


default search action
25th VMCAI 2024: London, UK - Part II
- Rayna Dimitrova, Ori Lahav

, Sebastian Wolff
:
Verification, Model Checking, and Abstract Interpretation - 25th International Conference, VMCAI 2024, London, United Kingdom, January 15-16, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14500, Springer 2024, ISBN 978-3-031-50520-1
Concurrency
- Matthias Heizmann

, Dominik Klumpp
, Lars Nitzke, Frank Schüssele
:
Petrification: Software Model Checking for Programs with Dynamic Thread Management. 3-25 - Stefan Bodenmüller

, John Derrick
, Brijesh Dongol
, Gerhard Schellhorn
, Heike Wehrheim
:
A Fully Verified Persistency Library. 26-47 - Roman Lakenbrink, Markus Müller-Olm, Christoph Ohrem, Jens Oliver Gutsfeld:

A Navigation Logic for Recursive Programs with Dynamic Thread Creation. 48-70
Neural Networks
- Jiaxu Tian, Dapeng Zhi, Si Liu

, Peixin Wang
, Guy Katz, Min Zhang
:
Taming Reachability Analysis of DNN-Controlled Systems via Abstraction-Based Training. 73-97 - Roie Reshef, Anan Kabaha, Olga Seleznova, Dana Drachsler-Cohen:

Verification of Neural Networks' Local Differential Classification Privacy. 98-123 - Akshay Dhonthi, Marcello Eiermann, Ernst Moritz Hahn, Vahid Hashemi:

AGNES: Abstraction-Guided Framework for Deep Neural Networks Security. 124-138
Probabilistic and Quantum Programs
- Michele Boreale, Luisa Collodi:

Guaranteed Inference for Probabilistic Programs: A Parallelisable, Small-Step Operational Approach. 141-162 - Yuxin Deng, Huiling Wu, Ming Xu:

Local Reasoning About Probabilistic Behaviour for Classical-Quantum Programs. 163-184
Program and System Verification
- Philip Tasche

, Raúl E. Monti
, Stefanie Eva Drerup
, Pauline Blohm
, Paula Herber
, Marieke Huisman
:
Deductive Verification of Parameterized Embedded Systems Modeled in SystemC. 187-209 - Twain Byrnes

, Yoshiki Takashima
, Limin Jia
:
Automatically Enforcing Rust Trait Properties. 210-223 - Takashi Nakayama

, Yusuke Matsushita
, Ken Sakayori
, Ryosuke Sato
, Naoki Kobayashi
:
Borrowable Fractional Ownership Types for Verification. 224-246
Runtime Verification
- Klaus Havelund, Panagiotis Katsaros, Moran Omer, Doron Peled, Anastasios Temperekidis:

TP-DejaVu: Combining Operational and Declarative Runtime Verification. 249-263 - Ritam Raha

, Rajarshi Roy
, Nathanaël Fijalkow
, Daniel Neider
, Guillermo A. Pérez
:
Synthesizing Efficiently Monitorable Formulas in Metric Temporal Logic. 264-288
Security and Privacy
- Joachim Bard, Swen Jacobs, Yakir Vizel:

Automatic and Incremental Repair for Speculative Information Leaks. 291-313 - Francesco Parolini

, Antoine Miné
:
Sound Abstract Nonexploitability Analysis. 314-337

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














