A fast and low-overhead technique to secure programs against integer overflows

RE Rodrigues, VHS Campos… - Proceedings of the 2013 …, 2013 - ieeexplore.ieee.org
The integer primitive type has upper and lower bounds in many programming languages,
including C, and Java. These limits might lead programs that manipulate large integer …

Decidability of inferring inductive invariants

O Padon, N Immerman, S Shoham, A Karbyshev… - ACM SIGPLAN …, 2016 - dl.acm.org
Induction is a successful approach for verification of hardware and software systems. A
common practice is to model a system using logical formulas, and then use a decision …

Widening with thresholds for programs with complex control graphs

L Lakhdar-Chaouch, B Jeannet, A Girault - Automated Technology for …, 2011 - Springer
The precision of an analysis based on abstract interpretation does not only depend on the
abstract domain, but also on the solving method. The traditional solution is to solve …

Interval analysis and machine arithmetic: Why signedness ignorance is bliss

G Gange, JA Navas, P Schachte… - ACM Transactions on …, 2015 - dl.acm.org
The most commonly used integer types have fixed bit-width, making it possible for
computations to “wrap around,” and many programs depend on this behaviour. Yet much …

Solving systems of rational equations through strategy iteration

TM Gawlitza, H Seidl - ACM Transactions on Programming Languages …, 2011 - dl.acm.org
We present practical algorithms for computing exact least solutions of equation systems over
the reals with addition, multiplication by positive constants, minimum and maximum. The …

Automating Pruning in Top-Down Enumeration for Program Synthesis Problems with Monotonic Semantics

KJC Johnson, R Krishnan, T Reps… - Proceedings of the ACM …, 2024 - dl.acm.org
In top-down enumeration for program synthesis, abstraction-based pruning uses an abstract
domain to approximate the set of possible values that a partial program, when completed …

[图书][B] Deductive verification of distributed protocols in first-order logic

O Padon - 2018 - ieeexplore.ieee.org
Formal verification of infinite-state systems, and distributed systems in particular, is a long
standing research goal. In the deductive verification approach, the programmer provides …

Warping cache simulation of polyhedral programs

C Morelli, J Reineke - Proceedings of the 43rd ACM SIGPLAN …, 2022 - dl.acm.org
Techniques to evaluate a program's cache performance fall into two camps: 1. Traditional
trace-based cache simulators precisely account for sophisticated real-world cache models …

Interval analysis of microcontroller code using abstract interpretation of hardware and software

J Brauer, T Noll, B Schlich - … of the 13th International Workshop on …, 2010 - dl.acm.org
Static analysis is often performed on source code where intervals--possibly the most widely
used numeric abstract domain--have successfully been used as a program abstraction for …

Parameterized construction of program representations for sparse dataflow analyses

A Tavares, B Boissinot, F Pereira, F Rastello - … , CC 2014, Held as Part of …, 2014 - Springer
Data-flow analyses usually associate information with control flow regions. Informally, if
these regions are too small, like a point between two consecutive statements, we call the …