Lifting Numeric Relational Domains to Algebraic Data Types
|
2022 |
Bautista, Santiago |
Boosting Robustness Verification of Semantic Feature Neighborhoods
|
2022 |
Kabaha, Anan |
Efficient Modular SMT-Based Model Checking of Pointer Programs
|
2022 |
Garcia-Contreras, Isabel |
Fast and Incremental Computation of Weak Control Closure
|
2022 |
Masud, Abu Naser |
Semantic Foundations for Cost Analysis of Pipeline-Optimized Programs
|
2022 |
Barthe, Gilles |
Parameterized Recursive Refinement Types for Automated Program Verification
|
2022 |
Mukai, Ryoya |
Towards Efficient Reasoning of Quantum Programs
|
2022 |
Yu, Nengkun |
Invariant Inference with Provable Complexity from the Monotone Theory
|
2022 |
Feldman, Yotam M. Y. |
Property-Driven Code Obfuscations Reinterpreting Jones-Optimality in Abstract Interpretation
|
2022 |
Giacobazzi, Roberto |
Local Completeness Logic on Kleene Algebra with Tests
|
2022 |
Milanese, Marco |
Adversanial Logic
|
2022 |
Vanegue, Julien |
Specification-Guided Reinforcement Learning
|
2022 |
Bansal, Suguman |
Solving Invariant Generation for Unsolvable Loops
|
2022 |
Amrollahi, Daneshvar |
Principles of Staged Static+Dynamic Partial Analysis
|
2022 |
Anand, Aditya |
SecWasm: Information Flow Control for WebAssembly
|
2022 |
Bastys, lulia |
Automated Synthesis of Asynchronizations
|
2022 |
Beillahi, Sidi Mohamed |
Case Study on Verification-Witness Validators: Where We Are and Where We Go
|
2022 |
Beyer, Dirk |
Deciding Program Properties via Complete Abstractions on Bounded Domains
|
2022 |
Bruni, Roberto |
Bootstrapping Library-Based Synthesis
|
2022 |
Huang, Kangjing |
CLEVEREST: Accelerating CEGAR-based Neural Network Verification via Adversarial Attacks
|
2022 |
Zhao, Zhe |