The C Bounded Model Checker (CBMC) demonstrates the violation of asserti...
JBMC is an open-source SAT- and SMT-based bounded model checking tool fo...
2LS ("tools") is a verification tool for C programs, built upon the CPRO...
LCRL is a software tool that implements model-free Reinforcement Learnin...
We present a new active model-learning approach to generating abstractio...
Existing methods for testing DNNs solve the oracle problem by constraini...
Existing algorithms for explaining the output of image classifiers perfo...
We introduce a novel approach to the automated termination analysis of
c...
Deep reinforcement learning (DRL) is applied in safety-critical domains ...
Policies trained via Reinforcement Learning (RL) are often needlessly
co...
Generic taint analysis is a pivotal technique in software security. Howe...
This paper presents the concept of an adaptive safe padding that forces
...
Adversarial examples for image classifiers are typically created by sear...
Program synthesis is the generation of a program from a specification.
C...
Abstract models of system-level behaviour have applications in design
ex...
Conventional tools for formal hardware/software co-verification use boun...
We propose a method for effective training of deep Reinforcement Learnin...
We propose a method for efficient training of deep Reinforcement Learnin...
We propose an actor-critic, model-free, and online Reinforcement Learnin...
Reinforcement Learning (RL) has emerged as an efficient method of choice...
Deep neural networks (DNNs) increasingly replace traditionally developed...
This paper presents CREST, a prototype front-end tool intended as an add...
The correctness of deep neural networks is well-known to be vulnerable t...
This paper proposes the first model-free Reinforcement Learning (RL)
fra...
In the past few years, significant progress has been made on deep neural...
This paper proposes a method for efficient training of the Q-function fo...
Empirical evaluation of verification tools by benchmarking is a common m...
Symbolic execution has shown its ability to find security-relevant flaws...
Concolic testing alternates between CONCrete program execution and symbO...
Heap layout manipulation is integral to exploiting heap-based memory
cor...
Deployment of deep neural networks (DNNs) in safety or security-critical...
Deep neural networks (DNNs) have a wide range of applications, and softw...
We propose a novel Reinforcement Learning (RL) algorithm to synthesize
p...
Refactorings are structured changes to existing software that leave its
...
We consider the problem of efficiently checking a set of safety properti...
Read-Copy Update (RCU) is a scalable, high-performance Linux-kernel
sync...