Automated Technology for Verification and Analysis 19th International Symposium, ATVA 2021, Gold Coast, QLD, Australia, October 18-22, 2021, Proceedings
This book constitutes the refereed proceedings of the 19th International Symposium on Automated Technology for Verification and Analysis, ATVA 2021, held in Gold Coast, Australia in October 2021. The symposium is dedicated to promoting research in theoretical and practical aspects of automated analy...
Saved in:
Main Authors | , |
---|---|
Format | eBook |
Language | English |
Published |
Netherlands
Springer Nature
2021
Springer International Publishing AG Springer International Publishing |
Edition | 1 |
Series | Lecture Notes in Computer Science |
Subjects | |
Online Access | Get full text |
ISBN | 3030888851 9783030888855 3030888843 9783030888848 |
Cover
Loading…
Abstract | This book constitutes the refereed proceedings of the 19th International Symposium on Automated Technology for Verification and Analysis, ATVA 2021, held in Gold Coast, Australia in October 2021. The symposium is dedicated to promoting research in theoretical and practical aspects of automated analysis, verification and synthesis by providing an international venue for the researchers to present new results. The 19 regular papers presented together with 4 tool papers and 1 invited paper were carefully reviewed and selected from 75 submissions.The papers are divided into the following topical sub-headings: Automata Theory; Machine learning for Formal Methods; Theorem Proving and Tools; Model Checking; Probabilistic Analysis; Software and Hardware Verification; System Synthesis and Approximation; and Verification of Machine Learning. |
---|---|
AbstractList | This book constitutes the refereed proceedings of the 19th International Symposium on Automated Technology for Verification and Analysis, ATVA 2021, held in Gold Coast, Australia in October 2021. The symposium is dedicated to promoting research in theoretical and practical aspects of automated analysis, verification and synthesis by providing an international venue for the researchers to present new results. The 19 regular papers presented together with 4 tool papers and 1 invited paper were carefully reviewed and selected from 75 submissions.The papers are divided into the following topical sub-headings: Automata Theory; Machine learning for Formal Methods; Theorem Proving and Tools; Model Checking; Probabilistic Analysis; Software and Hardware Verification; System Synthesis and Approximation; and Verification of Machine Learning. |
Author | Ganesh, Vijay Hou, Zhe |
Author_xml | – sequence: 1 fullname: Hou, Zhe – sequence: 2 fullname: Ganesh, Vijay |
BookMark | eNpNz8lKA0EQBuAWFzQx7zB4EQ-B3pdjHOICAS8h16GmpzsZ0-mO0xMlb-9gRKxL8RcfP9QIXcQU3RkaMcywHkaQ8__hCo0I1cQISRm5RpOc3zHGVA0XhW8QnR36tIPeNcXS2U1MIa2PhU9dsXJd61sLfZtiAbEpZhHCMbf5Fl16CNlNfvcYrZ7my_Jlunh7fi1niykQTDCfmsZq5jl3uhaUcGc4eMmJMlbUvhHCEaDAiPQ10FoAYVjWxjpilbBKOszG6OFUDHnrvvImhT5Xn8HVKW1zZZT--1IM9v5k9136OLjcVz_Muth3EKr5YymV1EroQd6dpIUMoY1ttUsxrTvYb3IlOMXScPYNWSRhSQ |
ContentType | eBook |
DBID | I4C |
DEWEY | 005 |
DatabaseName | Casalini Torrossa eBooks Institutional Catalogue |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 3030888851 9783030888855 |
Edition | 1 1st Edition 2021 |
Editor | Ganesh, Vijay Hou, Zhe |
Editor_xml | – sequence: 1 fullname: Ganesh, Vijay – sequence: 2 fullname: Hou, Zhe |
ExternalDocumentID | 9783030888855 EBC6768758 5420694 |
GroupedDBID | 38. AABBV AABLV ABNDO ACBPT ACNBG ACWLQ AEDXK AEKFX AELOD AIYYB ALMA_UNASSIGNED_HOLDINGS BAHJK BBABE CZZ DBWEY I4C IEZ OCUHQ ORHYB SBO TGIZN TPJZQ TSXQS Z7R Z7S Z7U Z7V Z7W Z7X Z7Y Z7Z Z81 Z82 Z83 Z84 Z85 Z87 Z88 AEJLV Z5O |
ID | FETCH-LOGICAL-a10104-9dc83f44e8b5214e94af64179c5bfd55e1a2a316fba2b5a1306b9ce1c75c76e03 |
ISBN | 3030888851 9783030888855 3030888843 9783030888848 |
IngestDate | Fri Nov 08 03:26:50 EST 2024 Fri May 30 23:25:42 EDT 2025 Tue Nov 14 22:56:21 EST 2023 |
IsPeerReviewed | false |
IsScholarly | false |
LCCallNum_Ident | Q |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-a10104-9dc83f44e8b5214e94af64179c5bfd55e1a2a316fba2b5a1306b9ce1c75c76e03 |
OCLC | 1281956231 |
PQID | EBC6768758 |
PageCount | 384 |
ParticipantIDs | askewsholts_vlebooks_9783030888855 proquest_ebookcentral_EBC6768758 casalini_monographs_5420694 |
PublicationCentury | 2000 |
PublicationDate | 2021 2021-10-13 |
PublicationDateYYYYMMDD | 2021-01-01 2021-10-13 |
PublicationDate_xml | – year: 2021 text: 2021 |
PublicationDecade | 2020 |
PublicationPlace | Netherlands |
PublicationPlace_xml | – name: Netherlands – name: Cham |
PublicationSeriesTitle | Lecture Notes in Computer Science |
PublicationYear | 2021 |
Publisher | Springer Nature Springer International Publishing AG Springer International Publishing |
Publisher_xml | – name: Springer Nature – name: Springer International Publishing AG – name: Springer International Publishing |
SSID | ssj0002719570 |
Score | 2.2520175 |
Snippet | This book constitutes the refereed proceedings of the 19th International Symposium on Automated Technology for Verification and Analysis, ATVA 2021, held in... |
SourceID | askewsholts proquest casalini |
SourceType | Aggregation Database Publisher |
SubjectTerms | Computer logic-Congresses Computer programming, programs, data |
Subtitle | 19th International Symposium, ATVA 2021, Gold Coast, QLD, Australia, October 18-22, 2021, Proceedings |
TableOfContents | 6 Computing Relevant Processes -- 7 Synthesizing Certificates -- 8 Experimental Results -- 9 Conclusions -- References -- Event-B Refinement for Continuous Behaviours Approximation -- 1 Introduction -- 2 Event-B -- 3 Hybrid Systems in Event-B -- 3.1 Continuous Variables -- 3.2 Continuous Refinement -- 3.3 Embedding Continuous Features Using Theories -- 4 A Theory of Approximation -- 4.1 Foundational Constructs -- 4.2 Properties of Approximation -- 4.3 Encoding Approximation in Event-B Using Theories -- 5 Approximation and Refinement: Two Scenarios of Use -- 5.1 Approximate Gluing Invariant -- 5.2 Downward Approximation Scenario -- 5.3 Upward Approximation Scenario -- 6 Related Work and Assessment -- 7 Conclusion -- References -- Incorporating Monitors in Reactive Synthesis Without Paying the Price -- 1 Introduction -- 2 Preliminaries -- 2.1 Flagging Monitors -- 3 Monitors as Triggers for LTL Formulas -- 4 Synthesising Monitor-Triggered Controllers -- 4.1 Tight Synthesis for Co-safety Implication Formulas -- 4.2 Monitor-Triggered Synthesis -- 5 Tool Support -- 6 Case Studies -- 6.1 Event Counting -- 6.2 Sequences of Events -- 7 Discussion -- 8 Conclusions -- References -- Verification of Machine Learning -- pyNeVer: A Framework for Learning and Verification of Neural Networks -- 1 Summary -- 2 Abstraction Algorithms -- 3 Experimental Evaluation -- References -- Property-Directed Verification and Robustness Certification of Recurrent Neural Networks -- 1 Introduction -- 2 Preliminaries -- 3 Verification Approaches -- 4 Property-Directed Verification of RNNs -- 5 Adversarial Robustness Certification -- 6 Experimental Evaluation -- 6.1 Evaluation on Randomly Generated DFAs -- 6.2 Adversarial Robustness Certification -- 6.3 RNNs Identifying Contact Sequences -- 7 Conclusion -- References -- Author Index 4.2 The Learning Algorithm -- 5 Learning Decision Trees over LTL Formulas -- 5.1 Decision Trees over LTL Formulas -- 5.2 The Learning Algorithm -- 5.3 LTL Formulas for Decision Nodes -- 5.4 Stopping Criterion -- 6 Experimental Evaluation -- 7 Conclusion -- References -- Mining Interpretable Spatio-Temporal Logic Properties for Spatially Distributed Systems -- 1 Introduction -- 2 Background -- 2.1 Spatio-temporal Reach and Escape Logic (STREL) -- 3 Constructing a Spatial Model -- 4 Learning STREL Formulas from Data -- 5 Case Studies -- 6 Related Work and Conclusion -- References -- Theorem Proving and Tools -- A Formal Semantics of the GraalVM Intermediate Representation -- 1 Introduction -- 2 GraalVM IR -- 3 Graph Model in Isabelle/HOL -- 4 Data-Flow Semantics -- 5 Local Control-Flow Semantics -- 6 Global Control-Flow Semantics -- 7 Validation of Execution Semantics -- 8 Proving Optimizations -- 9 Related Work -- 10 Conclusions -- References -- A Verified Decision Procedure for Orders in Isabelle/HOL -- 1 Introduction -- 1.1 Related Work -- 1.2 Contributions -- 1.3 Notation -- 2 A Semantics for Orders -- 3 Deciding Partial Orders -- 4 Deciding Linear Orders -- 5 Certification with Proof Terms -- 5.1 Basic Proof System for Partial Orders -- 5.2 Dealing with Strict Literals Through Rewriting -- 6 Refinement to Executable Specification -- 7 From Exported Code to Integrated Proof Tactic -- 8 Conclusion -- References -- PJBDD: A BDD Library for Java and Multi-Threading -- 1 Introduction -- 2 Design and Implementation Details -- 3 Architecture of the Library -- 4 Experimental Evaluation -- 5 Conclusion -- References -- Model Checking -- Live Synthesis -- 1 Introduction -- 2 Running Example - Relay Station -- 3 Preliminaries -- 4 Live Updates -- 5 A Temporal Language for Live Updates -- 5.1 LiveLTL -- 5.2 Obligations -- 6 Model Checking and Synthesis 6.1 Model Checking Live Updates -- 6.2 Live Synthesis -- 7 Case Study -- 7.1 Benchmark Families -- 7.2 Observations -- 8 Related Work -- 9 Conclusion -- References -- Faster Pushdown Reachability Analysis with Applications in Network Verification -- 1 Introduction -- 2 Preliminaries -- 3 Formal Model of MPLS Networks -- 3.1 MPLS Network Verification -- 3.2 From Query Satisfiability to Pushdown Reachability -- 4 Improving Pushdown System Reachability Analysis -- 4.1 Early Termination of Reachability Algorithms -- 4.2 Combining Forward and Backward Search -- 4.3 Abstraction Refinement for Pushdown System Reachability -- 5 Implementation and Experiments -- 6 Conclusion -- References -- Verifying Verified Code -- 1 Introduction -- 2 Unit Proofs with Code-as-Specification -- 3 Case Study -- 3.1 RQ1: Does CaS Empower Multiple Tools? -- 3.2 Are There Bugs in Verified Code? -- 3.3 Can Specifications Be Improved While Maintaining the CaS Philosophy? -- 4 Related Work -- 5 Conclusion -- References -- Probabilistic Analysis -- Probabilistic Causes in Markov Chains -- 1 Introduction -- 2 Preliminaries -- 3 Causes -- 3.1 Types of p-causes and Induced Monitors -- 3.2 Comparison to Prima Facie Causes -- 4 Costs of p-causes -- 4.1 Expected Cost of a p-cause -- 4.2 Partial Expected Cost of a p-cause -- 4.3 Maximal Cost of a p-cause -- 4.4 Instantaneous Cost -- 5 Conclusion -- References -- TEMPEST - Synthesis Tool for Reactive Systems and Shields in Probabilistic Environments -- 1 Introduction -- 2 Model and Property Specification -- 3 Tempest Synthesis of Strategies -- 4 Tempest in Action -- 5 Conclusion and Future Work -- References -- AQUA: Automated Quantized Inference for Probabilistic Programs -- 1 Introduction -- 2 Preliminaries -- 3 AQUA's Probabilistic Inference Using Density Cubes -- 3.1 Notations and Basic Definitions -- 3.2 Analysis 3.3 Formal Guarantee of Accuracy -- 4 AQUA Analysis Optimizations -- 5 Methodology -- 6 Evaluation -- 6.1 Runtime and Accuracy Comparison -- 6.2 Estimating the Tails of Posterior Distribution -- 7 Related Work -- 8 Conclusion -- References -- Software and Hardware Verification -- Proving SIFA Protection of Masked Redundant Circuits -- 1 Introduction -- 1.1 Related Work -- 1.2 Contribution -- 2 Preliminaries -- 3 Verification Method -- 3.1 Attack Model -- 3.2 Incompleteness -- 3.3 Hiding -- 3.4 Inferred Statistical Independence -- 3.5 Approximating Statistical Independence -- 3.6 Verification Algorithm -- 4 Case Studies -- 4.1 Masked Keccak 3 -- 4.2 Masked AES S-Box -- 4.3 Performance Evaluation -- 5 Conclusion -- References -- Verification by Gambling on Program Slices -- 1 Introduction -- 2 Background -- 3 Qicc -- 3.1 Cyclic Region Identification -- 3.2 Gambling -- 4 Evaluation -- 4.1 Implementation -- 4.2 Experimental Design -- 4.3 RQ1: Bounded Model Checking Systematic Analysis -- 4.4 RQ2: Evaluation with Automata Verifier -- 4.5 RQ3: Case Study -- 4.6 Threats to Validity -- 5 Related Work -- 6 Conclusion -- References -- Runtime Enforcement of Hyperproperties -- 1 Introduction -- 2 Preliminaries -- 3 Hyperproperty Enforcement -- 3.1 Trace Input Models -- 3.2 Losing Prefixes for Hyperproperties -- 3.3 Enforcement Mechanisms -- 4 Enforcement Algorithms for HyperLTL Specifications -- 4.1 Parallel Trace Input Model -- 4.2 Sequential Trace Input Model -- 5 Experimental Evaluation -- 5.1 Enforcing Symmetry in Mutual Exclusion Algorithms -- 5.2 Enforcing Observational Determinism -- 6 Conclusion -- References -- System Synthesis and Approximation -- Compositional Synthesis of Modular Systems -- 1 Introduction -- 2 Running Example -- 3 Preliminaries -- 4 Compositional Synthesis with Certificates -- 5 Certifying Synthesis with Deterministic Certificates Intro -- Preface -- Organization -- Geometric Theory for Program Testing (Abstract of a Keynote Talk) -- Contents -- Invited Paper -- Linear Temporal Logic - From Infinite to Finite Horizon -- 1 Reactive Systems and Reactive Synthesis -- 2 LTL Synthesis over Finite Traces -- 3 Synthesis Using Finite-Word Automata -- References -- Automata Theory -- Determinization and Limit-Determinization of Emerson-Lei Automata -- 1 Introduction -- 2 Preliminaries -- 3 From TELA to Generalized Büchi Automata -- 3.1 Operations on Emerson-Lei Automata -- 3.2 Construction of Generalized Büchi Automata -- 4 Determinization -- 5 Limit-Deterministic TELA -- 5.1 Limit-Determinization -- 5.2 Probabilistic Model Checking -- 6 Experimental Evaluation -- 7 Conclusion -- References -- Automatic Discovery of Fair Paths in Infinite-State Transition Systems -- 1 Introduction -- 2 Background -- 3 Funnels and Funnel Loops -- 4 Automated Synthesis of Funnel Loops -- 5 Related Work -- 6 Experimental Evaluation -- 7 Conclusions and Future Work -- References -- Certifying DFA Bounds for Recognition and Separation -- 1 Introduction -- 2 Preliminaries -- 3 Proving and Refuting Bounds on DFAs -- 4 Certifying Bounds on Recognizability -- 4.1 Certification with Offline Refuters -- 4.2 Certification with Online Refuters -- 5 Bounds on DFA Separation -- 5.1 Hardness of Separation -- 5.2 Certifying Bounds on Separation -- 6 Discussion and Directions for Future Research -- References -- Machine Learning for Formal Methods -- AALpy: An Active Automata Learning Library -- 1 Introduction -- 2 AALpy - Intuitive Automata Learning in Python -- 3 Experimental Evaluation -- 4 Conclusion -- References -- Learning Linear Temporal Properties from Noisy Data: A MaxSAT-Based Approach -- 1 Introduction -- 2 Preliminaries -- 3 Problem Formulation -- 4 Learning Minimal LTL Formulas -- 4.1 MaxSAT |
Title | Automated Technology for Verification and Analysis |
URI | http://digital.casalini.it/9783030888855 https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=6768758 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783030888855 |
Volume | 12971 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lj9MwELbY3Qt7WZ6iLCALcWuCGr_SIHEoS6FalQVEifYWOY6jBXYbiaRI8E_4t4wdO0kLB6CHqHHrWJn5bM-M54HQE6VZzqWKQxlFOmSU5WEumAqpMgnQCpoIZU5035yJxUd2es7P-_JWNrqkyZ-qH3-MK_kfrkIb8NVEyf4DZ7uHQgN8B_7CFTgM1x3ht7t1rsWbpgJRE4TF3jRuHQZTGLZ0Zjh7LuCTjrSaf3OxYwL88P3KuG21xY5nq3Q2JrAdW2N5dVnAaiHbmJD3y5f2H94yYm7eqsa4ZY8jIBcxDb7ru25T7AT2RbWxxyAXHY5eS1hkrU0n_fTZefIYoun6-dKda5xVjXUXG_vSE34lGpoqiPWVayNNt0yVO2_a29u2dFtqMunAp03E2S3WJGlLtuxkyR504HwP7cUxaOIHs_npMu1MbiSOEh5PTISPfzZtczD1Yx2iQ1l_gf0F9p6mNsKKrKWJUf1tr7YCyOoGOtAmKuUmuqbXt9CRJwh2BLmNfnaQwD0kMEACDyGBARLYQ-IZNoDAW2TCHSACbOCADYEDbMCALRgCDFCA3zwQAuxggC0MAtdhAIE7KH01X50sQld2A-ar0c7DpFBTWjKmpzkId0wnTJbCVKpTPC8LznUkiaSRKHNJYKKDFCTyROlIxVzFQk_oXbS_rtb6HsKFKEgpOC1IAZp8zJIJKfhUyZKyaS5KMkKPB-TOvl1aF4E622LnCB17LmQwg9tU7nXGGTFR2yOEPWMy29t5NWfzFycClGlQiO__zSjH6HqP2Qdov_m60Q9B4GzyRw5IvwA0135y |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Automated+Technology+for+Verification+and+Analysis%3A+19th+International+Symposium%2C+ATVA+2021%2C+Gold+Coast%2C+QLD%2C+Australia%2C+October+18-22%2C+2021%2C+Proceedings&rft.au=Hou%2C+Zhe&rft.au=Ganesh%2C+Vijay&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2021-10-13&rft.pub=Springer+International+Publishing&rft.isbn=9783030888848&rft.volume=12971&rft.externalDocID=9783030888855 |
thumbnail_m | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97830308%2F9783030888855.jpg |