Skip to main content

previous disabled Page of 2
and
  1. Chapter and Conference Paper

    ILAng: A Modeling and Verification Platform for SoCs Using Instruction-Level Abstractions

    We present ILAng, a platform for modeling and verification of systems-on-chip (SoCs) using Instruction-Level Abstractions (ILA). The ILA formal model targeting the hardware-software interface enables a clean s...

    Bo-Yuan Huang, Hongce Zhang, Aarti Gupta in Tools and Algorithms for the Construction … (2019)

  2. Chapter and Conference Paper

    Lazy Self-composition for Security Verification

    The secure information flow problem, which checks whether low-security outputs of a program are influenced by high-security inputs, has many applications in verifying security properties in programs. In this p...

    Weikun Yang, Yakir Vizel, Pramod Subramanyan, Aarti Gupta in Computer Aided Verification (2018)

  3. No Access

    Chapter and Conference Paper

    Trace-based Analysis of Memory Corruption Malware Attacks

    Understanding malware behavior is critical for cybersecurity. This is still largely done through expert manual analysis of the malware code/binary. In this work, we introduce a fully automated method for malwa...

    Zhixing Xu, Aarti Gupta, Sharad Malik in Hardware and Software: Verification and Testing (2017)

  4. No Access

    Article

    On computing minimal independent support and its applications to sampling and counting

    Constrained sampling and counting are two fundamental problems arising in domains ranging from artificial intelligence and security, to hardware and software testing. Recent approaches to approximate solutions...

    Alexander Ivrii, Sharad Malik, Kuldeep S. Meel, Moshe Y. Vardi in Constraints (2016)

  5. No Access

    Chapter and Conference Paper

    Reduction of Resolution Refutations and Interpolants via Subsumption

    Propositional resolution proofs and interpolants derived from them are widely used in automated verification and circuit synthesis. There is a broad consensus that “small is beautiful”—small proofs and interpo...

    Roderick Bloem, Sharad Malik in Hardware and Software: Verification and Te… (2014)

  6. No Access

    Chapter and Conference Paper

    Coverage-Based Trace Signal Selection for Fault Localisation in Post-silicon Validation

    Post-silicon validation is the time-consuming process of detecting and diagnosing defects in prototype silicon. It targets electrical and functional defects that escaped detection during pre-silicon verificati...

    Charlie Shucheng Zhu, Georg Weissenbacher in Hardware and Software: Verification and Te… (2013)

  7. No Access

    Chapter and Conference Paper

    Modeling Firmware as Service Functions and Its Application to Test Generation

    The term firmware refers to software that is tied to a specific hardware platform, e.g., low-level drivers that physically interface with the peripherals. More recently, this has grown to include software that...

    Sunha Ahn, Sharad Malik in Hardware and Software: Verification and Testing (2013)

  8. Chapter and Conference Paper

    passert: A Tool for Debugging Parallel Programs

    passert is a new debugging tool for parallel programs which allows programmers to express correctness criteria using a simple, expressive assertion language. We demonstrate how these parallel assertions allow the...

    Daniel Schwartz-Narbonne, Feng Liu, David August in Computer Aided Verification (2012)

  9. Chapter and Conference Paper

    Wolverine: Battling Bugs with Interpolants

    Wolverine is a software verifier that checks safety properties of sequential ANSI-C and C++ programs, deploying Craig interpolation to derive program invariants. We describe the underlying approa...

    Georg Weissenbacher, Daniel Kroening in Tools and Algorithms for the Construction … (2012)

  10. No Access

    Chapter and Conference Paper

    Predicting Serializability Violations: SMT-Based Search vs. DPOR-Based Search

    In our recent work, we addressed the problem of detecting serializability violations in a concurrent program using predictive analysis, where we used a graph-based method to derive a predictive model from a gi...

    Arnab Sinha, Sharad Malik, Chao Wang in Hardware and Software: Verification and Te… (2012)

  11. No Access

    Book and Conference Proceedings

    Computer Aided Verification

    20th International Conference, CAV 2008 Princeton, NJ, USA, July 7-14, 2008 Proceedings

    Aarti Gupta, Sharad Malik in Lecture Notes in Computer Science (2008)

  12. No Access

    Chapter and Conference Paper

    Solving Quantified Boolean Formulas with Circuit Observability Don’t Cares

    Traditionally the propositional part of a Quantified Boolean Formula (QBF) instance has been represented using a conjunctive normal form (CNF). As with propositional satisfiability (SAT), this is motivated by ...

    Daijue Tang, Sharad Malik in Theory and Applications of Satisfiability Testing - SAT 2006 (2006)

  13. No Access

    Chapter and Conference Paper

    Lemma Learning in SMT on Linear Constraints

    The past decade has seen great improvement in Boolean Satisfiability(SAT) solvers. SAT solving is now widely used in different areas, including electronic design automation, software verification and artificia...

    Yinlei Yu, Sharad Malik in Theory and Applications of Satisfiability Testing - SAT 2006 (2006)

  14. No Access

    Chapter and Conference Paper

    On Solving the Partial MAX-SAT Problem

    Boolean Satisfiability (SAT) has seen many successful applications in various fields such as Electronic Design Automation and Artificial Intelligence. However, in some cases, it may be required/preferable to u...

    Zhaohui Fu, Sharad Malik in Theory and Applications of Satisfiability Testing - SAT 2006 (2006)

  15. Chapter and Conference Paper

    Symmetry Reduction in SAT-Based Model Checking

    The major challenge facing model checking is the state explosion problem. One technique to alleviate this is to apply symmetry reduction; this exploits the fact that many sequential systems consist of intercha...

    Daijue Tang, Sharad Malik, Aarti Gupta, C. Norris Ip in Computer Aided Verification (2005)

  16. No Access

    Chapter and Conference Paper

    Analysis of Search Based Algorithms for Satisfiability of Propositional and Quantified Boolean Formulas Arising from Circuit State Space Diameter Problems

    The sequential circuit state space diameter problem is an important problem in sequential verification. Bounded model checking is complete if the state space diameter of the system is known. By unrolling the t...

    Daijue Tang, Yinlei Yu, Darsh Ranjan in Theory and Applications of Satisfiability … (2005)

  17. No Access

    Chapter and Conference Paper

    Zchaff2004: An Efficient SAT Solver

    The Boolean Satisfiability Problem (SAT) is a well known NP-Complete problem. While its complexity remains a source of many interesting questions for theoretical computer scientists, the problem has found many...

    Yogesh S. Mahajan, Zhaohui Fu, Sharad Malik in Theory and Applications of Satisfiability … (2005)

  18. No Access

    Chapter and Conference Paper

    Cache Performance of SAT Solvers: a Case Study for Efficient Implementation of Algorithms

    We experimentally evaluate the cache performance of different SAT solvers as a case study for the efficient implementation of SAT algorithms. We evaluate several different Boolean Constraint Propagation (BCP) ...

    Lintao Zhang, Sharad Malik in Theory and Applications of Satisfiability Testing (2004)

  19. No Access

    Chapter and Conference Paper

    The Quest for Efficient Boolean Satisfiability Solvers

    The classical NP-complete problem of Boolean Satisfiability (SAT) has seen much interest in not just the theoretical computer science community, but also in areas where practical solutions to this problem enab...

    Lintao Zhang, Sharad Malik in Automated Deduction—CADE-18 (2002)

  20. No Access

    Chapter and Conference Paper

    Towards a Symmetric Treatment of Satisfaction and Conflicts in Quantified Boolean Formula Evaluation

    In this paper, we describe a new framework for evaluating Quantified Boolean Formulas (QBF). The new framework is based on the Davis-Putnam (DPLL) search algorithm. In existing DPLL based QBF algorithms, the p...

    Lintao Zhang, Sharad Malik in Principles and Practice of Constraint Programming - CP 2002 (2002)

previous disabled Page of 2