First international competition on runtime verification: rules, benchmarks, tools, and final results of CRV 2014

E Bartocci, Y Falcone, B Bonakdarpour… - International journal on …, 2019 - Springer
The first international Competition on Runtime Verification (CRV) was held in September
2014, in Toronto, Canada, as a satellite event of the 14th international conference on …

Shadow state encoding for efficient monitoring of block-level properties

K Vorobyov, J Signoles, N Kosmatov - ACM SIGPLAN Notices, 2017 - dl.acm.org
Memory shadowing associates addresses from an application's memory to values stored in
a disjoint memory space called shadow memory. At runtime shadow values store metadata …

Your proof fails? testing helps to find the reason

G Petiot, N Kosmatov, B Botella, A Giorgetti… - Tests and Proofs: 10th …, 2016 - Springer
Applying deductive verification to formally prove that a program respects its formal
specification is a very complex and time-consuming task due in particular to the lack of …

How testing helps to diagnose proof failures

G Petiot, N Kosmatov, B Botella, A Giorgetti… - Formal Aspects of …, 2018 - Springer
Applying deductive verification to formally prove that a program respects its formal
specification is a very complex and time-consuming task due in particular to the lack of …

[HTML][HTML] Fast as a shadow, expressive as a tree: Optimized memory monitoring for C

A Jakobsson, N Kosmatov, J Signoles - Science of Computer Programming, 2016 - Elsevier
One classical approach to ensuring memory safety of C programs is based on storing block
metadata in a tree-like datastructure. However it becomes relatively slow when the number …

Lightweight runtime checking of C programs with RTC

R Milewicz, R Vanka, J Tuck, D Quinlan… - … Languages, Systems & …, 2016 - Elsevier
Abstract The C Programming Language is known for being an efficient language that can be
compiled on almost any architecture and operating system. However the absence of …

Improving the scalability of directed model checking of concurrent java code through hybrid and distributed analysis

RM Milewicz - 2016 - search.proquest.com
Since the widespread adoption of multi-core architectures at the turn of the millennium,
parallel and concurrent programming paradigms, such as multi-threaded programming …

Computer-implemented method and a system for encoding a stack application memory state using shadow memory

K Vorobyov, N Kosmatov, J Signoles - US Patent 10,445,020, 2019 - Google Patents
A method is provided that allows tracking boundaries of allocated memory blocks while still
capturing byte-level properties. This is achieved with a particular shadow memory encoding …

Computer-implemented method and a system for encoding a heap application memory state using shadow memory

K Vorobyov, N Kosmatov, J Signoles - US Patent 10,229,070, 2019 - Google Patents
A computer-implemented method for encoding an applica tion memory that a program,
executed on a computer, has access to, using a shadow memory corresponding to the …

[图书][B] An Examination of the Molecular Mechanism of E. coli ClpAP Catalyzed Polypeptide Translocation

JM Miller - 2013 - search.proquest.com
ATP-dependent proteases catalyze the removal of both misfolded and properly folded
proteins in cellular quality control pathways. ClpAP shares a structural homology with other …