Safety-critical systems with neural network components require strong
gu...
This paper introduces ESBMC v7.3, the latest Efficient SMT-Based
Context...
Software vulnerabilities leading to various detriments such as crashes, ...
This paper proposes a privacy-preserving and accountable billing (PA-Bil...
This paper presents the FormAI dataset, a large collection of 112, 000
A...
Natural Language Processing (NLP) domain is experiencing a revolution du...
We present QNNRepair, the first method in the literature for repairing
q...
In this paper we present a novel solution that combines the capabilities...
We describe and evaluate LF-checker, a metaverifier tool based on machin...
Neural networks are essential components of learning-based software syst...
Bounded model checking (BMC) and fuzzing techniques are among the most
e...
Finding software vulnerabilities in concurrent programs is a challenging...
In this work, we describe and evaluate the first model checker for verif...
FuSeBMC is a test generator for finding security vulnerabilities in C
pr...
Smart contracts written in Solidity are programs used in blockchain netw...
In the last three decades, memory safety issues in system programming
la...
Internet of Things (IoT) consists of a large number of smart devices
con...
We describe and evaluate a novel white-box fuzzer for C programs named
F...
We describe a new SMT bit-blasting API for floating-points and evaluate ...
Internet of Things (IoT) is a system that consists of a large number of ...
Artificial Neural networks (ANNs) are powerful computing systems employe...
The proliferation of Unmanned Aerial Vehicles (UAVs) embedded with vulne...
Software model checking has experienced significant progress in the last...
We describe and evaluate a novel k-induction proof rule called bidirecti...
We describe and evaluate a bug refutation extension for the Clang Static...
We describe and evaluate a novel optimization-based off-line path planni...
Recently, the k-induction algorithm has proven to be a successful approa...
This paper describes three variants of a counterexample guided inductive...