Advances in Formal Verification and Security

The field of formal verification and security is moving towards more efficient and automated methods for ensuring the correctness and security of complex systems. Researchers are exploring new approaches to verify tree-manipulating programs, procedural programs with integer arrays, and concurrent programs on weak memory models. Additionally, there is a growing interest in developing solvers for constrained Horn clauses and applying algebraic methods to define language-based security properties. Notable papers in this area include:

  • Verifying Tree-Manipulating Programs via CHCs, which introduces a unified approach to verifying such programs using knitted-tree encoding and constrained Horn clauses.
  • HornStr: A string Theory Solver for Constrained Horn Clauses, which presents the first solver for invariant synthesis for Regular Model Checking with string constraints. These developments have the potential to significantly advance the field of formal verification and security, enabling more efficient and automated methods for ensuring the correctness and security of complex systems.

Sources

pyeb: A Python Implementation of Event-B Refinement Calculus

In Search of Lost Data: A Study of Flash Sanitization Practices

Verifying Tree-Manipulating Programs via CHCs

Unraveling the iterative CHAD

Owicki--Gries Logic for Timestamp Semantics

Defining Atomicity (and Integrity) for Snapshots of Storage in Forensic Computing

Data-driven Verification of Procedural Programs with Integer Arrays

HornStr: A string Theory Solver for Constrained Horn Clauses

Language-based Security and Time-inserting Supervisor

Built with on top of