Proceedings of the 30th International Conference on Computer Aided Verification, Part II
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter

Hana Chockler, Georg Weissenbacher
Proceedings of the 30th International Conference on Computer Aided Verification, Part II
CAV (2), 2018.

TEST
DBLP
Scholar
DOI
Full names Links ISxN
@proceedings{CAV-p2-2018,
	doi           = "10.1007/978-3-319-96142-2",
	editor        = "Hana Chockler and Georg Weissenbacher",
	isbn          = "['978-3-319-96141-5', '978-3-319-96142-2']",
	publisher     = "{Springer}",
	series        = "{Lecture Notes in Computer Science}",
	title         = "{Proceedings of the 30th International Conference on Computer Aided Verification, Part II}",
	volume        = 10982,
	year          = 2018,
}

Contents (31 items)

CAV-2018-ArndtJKMN #exclamation #graph #java #pointer #source code #verification
Let this Graph Be Your Witness! - An Attestor for Verifying Java Pointer Programs (HA, CJ, JPK, CM, TN0), pp. 3–11.
CAV-2018-HassanUE0 #python #type inference
MaxSMT-Based Type Inference for Python 3 (MH, CU, ME, PM0), pp. 12–19.
CAV-2018-GacekBWWG #model checking
The JKind Model Checker (AG, JB, MW, LGW, EG), pp. 20–27.
CAV-2018-ChevalKR #proving
The DEEPSEC Prover (VC, SK, IR), pp. 28–36.
CAV-2018-LiDPRV #approximate #named #performance #reachability
SimpleCAR: An Efficient Bug-Finding Tool Based on Approximate Reachability (JL, RD, GP, KYR, MYV), pp. 37–44.
CAV-2018-BlotskyMBZKG #fuzzing #named #string
StringFuzz: A Fuzzer for String Solvers (DB, FM, MB, YZ, IK, VG), pp. 45–51.
CAV-2018-DohrauSUM0 #array #source code
Permission Inference for Array Programs (JD, AJS, CU, SM, PM0), pp. 55–74.
CAV-2018-CousotGR #perspective #program analysis #verification
Program Analysis Is Harder Than Verification: A Computability Perspective (PC, RG, FR), pp. 75–95.
CAV-2018-BansalCV #automaton
Automata vs Linear-Programming Discounted-Sum Inclusion (SB, SC, MYV), pp. 99–116.
CAV-2018-BauerCS0 #model checking #protocol #random #security
Model Checking Indistinguishability of Randomized Security Protocols (MSB, RC, APS, MV0), pp. 117–135.
CAV-2018-YangVSGM #composition #lazy evaluation #security #self #verification
Lazy Self-composition for Security Verification (WY, YV, PS, AG, SM), pp. 136–156.
CAV-2018-ZhangGSW #named #verification
SCInfer: Refinement-Based Verification of Software Countermeasures Against Side-Channel Attacks (JZ, PG, FS, CW0), pp. 157–177.
CAV-2018-ChatterjeeHLOT #algorithm #graph #markov #process
Symbolic Algorithms for Graphs and Markov Decision Processes with Fairness Objectives (KC, MH, VL, SO, VT), pp. 178–197.
CAV-2018-Dijk #game studies
Attracting Tangles to Solve Parity Games (TvD), pp. 198–215.
CAV-2018-KongSG #problem
Delta-Decision Procedures for Exists-Forall Problems over the Reals (SK, ASL, SG), pp. 219–235.
CAV-2018-NiemetzPRBT #quantifier #using
Solving Quantified Bit-Vectors Using Invertibility Conditions (AN, MP, AR, CWB, CT), pp. 236–255.
CAV-2018-RabeTRS #comprehension #incremental
Understanding and Extending Incremental Determinization for 2QBF (MNR, LT, CR, SAS), pp. 256–274.
CAV-2018-RobereKG #complexity #proving #smt
The Proof Complexity of SMT Solvers (RR, AK, VG), pp. 275–293.
CAV-2018-FarinierBBP #approach #generative #quantifier
Model Generation for Quantified Formulas: A Taint-Based Approach (BF, SB, RB, MLP), pp. 294–313.
CAV-2018-YuanYG #concurrent #partial order
Partial Order Aware Concurrency Sampling (XY, JY, RG), pp. 317–335.
CAV-2018-BouajjaniEMT #abstraction #reasoning #reduction #source code #using
Reasoning About TSO Programs Using Reduction and Abstraction (AB, CE, SOM, ST), pp. 336–353.
CAV-2018-NguyenRSCP #partial order #reduction
Quasi-Optimal Partial Order Reduction (HTTN, CR, MS, CC, LP), pp. 354–371.
CAV-2018-BouajjaniEJQ #bound #message passing #on the #source code #verification
On the Completeness of Verifying Message Passing Programs Under Bounded Asynchrony (AB, CE, KJ, SQ), pp. 372–391.
CAV-2018-AlbertGIR #partial order #reduction
Constrained Dynamic Partial Order Reduction (EA, MGZ, MI, AR), pp. 392–410.
CAV-2018-TullsenPCT #verification
Formal Verification of a Vehicle-to-Vehicle (V2V) Messaging System (MT, LP, NC, AT), pp. 413–429.
CAV-2018-ChudnovCCDHMMMM #verification
Continuous Formal Verification of Amazon s2n (AC, NC, BC, JD, BH, CM, SM, EM, EM, ST, AT, EW), pp. 430–446.
CAV-2018-SchemmelBDNW #analysis #liveness
Symbolic Liveness Analysis of Real-World Software (DS, JB, OSD, TN0, KW), pp. 447–466.
CAV-2018-CookKKTTT #model checking
Model Checking Boot Code from AWS Data Centers (BC, KK, DK, ST, MT, MRT), pp. 467–486.
CAV-2018-ChenHSWWY #android #stack
Android Stack Machine (TC, JH, FS, GW, ZW, JY), pp. 487–504.
CAV-2018-Walther #multi
Formally Verified Montgomery Multiplication (CW), pp. 505–522.
CAV-2018-GoubaultPS #approximate #difference #equation
Inner and Outer Approximating Flowpipes for Delay Differential Equations (EG, SP, LS), pp. 523–541.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.