Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Verification as Learning Geometric Concepts

    We formalize the problem of program verification as a learning problem, showing that invariants in program verification can be regarded as geometric concepts in machine learning. Safety properties define bad stat...

    Rahul Sharma, Saurabh Gupta, Bharath Hariharan, Alex Aiken in Static Analysis (2013)

  2. Chapter and Conference Paper

    A Data Driven Approach for Algebraic Loop Invariants

    We describe a Guess-and-Check algorithm for computing algebraic equation invariants of the form ∧  i f i (x ...

    Rahul Sharma, Saurabh Gupta, Bharath Hariharan in Programming Languages and Systems (2013)

  3. Chapter and Conference Paper

    Reasoning about Lock Placements

    A lock placement describes, for each heap location, which lock guards the location, and under what circumstances. We formalize methods for reasoning about lock placements, making precise the interactions between ...

    Peter Hawkins, Alex Aiken, Kathleen Fisher in Programming Languages and Systems (2012)

  4. Chapter and Conference Paper

    Simplifying Loop Invariant Generation Using Splitter Predicates

    We present a novel static analysis technique that substantially improves the quality of invariants inferred by standard loop invariant generation techniques. Our technique decomposes multi-phase loops, which requ...

    Rahul Sharma, Isil Dillig, Thomas Dillig, Alex Aiken in Computer Aided Verification (2011)

  5. No Access

    Chapter and Conference Paper

    Community Epidemic Detection Using Time-Correlated Anomalies

    An epidemic is malicious code running on a subset of a community, a homogeneous set of instances of an application. Syzygy is an epidemic detection framework that looks for time-correlated anomalies, i.e., diverg...

    Adam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken in Recent Advances in Intrusion Detection (2010)

  6. No Access

    Chapter and Conference Paper

    Small Formulas for Large Programs: On-Line Constraint Simplification in Scalable Static Analysis

    Static analysis techniques that represent program states as formulas typically generate a large number of redundant formulas that are incrementally constructed from previous formulas. In addition to querying s...

    Isil Dillig, Thomas Dillig, Alex Aiken in Static Analysis (2010)

  7. Chapter and Conference Paper

    Fluid Updates: Beyond Strong vs. Weak Updates

    We describe a symbolic heap abstraction that unifies reasoning about arrays, pointers, and scalars, and we define a fluid update operation on this symbolic heap that relaxes the dichotomy between strong and weak ...

    Isil Dillig, Thomas Dillig, Alex Aiken in Programming Languages and Systems (2010)

  8. No Access

    Chapter and Conference Paper

    Data Structure Fusion

    We consider the problem of specifying data structures with complex sharing in a manner that is both declarative and results in provably correct code. In our approach, abstract data types are specified using re...

    Peter Hawkins, Alex Aiken, Kathleen Fisher in Programming Languages and Systems (2010)

  9. Chapter and Conference Paper

    Cuts from Proofs: A Complete and Practical Technique for Solving Linear Inequalities over Integers

    We propose a novel, sound, and complete Simplex-based algorithm for solving linear inequalities over integers. Our algorithm, which can be viewed as a semantic generalization of the branch-and-bound technique, sy...

    Isil Dillig, Thomas Dillig, Alex Aiken in Computer Aided Verification (2009)

  10. No Access

    Chapter and Conference Paper

    A Capability Calculus for Concurrency and Determinism

    We present a capability calculus for checking partial confluence of channel-communicating concurrent processes. Our approach automatically detects more programs to be partially confluent than previous approach...

    Tachio Terauchi, Alex Aiken in CONCUR 2006 – Concurrency Theory (2006)

  11. No Access

    Chapter and Conference Paper

    Banshee: A Scalable Constraint-Based Analysis Toolkit

    We introduce Banshee, a toolkit for constructing constraint-based analyses. Banshee’s novel features include a code generator for creating customized constraint resolution engines, incremental analysis based on b...

    John Kodumal, Alex Aiken in Static Analysis (2005)

  12. No Access

    Chapter and Conference Paper

    Secure Information Flow as a Safety Problem

    The termination insensitive secure information flow problem can be reduced to solving a safety problem via a simple program transformation. Barthe, D’Argenio, and Rezk coined the term “self-composition” to des...

    Tachio Terauchi, Alex Aiken in Static Analysis (2005)

  13. No Access

    Chapter and Conference Paper

    Type Systems for Distributed Data Sharing

    Parallel programming languages that let multiple processors access shared data provide a variety of sharing mechanisms and memory models. Understanding a language’s support for data sharing behavior is critica...

    Ben Liblit, Alex Aiken, Katherine Yelick in Static Analysis (2003)

  14. No Access

    Chapter and Conference Paper

    Constraint-based program analysis

    Alex Aiken in Static Analysis (1996)