Provenfix: Temporal property-guided program repair

Y Song, X Gao, W Li, WN Chin… - Proceedings of the ACM …, 2024 - dl.acm.org
Model checking has been used traditionally for finding violations of temporal properties.
Recently, testing or fuzzing approaches have also been applied to software systems to find …

Leveraging rust types for program synthesis

J Fiala, S Itzhaky, P Müller, N Polikarpova… - Proceedings of the ACM …, 2023 - dl.acm.org
The Rust type system guarantees memory safety and data-race freedom. However, to satisfy
Rust's type rules, many familiar implementation patterns must be adapted substantially …

Explainable Program Synthesis by Localizing Specifications

A Nazari, Y Huang, R Samanta… - Proceedings of the …, 2023 - dl.acm.org
The traditional formulation of the program synthesis problem is to find a program that meets
a logical correctness specification. When synthesis is successful, there is a guarantee that …

Reconciling enumerative and deductive program synthesis

K Huang, X Qiu, P Shen, Y Wang - Proceedings of the 41st ACM …, 2020 - dl.acm.org
Syntax-guided synthesis (SyGuS) aims to find a program satisfying semantic specification as
well as user-provided structural hypotheses. There are two main synthesis approaches …

M3 semantic API migrations

B Collie, P Ginsbach, J Woodruff, A Rajan… - Proceedings of the 35th …, 2020 - dl.acm.org
Library migration is a challenging problem, where most existing approaches rely on prior
knowledge. This can be, for example, information derived from changelogs or statistical …

Cyclic program synthesis

S Itzhaky, H Peleg, N Polikarpova, RNS Rowe… - Proceedings of the …, 2021 - dl.acm.org
We describe the first approach to automatically synthesizing heap-manipulating programs
with auxiliary recursive procedures. Such procedures occur routinely in data structure …

Deductive synthesis of programs with pointers: techniques, challenges, opportunities

S Itzhaky, H Peleg, N Polikarpova, RNS Rowe… - … Aided Verification: 33rd …, 2021 - Springer
Deductive Synthesis of Programs with Pointers: Techniques, Challenges, Opportunities |
SpringerLink Skip to main content Advertisement SpringerLink Account Menu Find a journal …

SecCSL: Security Concurrent Separation Logic

G Ernst, T Murray - … Aided Verification: 31st International Conference, CAV …, 2019 - Springer
We present SecCSL, a concurrent separation logic for proving expressive, data-dependent
information flow security properties of low-level programs. SecCSL is considerably more …

Dataflow-based pruning for speeding up superoptimization

M Mukherjee, P Kant, Z Liu, J Regehr - Proceedings of the ACM on …, 2020 - dl.acm.org
Superoptimization is a compilation strategy that uses search to improve code quality, rather
than relying on a canned sequence of transformations, as traditional optimizing compilers …

Programming with a read-eval-synth loop

H Peleg, R Gabay, S Itzhaky, E Yahav - Proceedings of the ACM on …, 2020 - dl.acm.org
A frequent programming pattern for small tasks, especially expressions, is to repeatedly
evaluate the program on an input as its editing progresses. The Read-Eval-Print Loop …