Formal methods: Practice and experience

J Woodcock, PG Larsen, J Bicarregui… - ACM computing surveys …, 2009 - dl.acm.org
Formal methods use mathematical models for analysis and verification at any part of the
program life-cycle. We describe the state of the art in the industrial use of formal methods …

[PDF][PDF] Contextual policy enforcement in android applications with permission event graphs.

KZ Chen, NM Johnson, V D'Silva, S Dai, K MacNamara… - Ndss, 2013 - lilicoding.github.io
The difference between a malicious and a benign Android application can often be
characterised by context and sequence in which certain permissions and APIs are used. We …

A parametric segmentation functor for fully automatic and scalable array content analysis

P Cousot, R Cousot, F Logozzo - ACM SIGPLAN Notices, 2011 - dl.acm.org
We introduce FunArray, a parametric segmentation abstract domain functor for the fully
automatic and scalable analysis of array content properties. The functor enables a natural …

Autoproof: Auto-active functional verification of object-oriented programs

J Tschannen, CA Furia, M Nordio… - … 2015, Held as Part of the …, 2015 - Springer
Auto-active verifiers provide a level of automation intermediate between fully automatic and
interactive: users supply code with annotations as input while benefiting from a high level of …

Fuzzing class specifications

F Molina, M d'Amorim, N Aguirre - Proceedings of the 44th International …, 2022 - dl.acm.org
Expressing class specifications via executable constraints is important for various software
engineering tasks such as test generation, bug finding and automated debugging, but …

Multi-mode energy management for multi-tier server clusters

T Horvath, K Skadron - Proceedings of the 17th international conference …, 2008 - dl.acm.org
This paper presents an energy management policy for reconfigurable clusters running a
multi-tier application, exploiting DVS together with multiple sleep states. We develop a …

Feature-interaction detection based on feature-based specifications

S Apel, A Von Rhein, T Thüm, C Kästner - Computer Networks, 2013 - Elsevier
Formal specification and verification techniques have been used successfully to detect
feature interactions. We investigate whether feature-based specifications can be used for …

Formalizing natural language intent into program specifications via large language models

M Endres, S Fakhoury, S Chakraborty… - arXiv preprint arXiv …, 2023 - arxiv.org
Informal natural language that describes code functionality, such as code comments or
function documentation, may contain substantial information about a programs intent …

Implicit flows: Can't live with 'em, can't live without 'em

D King, B Hicks, M Hicks, T Jaeger - Information Systems Security: 4th …, 2008 - Springer
Verifying that programs trusted to enforce security actually do so is a practical concern for
programmers and administrators. However, there is a disconnect between the kinds of tools …

Implementation-independent function reuse

B De Meester, T Seymoens, A Dimou… - Future Generation …, 2020 - Elsevier
Functions are essential building blocks of information retrieval and information
management. However, efforts implementing these functions are fragmented: one function …