Sciweavers

CAV
2011
Springer
202views Hardware» more  CAV 2011»
12 years 8 months ago
Simplifying Loop Invariant Generation Using Splitter Predicates
Abstract. We present a novel static analysis technique that substantially improves the quality of invariants inferred by standard loop invariant generation techniques. Our techniqu...
Rahul Sharma 0001, Isil Dillig, Thomas Dillig, Ale...
CAV
2011
Springer
242views Hardware» more  CAV 2011»
12 years 8 months ago
Equality-Based Translation Validator for LLVM
We updated our Peggy tool, previously presented in [6], to perform translation validation for the LLVM compiler using a technique called Equality Saturation. We present the tool, a...
Michael Stepp, Ross Tate, Sorin Lerner
CAV
2011
Springer
217views Hardware» more  CAV 2011»
12 years 8 months ago
From Cardiac Cells to Genetic Regulatory Networks
Abstract. A fundamental question in the treatment of cardiac disorders, such as tachycardia and fibrillation, is under what circumstances does such a disorder arise? To answer to ...
Radu Grosu, Grégory Batt, Flavio H. Fenton,...
CAV
2011
Springer
253views Hardware» more  CAV 2011»
12 years 8 months ago
HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection
Abstract. Many automatic testing, analysis, and verification techniques for programs can effectively be reduced to a constraint-generation phase followed by a constraint-solving ...
Vijay Ganesh, Adam Kiezun, Shay Artzi, Philip J. G...
CAV
2011
Springer
234views Hardware» more  CAV 2011»
12 years 8 months ago
Resolution Proofs and Skolem Functions in QBF Evaluation and Applications
Abstract. Quantified Boolean formulae (QBF) allow compact encoding of many decision problems. Their importance motivated the development of fast QBF solvers. Certifying the result...
Valeriy Balabanov, Jie-Hong R. Jiang
CAV
2011
Springer
207views Hardware» more  CAV 2011»
12 years 8 months ago
Interactive Synthesis of Code Snippets
Abstract. We describe a tool that applies theorem proving technology to synthesize code fragments that use given library functions. To determine candidate code fragments, our appro...
Tihomir Gvero, Viktor Kuncak, Ruzica Piskac
CAV
2011
Springer
216views Hardware» more  CAV 2011»
12 years 8 months ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song
CAV
2011
Springer
365views Hardware» more  CAV 2011»
12 years 8 months ago
BAP: A Binary Analysis Platform
Abstract. BAP is a publicly available infrastructure for performing program verification and analysis tasks on binary (i.e., executable) code. In this paper, we describe BAP as we...
David Brumley, Ivan Jager, Thanassis Avgerinos, Ed...