-
1
Automatic heap layout manipulation for exploitation
Published 2018“…We present a framework for benchmarking heap layout manipulation algorithms, and use it to evaluate our approach on several real-world allocators, showing that pseudo-random black box search can be highly effective. …”
Conference item -
2
Deciding floating-point logic with abstract conflict driven clause learning
Published 2014“…Our new technique is faster than a bit-vector encoding approach on 80 % of the benchmarks, and is faster by one order of magnitude or more on 60 % of the benchmarks. …”
Journal article -
3
JBMC: a bounded model checking tool for verifying Java bytecode
Published 2018“…Experimental results show that JBMC can correctly verify a set of Java benchmarks from the literature and that it is competitive with two state-of-the-art Java verifiers. …”
Conference item -
4
Model checking concurrent linux device drivers
Published 2007“…Our predicate abstraction-based tool DDVERIFY enables the automated verification of Linux device drivers and provides an accurate model of the relevant parts of the kernel. We report on benchmarks based on Linux device drivers, confirming the results that SLAM established for the Windows world. …”
Conference item -
5
Editorial.
Published 2011“…The verification community has identified benchmarks, tools and technologies that are useful for attacking a series of problems, and has started to compare those tools.…”
Journal article -
6
Optimizing a primitive based approach to generic taint analysis
Published 2020“…</p> <p>The optimizations are integrated into a generic taint tracker called the Taint Rabbit, and their effectiveness is evaluated on various real-world software and CPU-bound benchmarks. With average speed-ups of around 42% on SPEC CPU benchmarks, and as high as 99% on data compression tools, our results demonstrate the advancement of optimized and generic taint analysis.…”
Thesis -
7
Software verification for weak memory via program transformation
Published 2013“…We present experiments for a broad variety of models (from x86-TSO to Power) and a vast range of verification tools, quantify the additional cost of the transformation and highlight the cases when we can drastically reduce it. Our benchmarks include work-queue management code from PostgreSQL.…”
Conference item -
8
Unfolding-based partial order reduction
Published 2015“…Furthermore, our unfolding-based POR copes with non-terminating executions and incorporates state caching. On benchmarks with busy-waits, among others, our experiments show a dramatic reduction in the number of executions when compared to a state-of-the-art DPOR.…”
Journal article -
9
Using program synthesis for program analysis
Published 2015“…Our experimental results show that, on benchmarks capturing static analysis problems, our program synthesiser compares positively with other general purpose synthesisers.…”
Conference item -
10
Strengthening properties using abstraction refinement
Published 2009“…We quantify the benefits of our technique on a substantial set of circuit benchmarks.…”
Conference item -
11
An interpolating sequent calculus for quantifier-free Presburger arithmetic
Published 2011“…We have extended the Princess theorem prover to generate interpolating proofs, and applied it to a large number of publicly available Presburger arithmetic benchmarks. The results document the robustness and efficiency of our interpolation procedure. …”
Journal article -
12
Counterexample guided inductive synthesis modulo theories
Published 2018“…We demonstrate the practical value of CEGIS(T ) by automatically synthesizing programs for a set of intricate benchmarks.…”
Conference item -
13
Formal co−validation of low−level hardware/software interfaces
Published 2013“…We illustrate and evaluate our technique on three realistic benchmarks in which software I/O is subject to hardware-specific protocol rules: a real-time clock, a temperature sensor on an I2C bus, and an Ethernet MAC. …”
Conference item -
14
Formal Co-Validation of Low-Level Hardware/Software Interfaces
Published 2013“…We illustrate and evaluate our technique on three realistic benchmarks in which software I/O is subject to hardware-specific protocol rules: a real-time clock, a temperature sensor on an I2C bus, and an Ethernet MAC. …”
Conference item -
15
Accelerated test execution using GPUs
Published 2014“…We observe speed-ups up to a factor of 27 compared to single-core execution on conventional CPUs with embedded systems benchmark programs.…”
Conference item -
16
The taint rabbit: optimizing generic taint analysis with dynamic fast path generation
Published 2020“…For instance, Dytan incurs an average overhead of 237x, while the Taint Rabbit achieves 1.7x on the same set of benchmarks. This compares favorably to the 1.5x overhead delivered by the bitwise, non-generic, taint engine LibDFT.…”
Conference item -
17
Probabilistic fault localisation
Published 2016“…Furthermore, we show that it is theoretically impossible to design strictly rational sbfl measures that outperform pfl techniques on a large set of benchmarks.…”
Conference item -
18
Property-Driven Fence Insertion using Reorder Bounded Model Checking
Published 2015“…Our experimental results show that our technique is faster and solves more instances of relevant benchmarks than earlier approaches.…”
Journal article -
19
Fixed points for multi-cycle path detection
Published 2009“…Our implementation performs well on several benchmarks, including an exponential improvement on circuits analysed in the literature.…”
Conference item -
20
Under-approximating loops in C programs for fast counterexample detection
Published 2015“…We paired our techniques with lazy abstraction and bounded model checking, and evaluated the resulting tool on a number of buffer overflow benchmarks, demonstrating its ability to efficiently detect deep counterexamples in C programs that manipulate arrays.…”
Journal article