Verification of program safety is often reducible to proving the unsatisfiability (i.e., validity) of a formula in Satisfiability Modulo Theories (SMT): Boolean logic combined with theories that formalize arbitrary first-order fragments. Zero-knowledge (ZK) proofs allow SMT formulas to be validated without revealing the underlying formulas or their proofs to other parties, which is a crucial building block for proving the safety of proprietary programs. Recently, Luo et al. (CCS 2022) studied the simpler problem of proving the unsatisfiability of pure Boolean formulas, but it does not support safety proofs generated by SMT solvers. This work presents ZKSMT, a novel framework for proving the validity of SMT formulas in ZK. We design a virtu...
International audienceSatisfiability modulo theory (SMT) consists in testing the satisfiability of f...
Textbooks on program verification make use of simple programs in mathematical domains as illustrati...
SMT-based program verification can achieve high precision using bit-precise models or combinations o...
The area of software analysis, testing and verification is now undergoing a revolution thanks to the...
The area of software analysis, testing and verification is now undergoing a revolution thanks to the...
Formal methods are becoming increasingly important for debugging and verifying hardware and softwar...
keywords: Automated Test Generation;Bounded Model Checking;Quantitative Information Flow;Reliability...
As program verification has matured as a discipline, so distinct topics have emerged and then develo...
Many applications, notably in the context of verification (for critical systems in transportation, e...
AbstractThe problem of verifying safety properties of Lustre programs with integer arithmetic have b...
AbstractA common proof format for solvers for Satisfiability Modulo Theories (SMT) is proposed, base...
This thesis tackles the problem of automatically proving the validity of mathematical formulas gener...
Developers building cryptography into security-sensitive applications face a daunting task. Not only...
Developers building cryptography into security-sensitive applications face a daunting task. Not only...
Abstract. First-order logic provides a convenient formalism for describ-ing a wide variety of verifi...
International audienceSatisfiability modulo theory (SMT) consists in testing the satisfiability of f...
Textbooks on program verification make use of simple programs in mathematical domains as illustrati...
SMT-based program verification can achieve high precision using bit-precise models or combinations o...
The area of software analysis, testing and verification is now undergoing a revolution thanks to the...
The area of software analysis, testing and verification is now undergoing a revolution thanks to the...
Formal methods are becoming increasingly important for debugging and verifying hardware and softwar...
keywords: Automated Test Generation;Bounded Model Checking;Quantitative Information Flow;Reliability...
As program verification has matured as a discipline, so distinct topics have emerged and then develo...
Many applications, notably in the context of verification (for critical systems in transportation, e...
AbstractThe problem of verifying safety properties of Lustre programs with integer arithmetic have b...
AbstractA common proof format for solvers for Satisfiability Modulo Theories (SMT) is proposed, base...
This thesis tackles the problem of automatically proving the validity of mathematical formulas gener...
Developers building cryptography into security-sensitive applications face a daunting task. Not only...
Developers building cryptography into security-sensitive applications face a daunting task. Not only...
Abstract. First-order logic provides a convenient formalism for describ-ing a wide variety of verifi...
International audienceSatisfiability modulo theory (SMT) consists in testing the satisfiability of f...
Textbooks on program verification make use of simple programs in mathematical domains as illustrati...
SMT-based program verification can achieve high precision using bit-precise models or combinations o...