- 6.2 R2: Evaluation of the Sub-invariant Method -- 7 Related Work -- References -- Sound and Complete Certificates for Quantitative Termination Analysis of Probabilistic Programs -- 1 Introduction -- 2 Overview -- 3 Preliminaries -- 4 A Sound and Complete Characterization of SIs -- 5 Stochastic Invariants for LBPT -- 6 Automated Template-Based Synthesis Algorithm -- 7 Experimental Results -- 8 Related Works -- 9 Conclusion -- References -- Does a Program Yield the Right Distribution? -- 1 Introduction -- 2 Generating Functions.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.1 The Ring of Formal Power Series -- 2.2 Probability Generating Functions -- 3 ReDiP: A Probabilistic Programming Language -- 3.1 Program States and Variables -- 3.2 Syntax of ReDiP -- 3.3 The Statement x += iid(D, y) -- 4 Interpreting ReDiP with PGF -- 4.1 A Domain for Distribution Transformation -- 4.2 From Programs to PGF Transformers -- 4.3 Probabilistic Termination -- 5 Reasoning About Loops -- 5.1 Fixed Point Induction -- 5.2 Deciding Equivalence of Loop-free Programs -- 6 Case Studies -- 7 Related Work -- 8 Conclusion and Future Work -- References -- Abstraction-Refinement for Hierarchical Probabilistic Models -- 1 Introduction -- 2 Overview -- 3 Formal Problem Statement -- 3.1 Background -- 3.2 Hierarchical MDPs -- 3.3 Optimal Local Subpolicies and Beyond -- 4 Solving hMDPs with Abstraction-Refinement -- 4.1 The Macro-MDP Formulation -- 4.2 The Uncertain Macro-MDP Formulation -- 4.3 Set-Based SubMDP Analysis -- 4.4 Templates for Set-Based subMDP Analysis -- 5 Implementing the Abstraction-Refinement Loop -- 6 Experiments -- 7 Related Work -- 8 Conclusion -- References -- Formal Methods for Neural Networks -- Shared Certificates for Neural Network Verification -- 1 Introduction -- 2 Background -- 3 Proof Sharing with Templates -- 3.1 Motivation: Proof Subsumption -- 3.2 Proof Sharing with Templates -- 4 Efficient Verification via Proof Sharing -- 4.1 Choice of Abstract Domain -- 4.2 Template Generation -- 4.3 Robustness to Adversarial Patches -- 4.4 Geometric Robustness -- 4.5 Requirements for Proof Sharing -- 5 Experimental Evaluation -- 5.1 Experimental Setup -- 5.2 Robustness Against Adversarial Patches -- 5.3 Robustness Against Geometric Perturbations -- 5.4 Discussion -- 6 Related Work -- 7 Conclusion -- References -- Example Guided Synthesis of Linear Approximations for Neural Network Verification -- 1 Introduction.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2 Preliminaries -- 2.1 Neural Networks -- 2.2 Existing Neural Network Verification Techniques and Limitations -- 3 Problem Statement and Challenges -- 3.1 The Synthesis Problem -- 3.2 Challenges and Our Solution -- 4 Our Approach -- 4.1 Partitioning the Input Interval Space (Ix) -- 4.2 Learning the Function g(l, u) -- 4.3 Ensuring Soundness of the Linear Approximations -- 4.4 Efficient Lookup of the Linear Bounds -- 5 Evaluation -- 5.1 Benchmarks -- 5.2 Experimental Results -- 6 Related Work -- 7 Conclusions -- References -- Verifying Neural Networks Against Backdoor Attacks -- 1 Introduction -- 2 Problem Definition -- 3 Verifying Backdoor Absence -- 3.1 Overall Algorithm -- 3.2 Verifying Backdoor Absence Against a Set of Images -- 3.3 Abstract Interpretation -- 3.4 Generating Backdoor Triggers -- 3.5 Correctness and Complexity -- 3.6 Discussion -- 4 Implementation and Evaluation -- 5 Related Work -- 6 Conclusion -- References -- Trainify: A CEGAR-Driven Training and Verification Framework for Safe Deep Reinforcement Learning -- 1 Introduction -- 2 Deep Reinforcement Learning (DRL) -- 3 Model Checking of DRL Systems -- 3.1 The Model Checking Problem -- 3.2 Challenges in Model Checking DRL Systems -- 4 The CEGAR-Driven DRL Approach -- 4.1 The Framework -- 4.2 Training on Abstract States -- 4.3 Model Checking Trained DRL Systems -- 4.4 Counterexample-Guided Refinement -- 5 Implementation and Evaluation -- 5.1 Implementation -- 5.2 Benchmarks and Experimental Settings -- 5.3 Reliability and Verifiability Comparison -- 5.4 Performance Comparison -- 6 Related Work -- 7 Discussion and Conclusion -- References -- Neural Network Robustness as a Verification Property: A Principled Case Study -- 1 Introduction -- 2 Existing Training Techniques and Definitions of Robustness -- 3 Robustness in Evaluation, Attack and Verification.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4 Relative Comparison of Definitions of Robustness -- 4.1 Standard and Lipschitz Robustness -- 4.2 (Strong) Classification Robustness -- 4.3 Standard vs Classification Robustness -- 5 Other Properties of Robustness Definitions -- 6 Conclusions -- References -- Software Verification and Model Checking -- The Lattice-Theoretic Essence of Property Directed Reachability Analysis*-12pt -- 1 Introduction -- 2 Fixed-points in Complete Lattices -- 3 Lattice-Theoretic Reconstruction of PDR -- 3.1 Positive LT-PDR: Sequential Positive Witnesses -- 3.2 Negative PDR: Sequential Negative Witnesses -- 3.3 LT-PDR: Integrating Positive and Negative -- 4 Structural Theory of PDR by Category Theory -- 4.1 Categorical Modeling of Dynamics and Predicate Transformers -- 4.2 Structural Theory of PDR from Transition Systems -- 5 Known and New PDR Algorithms as Instances -- 5.1 LT-PDRs for Kripke Structures: PDRF-Krand PDRIB-Kr -- 5.2 LT-PDR for MDPs: PDRIB-MDP -- 5.3 LT-PDR for Markov Reward Models: PDRMRM -- 6 Implementation and Evaluation -- 7 Conclusions and Future Work -- References -- Affine Loop Invariant Generation via Matrix Algebra -- 1 Introduction -- 1.1 Related Work -- 2 Preliminaries -- 3 Affine Invariants via Farkas' Lemma -- 4 Single-Branch Affine Loops with Deterministic Updates -- 4.1 Derived Constraints from the Farkas Tables -- 4.2 Loops with Tautological Guard -- 4.3 Loops with Guard: Single-Constraint Case -- 4.4 Loops with Guard: Multi-constraint Case -- 5 Generalizations -- 5.1 Affine Loops with Non-deterministic Updates -- 5.2 An Extension to Bidirectional Affine Invariants -- 5.3 Other Possible Generalizations -- 6 Approximation of Eigenvectors through Continuity -- 7 Experimental Results -- References -- Data-driven Numerical Invariant Synthesis with Automatic Generation of Attributes -- 1 Introduction.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2 Safety Verification Using Learning of Invariants -- 2.1 Linear Constraints and Safety Verification -- 2.2 The ICE Learning Framework -- 2.3 ICE-DT: Invariant Learning Using Decision Trees -- 3 Linear Formulas as Abstract Objects -- 4 Generating Attributes from Sample Separators -- 4.1 Abstract Sample Separators -- 4.2 Computing a Join-Maximal Abstract Separator -- 4.3 Integrating Separator Computation in ICE-DT -- 4.4 Computing Separators Incrementally -- 5 Experiments -- 6 Conclusion -- References -- Proof-Guided Underapproximation Widening for Bounded Model Checking -- 1 Introduction -- 2 Background -- 2.1 Language Model -- 2.2 VC Generation for a Procedure -- 2.3 Static Versus Dynamic Inlining -- 2.4 Verification with Stratified Inlining -- 2.5 Overapproximation Refinement Guided Stratified Inlining -- 3 Overview -- 3.1 Underapproximation Widening -- 4 Algorithms -- 4.1 Underapproximation Widening Guided Stratified Inlining (UnderWidenSI) -- 4.2 Portfolio Technique -- 5 Experimental Results -- 5.1 Corral Versus Legion -- 5.2 Performance of Legion+ -- 6 Related Work -- 7 Conclusion -- References -- SolCMC: Solidity Compiler's Model Checker -- 1 Introduction -- 2 Solidity Model Checking -- 2.1 The CHC Verification Engine -- 2.2 Horn Encoding -- 3 User Features -- 4 Real World Experiments -- 4.1 CHC Solver Options -- 4.2 Deposit Contract -- 4.3 ERC777 -- 4.4 Discussion -- 5 Conclusions and Future Work -- References -- Hyperproperties and Security -- Software Verification of Hyperproperties Beyond k-Safety -- 1 Introduction -- 1.1 Verification Beyond k-Safety -- 1.2 Contributions and Structure -- 2 Overview: Reductions and Quantification as a Game -- 2.1 Reductions as a Game -- 2.2 Beyond k-Safety: Quantification as a Game -- 3 Preliminaries -- 4 Observation-Based HyperLTL -- 5 Reductions as a Game -- 6 Verification Beyond k-Safety.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">6.1 Existential Trace Quantification as a Game.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. </subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vizel, Yakir.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Shoham, Sharon</subfield><subfield code="t">Computer Aided Verification</subfield><subfield code="d">Cham : Springer International Publishing AG,c2022</subfield><subfield code="z">9783031131844</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science Series</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=7070218</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |