[PDF][PDF] PERC: Posit enhanced rocket chip

MV Arunkumar, SG Bhairathi… - Proceedings of Fourth …, 2020 - researchgate.net
Precision and performance of arithmetic processing is a known trade-off of a system design.
The IEEE 754 fixed width 32-bit and 64-bit precision arithmetic, while tuned for performance …

Joint forces for memory safety checking revisited

M Chalupa, J Strejček, M Vitovská - International Journal on Software …, 2020 - Springer
We present an improved version of the memory safety verification approach implemented in
Symbiotic 5, the winner of the MemSafety category at the Competition on Software …

Symbiotic  6: generating test cases by slicing and symbolic execution

M Chalupa, M Vitovská, T Jašek, M Šimáček… - International Journal on …, 2021 - Springer
Symbiotic is a bug-finding and verification tool that integrates light-weight static analyses
and instrumentation with program slicing and symbolic execution. The techniques are …

Application of secret sharing scheme in software watermarking

KK Aiswarya, K Praveen, PP Amritha… - … for Intelligent Systems …, 2021 - Springer
The software watermarking technique is used to eradicate software piracy that is increasing
widely in this digital world. The programmer can prove his ownership by recovering the …

Application of visual cryptography scheme in software watermarking

RM Jacob, K Praveen… - 2020 4th International …, 2020 - ieeexplore.ieee.org
Software watermark is a unique identifier that is embedded in software that can be extracted
later to prove the identity of the owner. Software is prone to threats like piracy, modification …

[PDF][PDF] Verification of Memory Safety with Predator and Symbiotic

BT Jašek - is.muni.cz
Symbiotic and Predator are formal verification tools. We evaluate each of those tools on
benchmarks from sv-comp. Our evaluation shows that the tools can benefit from cooperating …