E-Book, Englisch, Band 14500, 340 Seiten, eBook
Dimitrova / Lahav / Wolff Verification, Model Checking, and Abstract Interpretation
1. Auflage 2024
ISBN: 978-3-031-50521-8
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
25th International Conference, VMCAI 2024, London, United Kingdom, January 15–16, 2024, Proceedings, Part II
E-Book, Englisch, Band 14500, 340 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-031-50521-8
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
The 30 full papers presented in the proceedings were carefully reviewed and selected from 74 submissions. They were organized in topical sections as follows:Part I: Abstract interpretation; infinite-state systems; model checking and synthesis; SAT, SMT, and automated reasoning; Part II: Concurrency; neural networks; probabilistic and quantum programs; program and system verification; runtime verification; security and privacy;
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Concurrency.- Petrification: Software Model Checking for Programs with Dynamic Thread Management.- A Fully Verified Persistency Library.- A Navigation Logic for Recursive Programs with Dynamic Thread Creation.- Neural Networks.- Taming Reachability Analysis of DNN-Controlled Systems via Abstraction-Based Training.- Verification of Neural Networks' Local Differential Classification Privacy.- AGNES: Abstraction-guided Framework for Deep Neural Network Security.- Probabilistic and Quantum Programs Guaranteed inference for probabilistic programs: a parallelisable, small-step operational approach.- Local Reasoning about Probabilistic Behaviour for Classical-Quantum Programs.- Program and System Verification.- Deductive Verification of Parameterized Embedded Systems modeled in SystemC.- Automatically Enforcing Rust Trait Properties.- Borrowable Fractional Ownership Types for Verification.- Runtime Verification.- TP-DejaVu: Combining Operational and Declarative Runtime Verification.- Synthesizing Efficiently Monitorable Formulas in Metric Temporal Logic.- Security and Privacy.- Automatic and Incremental Repair for Speculative Information Leaks.- Sound Abstract Nonexploitability Analysis.




