Safety-critical systems with neural network components require strong
gu...
Bounded model checking (BMC) and fuzzing techniques are among the most
e...
Finding software vulnerabilities in concurrent programs is a challenging...
We present a new method for the automated synthesis of digital controlle...