Accepted Papers

Accepted Research Papers

TitleAuthors
Extending Isabelle/HOL’s Code Generator with support for the Go programming languageTerru Stübinger and Lars Hupel
Fast Attack Graph Defense Localization via BisimulationNimrod Busany, Rafi Shalom, Dan Klein and Shahar Maoz
A Zonotopic Dempster-Shafer Approach to the Quantitative Verification of Neural NetworksEric Goubault and Sylvie Putot
Stochastic Games for User JourneysPaul Kobialka, Andrea Pferscher, Gunnar Rye Bergersen, Einar Broch Johnsen and Silvia Lizeth Tapia Tarifa
Staged Specification Logic for Verifying Higher-Order Imperative ProgramsDarius Foo, Yahui Song and Wei-Ngan Chin
State Matching and Multiple References in Adaptive Active Automata LearningLoes Kruger, Sebastian Junges and Jurriaan Rot
Certified Quantization Strategy Synthesis for Neural NetworksYedi Zhang, Guangke Chen, Fu Song, Jun Sun and Jin Song Dong
Rigorous Floating-Point Round-Off Error Analysis in PRECiSA 4.0Laura Titolo, Mariano Moscato, Marco A. Feliu, Paolo Masci and Cesar Munoz
Partially Observable Stochastic Games with Neural Perception MechanismsRui Yan, Gabriel Santos, Gethin Norman, David Parker and Marta Kwiatkowska
Misconceptions in Finite-Trace and Infinite-Trace Linear Temporal LogicBen Greenman, Siddhartha Prasad, Shufang Zhu, Giuseppe De Giacomo, Shriram Krishnamurthi, Marco Montali, Tim Nelson, Milda Zizyte and Antonio Di Stasio
Automated Repair of Information Flow Security in Android Implicit Inter-App CommunicationAbhishek Tiwari, Jyoti Prakash, Zhen Dong and Carlo A. Furia
The Opacity of Timed AutomataJie An, Qiang Gao, Lingtai Wang, Naijun Zhan and Ichiro Hasuo
Unifying Weak Memory Verification using PotentialsLara Bargmann, Brijesh Dongol and Heike Wehrheim
Formal Semantics and Analysis of Multitask PLC ST Programs with PreemptionJaeseo Lee and Kyungmin Bae
fm-weck: Containerized Execution of Formal Methods ToolsDirk Beyer and Henrik Wachowitz
Learning Branching-Time Properties in CTL and ATL via Constraint SolvingBenjamin Bordais, Daniel Neider and Rajarshi Roy
A Local Search Algorithm for MaxSMT(LIA)Xiang He, Bohan Li, Mengyu Zhao and Shaowei Cai
Free Facts: An Alternative to Inefficient Axioms in DafnyTabea Bordis and K. Rustan M. Leino
DFAMiner: Mining minimal separating DFAs from labelled samplesDaniele Dell’Erba, Yong Li and Sven Schewe
Accelerated Bounded Model CheckingFlorian Frohn and Jürgen Giesl
Nonlinear Craig Interpolant Generation over Unbounded Domains by Separating Semialgebraic SetsHao Wu, Jie Wang, Bican Xia, Xiakun Li, Naijun Zhan and Gan Ting
Sound and Complete Witnesses for Template-based Verification of LTL Properties on Polynomial ProgramsKrishnendu Chatterjee, Amir Kafshdar Goharshady, Ehsan Kafshdar Goharshady, Mehrdad Karrabi and Ðorđe Žikelić
Understanding Synthesized Reactive Systems Through InvariantsRüdiger Ehlers
Accurate Static Data Race Detection for CEmerson Sales, Omar Inverso and Emilio Tuosto
HyGaViz: Visualizing Game-Based Certificates for Hyperproperty VerificationRaven Beutner, Bernd Finkbeiner and Angelina Göbl
Chamelon : a delta-debugger for OCamlMilla Valnet, Nathanaëlle Courant, Guillaume Bury, Pierre Chambart and Vincent Laviron
Automated Static Analysis of Quality of Service Properties of Communicating SystemsCarlos Gustavo Lopez Pombo, Agustín Eloy Martinez Suñé and Emilio Tuosto
Alloy repair hint generation based on historical dataAna Inês Barros, Henrique Neto, Alcino Cunha, Nuno Macedo and Ana C. R. Paiva
Combining Classical and Probabilistic Independence Reasoning to Verify the Security of Oblivious AlgorithmsPengbo Yan, Toby Murray, Olga Ohrimenko, Van-Thuan Pham and Robert Sison
B2SAT: A Bare-Metal Reduction of B to SATMichael Leuschel
Introducing SWIRL: An Intermediate Representation Language for Scientific WorkflowsIacopo Colonnelli, Doriana Medic, Alberto Mulone, Viviana Bono, Luca Padovani and Marco Aldinucci
CFaults: Model-Based Diagnosis for Fault Localization in C with Multiple Test CasesPedro Orvalho, Mikolas Janota and Vasco Manquinho
Bridging Dimensions: Confident Reachability for High-Dimensional ControllersYuang Geng, Jake Brandon Baldauf, Souradeep Dutta, Chao Huang and Ivan Ruchkin
Detecting speculative execution vulnerabilities on weak memory modelsNicholas Coughlin, Kait Lam, Graeme Smith and Kirsten Winter
The nonexistence of unicorns and many-sorted Löwenheim–Skolem theoremsBenjamin Przybocki, Guilherme Toledo, Yoni Zohar and Clark Barrett
PyBDR: Set-boundary based Reachability Analysis Toolkit in PythonJianqiang Ding, Taoran Wu, Zhen Liang and Bai Xue
VeriQR: A Robustness Verification Tool for Quantum Machine Learning ModelsYanling Lin, Ji Guan, Wang Fang, Mingsheng Ying and Zhaofeng Su
Practical Approximate Quantifier Elimination for Non-linear Real ArithmeticS. Akshay, Supratik Chakraborty, Amir Kafshdar Goharshady, R. Govind, Harshit Jitendra Motwani and Sai Teja Varanasi
A Divide-and-Conquer Approach to Variable Elimination in Linear Real ArithmeticValentin Promies and Erika Abraham
Parameterized Verification of Round-based Distributed Algorithms via Extended Threshold AutomataTom Baumeister, Paul Eichler, Swen Jacobs, Mouhammad Sakr and Marcus Völp
Reachability Analysis for Multiloop Programs Using Transition Power AbstractionKonstantin Britikov, Martin Blicha, Natasha Sharygina and Grigory Fedyukovich
Efficient Formally Verified Maximal End Component Decomposition for MDPsArnd Hartmanns, Bram Kohlen and Peter Lammich
Proving Functional Program Equivalence via Directed Lemma SynthesisYican Sun, Ruyi Ji, Jian Fang, Xuanlin Jiang, Mingshuai Chen and Yingfei Xiong
Discourje: Run-Time Verification of Communication Protocols in Clojure — Live at LastSung-Shik Jongmans

Accepted Embedded Systems Track Papers

TitleAuthors
Compositional Verification of Cryptographic Circuits against Fault Injection AttacksHuiyu Tan, Xi Yang, Fu Song, Taolue Chen and Zhilin Wu
Reusable Specification Patterns for Verification of Resilience in Autonomous Hybrid SystemsJulius Adelt, Robert Aron Mensing and Paula Herber
Switching Controller Synthesis for Hybrid Systems Against STL FormulasHan Su, Shenghua Feng, Sinong Zhan and Naijun Zhan
On Completeness of SDP-Based Barrier Certificate Synthesis over Unbounded DomainsHao Wu, Shenghua Feng, Gan Ting, Jie Wang, Bican Xia and Naijun Zhan
Tolerance of Reinforcement Learning Controllers against Deviations in Cyber Physical SystemsChangjian Zhang, Parv Kapoor, Romulo Meira-Goes, David Garlan, Eunsuk Kang, Akila Ganlath, Shatadal Mishra and Nejib Ammar
CauMon: An Informative Online Monitor for Signal Temporal LogicZhenya Zhang, Jie An, Paolo Arcaini and Ichiro Hasuo

Accepted Industry Day Papers

TitleAuthors
UnsafeCop: Towards Memory Safety for Real-World Unsafe Rust Code with Practical Bounded Model CheckingMinghua Wang, Jingling Xue, Lin Huang, Yuan Zi and Tao Wei
Beyond the Bottleneck: Enhancing High-Concurrency Systems with Lock TuningJuntao Ji, Yinyou Gu, Yubao Fu and Qingshan Lin
AGVTS: Automated Generation and Verification of Temporal Specifications for Aeronautics SCADE ModelsHanfeng Wang, Zhibin Yang, Yong Zhou, Xilong Wang, Weilin Deng and Wei Li
Code-level Safety Verification for Automated Driving: A Case StudyVladislav Nenchev, Calum Imrie, Simos Gerasimou and Radu Calinescu
Systematic Test Case Generation for Distributed Redundant Controllers using Model Checking (EXTENDED ABSTRACT)Bjarne Johansson, Marjan Sirjani, Edward Lee, Zahra Moezkarimi, Bahman Pourvatan, Stefan Marksteiner and Alessandro Papadopoulos

Accepted Tutorial Papers

TitleAuthors
The Pyramid Of (Formal) Software VerificationMartin Brain and Elizabeth Polgreen
Copilot TutorialIvan Perez, Alwyn Goodloe and Frank Dedden
Tutorial on CPAcheckerDaniel Baier, Dirk Beyer, Po-Chun Chien, Marie-Christine Jakobs, Marek Jankola, Matthias Kettl, Nian-Ze Lee, Thomas Lemberger, Marian Lingsch-Rosenfeld, Henrik Wachowitz and Philipp Wendler
The Java Verification Tool KeY: A TutorialBernhard Beckert, Richard Bubel, Daniel Drodt, Reiner Hähnle, Florian Lanzinger, Wolfram Pfeifer, Mattias Ulbrich and Alexander Weigl
A Tutorial on Stream-based MonitoringJan Baumeister, Bernd Finkbeiner, Florian Kohn and Frederik Scheerer
ASMETA tool set for rigorous system designAndrea Bombarda, Silvia Bonfanti, Angelo Gargantini, Elvinia Riccobene and Patrizia Scandurra
Advancing Quantum Computing with Formal MethodsArend-Jan Quist, Jingyi Mei, Tim Coopmans and Alfons Laarman
No risk, no fun: a tutorial on risk managementMarielle Stoelinga
Satisfiability Modulo Theories: A Beginner’s TutorialClark Barrett, Cesare Tinelli, Haniel Barbosa, Aina Niemetz, Mathias Preiner, Andrew Reynolds and Yoni Zohar
Practical Deductive Verification of OCaml ProgramsMário Pereira