Výsledky vyhľadávania - "Software and its engineering→Software verification"

  1. 1

    Proof Automation with Large Language Models Autor Lu, Minghai, Delaware, Benjamin, Zhang, Tianyi

    ISSN: 2643-1572
    Vydavateľské údaje: ACM 27.10.2024
    “…Interactive theorem provers such as Coq are powerful tools to formally guarantee the correctness of software. However, using these tools requires significant…”
    Získať plný text
    Konferenčný príspevok..
  2. 2

    Uncover the Premeditated Attacks: Detecting Exploitable Reentrancy Vulnerabilities by Identifying Attacker Contracts Autor Yang, Shuo, Chen, Jiachi, Huang, Mingyuan, Zheng, Zibin, Huang, Yuan

    ISSN: 1558-1225
    Vydavateľské údaje: ACM 14.04.2024
    “…Reentrancy, a notorious vulnerability in smart contracts, has led to millions of dollars in financial loss. However, current smart contract vulnerability…”
    Získať plný text
    Konferenčný príspevok..
  3. 3

    AmbieGenVAE at the SBFT 2024 Tool Competition - Cyber-Physical Systems Track Autor Humeniuk, Dmytro, Khomh, Foutse

    Vydavateľské údaje: ACM 14.04.2024
    “…Testing and verification of autonomous systems is critically important. In the context of SBFT 2024 Cyber-physical systems (CPS) testing tool competition, we…”
    Získať plný text
    Konferenčný príspevok..
  4. 4

    AmbieGen at the SBFT 2024 Tool Competition - CPS-UAV Track Autor Humeniuk, Dmytro, Khomh, Foutse

    Vydavateľské údaje: ACM 14.04.2024
    “…Simulation based testing of autonomous systems prior to their deployment in the real world is of big importance. AmbieGen is a tool for automatic generation of…”
    Získať plný text
    Konferenčný príspevok..
  5. 5

    Runtime Instrumentation for Reactive Components (Artifact) Autor Aceto, Luca, Attard, Duncan Paul, Francalanza, Adrian, Ingólfsdóttir, Anna

    ISSN: 2509-8195
    Vydavateľské údaje: Schloss Dagstuhl – Leibniz-Zentrum für Informatik 12.09.2024
    “…Reactive software calls for instrumentation methods that uphold the reactive attributes of systems. Runtime verification sets another demand on the…”
    Získať plný text
    Data Set
  6. 6

    A Framework for Including Uncertainty in Robustness Evaluation of Bayesian Neural Network Classifiers Autor Essbai, Wasim, Bombarda, Andrea, Bonfanti, Silvia, Gargantini, Angelo

    Vydavateľské údaje: ACM 20.04.2024
    “…Neural networks (NNs) play a crucial role in safety-critical fields, requiring robustness assurance. Bayesian Neural Networks (BNNs) address data uncertainty,…”
    Získať plný text
    Konferenčný príspevok..
  7. 7

    C for Yourself: Comparison of Front-End Techniques for Formal Verification Autor Bajczi, Levente, Adam, Zsofia, Molnar, Vince

    ISSN: 2575-5099
    Vydavateľské údaje: ACM 01.05.2022
    “…With the improvement of hardware and algorithms, the main challenge of software model checking has shifted from pure algorithmic performance toward supporting…”
    Získať plný text
    Konferenčný príspevok..
  8. 8

    MASS: A tool for Mutation Analysis of Space CPS Autor Cornejo, Oscar, Pastore, Fabrizio, Briand, Lionel

    Vydavateľské údaje: IEEE 01.05.2022
    “…We present MASS, a mutation analysis tool for embedded software in cyber-physical systems (CPS). We target space CPS (e.g., satellites) and other CPS with…”
    Získať plný text
    Konferenčný príspevok..
  9. 9

    Automatic Loop Invariant Generation for Data Dependence Analysis Autor Tabar, Asmae Heydari, Bubel, Richard, Hahnle, Reiner

    ISSN: 2575-5099
    Vydavateľské údaje: ACM 01.05.2022
    “…Parallelization of programs relies on sound and precise analysis of data dependences in the code, specifically, when dealing with loops. State-of-art tools are…”
    Získať plný text
    Konferenčný príspevok..
  10. 10

    DFarm: Massive-Scaling Dynamic Android App Analysis on Real Hardware Autor Miltenberger, Marc, Gerding, Julien, Guthmann, Jens, Arzt, Steven

    Vydavateľské údaje: ACM 01.10.2020
    “…Dynamic analysis is an important tool for assessing software quality during testing. It not only helps analysts identify performance bottlenecks and functional…”
    Získať plný text
    Konferenčný príspevok..
  11. 11

    Do Instance-level Review Diagrams Support Validation Processes of Cyber-Physical System Specifications : Results from a Controlled Experiment Autor Daun, Marian, Brings, Jennifer, Weyer, Thorsten

    Vydavateľské údaje: ACM 01.06.2020
    “…In the field of safety-critical systems, manual reviews are important to ensure high-quality software and to satisfy legal obligations. When applying…”
    Získať plný text
    Konferenčný príspevok..
  12. 12

    Making Android Apps Monkey-Friendly Autor Paydar, Samad

    Vydavateľské údaje: ACM 01.10.2020
    “…Monkey testing is a random testing technique in which a stream of pseudo-random events are automatically fired on the GUI of the application under test,…”
    Získať plný text
    Konferenčný príspevok..
  13. 13

    On the Monitorability of Session Types, in Theory and Practice (Artifact) Autor Bartolo Burlò, Christian, Francalanza, Adrian, Scalas, Alceste

    ISSN: 2509-8195
    Vydavateľské údaje: Schloss Dagstuhl – Leibniz-Zentrum für Informatik 06.07.2021
    “…In the paper "On the Monitorability of Session Types, in Theory and Practice" we study the monitorability of message-passing black-box processes against…”
    Získať plný text
    Data Set
  14. 14

    Lifestate: Event-Driven Protocols and Callback Control Flow (Artifact) Autor Meier, Shawn, Mover, Sergio, Chang, Bor-Yuh Evan

    ISSN: 2509-8195
    Vydavateľské údaje: Schloss Dagstuhl – Leibniz-Zentrum für Informatik 12.07.2019
    “…Developing interactive applications (apps) against event-driven software frameworks such as Android is notoriously difficult. To create apps that behave as…”
    Získať plný text
    Data Set
  15. 15

    Evaluating System-Level Test Generation for Industrial Software: A Comparison between Manual, Combinatorial and Model-Based Testing Autor Zafar, Muhammad Nouman, Afzal, Wasif, Enoiu, Eduard

    Vydavateľské údaje: ACM 01.05.2022
    “…Adequate testing of safety-critical systems is vital to ensure correct functional and non-functional operations. Previous research has shown that testing such…”
    Získať plný text
    Konferenčný príspevok..
  16. 16

    Better Code, Better Sharing: On the Need of Analyzing Jupyter Notebooks Autor Wang, Jiawei, Li, Li, Zeller, Andreas

    Vydavateľské údaje: ACM 01.10.2020
    “…By bringing together code, text, and examples, Jupyter notebooks have become one of the most popular means to produce scientific results in a productive and…”
    Získať plný text
    Konferenčný príspevok..
  17. 17

    AdvSCanner: Generating Adversarial Smart Contracts to Exploit Reentrancy Vulnerabilities Using LLM and Static Analysis Autor Wu, Yin, Xie, Xiaofei, Peng, Chenyang, Liu, Dijun, Wu, Hao, Fan, Ming, Liu, Ting, Wang, Haijun

    ISSN: 2643-1572
    Vydavateľské údaje: ACM 27.10.2024
    “…Smart contracts are prone to vulnerabilities, with reentrancy attacks posing significant risks due to their destructive potential. While various methods exist…”
    Získať plný text
    Konferenčný príspevok..
  18. 18

    BenchCloud: A Platform for Scalable Performance Benchmarking Autor Beyer, Dirk, Chien, Po-Chun, Jankola, Marek

    ISSN: 2643-1572
    Vydavateľské údaje: ACM 27.10.2024
    “…Performance evaluation is a crucial method for assessing automated-reasoning tools. Evaluating automated tools requires rigorous benchmarking to accurately…”
    Získať plný text
    Konferenčný príspevok..
  19. 19

    Oracle-Guided Vulnerability Diversity and Exploit Synthesis of Smart Contracts Using LLMs Autor Eshghie, Mojtaba, Artho, Cyrille

    ISSN: 2643-1572
    Vydavateľské údaje: ACM 27.10.2024
    “…Many smart contracts are prone to exploits, which has given rise to analysis tools that try to detect and fix vulnerabilities. Such analysis tools are often…”
    Získať plný text
    Konferenčný príspevok..
  20. 20

    Skyeye: Detecting Imminent Attacks via Analyzing Adversarial Smart Contracts Autor Wang, Haijun, Hu, Yurui, Wu, Hao, Liu, Dijun, Peng, Chenyang, Wu, Yin, Fan, Ming, Liu, Ting

    ISSN: 2643-1572
    Vydavateľské údaje: ACM 27.10.2024
    “…Smart contracts are susceptible to various vulnerabilities that can be exploited by hackers via developing adversarial contracts. Existing vulnerability…”
    Získať plný text
    Konferenčný príspevok..