Computer Aided Verification : : 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I.

Saved in:
Bibliographic Details
Superior document:Lecture Notes in Computer Science Series ; v.13371
:
TeilnehmendeR:
Place / Publishing House:Cham : : Springer International Publishing AG,, 2022.
©2022.
Year of Publication:2022
Edition:1st ed.
Language:English
Series:Lecture Notes in Computer Science Series
Online Access:
Physical Description:1 online resource (563 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 5007070218
ctrlnum (MiAaPQ)5007070218
(Au-PeEL)EBL7070218
(OCoLC)1341275496
collection bib_alma
record_format marc
spelling Shoham, Sharon.
Computer Aided Verification : 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I.
1st ed.
Cham : Springer International Publishing AG, 2022.
©2022.
1 online resource (563 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Lecture Notes in Computer Science Series ; v.13371
Intro -- Preface -- Organization -- Contents - Part I -- Contents - Part II -- Invited Papers -- A Billion SMT Queries a Day (Invited Paper) -- 1 Introduction -- 2 Eliminate Writing Specifications -- 2.1 Generating Possible Specifications (Findings) -- 3 Domain-Specific Abstractions -- 4 SMT Solving at Cloud Scale -- 4.1 Monotonicity in Runtimes Across Solver Versions -- 4.2 Stability of the Solvers -- 4.3 Concluding Remarks -- References -- Program Verification with Constrained Horn Clauses (Invited Paper) -- 1 Introduction -- 2 Logic of Constrained Horn Clauses -- 3 Solving CHC Modulo Theories -- References -- Formal Methods for Probabilistic Programs -- Data-Driven Invariant Learning for Probabilistic Programs -- 1 Introduction -- 2 Preliminaries -- 3 Algorithm Overview -- 4 Learning Exact Invariants -- 4.1 Generate Features (getFeatures) -- 4.2 Sample Initial States (sampleStates) -- 4.3 Sample Training Data (sampleTraces) -- 4.4 Learning a Model Tree (learnInv) -- 4.5 Extracting Expectations from Models (extractInv) -- 4.6 Verify Extracted Expectations (verifyInv) -- 5 Learning Sub-invariants -- 5.1 Sample Training Data (sampleTraces) -- 5.2 Learning a Neural Model Tree (learnInv) -- 5.3 Verify Extracted Expectations (verifyInv) -- 6 Evaluations -- 6.1 R1: Evaluation of the Exact Invariant Method -- 6.2 R2: Evaluation of the Sub-invariant Method -- 7 Related Work -- References -- Sound and Complete Certificates for Quantitative Termination Analysis of Probabilistic Programs -- 1 Introduction -- 2 Overview -- 3 Preliminaries -- 4 A Sound and Complete Characterization of SIs -- 5 Stochastic Invariants for LBPT -- 6 Automated Template-Based Synthesis Algorithm -- 7 Experimental Results -- 8 Related Works -- 9 Conclusion -- References -- Does a Program Yield the Right Distribution? -- 1 Introduction -- 2 Generating Functions.
2.1 The Ring of Formal Power Series -- 2.2 Probability Generating Functions -- 3 ReDiP: A Probabilistic Programming Language -- 3.1 Program States and Variables -- 3.2 Syntax of ReDiP -- 3.3 The Statement x += iid(D, y) -- 4 Interpreting ReDiP with PGF -- 4.1 A Domain for Distribution Transformation -- 4.2 From Programs to PGF Transformers -- 4.3 Probabilistic Termination -- 5 Reasoning About Loops -- 5.1 Fixed Point Induction -- 5.2 Deciding Equivalence of Loop-free Programs -- 6 Case Studies -- 7 Related Work -- 8 Conclusion and Future Work -- References -- Abstraction-Refinement for Hierarchical Probabilistic Models -- 1 Introduction -- 2 Overview -- 3 Formal Problem Statement -- 3.1 Background -- 3.2 Hierarchical MDPs -- 3.3 Optimal Local Subpolicies and Beyond -- 4 Solving hMDPs with Abstraction-Refinement -- 4.1 The Macro-MDP Formulation -- 4.2 The Uncertain Macro-MDP Formulation -- 4.3 Set-Based SubMDP Analysis -- 4.4 Templates for Set-Based subMDP Analysis -- 5 Implementing the Abstraction-Refinement Loop -- 6 Experiments -- 7 Related Work -- 8 Conclusion -- References -- Formal Methods for Neural Networks -- Shared Certificates for Neural Network Verification -- 1 Introduction -- 2 Background -- 3 Proof Sharing with Templates -- 3.1 Motivation: Proof Subsumption -- 3.2 Proof Sharing with Templates -- 4 Efficient Verification via Proof Sharing -- 4.1 Choice of Abstract Domain -- 4.2 Template Generation -- 4.3 Robustness to Adversarial Patches -- 4.4 Geometric Robustness -- 4.5 Requirements for Proof Sharing -- 5 Experimental Evaluation -- 5.1 Experimental Setup -- 5.2 Robustness Against Adversarial Patches -- 5.3 Robustness Against Geometric Perturbations -- 5.4 Discussion -- 6 Related Work -- 7 Conclusion -- References -- Example Guided Synthesis of Linear Approximations for Neural Network Verification -- 1 Introduction.
2 Preliminaries -- 2.1 Neural Networks -- 2.2 Existing Neural Network Verification Techniques and Limitations -- 3 Problem Statement and Challenges -- 3.1 The Synthesis Problem -- 3.2 Challenges and Our Solution -- 4 Our Approach -- 4.1 Partitioning the Input Interval Space (Ix) -- 4.2 Learning the Function g(l, u) -- 4.3 Ensuring Soundness of the Linear Approximations -- 4.4 Efficient Lookup of the Linear Bounds -- 5 Evaluation -- 5.1 Benchmarks -- 5.2 Experimental Results -- 6 Related Work -- 7 Conclusions -- References -- Verifying Neural Networks Against Backdoor Attacks -- 1 Introduction -- 2 Problem Definition -- 3 Verifying Backdoor Absence -- 3.1 Overall Algorithm -- 3.2 Verifying Backdoor Absence Against a Set of Images -- 3.3 Abstract Interpretation -- 3.4 Generating Backdoor Triggers -- 3.5 Correctness and Complexity -- 3.6 Discussion -- 4 Implementation and Evaluation -- 5 Related Work -- 6 Conclusion -- References -- Trainify: A CEGAR-Driven Training and Verification Framework for Safe Deep Reinforcement Learning -- 1 Introduction -- 2 Deep Reinforcement Learning (DRL) -- 3 Model Checking of DRL Systems -- 3.1 The Model Checking Problem -- 3.2 Challenges in Model Checking DRL Systems -- 4 The CEGAR-Driven DRL Approach -- 4.1 The Framework -- 4.2 Training on Abstract States -- 4.3 Model Checking Trained DRL Systems -- 4.4 Counterexample-Guided Refinement -- 5 Implementation and Evaluation -- 5.1 Implementation -- 5.2 Benchmarks and Experimental Settings -- 5.3 Reliability and Verifiability Comparison -- 5.4 Performance Comparison -- 6 Related Work -- 7 Discussion and Conclusion -- References -- Neural Network Robustness as a Verification Property: A Principled Case Study -- 1 Introduction -- 2 Existing Training Techniques and Definitions of Robustness -- 3 Robustness in Evaluation, Attack and Verification.
4 Relative Comparison of Definitions of Robustness -- 4.1 Standard and Lipschitz Robustness -- 4.2 (Strong) Classification Robustness -- 4.3 Standard vs Classification Robustness -- 5 Other Properties of Robustness Definitions -- 6 Conclusions -- References -- Software Verification and Model Checking -- The Lattice-Theoretic Essence of Property Directed Reachability Analysis*-12pt -- 1 Introduction -- 2 Fixed-points in Complete Lattices -- 3 Lattice-Theoretic Reconstruction of PDR -- 3.1 Positive LT-PDR: Sequential Positive Witnesses -- 3.2 Negative PDR: Sequential Negative Witnesses -- 3.3 LT-PDR: Integrating Positive and Negative -- 4 Structural Theory of PDR by Category Theory -- 4.1 Categorical Modeling of Dynamics and Predicate Transformers -- 4.2 Structural Theory of PDR from Transition Systems -- 5 Known and New PDR Algorithms as Instances -- 5.1 LT-PDRs for Kripke Structures: PDRF-Krand PDRIB-Kr -- 5.2 LT-PDR for MDPs: PDRIB-MDP -- 5.3 LT-PDR for Markov Reward Models: PDRMRM -- 6 Implementation and Evaluation -- 7 Conclusions and Future Work -- References -- Affine Loop Invariant Generation via Matrix Algebra -- 1 Introduction -- 1.1 Related Work -- 2 Preliminaries -- 3 Affine Invariants via Farkas' Lemma -- 4 Single-Branch Affine Loops with Deterministic Updates -- 4.1 Derived Constraints from the Farkas Tables -- 4.2 Loops with Tautological Guard -- 4.3 Loops with Guard: Single-Constraint Case -- 4.4 Loops with Guard: Multi-constraint Case -- 5 Generalizations -- 5.1 Affine Loops with Non-deterministic Updates -- 5.2 An Extension to Bidirectional Affine Invariants -- 5.3 Other Possible Generalizations -- 6 Approximation of Eigenvectors through Continuity -- 7 Experimental Results -- References -- Data-driven Numerical Invariant Synthesis with Automatic Generation of Attributes -- 1 Introduction.
2 Safety Verification Using Learning of Invariants -- 2.1 Linear Constraints and Safety Verification -- 2.2 The ICE Learning Framework -- 2.3 ICE-DT: Invariant Learning Using Decision Trees -- 3 Linear Formulas as Abstract Objects -- 4 Generating Attributes from Sample Separators -- 4.1 Abstract Sample Separators -- 4.2 Computing a Join-Maximal Abstract Separator -- 4.3 Integrating Separator Computation in ICE-DT -- 4.4 Computing Separators Incrementally -- 5 Experiments -- 6 Conclusion -- References -- Proof-Guided Underapproximation Widening for Bounded Model Checking -- 1 Introduction -- 2 Background -- 2.1 Language Model -- 2.2 VC Generation for a Procedure -- 2.3 Static Versus Dynamic Inlining -- 2.4 Verification with Stratified Inlining -- 2.5 Overapproximation Refinement Guided Stratified Inlining -- 3 Overview -- 3.1 Underapproximation Widening -- 4 Algorithms -- 4.1 Underapproximation Widening Guided Stratified Inlining (UnderWidenSI) -- 4.2 Portfolio Technique -- 5 Experimental Results -- 5.1 Corral Versus Legion -- 5.2 Performance of Legion+ -- 6 Related Work -- 7 Conclusion -- References -- SolCMC: Solidity Compiler's Model Checker -- 1 Introduction -- 2 Solidity Model Checking -- 2.1 The CHC Verification Engine -- 2.2 Horn Encoding -- 3 User Features -- 4 Real World Experiments -- 4.1 CHC Solver Options -- 4.2 Deposit Contract -- 4.3 ERC777 -- 4.4 Discussion -- 5 Conclusions and Future Work -- References -- Hyperproperties and Security -- Software Verification of Hyperproperties Beyond k-Safety -- 1 Introduction -- 1.1 Verification Beyond k-Safety -- 1.2 Contributions and Structure -- 2 Overview: Reductions and Quantification as a Game -- 2.1 Reductions as a Game -- 2.2 Beyond k-Safety: Quantification as a Game -- 3 Preliminaries -- 4 Observation-Based HyperLTL -- 5 Reductions as a Game -- 6 Verification Beyond k-Safety.
6.1 Existential Trace Quantification as a Game.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic books.
Vizel, Yakir.
Print version: Shoham, Sharon Computer Aided Verification Cham : Springer International Publishing AG,c2022 9783031131844
ProQuest (Firm)
Lecture Notes in Computer Science Series
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=7070218 Click to View
language English
format eBook
author Shoham, Sharon.
spellingShingle Shoham, Sharon.
Computer Aided Verification : 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I.
Lecture Notes in Computer Science Series ;
Intro -- Preface -- Organization -- Contents - Part I -- Contents - Part II -- Invited Papers -- A Billion SMT Queries a Day (Invited Paper) -- 1 Introduction -- 2 Eliminate Writing Specifications -- 2.1 Generating Possible Specifications (Findings) -- 3 Domain-Specific Abstractions -- 4 SMT Solving at Cloud Scale -- 4.1 Monotonicity in Runtimes Across Solver Versions -- 4.2 Stability of the Solvers -- 4.3 Concluding Remarks -- References -- Program Verification with Constrained Horn Clauses (Invited Paper) -- 1 Introduction -- 2 Logic of Constrained Horn Clauses -- 3 Solving CHC Modulo Theories -- References -- Formal Methods for Probabilistic Programs -- Data-Driven Invariant Learning for Probabilistic Programs -- 1 Introduction -- 2 Preliminaries -- 3 Algorithm Overview -- 4 Learning Exact Invariants -- 4.1 Generate Features (getFeatures) -- 4.2 Sample Initial States (sampleStates) -- 4.3 Sample Training Data (sampleTraces) -- 4.4 Learning a Model Tree (learnInv) -- 4.5 Extracting Expectations from Models (extractInv) -- 4.6 Verify Extracted Expectations (verifyInv) -- 5 Learning Sub-invariants -- 5.1 Sample Training Data (sampleTraces) -- 5.2 Learning a Neural Model Tree (learnInv) -- 5.3 Verify Extracted Expectations (verifyInv) -- 6 Evaluations -- 6.1 R1: Evaluation of the Exact Invariant Method -- 6.2 R2: Evaluation of the Sub-invariant Method -- 7 Related Work -- References -- Sound and Complete Certificates for Quantitative Termination Analysis of Probabilistic Programs -- 1 Introduction -- 2 Overview -- 3 Preliminaries -- 4 A Sound and Complete Characterization of SIs -- 5 Stochastic Invariants for LBPT -- 6 Automated Template-Based Synthesis Algorithm -- 7 Experimental Results -- 8 Related Works -- 9 Conclusion -- References -- Does a Program Yield the Right Distribution? -- 1 Introduction -- 2 Generating Functions.
2.1 The Ring of Formal Power Series -- 2.2 Probability Generating Functions -- 3 ReDiP: A Probabilistic Programming Language -- 3.1 Program States and Variables -- 3.2 Syntax of ReDiP -- 3.3 The Statement x += iid(D, y) -- 4 Interpreting ReDiP with PGF -- 4.1 A Domain for Distribution Transformation -- 4.2 From Programs to PGF Transformers -- 4.3 Probabilistic Termination -- 5 Reasoning About Loops -- 5.1 Fixed Point Induction -- 5.2 Deciding Equivalence of Loop-free Programs -- 6 Case Studies -- 7 Related Work -- 8 Conclusion and Future Work -- References -- Abstraction-Refinement for Hierarchical Probabilistic Models -- 1 Introduction -- 2 Overview -- 3 Formal Problem Statement -- 3.1 Background -- 3.2 Hierarchical MDPs -- 3.3 Optimal Local Subpolicies and Beyond -- 4 Solving hMDPs with Abstraction-Refinement -- 4.1 The Macro-MDP Formulation -- 4.2 The Uncertain Macro-MDP Formulation -- 4.3 Set-Based SubMDP Analysis -- 4.4 Templates for Set-Based subMDP Analysis -- 5 Implementing the Abstraction-Refinement Loop -- 6 Experiments -- 7 Related Work -- 8 Conclusion -- References -- Formal Methods for Neural Networks -- Shared Certificates for Neural Network Verification -- 1 Introduction -- 2 Background -- 3 Proof Sharing with Templates -- 3.1 Motivation: Proof Subsumption -- 3.2 Proof Sharing with Templates -- 4 Efficient Verification via Proof Sharing -- 4.1 Choice of Abstract Domain -- 4.2 Template Generation -- 4.3 Robustness to Adversarial Patches -- 4.4 Geometric Robustness -- 4.5 Requirements for Proof Sharing -- 5 Experimental Evaluation -- 5.1 Experimental Setup -- 5.2 Robustness Against Adversarial Patches -- 5.3 Robustness Against Geometric Perturbations -- 5.4 Discussion -- 6 Related Work -- 7 Conclusion -- References -- Example Guided Synthesis of Linear Approximations for Neural Network Verification -- 1 Introduction.
2 Preliminaries -- 2.1 Neural Networks -- 2.2 Existing Neural Network Verification Techniques and Limitations -- 3 Problem Statement and Challenges -- 3.1 The Synthesis Problem -- 3.2 Challenges and Our Solution -- 4 Our Approach -- 4.1 Partitioning the Input Interval Space (Ix) -- 4.2 Learning the Function g(l, u) -- 4.3 Ensuring Soundness of the Linear Approximations -- 4.4 Efficient Lookup of the Linear Bounds -- 5 Evaluation -- 5.1 Benchmarks -- 5.2 Experimental Results -- 6 Related Work -- 7 Conclusions -- References -- Verifying Neural Networks Against Backdoor Attacks -- 1 Introduction -- 2 Problem Definition -- 3 Verifying Backdoor Absence -- 3.1 Overall Algorithm -- 3.2 Verifying Backdoor Absence Against a Set of Images -- 3.3 Abstract Interpretation -- 3.4 Generating Backdoor Triggers -- 3.5 Correctness and Complexity -- 3.6 Discussion -- 4 Implementation and Evaluation -- 5 Related Work -- 6 Conclusion -- References -- Trainify: A CEGAR-Driven Training and Verification Framework for Safe Deep Reinforcement Learning -- 1 Introduction -- 2 Deep Reinforcement Learning (DRL) -- 3 Model Checking of DRL Systems -- 3.1 The Model Checking Problem -- 3.2 Challenges in Model Checking DRL Systems -- 4 The CEGAR-Driven DRL Approach -- 4.1 The Framework -- 4.2 Training on Abstract States -- 4.3 Model Checking Trained DRL Systems -- 4.4 Counterexample-Guided Refinement -- 5 Implementation and Evaluation -- 5.1 Implementation -- 5.2 Benchmarks and Experimental Settings -- 5.3 Reliability and Verifiability Comparison -- 5.4 Performance Comparison -- 6 Related Work -- 7 Discussion and Conclusion -- References -- Neural Network Robustness as a Verification Property: A Principled Case Study -- 1 Introduction -- 2 Existing Training Techniques and Definitions of Robustness -- 3 Robustness in Evaluation, Attack and Verification.
4 Relative Comparison of Definitions of Robustness -- 4.1 Standard and Lipschitz Robustness -- 4.2 (Strong) Classification Robustness -- 4.3 Standard vs Classification Robustness -- 5 Other Properties of Robustness Definitions -- 6 Conclusions -- References -- Software Verification and Model Checking -- The Lattice-Theoretic Essence of Property Directed Reachability Analysis*-12pt -- 1 Introduction -- 2 Fixed-points in Complete Lattices -- 3 Lattice-Theoretic Reconstruction of PDR -- 3.1 Positive LT-PDR: Sequential Positive Witnesses -- 3.2 Negative PDR: Sequential Negative Witnesses -- 3.3 LT-PDR: Integrating Positive and Negative -- 4 Structural Theory of PDR by Category Theory -- 4.1 Categorical Modeling of Dynamics and Predicate Transformers -- 4.2 Structural Theory of PDR from Transition Systems -- 5 Known and New PDR Algorithms as Instances -- 5.1 LT-PDRs for Kripke Structures: PDRF-Krand PDRIB-Kr -- 5.2 LT-PDR for MDPs: PDRIB-MDP -- 5.3 LT-PDR for Markov Reward Models: PDRMRM -- 6 Implementation and Evaluation -- 7 Conclusions and Future Work -- References -- Affine Loop Invariant Generation via Matrix Algebra -- 1 Introduction -- 1.1 Related Work -- 2 Preliminaries -- 3 Affine Invariants via Farkas' Lemma -- 4 Single-Branch Affine Loops with Deterministic Updates -- 4.1 Derived Constraints from the Farkas Tables -- 4.2 Loops with Tautological Guard -- 4.3 Loops with Guard: Single-Constraint Case -- 4.4 Loops with Guard: Multi-constraint Case -- 5 Generalizations -- 5.1 Affine Loops with Non-deterministic Updates -- 5.2 An Extension to Bidirectional Affine Invariants -- 5.3 Other Possible Generalizations -- 6 Approximation of Eigenvectors through Continuity -- 7 Experimental Results -- References -- Data-driven Numerical Invariant Synthesis with Automatic Generation of Attributes -- 1 Introduction.
2 Safety Verification Using Learning of Invariants -- 2.1 Linear Constraints and Safety Verification -- 2.2 The ICE Learning Framework -- 2.3 ICE-DT: Invariant Learning Using Decision Trees -- 3 Linear Formulas as Abstract Objects -- 4 Generating Attributes from Sample Separators -- 4.1 Abstract Sample Separators -- 4.2 Computing a Join-Maximal Abstract Separator -- 4.3 Integrating Separator Computation in ICE-DT -- 4.4 Computing Separators Incrementally -- 5 Experiments -- 6 Conclusion -- References -- Proof-Guided Underapproximation Widening for Bounded Model Checking -- 1 Introduction -- 2 Background -- 2.1 Language Model -- 2.2 VC Generation for a Procedure -- 2.3 Static Versus Dynamic Inlining -- 2.4 Verification with Stratified Inlining -- 2.5 Overapproximation Refinement Guided Stratified Inlining -- 3 Overview -- 3.1 Underapproximation Widening -- 4 Algorithms -- 4.1 Underapproximation Widening Guided Stratified Inlining (UnderWidenSI) -- 4.2 Portfolio Technique -- 5 Experimental Results -- 5.1 Corral Versus Legion -- 5.2 Performance of Legion+ -- 6 Related Work -- 7 Conclusion -- References -- SolCMC: Solidity Compiler's Model Checker -- 1 Introduction -- 2 Solidity Model Checking -- 2.1 The CHC Verification Engine -- 2.2 Horn Encoding -- 3 User Features -- 4 Real World Experiments -- 4.1 CHC Solver Options -- 4.2 Deposit Contract -- 4.3 ERC777 -- 4.4 Discussion -- 5 Conclusions and Future Work -- References -- Hyperproperties and Security -- Software Verification of Hyperproperties Beyond k-Safety -- 1 Introduction -- 1.1 Verification Beyond k-Safety -- 1.2 Contributions and Structure -- 2 Overview: Reductions and Quantification as a Game -- 2.1 Reductions as a Game -- 2.2 Beyond k-Safety: Quantification as a Game -- 3 Preliminaries -- 4 Observation-Based HyperLTL -- 5 Reductions as a Game -- 6 Verification Beyond k-Safety.
6.1 Existential Trace Quantification as a Game.
author_facet Shoham, Sharon.
Vizel, Yakir.
author_variant s s ss
author2 Vizel, Yakir.
author2_variant y v yv
author2_role TeilnehmendeR
author_sort Shoham, Sharon.
title Computer Aided Verification : 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I.
title_sub 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I.
title_full Computer Aided Verification : 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I.
title_fullStr Computer Aided Verification : 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I.
title_full_unstemmed Computer Aided Verification : 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I.
title_auth Computer Aided Verification : 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I.
title_new Computer Aided Verification :
title_sort computer aided verification : 34th international conference, cav 2022, haifa, israel, august 7-10, 2022, proceedings, part i.
series Lecture Notes in Computer Science Series ;
series2 Lecture Notes in Computer Science Series ;
publisher Springer International Publishing AG,
publishDate 2022
physical 1 online resource (563 pages)
edition 1st ed.
contents Intro -- Preface -- Organization -- Contents - Part I -- Contents - Part II -- Invited Papers -- A Billion SMT Queries a Day (Invited Paper) -- 1 Introduction -- 2 Eliminate Writing Specifications -- 2.1 Generating Possible Specifications (Findings) -- 3 Domain-Specific Abstractions -- 4 SMT Solving at Cloud Scale -- 4.1 Monotonicity in Runtimes Across Solver Versions -- 4.2 Stability of the Solvers -- 4.3 Concluding Remarks -- References -- Program Verification with Constrained Horn Clauses (Invited Paper) -- 1 Introduction -- 2 Logic of Constrained Horn Clauses -- 3 Solving CHC Modulo Theories -- References -- Formal Methods for Probabilistic Programs -- Data-Driven Invariant Learning for Probabilistic Programs -- 1 Introduction -- 2 Preliminaries -- 3 Algorithm Overview -- 4 Learning Exact Invariants -- 4.1 Generate Features (getFeatures) -- 4.2 Sample Initial States (sampleStates) -- 4.3 Sample Training Data (sampleTraces) -- 4.4 Learning a Model Tree (learnInv) -- 4.5 Extracting Expectations from Models (extractInv) -- 4.6 Verify Extracted Expectations (verifyInv) -- 5 Learning Sub-invariants -- 5.1 Sample Training Data (sampleTraces) -- 5.2 Learning a Neural Model Tree (learnInv) -- 5.3 Verify Extracted Expectations (verifyInv) -- 6 Evaluations -- 6.1 R1: Evaluation of the Exact Invariant Method -- 6.2 R2: Evaluation of the Sub-invariant Method -- 7 Related Work -- References -- Sound and Complete Certificates for Quantitative Termination Analysis of Probabilistic Programs -- 1 Introduction -- 2 Overview -- 3 Preliminaries -- 4 A Sound and Complete Characterization of SIs -- 5 Stochastic Invariants for LBPT -- 6 Automated Template-Based Synthesis Algorithm -- 7 Experimental Results -- 8 Related Works -- 9 Conclusion -- References -- Does a Program Yield the Right Distribution? -- 1 Introduction -- 2 Generating Functions.
2.1 The Ring of Formal Power Series -- 2.2 Probability Generating Functions -- 3 ReDiP: A Probabilistic Programming Language -- 3.1 Program States and Variables -- 3.2 Syntax of ReDiP -- 3.3 The Statement x += iid(D, y) -- 4 Interpreting ReDiP with PGF -- 4.1 A Domain for Distribution Transformation -- 4.2 From Programs to PGF Transformers -- 4.3 Probabilistic Termination -- 5 Reasoning About Loops -- 5.1 Fixed Point Induction -- 5.2 Deciding Equivalence of Loop-free Programs -- 6 Case Studies -- 7 Related Work -- 8 Conclusion and Future Work -- References -- Abstraction-Refinement for Hierarchical Probabilistic Models -- 1 Introduction -- 2 Overview -- 3 Formal Problem Statement -- 3.1 Background -- 3.2 Hierarchical MDPs -- 3.3 Optimal Local Subpolicies and Beyond -- 4 Solving hMDPs with Abstraction-Refinement -- 4.1 The Macro-MDP Formulation -- 4.2 The Uncertain Macro-MDP Formulation -- 4.3 Set-Based SubMDP Analysis -- 4.4 Templates for Set-Based subMDP Analysis -- 5 Implementing the Abstraction-Refinement Loop -- 6 Experiments -- 7 Related Work -- 8 Conclusion -- References -- Formal Methods for Neural Networks -- Shared Certificates for Neural Network Verification -- 1 Introduction -- 2 Background -- 3 Proof Sharing with Templates -- 3.1 Motivation: Proof Subsumption -- 3.2 Proof Sharing with Templates -- 4 Efficient Verification via Proof Sharing -- 4.1 Choice of Abstract Domain -- 4.2 Template Generation -- 4.3 Robustness to Adversarial Patches -- 4.4 Geometric Robustness -- 4.5 Requirements for Proof Sharing -- 5 Experimental Evaluation -- 5.1 Experimental Setup -- 5.2 Robustness Against Adversarial Patches -- 5.3 Robustness Against Geometric Perturbations -- 5.4 Discussion -- 6 Related Work -- 7 Conclusion -- References -- Example Guided Synthesis of Linear Approximations for Neural Network Verification -- 1 Introduction.
2 Preliminaries -- 2.1 Neural Networks -- 2.2 Existing Neural Network Verification Techniques and Limitations -- 3 Problem Statement and Challenges -- 3.1 The Synthesis Problem -- 3.2 Challenges and Our Solution -- 4 Our Approach -- 4.1 Partitioning the Input Interval Space (Ix) -- 4.2 Learning the Function g(l, u) -- 4.3 Ensuring Soundness of the Linear Approximations -- 4.4 Efficient Lookup of the Linear Bounds -- 5 Evaluation -- 5.1 Benchmarks -- 5.2 Experimental Results -- 6 Related Work -- 7 Conclusions -- References -- Verifying Neural Networks Against Backdoor Attacks -- 1 Introduction -- 2 Problem Definition -- 3 Verifying Backdoor Absence -- 3.1 Overall Algorithm -- 3.2 Verifying Backdoor Absence Against a Set of Images -- 3.3 Abstract Interpretation -- 3.4 Generating Backdoor Triggers -- 3.5 Correctness and Complexity -- 3.6 Discussion -- 4 Implementation and Evaluation -- 5 Related Work -- 6 Conclusion -- References -- Trainify: A CEGAR-Driven Training and Verification Framework for Safe Deep Reinforcement Learning -- 1 Introduction -- 2 Deep Reinforcement Learning (DRL) -- 3 Model Checking of DRL Systems -- 3.1 The Model Checking Problem -- 3.2 Challenges in Model Checking DRL Systems -- 4 The CEGAR-Driven DRL Approach -- 4.1 The Framework -- 4.2 Training on Abstract States -- 4.3 Model Checking Trained DRL Systems -- 4.4 Counterexample-Guided Refinement -- 5 Implementation and Evaluation -- 5.1 Implementation -- 5.2 Benchmarks and Experimental Settings -- 5.3 Reliability and Verifiability Comparison -- 5.4 Performance Comparison -- 6 Related Work -- 7 Discussion and Conclusion -- References -- Neural Network Robustness as a Verification Property: A Principled Case Study -- 1 Introduction -- 2 Existing Training Techniques and Definitions of Robustness -- 3 Robustness in Evaluation, Attack and Verification.
4 Relative Comparison of Definitions of Robustness -- 4.1 Standard and Lipschitz Robustness -- 4.2 (Strong) Classification Robustness -- 4.3 Standard vs Classification Robustness -- 5 Other Properties of Robustness Definitions -- 6 Conclusions -- References -- Software Verification and Model Checking -- The Lattice-Theoretic Essence of Property Directed Reachability Analysis*-12pt -- 1 Introduction -- 2 Fixed-points in Complete Lattices -- 3 Lattice-Theoretic Reconstruction of PDR -- 3.1 Positive LT-PDR: Sequential Positive Witnesses -- 3.2 Negative PDR: Sequential Negative Witnesses -- 3.3 LT-PDR: Integrating Positive and Negative -- 4 Structural Theory of PDR by Category Theory -- 4.1 Categorical Modeling of Dynamics and Predicate Transformers -- 4.2 Structural Theory of PDR from Transition Systems -- 5 Known and New PDR Algorithms as Instances -- 5.1 LT-PDRs for Kripke Structures: PDRF-Krand PDRIB-Kr -- 5.2 LT-PDR for MDPs: PDRIB-MDP -- 5.3 LT-PDR for Markov Reward Models: PDRMRM -- 6 Implementation and Evaluation -- 7 Conclusions and Future Work -- References -- Affine Loop Invariant Generation via Matrix Algebra -- 1 Introduction -- 1.1 Related Work -- 2 Preliminaries -- 3 Affine Invariants via Farkas' Lemma -- 4 Single-Branch Affine Loops with Deterministic Updates -- 4.1 Derived Constraints from the Farkas Tables -- 4.2 Loops with Tautological Guard -- 4.3 Loops with Guard: Single-Constraint Case -- 4.4 Loops with Guard: Multi-constraint Case -- 5 Generalizations -- 5.1 Affine Loops with Non-deterministic Updates -- 5.2 An Extension to Bidirectional Affine Invariants -- 5.3 Other Possible Generalizations -- 6 Approximation of Eigenvectors through Continuity -- 7 Experimental Results -- References -- Data-driven Numerical Invariant Synthesis with Automatic Generation of Attributes -- 1 Introduction.
2 Safety Verification Using Learning of Invariants -- 2.1 Linear Constraints and Safety Verification -- 2.2 The ICE Learning Framework -- 2.3 ICE-DT: Invariant Learning Using Decision Trees -- 3 Linear Formulas as Abstract Objects -- 4 Generating Attributes from Sample Separators -- 4.1 Abstract Sample Separators -- 4.2 Computing a Join-Maximal Abstract Separator -- 4.3 Integrating Separator Computation in ICE-DT -- 4.4 Computing Separators Incrementally -- 5 Experiments -- 6 Conclusion -- References -- Proof-Guided Underapproximation Widening for Bounded Model Checking -- 1 Introduction -- 2 Background -- 2.1 Language Model -- 2.2 VC Generation for a Procedure -- 2.3 Static Versus Dynamic Inlining -- 2.4 Verification with Stratified Inlining -- 2.5 Overapproximation Refinement Guided Stratified Inlining -- 3 Overview -- 3.1 Underapproximation Widening -- 4 Algorithms -- 4.1 Underapproximation Widening Guided Stratified Inlining (UnderWidenSI) -- 4.2 Portfolio Technique -- 5 Experimental Results -- 5.1 Corral Versus Legion -- 5.2 Performance of Legion+ -- 6 Related Work -- 7 Conclusion -- References -- SolCMC: Solidity Compiler's Model Checker -- 1 Introduction -- 2 Solidity Model Checking -- 2.1 The CHC Verification Engine -- 2.2 Horn Encoding -- 3 User Features -- 4 Real World Experiments -- 4.1 CHC Solver Options -- 4.2 Deposit Contract -- 4.3 ERC777 -- 4.4 Discussion -- 5 Conclusions and Future Work -- References -- Hyperproperties and Security -- Software Verification of Hyperproperties Beyond k-Safety -- 1 Introduction -- 1.1 Verification Beyond k-Safety -- 1.2 Contributions and Structure -- 2 Overview: Reductions and Quantification as a Game -- 2.1 Reductions as a Game -- 2.2 Beyond k-Safety: Quantification as a Game -- 3 Preliminaries -- 4 Observation-Based HyperLTL -- 5 Reductions as a Game -- 6 Verification Beyond k-Safety.
6.1 Existential Trace Quantification as a Game.
isbn 9783031131851
9783031131844
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.758
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=7070218
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.14
dewey-sort 15.14
dewey-raw 005.14
dewey-search 005.14
oclc_num 1341275496
work_keys_str_mv AT shohamsharon computeraidedverification34thinternationalconferencecav2022haifaisraelaugust7102022proceedingsparti
AT vizelyakir computeraidedverification34thinternationalconferencecav2022haifaisraelaugust7102022proceedingsparti
status_str n
ids_txt_mv (MiAaPQ)5007070218
(Au-PeEL)EBL7070218
(OCoLC)1341275496
carrierType_str_mv cr
hierarchy_parent_title Lecture Notes in Computer Science Series ; v.13371
is_hierarchy_title Computer Aided Verification : 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I.
container_title Lecture Notes in Computer Science Series ; v.13371
author2_original_writing_str_mv noLinkedField
marc_error Info : MARC8 translation shorter than ISO-8859-1, choosing MARC8. --- [ 856 : z ]
_version_ 1792331064116510721
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>11152nam a22004813i 4500</leader><controlfield tag="001">5007070218</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20240229073847.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">240229s2022 xx o ||||0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031131851</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9783031131844</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5007070218</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL7070218</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1341275496</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.758</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.14</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shoham, Sharon.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer Aided Verification :</subfield><subfield code="b">34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham :</subfield><subfield code="b">Springer International Publishing AG,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (563 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science Series ;</subfield><subfield code="v">v.13371</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro -- Preface -- Organization -- Contents - Part I -- Contents - Part II -- Invited Papers -- A Billion SMT Queries a Day (Invited Paper) -- 1 Introduction -- 2 Eliminate Writing Specifications -- 2.1 Generating Possible Specifications (Findings) -- 3 Domain-Specific Abstractions -- 4 SMT Solving at Cloud Scale -- 4.1 Monotonicity in Runtimes Across Solver Versions -- 4.2 Stability of the Solvers -- 4.3 Concluding Remarks -- References -- Program Verification with Constrained Horn Clauses (Invited Paper) -- 1 Introduction -- 2 Logic of Constrained Horn Clauses -- 3 Solving CHC Modulo Theories -- References -- Formal Methods for Probabilistic Programs -- Data-Driven Invariant Learning for Probabilistic Programs -- 1 Introduction -- 2 Preliminaries -- 3 Algorithm Overview -- 4 Learning Exact Invariants -- 4.1 Generate Features (getFeatures) -- 4.2 Sample Initial States (sampleStates) -- 4.3 Sample Training Data (sampleTraces) -- 4.4 Learning a Model Tree (learnInv) -- 4.5 Extracting Expectations from Models (extractInv) -- 4.6 Verify Extracted Expectations (verifyInv) -- 5 Learning Sub-invariants -- 5.1 Sample Training Data (sampleTraces) -- 5.2 Learning a Neural Model Tree (learnInv) -- 5.3 Verify Extracted Expectations (verifyInv) -- 6 Evaluations -- 6.1 R1: Evaluation of the Exact Invariant Method -- 6.2 R2: Evaluation of the Sub-invariant Method -- 7 Related Work -- References -- Sound and Complete Certificates for Quantitative Termination Analysis of Probabilistic Programs -- 1 Introduction -- 2 Overview -- 3 Preliminaries -- 4 A Sound and Complete Characterization of SIs -- 5 Stochastic Invariants for LBPT -- 6 Automated Template-Based Synthesis Algorithm -- 7 Experimental Results -- 8 Related Works -- 9 Conclusion -- References -- Does a Program Yield the Right Distribution? -- 1 Introduction -- 2 Generating Functions.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.1 The Ring of Formal Power Series -- 2.2 Probability Generating Functions -- 3 ReDiP: A Probabilistic Programming Language -- 3.1 Program States and Variables -- 3.2 Syntax of ReDiP -- 3.3 The Statement x += iid(D, y) -- 4 Interpreting ReDiP with PGF -- 4.1 A Domain for Distribution Transformation -- 4.2 From Programs to PGF Transformers -- 4.3 Probabilistic Termination -- 5 Reasoning About Loops -- 5.1 Fixed Point Induction -- 5.2 Deciding Equivalence of Loop-free Programs -- 6 Case Studies -- 7 Related Work -- 8 Conclusion and Future Work -- References -- Abstraction-Refinement for Hierarchical Probabilistic Models -- 1 Introduction -- 2 Overview -- 3 Formal Problem Statement -- 3.1 Background -- 3.2 Hierarchical MDPs -- 3.3 Optimal Local Subpolicies and Beyond -- 4 Solving hMDPs with Abstraction-Refinement -- 4.1 The Macro-MDP Formulation -- 4.2 The Uncertain Macro-MDP Formulation -- 4.3 Set-Based SubMDP Analysis -- 4.4 Templates for Set-Based subMDP Analysis -- 5 Implementing the Abstraction-Refinement Loop -- 6 Experiments -- 7 Related Work -- 8 Conclusion -- References -- Formal Methods for Neural Networks -- Shared Certificates for Neural Network Verification -- 1 Introduction -- 2 Background -- 3 Proof Sharing with Templates -- 3.1 Motivation: Proof Subsumption -- 3.2 Proof Sharing with Templates -- 4 Efficient Verification via Proof Sharing -- 4.1 Choice of Abstract Domain -- 4.2 Template Generation -- 4.3 Robustness to Adversarial Patches -- 4.4 Geometric Robustness -- 4.5 Requirements for Proof Sharing -- 5 Experimental Evaluation -- 5.1 Experimental Setup -- 5.2 Robustness Against Adversarial Patches -- 5.3 Robustness Against Geometric Perturbations -- 5.4 Discussion -- 6 Related Work -- 7 Conclusion -- References -- Example Guided Synthesis of Linear Approximations for Neural Network Verification -- 1 Introduction.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2 Preliminaries -- 2.1 Neural Networks -- 2.2 Existing Neural Network Verification Techniques and Limitations -- 3 Problem Statement and Challenges -- 3.1 The Synthesis Problem -- 3.2 Challenges and Our Solution -- 4 Our Approach -- 4.1 Partitioning the Input Interval Space (Ix) -- 4.2 Learning the Function g(l, u) -- 4.3 Ensuring Soundness of the Linear Approximations -- 4.4 Efficient Lookup of the Linear Bounds -- 5 Evaluation -- 5.1 Benchmarks -- 5.2 Experimental Results -- 6 Related Work -- 7 Conclusions -- References -- Verifying Neural Networks Against Backdoor Attacks -- 1 Introduction -- 2 Problem Definition -- 3 Verifying Backdoor Absence -- 3.1 Overall Algorithm -- 3.2 Verifying Backdoor Absence Against a Set of Images -- 3.3 Abstract Interpretation -- 3.4 Generating Backdoor Triggers -- 3.5 Correctness and Complexity -- 3.6 Discussion -- 4 Implementation and Evaluation -- 5 Related Work -- 6 Conclusion -- References -- Trainify: A CEGAR-Driven Training and Verification Framework for Safe Deep Reinforcement Learning -- 1 Introduction -- 2 Deep Reinforcement Learning (DRL) -- 3 Model Checking of DRL Systems -- 3.1 The Model Checking Problem -- 3.2 Challenges in Model Checking DRL Systems -- 4 The CEGAR-Driven DRL Approach -- 4.1 The Framework -- 4.2 Training on Abstract States -- 4.3 Model Checking Trained DRL Systems -- 4.4 Counterexample-Guided Refinement -- 5 Implementation and Evaluation -- 5.1 Implementation -- 5.2 Benchmarks and Experimental Settings -- 5.3 Reliability and Verifiability Comparison -- 5.4 Performance Comparison -- 6 Related Work -- 7 Discussion and Conclusion -- References -- Neural Network Robustness as a Verification Property: A Principled Case Study -- 1 Introduction -- 2 Existing Training Techniques and Definitions of Robustness -- 3 Robustness in Evaluation, Attack and Verification.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4 Relative Comparison of Definitions of Robustness -- 4.1 Standard and Lipschitz Robustness -- 4.2 (Strong) Classification Robustness -- 4.3 Standard vs Classification Robustness -- 5 Other Properties of Robustness Definitions -- 6 Conclusions -- References -- Software Verification and Model Checking -- The Lattice-Theoretic Essence of Property Directed Reachability Analysis*-12pt -- 1 Introduction -- 2 Fixed-points in Complete Lattices -- 3 Lattice-Theoretic Reconstruction of PDR -- 3.1 Positive LT-PDR: Sequential Positive Witnesses -- 3.2 Negative PDR: Sequential Negative Witnesses -- 3.3 LT-PDR: Integrating Positive and Negative -- 4 Structural Theory of PDR by Category Theory -- 4.1 Categorical Modeling of Dynamics and Predicate Transformers -- 4.2 Structural Theory of PDR from Transition Systems -- 5 Known and New PDR Algorithms as Instances -- 5.1 LT-PDRs for Kripke Structures: PDRF-Krand PDRIB-Kr -- 5.2 LT-PDR for MDPs: PDRIB-MDP -- 5.3 LT-PDR for Markov Reward Models: PDRMRM -- 6 Implementation and Evaluation -- 7 Conclusions and Future Work -- References -- Affine Loop Invariant Generation via Matrix Algebra -- 1 Introduction -- 1.1 Related Work -- 2 Preliminaries -- 3 Affine Invariants via Farkas' Lemma -- 4 Single-Branch Affine Loops with Deterministic Updates -- 4.1 Derived Constraints from the Farkas Tables -- 4.2 Loops with Tautological Guard -- 4.3 Loops with Guard: Single-Constraint Case -- 4.4 Loops with Guard: Multi-constraint Case -- 5 Generalizations -- 5.1 Affine Loops with Non-deterministic Updates -- 5.2 An Extension to Bidirectional Affine Invariants -- 5.3 Other Possible Generalizations -- 6 Approximation of Eigenvectors through Continuity -- 7 Experimental Results -- References -- Data-driven Numerical Invariant Synthesis with Automatic Generation of Attributes -- 1 Introduction.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2 Safety Verification Using Learning of Invariants -- 2.1 Linear Constraints and Safety Verification -- 2.2 The ICE Learning Framework -- 2.3 ICE-DT: Invariant Learning Using Decision Trees -- 3 Linear Formulas as Abstract Objects -- 4 Generating Attributes from Sample Separators -- 4.1 Abstract Sample Separators -- 4.2 Computing a Join-Maximal Abstract Separator -- 4.3 Integrating Separator Computation in ICE-DT -- 4.4 Computing Separators Incrementally -- 5 Experiments -- 6 Conclusion -- References -- Proof-Guided Underapproximation Widening for Bounded Model Checking -- 1 Introduction -- 2 Background -- 2.1 Language Model -- 2.2 VC Generation for a Procedure -- 2.3 Static Versus Dynamic Inlining -- 2.4 Verification with Stratified Inlining -- 2.5 Overapproximation Refinement Guided Stratified Inlining -- 3 Overview -- 3.1 Underapproximation Widening -- 4 Algorithms -- 4.1 Underapproximation Widening Guided Stratified Inlining (UnderWidenSI) -- 4.2 Portfolio Technique -- 5 Experimental Results -- 5.1 Corral Versus Legion -- 5.2 Performance of Legion+ -- 6 Related Work -- 7 Conclusion -- References -- SolCMC: Solidity Compiler's Model Checker -- 1 Introduction -- 2 Solidity Model Checking -- 2.1 The CHC Verification Engine -- 2.2 Horn Encoding -- 3 User Features -- 4 Real World Experiments -- 4.1 CHC Solver Options -- 4.2 Deposit Contract -- 4.3 ERC777 -- 4.4 Discussion -- 5 Conclusions and Future Work -- References -- Hyperproperties and Security -- Software Verification of Hyperproperties Beyond k-Safety -- 1 Introduction -- 1.1 Verification Beyond k-Safety -- 1.2 Contributions and Structure -- 2 Overview: Reductions and Quantification as a Game -- 2.1 Reductions as a Game -- 2.2 Beyond k-Safety: Quantification as a Game -- 3 Preliminaries -- 4 Observation-Based HyperLTL -- 5 Reductions as a Game -- 6 Verification Beyond k-Safety.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">6.1 Existential Trace Quantification as a Game.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. </subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vizel, Yakir.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Shoham, Sharon</subfield><subfield code="t">Computer Aided Verification</subfield><subfield code="d">Cham : Springer International Publishing AG,c2022</subfield><subfield code="z">9783031131844</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science Series</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=7070218</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>