Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–22 of 22 results for author: Černý, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2104.05207  [pdf, other

    cs.LO cs.AI

    Online Machine Learning Techniques for Coq: A Comparison

    Authors: Liao Zhang, Lasse Blaauwbroek, Bartosz Piotrowski, Prokop Černý, Cezary Kaliszyk, Josef Urban

    Abstract: We present a comparison of several online machine learning techniques for tactical learning and proving in the Coq proof assistant. This work builds on top of Tactician, a plugin for Coq that learns from proofs written by the user to synthesize new proofs. Learning happens in an online manner, meaning that Tactician's machine learning model is updated immediately every time the user performs a ste… ▽ More

    Submitted 7 June, 2021; v1 submitted 12 April, 2021; originally announced April 2021.

    Comments: Intelligent Computer Mathematics 14th International Conference, CICM 2021

  2. arXiv:2006.01991  [pdf, other

    cs.LG cs.PF cs.SE

    Detecting and Understanding Real-World Differential Performance Bugs in Machine Learning Libraries

    Authors: Saeid Tizpaz-Niari, Pavol Cerný, Ashutosh Trivedi

    Abstract: Programming errors that degrade the performance of systems are widespread, yet there is little tool support for analyzing these bugs. We present a method based on differential performance analysis---we find inputs for which the performance varies widely, despite having the same size. To ensure that the differences in the performance are robust (i.e. hold also for large inputs), we compare the perf… ▽ More

    Submitted 2 June, 2020; originally announced June 2020.

    Comments: To appear in ISSTA'20, 11 pages, 8 figures

    ACM Class: D.2.5

  3. arXiv:1907.10159  [pdf, other

    cs.CR cs.LG cs.SE

    Efficient Detection and Quantification of Timing Leaks with Neural Networks

    Authors: Saeid Tizpaz-Niari, Pavol Cerny, Sriram Sankaranarayanan, Ashutosh Trivedi

    Abstract: Detection and quantification of information leaks through timing side channels are important to guarantee confidentiality. Although static analysis remains the prevalent approach for detecting timing side channels, it is computationally challenging for real-world applications. In addition, the detection techniques are usually restricted to 'yes' or 'no' answers. In practice, real-world application… ▽ More

    Submitted 23 July, 2019; originally announced July 2019.

    Comments: To Appear in RV'19

  4. arXiv:1906.08957  [pdf, other

    cs.CR cs.LG

    Quantitative Mitigation of Timing Side Channels

    Authors: Saeid Tizpaz-Niari, Pavol Cerny, Ashutosh Trivedi

    Abstract: Timing side channels pose a significant threat to the security and privacy of software applications. We propose an approach for mitigating this problem by decreasing the strength of the side channels as measured by entropy-based objectives, such as min-guess entropy. Our goal is to minimize the information leaks while guaranteeing a user-specified maximal acceptable performance overhead. We dub th… ▽ More

    Submitted 21 June, 2019; originally announced June 2019.

    Comments: To Appear in CAV 2019

  5. arXiv:1810.10443  [pdf, ps, other

    cs.PL

    Type-directed Bounding of Collections in Reactive Programs

    Authors: Tianhan Lu, Pavol Cerny, Bor-Yuh Evan Chang, Ashutosh Trivedi

    Abstract: Our aim is to statically verify that in a given reactive program, the length of collection variables does not grow beyond a given bound. We propose a scalable type-based technique that checks that each collection variable has a given refinement type that specifies constraints about its length. A novel feature of our refinement types is that the refinements can refer to AST counters that track how… ▽ More

    Submitted 28 January, 2019; v1 submitted 24 October, 2018; originally announced October 2018.

  6. arXiv:1808.10502  [pdf, other

    cs.CR cs.LG cs.SE

    Data-Driven Debugging for Functional Side Channels

    Authors: Saeid Tizpaz-Niari, Pavol Cerny, Ashutosh Trivedi

    Abstract: Information leaks through side channels are a pervasive problem, even in security-critical applications. Functional side channels arise when an attacker knows that a secret value of a server stays fixed for a certain time. Then, the attacker can observe the server executions on a sequence of different public inputs, each paired with the same secret input. Thus for each secret, the attacker observe… ▽ More

    Submitted 7 February, 2020; v1 submitted 30 August, 2018; originally announced August 2018.

    Comments: To Appear in NDSS'20 (17 pages, 11 figures)

  7. arXiv:1802.08733  [pdf, other

    cs.DC

    Conflict-Aware Replicated Data Types

    Authors: Nicholas V. Lewchenko, Arjun Radhakrishna, Akash Gaonkar, Pavol Černý

    Abstract: We introduce Conflict-Aware Replicated Data Types (CARDs). CARDs are significantly more expressive than Conflict-free Replicated Data Types (CRDTs) as they support operations that can conflict with each other. Introducing conflicting operations typically brings the need to block an operation in at least some executions, leading to difficulties in programming and reasoning about correctness, as wel… ▽ More

    Submitted 26 September, 2018; v1 submitted 23 February, 2018; originally announced February 2018.

  8. arXiv:1711.04076  [pdf, ps, other

    cs.AI cs.PF cs.SE

    Differential Performance Debugging with Discriminant Regression Trees

    Authors: Saeid Tizpaz-Niari, Pavol Cerny, Bor-Yuh Evan Chang, Ashutosh Trivedi

    Abstract: Differential performance debugging is a technique to find performance problems. It applies in situations where the performance of a program is (unexpectedly) different for different classes of inputs. The task is to explain the differences in asymptotic performance among various input classes in terms of program internals. We propose a data-driven technique based on discriminant regression tree (D… ▽ More

    Submitted 28 November, 2017; v1 submitted 10 November, 2017; originally announced November 2017.

    Comments: To Appear in AAAI 2018

  9. arXiv:1702.07103  [pdf, other

    cs.PL cs.CR cs.FL cs.LG cs.SE

    Discriminating Traces with Time

    Authors: Saeid Tizpaz-Niari, Pavol Cerny, Bor-Yuh Evan Chang, Sriram Sankaranarayanan, Ashutosh Trivedi

    Abstract: What properties about the internals of a program explain the possible differences in its overall running time for different inputs? In this paper, we propose a formal framework for considering this question we dub trace-set discrimination. We show that even though the algorithmic problem of computing maximum likelihood discriminants is NP-hard, approaches based on integer linear programming (ILP)… ▽ More

    Submitted 23 February, 2017; originally announced February 2017.

    Comments: Published in TACAS 2017

  10. arXiv:1701.07842  [pdf, other

    cs.LO cs.LG cs.PL

    DroidStar: Callback Typestates for Android Classes

    Authors: Arjun Radhakrishna, Nicholas V. Lewchenko, Shawn Meier, Sergio Mover, Krishna Chaitanya Sripada, Damien Zufferey, Bor-Yuh Evan Chang, Pavol Černý

    Abstract: Event-driven programming frameworks, such as Android, are based on components with asynchronous interfaces. The protocols for interacting with these components can often be described by finite-state machines we dub *callback typestates*. Callback typestates are akin to classical typestates, with the difference that their outputs (callbacks) are produced asynchronously. While useful, these specific… ▽ More

    Submitted 2 March, 2018; v1 submitted 26 January, 2017; originally announced January 2017.

    Comments: Appearing at ICSE 2018

  11. arXiv:1607.05159  [pdf, ps, other

    cs.NI

    Optimal Consistent Network Updates in Polynomial Time

    Authors: Pavol Cerny, Nate Foster, Nilesh Jagnik, Jedidiah McClurg

    Abstract: Software-defined networking (SDN) allows operators to control the behavior of a network by programatically managing the forwarding rules installed on switches. However, as is common in distributed systems, it can be difficult to ensure that certain consistency properties are preserved during periods of reconfiguration. The widely-accepted notion of PER-PACKET CONSISTENCY requires every packet to b… ▽ More

    Submitted 18 July, 2016; originally announced July 2016.

    ACM Class: C.2.3; D.3.2

  12. arXiv:1602.00786   

    cs.PL cs.LO

    Proceedings Fourth Workshop on Synthesis

    Authors: Pavol Černý, Viktor Kuncak, Madhusudan Parthasarathy

    Abstract: The SYNT workshop aims to bring together researchers interested in the broad area of synthesis of computing systems. The goal is to foster the development of frontier techniques in automating the development of computing system. Contributions of interest include algorithms, complexity and decidability analysis, as well as reproducible heuristics, implemented tools, and experimental evaluation. Ap… ▽ More

    Submitted 1 February, 2016; originally announced February 2016.

    Journal ref: EPTCS 202, 2016

  13. arXiv:1511.07163  [pdf, other

    cs.PL

    Optimizing Solution Quality in Synchronization Synthesis

    Authors: Pavol Černý, Edmund M. Clarke, Thomas A. Henzinger, Arjun Radhakrishna, Leonid Ryzhyk, Roopsha Samanta, Thorsten Tarrach

    Abstract: Given a multithreaded program written assuming a friendly, non-preemptive scheduler, the goal of synchronization synthesis is to automatically insert synchronization primitives to ensure that the modified program behaves correctly, even with a preemptive scheduler. In this work, we focus on the quality of the synthesized solution: we aim to infer synchronization placements that not only ensure cor… ▽ More

    Submitted 23 November, 2015; originally announced November 2015.

  14. Event-Driven Network Programming

    Authors: Jedidiah McClurg, Hossein Hojjat, Nate Foster, Pavol Cerny

    Abstract: Software-defined networking (SDN) programs must simultaneously describe static forwarding behavior and dynamic updates in response to events. Event-driven updates are critical to get right, but difficult to implement correctly due to the high degree of concurrency in networks. Existing SDN platforms offer weak guarantees that can break application invariants, leading to problems such as dropped pa… ▽ More

    Submitted 15 April, 2016; v1 submitted 24 July, 2015; originally announced July 2015.

    ACM Class: C.2.3; D.3.2; D.3.4

  15. arXiv:1505.05868  [pdf, ps, other

    cs.PL

    Synthesis through Unification

    Authors: Rajeev Alur, Pavol Cerny, Arjun Radhakrishna

    Abstract: Given a specification and a set of candidate programs (program space), the program synthesis problem is to find a candidate program that satisfies the specification. We present the synthesis through unification (STUN) approach, which is an extension of the counter-example guided inductive synthesis (CEGIS) approach. In CEGIS, the synthesizer maintains a subset S of inputs and a candidate program P… ▽ More

    Submitted 21 May, 2015; originally announced May 2015.

  16. arXiv:1505.04533  [pdf, ps, other

    cs.PL

    From Non-preemptive to Preemptive Scheduling using Synchronization Synthesis

    Authors: Pavol Černý, Edmund M. Clarke, Thomas A. Henzinger, Arjun Radhakrishna, Leonid Ryzhyk, Roopsha Samanta, Thorsten Tarrach

    Abstract: We present a computer-aided programming approach to concurrency. The approach allows programmers to program assuming a friendly, non-preemptive scheduler, and our synthesis procedure inserts synchronization to ensure that the final program works even with a preemptive scheduler. The correctness specification is implicit, inferred from the non-preemptive behavior. Let us consider sequences of calls… ▽ More

    Submitted 18 May, 2015; originally announced May 2015.

    Comments: Liss is published as open-source at https://github.com/thorstent/Liss, Computer Aided Verification 2015

  17. Regression-free Synthesis for Concurrency

    Authors: Pavol Černý, Thomas A. Henzinger, Arjun Radhakrishna, Leonid Ryzhyk, Thorsten Tarrach

    Abstract: While fixing concurrency bugs, program repair algorithms may introduce new concurrency bugs. We present an algorithm that avoids such regressions. The solution space is given by a set of program transformations we consider in for repair process. These include reordering of instructions within a thread and inserting atomic sections. The new algorithm learns a constraint on the space of candidate so… ▽ More

    Submitted 14 July, 2014; originally announced July 2014.

    Comments: for source code see https://github.com/thorstent/ConRepair

    Journal ref: Computer Aided Verification, Lecture Notes in Computer Science Volume 8559, 2014, pp 568-584

  18. arXiv:1403.7840  [pdf, other

    cs.PL cs.LO cs.NI

    Toward Synthesis of Network Updates

    Authors: Andrew Noyes, Todd Warszawski, Pavol Černý, Nate Foster

    Abstract: Updates to network configurations are notoriously difficult to implement correctly. Even if the old and new configurations are correct, the update process can introduce transient errors such as forwarding loops, dropped packets, and access control violations. The key factor that makes updates difficult to implement is that networks are distributed systems with hundreds or even thousands of nodes… ▽ More

    Submitted 30 March, 2014; originally announced March 2014.

    Comments: In Proceedings SYNT 2013, arXiv:1403.7264

    Journal ref: EPTCS 142, 2014, pp. 8-23

  19. Efficient Synthesis of Network Updates

    Authors: Jedidiah McClurg, Hossein Hojjat, Pavol Cerny, Nate Foster

    Abstract: Software-defined networking (SDN) is revolutionizing the networking industry, but current SDN programming platforms do not provide automated mechanisms for updating global configurations on the fly. Implementing updates by hand is challenging for SDN programmers because networks are distributed systems with hundreds or thousands of interacting nodes. Even if initial and final configurations are co… ▽ More

    Submitted 16 April, 2015; v1 submitted 23 March, 2014; originally announced March 2014.

    ACM Class: D.2.4; F.3.1; F.4.1; C.2.3

  20. Interface Simulation Distances

    Authors: Pavol Černý, Martin Chmelík, Thomas A. Henzinger, Arjun Radhakrishna

    Abstract: The classical (boolean) notion of refinement for behavioral interfaces of system components is the alternating refinement preorder. In this paper, we define a distance for interfaces, called interface simulation distance. It makes the alternating refinement preorder quantitative by, intuitively, tolerating errors (while counting them) in the alternating simulation game. We show that the interface… ▽ More

    Submitted 8 October, 2012; originally announced October 2012.

    Comments: In Proceedings GandALF 2012, arXiv:1210.2028

    Journal ref: EPTCS 96, 2012, pp. 29-42

  21. arXiv:1104.4306  [pdf, other

    cs.PL

    Quantitative Synthesis for Concurrent Programs

    Authors: Pavol Cerny, Krishnendu Chatterjee, Thomas Henzinger, Arjun Radhakrishna, Rohit Singh

    Abstract: We present an algorithmic method for the quantitative, performance-aware synthesis of concurrent programs. The input consists of a nondeterministic partial program and of a parametric performance model. The nondeterminism allows the programmer to omit which (if any) synchronization construct is used at a particular program location. The performance model, specified as a weighted automaton, can cap… ▽ More

    Submitted 21 April, 2011; originally announced April 2011.

  22. arXiv:1007.4958  [pdf, other

    cs.PL

    Algorithmic Verification of Single-Pass List Processing Programs

    Authors: Rajeev Alur, Pavol Cerny

    Abstract: We introduce streaming data string transducers that map input data strings to output data strings in a single left-to-right pass in linear time. Data strings are (unbounded) sequences of data values, tagged with symbols from a finite set, over a potentially infinite data domain that supports only the operations of equality and ordering. The transducer uses a finite set of states, a finite set of v… ▽ More

    Submitted 14 February, 2011; v1 submitted 28 July, 2010; originally announced July 2010.