Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
Verifying Unboundedness via Amalgamation
LICS '24: Proceedings of the 39th Annual ACM/IEEE Symposium on Logic in Computer ScienceJuly 2024, Article No.: 4, Pages 1–15https://doi.org/10.1145/3661814.3662133Well-structured transition systems (WSTS) are an abstract family of systems that encompasses a vast landscape of infinite-state systems. By requiring a well-quasi-ordering (wqo) on the set of states, a WSTS enables generic algorithms for classic ...
- ArticleJune 2024
- short-paperJune 2024
SecureCheck: User-Centric and Geolocation-Aware Access Mediation Contracts for Sharing Private Data
SACMAT 2024: Proceedings of the 29th ACM Symposium on Access Control Models and TechnologiesJune 2024, Pages 53–58https://doi.org/10.1145/3649158.3657050Data oversharing is a critical issue in today's technologically driven society. Numerous entities, i.e., corporations, governments, criminal groups, are collecting individuals' data. One potential cause is that current systems, such as verification ...
- posterJuly 2024
Meta-Configuration Tracking for Machine-Certified Correctness of Concurrent Data Structures (Abstract)
HOPC'24: Proceedings of the 2024 ACM Workshop on Highlights of Parallel ComputingJune 2024, Pages 21–22https://doi.org/10.1145/3670684.3673406We introduce meta-configuration tracking: a simple, universal, sound, and complete proof method for producing machine-verifiable proofs of linearizability. Universality means that our method works for any object type; soundness means that an algorithm ...
- research-articleJune 2024
Log Diameter Rounds MST Verification and Sensitivity in MPC
SPAA '24: Proceedings of the 36th ACM Symposium on Parallelism in Algorithms and ArchitecturesJune 2024, Pages 269–280https://doi.org/10.1145/3626183.3659984We consider two natural variants of the problem of minimum spanning tree (MST) of a graph in the parallel setting: MST verification (verifying if a given tree is an MST) and the sensitivity analysis of an MST (finding the lowest cost replacement edge for ...
-
- research-articleJune 2024
A Systematic Process to Engineer Dependable Integration of Frame-based Input Devices in a Multimodal Input Chain: Application to Rehabilitation in Healthcare
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 8, Issue EICSArticle No.: 259, Pages 1–31https://doi.org/10.1145/3664633Designing new input devices and associated interaction techniques is a key contribution in order to increase the bandwidth between users and interactive applications. In the field of Human-Computer Interaction, research and development services in ...
- research-articleJune 2024
Experimental evaluation of a machine learning approach to improve the reproducibility of network simulations
Simulation (SIMU), Volume 100, Issue 6Jun 2024, Pages 545–561https://doi.org/10.1177/00375497241229753A stochastic network simulation is verified when its distribution of outputs is aligned with the ground truth, while tolerating deviations due to variability in real-world measurements and the randomness of a stochastic simulation. However, comparing ...
- ArticleMay 2024
AprèsSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing
Advances in Cryptology – EUROCRYPT 2024May 2024, Pages 63–93https://doi.org/10.1007/978-3-031-58716-0_3AbstractWe optimise the verification of the SQIsign signature scheme. By using field extensions in the signing procedure, we are able to significantly increase the amount of available rational 2-power torsion in verification, which achieves a significant ...
- research-articleMay 2024
Dungeons & Deepfakes: Using scenario-based role-play to study journalists' behavior towards using AI-based verification tools for video content
CHI '24: Proceedings of the CHI Conference on Human Factors in Computing SystemsMay 2024, Article No.: 776, Pages 1–17https://doi.org/10.1145/3613904.3641973The evolving landscape of manipulated media, including the threat of deepfakes, has made information verification a daunting challenge for journalists. Technologists have developed tools to detect deepfakes, but these tools can sometimes yield inaccurate ...
- research-articleMay 2024
Multimodal Pretrained Models for Verifiable Sequential Decision-Making: Planning, Grounding, and Perception
AAMAS '24: Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent SystemsMay 2024, Pages 2011–2019Recently developed pretrained models can encode rich world knowledge expressed in multiple modalities, such as text and images. However, the outputs of these models cannot be integrated into algorithms to solve sequential decision-making tasks. We ...
- research-articleApril 2024
Scenario-Based Proofs for Concurrent Objects
Proceedings of the ACM on Programming Languages (PACMPL), Volume 8, Issue OOPSLA1Article No.: 140, Pages 1294–1323https://doi.org/10.1145/3649857Concurrent objects form the foundation of many applications that exploit multicore architectures and their importance has lead to informal correctness arguments, as well as formal proof systems. Correctness arguments (as found in the distributed ...
- research-articleApril 2024
Models for Storage in Database Backends
PaPoC '24: Proceedings of the 11th Workshop on Principles and Practice of Consistency for Distributed DataApril 2024, Pages 58–66https://doi.org/10.1145/3642976.3653036This paper describes ongoing work on developing a formal specification of a database backend. We present the formalisation of the expected behaviour of a basic transactional system that calls into a simple store API, and instantiate in two semantic ...
- research-articleApril 2024
Simplifying Snapshot Isolation: A New Definition, Equivalence, and Efficient Checking
PaPoC '24: Proceedings of the 11th Workshop on Principles and Practice of Consistency for Distributed DataApril 2024, Pages 23–29https://doi.org/10.1145/3642976.3653032Snapshot Isolation (SI) is a popular isolation level, supported by many databases and is widely used by applications. Understanding and checking SI is essential. However, today's SI definitions can be obscure for non-experts to understand, or inefficient ...
- research-articleApril 2024JUST ACCEPTED
Knowledge-Augmented Mutation-Based Bug Localization for Hardware Design Code
ACM Transactions on Architecture and Code Optimization (TACO), Just Accepted https://doi.org/10.1145/3660526Verification of hardware design code is crucial for the quality assurance of hardware products. Being an indispensable part of verification, localizing bugs in the hardware design code is significant for hardware development but is often regarded as a ...
- posterJune 2024
Trustworthy AI: Industry-Guided Tooling of the Methods
CAIN '24: Proceedings of the IEEE/ACM 3rd International Conference on AI Engineering - Software Engineering for AIApril 2024, Pages 245–246https://doi.org/10.1145/3644815.3644970The need to assess and validate the trustworthiness of AI (robustness, transparency, safety, security, etc.,) has been the subject of considerable academic work for some time now. A natural evolution of such research efforts is to have a tangible impact ...
Verifying Opacity of Discrete-Timed Automata
FormaliSE '24: Proceedings of the 2024 IEEE/ACM 12th International Conference on Formal Methods in Software Engineering (FormaliSE)April 2024, Pages 55–65https://doi.org/10.1145/3644033.3644376Opacity is a powerful confidentiality property that holds if a system cannot leak secret information through observable behavior. In recent years, time has become an increasingly popular attack vector. The notion of opacity has therefore been extended to ...
- research-articleMay 2024
TPV: A Tool for Validating Temporal Properties in UML Class Diagrams
ICSE-Companion '24: Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion ProceedingsApril 2024, Pages 114–118https://doi.org/10.1145/3639478.3640044Software scientists and practitioners have criticized Model-driven engineering (MDE) for lacking effective tooling. Although progress has been made, most MDE analysis tools rely on complex, heavyweight mathematical techniques that are not based on UML. ...
- posterMay 2024
Formalization and Verification of Delegate Contract Signing Mechanism Based on Smart Contract Using CSP
SAC '24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied ComputingApril 2024, Pages 300–304https://doi.org/10.1145/3605098.3636187Smart contracts are widely applied in financial delegation contracts to address contract fraud. The smart contract delegation contract signing mechanism (DCSM-SC) effectively tackles fraud risks arising from information and interest asymmetry. However, ...
- research-articleMay 2024
A Formal Framework of Model and Logical Embeddings for Verification of Stochastic Systems
SAC '24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied ComputingApril 2024, Pages 1712–1721https://doi.org/10.1145/3605098.3636032This paper proposes a formal framework for minimizing, analyzing and verifying stochastic process algebraic models using tools and techniques developed for the state-labeled domain, and vice versa. First, we modify the model embeddings proposed in the ...
- research-articleMay 2024
VeriFog: A Generic Model-based Approach for Verifying Fog Systems at Design Time
SAC '24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied ComputingApril 2024, Pages 1252–1261https://doi.org/10.1145/3605098.3635973Fog Computing is a paradigm aiming to decentralize the Cloud by geographically distributing away computation, storage, network resources and related services. It provides several benefits such as reducing the number of bottlenecks, limiting unwanted data ...