Software verification: 10th comparative evaluation (SV-COMP 2021)

D Beyer - Tools and Algorithms for the Construction and Analysis …, 2021 - Springer
SV-COMP 2021 is the 10th edition of the Competition on Software Verification (SV-COMP),
which is an annual comparative evaluation of fully automatic software verifiers for C and …

Symbiotic 9: String Analysis and Backward Symbolic Execution with Loop Folding: (Competition Contribution)

M Chalupa, V Mihalkovič, A Řechtáčková… - … Conference on Tools …, 2022 - Springer
The development of Symbiotic 9 focused mainly on two components. One is the symbolic
executor Slowbeast, which newly supports backward symbolic execution including its …

[PDF][PDF] Construction of verifier combinations based on off-the-shelf verifiers

D Beyer, S Kanav, C Richter - International Conference on …, 2022 - library.oapen.org
Software verifiers have different strengths and weaknesses, depending on properties of the
verification task. It is well-known that combinations of verifiers via portfolio and selection …

Eunomia: enabling user-specified fine-grained search in symbolically executing WebAssembly binaries

N He, Z Zhao, J Wang, Y Hu, S Guo, H Wang… - Proceedings of the …, 2023 - dl.acm.org
Although existing techniques have proposed automated approaches to alleviate the path
explosion problem of symbolic execution, users still need to optimize symbolic execution by …

FuSeBMC v4: Improving code coverage with smart seeds via BMC, fuzzing and static analysis

K Alshmrany, M Aldughaim, A Bhayat… - Formal Aspects of …, 2024 - dl.acm.org
Bounded model checking (BMC) and fuzzing techniques are among the most effective
methods for detecting errors and security vulnerabilities in software. However, there are still …

Automated Verification of Correctness for Masked Arithmetic Programs

M Liu, F Song, T Chen - International Conference on Computer Aided …, 2023 - Springer
Masking is a widely-used effective countermeasure against power side-channel attacks for
implementing cryptographic algorithms. Surprisingly, few formal verification techniques have …

Reusing predicate precision in value analysis

MC Jakobs - International Conference on Integrated Formal …, 2022 - Springer
Software verification allows one to examine the reliability of software. Thereby, analyses
exchange information to become more effective, more efficient, or to eliminate false results …

Cooperative Verification of PLC Programs Using CoVeriTeam: Towards a reliable and secure Industrial Control Systems

C Ukegbu, H Mehrpouyan - … of Cyber-Physical Systems and Internet of …, 2023 - dl.acm.org
It is important that the programmed logic controller (PLC), the heart of industrial control
systems (ICS), is formally verified to ensure that its safety and security requirements are met …

Review of Software Model-Checking Techniques for Dealing with Error Detection in Program Codes

EO Aliyu - Journal of Software Engineering and Applications, 2023 - scirp.org
Debugging software code has been a challenge for software developers since the early
days of computer programming. A simple need, because the world is run by software. So …

Fast computation of strong control dependencies

M Chalupa, D Klas̆ka, J Strejček… - … Aided Verification: 33rd …, 2021 - Springer
We introduce new algorithms for computing non-termination sensitive control dependence
(NTSCD) and decisive order dependence (DOD). These relations on vertices of a control …