We show that computing the strongest polynomial invariant for single-pat...
Automatically generating invariants, key to computer-aided analysis of
p...
We present an exact approach to analyze and quantify the sensitivity of
...
Cryptographic protocols are extremely hard to design and prove correct, ...
Non-linear polynomial systems over finite fields are used to model funct...
Loop invariants are software properties that hold before and after every...
Provably correct software is one of the key challenges of our software-d...
Automatically generating invariants, key to computer-aided analysis of
p...
We present an algorithmic approach to estimate the value distributions o...
We present a novel static analysis technique to derive higher moments fo...
Off-chain protocols constitute one of the most promising approaches to s...
We describe the Amber tool for proving and refuting the termination of a...
Despite recent advances in automating theorem proving in full first-orde...
Some of the most significant high-level properties of currencies are the...
We introduce MORA, an automated tool for generating invariants of
probab...
We describe a dataset expressing and proving properties of graph trails,...
Provably correct software is one of the key challenges in our softwaredr...
The termination behavior of probabilistic programs depends on the outcom...
We propose trace logic, an instance of many-sorted first-order logic, to...
Prob-solvable loops are probabilistic programs with polynomial assignmen...
We present an algorithm for synthesizing program loops satisfying a give...
Motivated by applications of first-order theorem proving to software
ana...
Many applications of formal methods require automated reasoning about sy...
We present a logical framework for the verification of relational proper...
Given a lattice L in Z^m and a subset A of R^m, we say that a point in A...
One of the main challenges in the analysis of probabilistic programs is ...
We describe the Aligator.jl software package for automatically generatin...
Program analysis requires the generation of program properties expressin...
We present an algorithm for synthesising a controller (supervisor) for a...
We study interpolant extraction from local first-order refutations. We
p...
Analyzing and reasoning about safety properties of software systems beco...