Software vulnerability detection using deep neural networks: a survey

G Lin, S Wen, QL Han, J Zhang… - Proceedings of the …, 2020 - ieeexplore.ieee.org
The constantly increasing number of disclosed security vulnerabilities have become an
important concern in the software industry and in the field of cybersecurity, suggesting that …

Component-based distributed software reconfiguration: a verification-oriented survey

H Coullon, L Henrio, F Loulergue… - ACM Computing Surveys, 2023 - dl.acm.org
Distributed software built from components has become a mainstay of service-oriented
applications, which frequently undergo reconfigurations to adapt to changes in their …

A rewriting system for convex optimization problems

A Agrawal, R Verschueren, S Diamond… - Journal of Control and …, 2018 - Taylor & Francis
We describe a modular rewriting system for translating optimization problems written in a
domain-specific language (DSL) to forms compatible with low-level solver interfaces …

Viper: A verification infrastructure for permission-based reasoning

P Müller, M Schwerhoff, AJ Summers - … St. Petersburg, FL, USA, January 17 …, 2016 - Springer
The automation of verification techniques based on first-order logic specifications has
benefitted greatly from verification infrastructures such as Boogie and Why. These offer an …

Verismart: A highly precise safety verifier for ethereum smart contracts

S So, M Lee, J Park, H Lee, H Oh - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
We present VERISMART, a highly precise verifier for ensuring arithmetic safety of Ethereum
smart contracts. Writing safe smart contracts without unintended behavior is critically …

The dogged pursuit of bug-free C programs: the Frama-C software analysis platform

P Baudin, F Bobot, D Bühler, L Correnson… - Communications of the …, 2021 - dl.acm.org
The dogged pursuit of bug-free C programs: the Frama-C software analysis platform Page 1 56
COMMUNICATIONS OF THE ACM | AUGUST 2021 | VOL. 64 | NO. 8 contributed articles IMA GE …

An empirical study on mutation, statement and branch coverage fault revelation that avoids the unreliable clean program assumption

TT Chekam, M Papadakis, Y Le Traon… - 2017 IEEE/ACM 39th …, 2017 - ieeexplore.ieee.org
Many studies suggest using coverage concepts, such as branch coverage, as the starting
point of testing, while others as the most prominent test quality indicator. Yet the relationship …

Deductive software verification: from pen-and-paper proofs to industrial tools

R Hähnle, M Huisman - Computing and Software Science: State of the Art …, 2019 - Springer
Deductive software verification aims at formally verifying that all possible behaviors of a
given program satisfy formally defined, possibly complex properties, where the verification …

Verified low-level programming embedded in F

J Protzenko, JK Zinzindohoué, A Rastogi… - Proceedings of the …, 2017 - dl.acm.org
We present Low*, a language for low-level programming and verification, and its application
to high-assurance optimized cryptographic libraries. Low* is a shallow embedding of a …

Edge-based auditing method for data security in resource-constrained internet of things

T Wang, Y Mei, X Liu, J Wang, HN Dai… - Journal of Systems …, 2021 - Elsevier
The explosive generation of Internet of Things (IoT) data calls for cloud service providers
(CSP) to further provide more secure and reliable transmission, storage, and management …