Skip to main content

previous disabled Page of 2
and
  1. Chapter and Conference Paper

    Lazy Self-composition for Security Verification

    The secure information flow problem, which checks whether low-security outputs of a program are influenced by high-security inputs, has many applications in verifying security properties in programs. In this p...

    Weikun Yang, Yakir Vizel, Pramod Subramanyan, Aarti Gupta in Computer Aided Verification (2018)

  2. No Access

    Chapter and Conference Paper

    Trace-based Analysis of Memory Corruption Malware Attacks

    Understanding malware behavior is critical for cybersecurity. This is still largely done through expert manual analysis of the malware code/binary. In this work, we introduce a fully automated method for malwa...

    Zhixing Xu, Aarti Gupta, Sharad Malik in Hardware and Software: Verification and Testing (2017)

  3. No Access

    Chapter and Conference Paper

    IC3 - Flip** the E in ICE

    Induction is a key element of state-of-the-art verification techniques. Automatically synthesizing and verifying inductive invariants is at the heart of Model Checking of safety properties. In this paper, we stud...

    Yakir Vizel, Arie Gurfinkel, Sharon Shoham in Verification, Model Checking, and Abstract… (2017)

  4. No Access

    Article

    Model checking unbounded concurrent lists

    We present a model checking-based method for verifying list-based concurrent set data structures. Concurrent data structures are notorious for being hard to get right and thus, their verification has received ...

    Divjyot Sethi, Muralidhar Talupur in International Journal on Software Tools fo… (2016)

  5. No Access

    Chapter and Conference Paper

    Reduction of Resolution Refutations and Interpolants via Subsumption

    Propositional resolution proofs and interpolants derived from them are widely used in automated verification and circuit synthesis. There is a broad consensus that “small is beautiful”—small proofs and interpo...

    Roderick Bloem, Sharad Malik in Hardware and Software: Verification and Te… (2014)

  6. No Access

    Chapter and Conference Paper

    Using Flow Specifications of Parameterized Cache Coherence Protocols for Verifying Deadlock Freedom

    We consider the problem of verifying deadlock freedom for symmetric cache coherence protocols. While there are multiple definitions of deadlock in the literature, we focus on a specific form of deadlock which ...

    Divjyot Sethi, Muralidhar Talupur in Automated Technology for Verification and … (2014)

  7. No Access

    Chapter and Conference Paper

    SAT Based Verification of Network Data Planes

    Formal verification has seen relatively less application in verifying computer networking infrastructure. This is in part due to the lack of clean layers of abstraction that enable design modeling and specific...

    Shuyuan Zhang, Sharad Malik in Automated Technology for Verification and Analysis (2013)

  8. No Access

    Chapter and Conference Paper

    Coverage-Based Trace Signal Selection for Fault Localisation in Post-silicon Validation

    Post-silicon validation is the time-consuming process of detecting and diagnosing defects in prototype silicon. It targets electrical and functional defects that escaped detection during pre-silicon verificati...

    Charlie Shucheng Zhu, Georg Weissenbacher in Hardware and Software: Verification and Te… (2013)

  9. No Access

    Chapter and Conference Paper

    Model Checking Unbounded Concurrent Lists

    We present a model checking based method for verifying list-based concurrent data structures. Concurrent data structures are notorious for being hard to get right and thus, their verification has received sign...

    Divjyot Sethi, Muralidhar Talupur, Sharad Malik in Model Checking Software (2013)

  10. No Access

    Chapter and Conference Paper

    Modeling Firmware as Service Functions and Its Application to Test Generation

    The term firmware refers to software that is tied to a specific hardware platform, e.g., low-level drivers that physically interface with the peripherals. More recently, this has grown to include software that...

    Sunha Ahn, Sharad Malik in Hardware and Software: Verification and Testing (2013)

  11. Chapter and Conference Paper

    passert: A Tool for Debugging Parallel Programs

    passert is a new debugging tool for parallel programs which allows programmers to express correctness criteria using a simple, expressive assertion language. We demonstrate how these parallel assertions allow the...

    Daniel Schwartz-Narbonne, Feng Liu, David August in Computer Aided Verification (2012)

  12. Chapter and Conference Paper

    Wolverine: Battling Bugs with Interpolants

    Wolverine is a software verifier that checks safety properties of sequential ANSI-C and C++ programs, deploying Craig interpolation to derive program invariants. We describe the underlying approa...

    Georg Weissenbacher, Daniel Kroening in Tools and Algorithms for the Construction … (2012)

  13. No Access

    Chapter and Conference Paper

    Verification of Computer Switching Networks: An Overview

    Formal verification has seen much success in several domains of hardware and software design. For example, in hardware verification there has been much work in the verification of microprocessors (e.g. [1]) an...

    Shuyuan Zhang, Sharad Malik, Rick McGeer in Automated Technology for Verification and … (2012)

  14. No Access

    Chapter and Conference Paper

    Runtime Verification: A Computer Architecture Perspective

    A major challenge in hardware verification is managing the state explosion problem in pre-silicon verification. This is seen in the high cost and low coverage of simulation, and capacity limitations of formal ...

    Sharad Malik in Runtime Verification (2012)

  15. No Access

    Chapter and Conference Paper

    Parallel Assertions for Architectures with Weak Memory Models

    Assertions are a powerful and widely used debugging tool in sequential programs, but are ineffective at detecting concurrency bugs. We recently introduced parallel assertions which solve this problem by provid...

    Daniel Schwartz-Narbonne in Automated Technology for Verification and … (2012)

  16. No Access

    Chapter and Conference Paper

    Predicting Serializability Violations: SMT-Based Search vs. DPOR-Based Search

    In our recent work, we addressed the problem of detecting serializability violations in a concurrent program using predictive analysis, where we used a graph-based method to derive a predictive model from a gi...

    Arnab Sinha, Sharad Malik, Chao Wang in Hardware and Software: Verification and Te… (2012)

  17. No Access

    Chapter and Conference Paper

    Parameterized Model Checking of Fine Grained Concurrency

    Concurrent data structures are provided in libraries such as Intel Thread Building Blocks and Java.util.concurrent to enable efficient implementation of multi-threaded programs. Their efficiency is achieved by...

    Divjyot Sethi, Muralidhar Talupur, Daniel Schwartz-Narbonne in Model Checking Software (2012)

  18. No Access

    Book and Conference Proceedings

    Computer Aided Verification

    20th International Conference, CAV 2008 Princeton, NJ, USA, July 7-14, 2008 Proceedings

    Aarti Gupta, Sharad Malik in Lecture Notes in Computer Science (2008)

  19. Chapter and Conference Paper

    Hardware Verification: Techniques, Methodology and Solutions

    Hardware verification has been one of the biggest drivers of formal verification research, and has seen the greatest practical impact of its results. The use of formal techniques has not been uniformly success...

    Sharad Malik in Tools and Algorithms for the Construction and Analysis of Systems (2008)

  20. No Access

    Chapter and Conference Paper

    A Case for Runtime Validation of Hardware

    Increasing hardware design complexity has resulted in significant challenges for hardware design verification. The growing “verification gap” between the complexity of what we can verify and what we can fabric...

    Sharad Malik in Hardware and Software, Verification and Testing (2006)

previous disabled Page of 2