Computer Aided Verification : : 36th International Conference, CAV 2024, Montreal, QC, Canada, July 24-27, 2024, Proceedings, Part II.

Saved in:
Bibliographic Details
Superior document:Lecture Notes in Computer Science Series ; v.14682
:
TeilnehmendeR:
Place / Publishing House:Cham : : Springer International Publishing AG,, 2024.
©2024.
Year of Publication:2024
Edition:1st ed.
Language:English
Series:Lecture Notes in Computer Science Series
Physical Description:1 online resource (447 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Intro
  • Preface
  • Organization
  • Invited Talks
  • How to Solve Math Problems Without Talent
  • Bridging Formal Mathematics and Software Verification
  • The Art of SMT Solving
  • Contents - Part II
  • Concurrency
  • The VerCors Verifier: A Progress Report
  • 1 Introduction
  • 2 New and Improved Language Support
  • 2.1 Improved Existing Language Support
  • 2.2 Newly Supported Frameworks
  • 2.3 Programming Languages Encoded into VerCors
  • 3 VerCors Implementation Changes
  • 4 Deriving Verified, Optimised Programs
  • 5 Case Studies
  • 5.1 Tunnel Control Software Components
  • 5.2 Verification of Red-Black Trees and their Parallel Merge
  • 5.3 GPU Case Studies
  • 5.4 Student Projects
  • 6 Conclusions, Related Work and Future Work
  • References
  • Parsimonious Optimal Dynamic Partial Order Reduction
  • 1 Introduction
  • 2 Main Concepts
  • 3 Programs, Executions, and Equivalence
  • 4 Design of the POP Algorithm
  • 4.1 Parsimonious Race Reversals
  • 4.2 The Parsimonious-OPtimal DPOR (POP) Algorithm
  • 4.3 Parsimonious Sleep Set Characterization
  • 5 Correctness and Space Complexity
  • 6 Implementation and Evaluation
  • 7 Related Work
  • 8 Conclusion
  • References
  • Collective Contracts for Message-Passing Parallel Programs
  • 1 Introduction
  • 2 A Theory of Collective Contracts
  • 2.1 Language
  • 2.2 Semantics
  • 2.3 Collective Correctness
  • 2.4 Simulation
  • 3 Collective Contracts for C/MPI
  • 3.1 Background from MPI
  • 3.2 Contract Structure
  • 4 Evaluation
  • 4.1 Collective Contract Examples
  • 4.2 Bounded Verification of Collective Contracts
  • 5 Related Work
  • 6 Discussion
  • References
  • Distributed Systems
  • mypyvy: A Research Platform for Verification of Transition Systems in First-Order Logic
  • 1 Introduction
  • 2 Modeling Language
  • 2.1 Benchmarks
  • 3 Satisfiability-Based Queries
  • 3.1 Queries
  • 3.2 Counterexamples.
  • 3.3 Decidability and Finite Counterexamples via EPR
  • 4 Invariant Inference
  • 5 Designing mypyvy's Internals
  • 6 Works Using mypyvy
  • 7 Related Work
  • References
  • Efficient Implementation of an Abstract Domain of Quantified First-Order Formulas
  • 1 Introduction
  • 2 Background
  • 3 Subsumption-Based Representation of Sets of Formulas
  • 3.1 Bounded First-Order Languages
  • 3.2 Syntactic Subsumption
  • 3.3 Canonicalization
  • 3.4 Representing Sets of Formulas
  • 4 The Weaken Operator
  • 4.1 Weakening a Single Canonical Formula
  • 4.2 Weakening Sets of Formulas
  • 4.3 Design Consideration and Tradeoffs
  • 5 Data Structure for Sets of Formulas
  • 6 Implementation and Evaluation
  • 6.1 Implementation
  • 6.2 Experiments
  • 6.3 Results
  • 7 Related Work
  • 8 Conclusion
  • References
  • Verifying Cake-Cutting, Faster
  • 1 Introduction
  • 2 Cake-Cutting Preliminaries
  • 3 Language and Type System
  • 3.1 Syntax of Base Slice
  • 3.2 A Linear Type System for Slice
  • 3.3 Semantics
  • 3.4 Disjointness
  • 4 Constraints
  • 5 Piecewise Uniform Reduction
  • 5.1 Replicating Protocol Executions
  • 5.2 Piecewise Uniform Valuations
  • 5.3 Piecewise Uniform Replacement
  • 6 Implementation and Evaluation
  • 7 Related and Future Work
  • References
  • Runtime Verification and Monitoring
  • General Anticipatory Runtime Verification
  • 1 Introduction
  • 2 Lola Monitoring Revisited
  • 2.1 Recurrent Monitoring
  • 2.2 Lola
  • 3 Lola Recurrent Online Monitoring Semantics
  • 4 An Abstraction Framework for Lola Monitoring
  • 5 Abstraction-Based Recurrent Lola Monitoring
  • 6 Symbolic Recurrent Lola Monitoring
  • 7 Empirical Evaluation
  • 8 Conclusion
  • References
  • Proactive Real-Time First-Order Enforcement
  • 1 Introduction
  • 2 Preliminaries
  • 3 Proactive, Real-Time, First-Order Enforcement
  • 3.1 System Model
  • 3.2 Enforcers
  • 4 Enforceable MFOTL Formulae.
  • 5 Enforcing EMFOTL
  • 5.1 Obligations
  • 5.2 Checking Satisfaction of MFOTL Formulae Under Assumptions
  • 5.3 The Enforcement Algorithm
  • 5.4 Correctness
  • 6 Evaluation
  • 7 Related Work
  • 8 Conclusion
  • References
  • Predictive Monitoring with Strong Trace Prefixes
  • 1 Introduction
  • 2 Predictive Monitoring and Trace Theory
  • 3 Strong Trace Prefixes
  • 3.1 Modelling Correct Reorderings with Strong Trace Prefixes
  • 4 Complexity of Predictive Monitoring
  • 4.1 Non-deterministic Predictive Monitoring
  • 4.2 Deterministic Predictive Monitoring
  • 4.3 Ensuring Well-Formedness and Soundness
  • 5 Strong Reads-From Prefixes
  • 6 Strong Prefixes Versus Synchronization Preservation
  • 7 Experimental Evaluation
  • 7.1 Enhanced Predictive Power of Strong Prefixes
  • 7.2 Strong Reads-From Prefixes v/s Sync-Preservation
  • 8 Related Work and Conclusions
  • References
  • Case Studies and Tools
  • Monitoring Unmanned Aircraft: Specification, Integration, and Lessons-Learned
  • 1 Introduction
  • 1.1 Related Work
  • 2 Stream-Based Monitoring
  • 3 Setup
  • 3.1 Monitoring Applications
  • 3.2 Development Cycle for the Monitor
  • 4 Abstract Integration
  • 4.1 Common Interfaces
  • 5 Concrete Integration of Representative Specifications
  • 6 Conclusion
  • References
  • Testing the Migration from Analog to Software-Based Railway Interlocking Systems
  • 1 Introduction
  • 2 Operational Setting
  • 3 Bridging the Gap Between ReRIS and SwRIS
  • 3.1 Simulations Extractor
  • 3.2 Working with a Partial ReRIS Model
  • 3.3 Mapping a ReRIS Simulation into an Abstract SwRIS Test
  • 3.4 Test Execution
  • 4 Related Works
  • 5 Experimental Evaluation
  • 6 Conclusions
  • References
  • soid: A Tool for Legal Accountability for Automated Decision Making
  • 1 Introduction
  • 1.1 Related Work
  • 2 soid Tool Architecture and Usage
  • 2.1 Example #1: Decision Tree Inference.
  • 3 soid-gui Architecture and Usage
  • 3.1 Example #2: Three Cars on the Stand
  • 4 Conclusion
  • References
  • Machine Learning and Neural Networks
  • Marabou 2.0: A Versatile Formal Analyzer of Neural Networks
  • 1 Introduction
  • 2 Architecture and Core Components
  • 2.1 Engine
  • 2.2 Context-Dependent Data-Structures
  • 2.3 Proof Module
  • 2.4 Front End
  • 2.5 Availability, License, and Installation
  • 3 Highlighted Features and Applications
  • 4 Runtime Evaluation
  • 5 Conclusion and Next Steps
  • References
  • Monitizer: Automating Design and Evaluation of Neural Network Monitors
  • 1 Introduction
  • 2 Related Work
  • 3 Monitizer
  • 3.1 Overview
  • 3.2 Use Cases
  • 3.3 Phases of Monitizer
  • 3.4 Classification of Out-of-Distribution Data
  • 3.5 Library of Monitors, NNs, and Datasets
  • 4 Summary of Evaluation by Case Study
  • 5 Conclusion
  • References
  • Guiding Enumerative Program Synthesis with Large Language Models
  • 1 Introduction
  • 2 Background
  • 3 Overview
  • 4 Stand-Alone LLM
  • 4.1 Prompting the LLM
  • 5 Synthesis with pCFG Guidance: pCFG-synth
  • 5.1 Inferring a Weighted CFG
  • 5.2 Probabilistic Guided Search
  • 5.3 Weighted A* Search
  • 6 Enumerative Synthesis with an Integrated LLM (iLLM-synth)
  • 6.1 Integrated Prompting
  • 6.2 Updating the Weighted Grammar
  • 6.3 Integrating Syntactic Feedback into Enumerative Search
  • 7 Evaluation
  • 8 Threats to Validity
  • 9 Related Work
  • 10 Conclusions
  • References
  • Enchanting Program Specification Synthesis by Large Language Models Using Static Analysis and Program Verification
  • 1 Introduction
  • 2 Background and Motivation
  • 3 Methodology
  • 3.1 Code Decomposition
  • 3.2 Hierarchical Specification Generation
  • 3.3 Specification Validation
  • 4 Evaluation
  • 4.1 Evaluation Setup
  • 4.2 RQ1. Effectiveness on General Specification
  • 4.3 RQ2. Effectiveness on Loop Invariants.
  • 4.4 RQ3. Efficiency of AutoSpec
  • 4.5 RQ4. Ablation Study
  • 4.6 Case Studies
  • 5 Threats to Validity
  • 6 Related Work
  • 7 Conclusion
  • References
  • Verifying Global Two-Safety Properties in Neural Networks with Confidence
  • 1 Introduction
  • 2 Background
  • 2.1 Feed-Forward Neural Networks
  • 2.2 Hyperproperties
  • 2.3 Relational Verification and Self-composition
  • 2.4 Robustness and Fairness
  • 3 Confidence Based Global Verification of Feed-Forward Neural Networks
  • 3.1 Encoding 2-Safety Properties as Product Neural Network
  • 3.2 Softmax Approximation
  • 4 Implementation
  • 5 Experimental Evaluation
  • 5.1 Discussion
  • 6 Conclusion
  • References
  • Certified Robust Accuracy of Neural Networks Are Bounded Due to Bayes Errors
  • 1 Introduction
  • 2 Preliminary and Problem Definition
  • 2.1 Robustness in Classification
  • 2.2 Bayes Rules for Distributions
  • 3 An Upper Bound of Robustness from Bayes Error
  • 3.1 Certified Training Increases Bayes Error
  • 3.2 Irreducible Robustness Error and Robustness Upper Bound
  • 4 Experiment and Results
  • 5 Related Works
  • 6 Conclusion
  • References
  • Boosting Few-Pixel Robustness Verification via Covering Verification Designs
  • 1 Introduction
  • 2 Background
  • 3 Our Approach: Covering Verification Designs
  • 4 CoVerD
  • 4.1 Our System
  • 4.2 Choosing a Covering Verification Design
  • 4.3 Constructing a Covering Verification Design
  • 4.4 A Running Example
  • 5 Evaluation
  • 6 Related Work
  • 7 Conclusion
  • References
  • Unifying Qualitative and Quantitative Safety Verification of DNN-Controlled Systems
  • 1 Introduction
  • 2 Preliminaries
  • 2.1 DNN-Controlled Systems
  • 2.2 Barrier Certificate and Its Neural Implementation
  • 3 Verification Problem and Our Framework
  • 3.1 Problem Statement
  • 3.2 Overview of Our Framework
  • 4 Qualitative and Quantitative Safety Verification.
  • 4.1 Qualitative Safety Verification.