PdscSynth is a tool designed on top of PDSC (https://bitbucket.org/sharonsh/pdsc/src/master/), corresponding to the work presented in our ATVA 2023 submission (paper ID 51). We consider the problem of hypersafety verification, i.e. of verifying k-safety properties of a program. While this can, in principle, be addressed by self composition, which reduces the k-safety verification task into a standard safety verification exercise, verifying self-composed programs is not easy. The proofs often require that the functionality of every component program be captured fully, making invariant inference a challenge. Recently, a technique for property directed self composition (or, PDSC) was proposed to tackle this problem. PDSC tries to come up wit...
Information flow policies are confidentiality policies that control information leakage through prog...
This paper shows how secure information flow properties of multi-threaded programs can be verified b...
Abstract. Verification of machine-code programs using program logic has focused on functional correc...
We present an automated compositional program verification technique for safety properties based on ...
Abstract—We present an automated compositional program verification technique for safety properties ...
This report presents a two-step components selection method to compose the components for compositio...
Self-composition is a logical formulation of non-interference, a high-level security property that g...
Abstract. We show how game semantics, counterexample-guided abstraction refinement, assume-guarantee...
International audienceThe use of function contracts to specify the behavior of functions often remai...
AbstractWe present a method for algorithmic, compositional verification of control-flow-based safety...
Strengthening a property allows it to be falsified/verified at an earlier induction depth. In this p...
This paper presents a novel safety property verification approach for component-based systems modell...
Verifying system specifications using traditional model-checking techniques rapidly becomes infeasib...
This project develops a uniform verification framework for the protection of data. Key innovation on...
We show how game semantics, counterexample-guided abstraction refinement, assume-guarantee reasoning...
Information flow policies are confidentiality policies that control information leakage through prog...
This paper shows how secure information flow properties of multi-threaded programs can be verified b...
Abstract. Verification of machine-code programs using program logic has focused on functional correc...
We present an automated compositional program verification technique for safety properties based on ...
Abstract—We present an automated compositional program verification technique for safety properties ...
This report presents a two-step components selection method to compose the components for compositio...
Self-composition is a logical formulation of non-interference, a high-level security property that g...
Abstract. We show how game semantics, counterexample-guided abstraction refinement, assume-guarantee...
International audienceThe use of function contracts to specify the behavior of functions often remai...
AbstractWe present a method for algorithmic, compositional verification of control-flow-based safety...
Strengthening a property allows it to be falsified/verified at an earlier induction depth. In this p...
This paper presents a novel safety property verification approach for component-based systems modell...
Verifying system specifications using traditional model-checking techniques rapidly becomes infeasib...
This project develops a uniform verification framework for the protection of data. Key innovation on...
We show how game semantics, counterexample-guided abstraction refinement, assume-guarantee reasoning...
Information flow policies are confidentiality policies that control information leakage through prog...
This paper shows how secure information flow properties of multi-threaded programs can be verified b...
Abstract. Verification of machine-code programs using program logic has focused on functional correc...