Skip to content

Commit 8e20bf7

Browse files
committed
update of the abstracts
1 parent e25145d commit 8e20bf7

File tree

5 files changed

+30
-8
lines changed

5 files changed

+30
-8
lines changed

config.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,8 @@ persons:
1717
"Joshua Bachmeier":
1818
1919
link: ""
20+
"Dirk Beyer":
21+
link: "https://www.sosy-lab.org/people/beyer/"
2022
"Bernhard Beckert":
2123
2224
link: "https://formal.iti.kit.edu/beckert"

talks/beyer.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,12 @@
22
author: "Dirk Beyer"
33
kind: "Invited Talk"
44
track: "Common Track"
5-
title: "tbd"
5+
title: "Distributed Automatic Contract Construction"
66
slot: 207
77
length: 60
88
type: invited
99
order: 70
1010
---
11+
12+
13+
The presentation consists of two parts. The first part presents an approach to automatic contract construction that is more modular, scalable, and precise compared to existing automatic approaches. We decompose the program into code blocks, and for each code block, we compute a postcondition and a violation condition. The postcondition of a block is given to successors in order to refine their precondition and derive a proof of correctness. The violation condition is a condition that describes states leading to a specification violation. The approach is scalable because each block can be analyzed independently: the blocks communicate only via postconditions and violation conditions. The precision of the approach can be defined by the underlying program analysis. In a second part, we describe an approach to conserve tools for formal methods. We collect and maintain essential data about tools for formal methods in a central repository, called FM-Tools, available at https://gitlab.com/sosy-lab/benchmarking/fm-tools. The repository contains metadata, such as which tools are available, which versions are advertized for each tool, and what command-line arguments to use for default usage. The actual tool executables are stored in tool archives at Zenodo, and for technically deep documentation, references point to archived publications or project web sites. With this approach, we can conserve today's tools for the future.

talks/graetz.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,10 @@ length: 30
88
order: 62
99
---
1010

11+
More than 15 years ago, a paper ""Better bug reporting with better privacy"" solved the two problems of automatic bug reports: Specifically, memory dumps might not be sufficient to reconstruct an issue/crash while leaking private information. However, their approach of generating new input-data had limited applicability.
1112

12-
More than 15 years ago, a paper "Better bug reporting with better privacy" solved the two problems of automatic bug reports: Specifically, memory dumps might not be sufficient to reconstruct an issue/crash while leaking private information.
13+
Our tool instruments the source code to record (with low overhead) a compressed control flow trace, which can be directly added to a bug-report (instead of input-data or memory dumps). The trace format is designed to be adaptable to different programming languages.
1314

14-
In this talk, we will follow a related approach with improved overhead and portability: Our tool instruments the source code to record (with low overhead) a compressed control flow trace, which can be directly added to a bug-report. The trace format is designed to be adaptable to different programming languages.
15+
In the second part, these traces are used not only by visualizing the control-flow in the code: On the developers side, we can debug a trace using symbolic execution (we call that retracing). Our current implementation works on top of either KeY, CBMC or angr.
1516

16-
In the second part, we see what a developer can do with these traces apart from visualizing in the source code: We use symbolic execution to retrace (partial program run reconstruction), to inspect variable values and to check against specifications/assertions. Our current implementation works on top of either KeY, CBMC or angr.
17-
18-
We also see how to record a trace with KeY, useful for debugging a KeY-proof and restricting it to a single control flow (and then retrying, i.e., with different proof strategy settings).
17+
We also see how to record a trace with KeY and how to restrict symbolic execution (or a part of it) to a single control flow, to avoid loop invariants and path explosion.

talks/heydari-tabar.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,12 @@
22
author: "Asmae Heydari-Tabar"
33
kind: "Short Talk (10 min. + 5 min.)"
44
track: "Common Track, KeY-only Track"
5-
title: "Data Dependence Logic: Applications"
5+
title: "Data Dependence Analysis Program Logic: Applications"
66
slot: 209
77
length: 15
88
order: 71
99
---
1010

11+
12+
We developed a program logic and a sequent calculus to formally address the data dependence analysis problem in high-performance computing. This program logic is rich and powerful enough to be used in different contexts when the problem at hand can be formulated in terms of data dependences. In this presentation, we briefly discuss such problems (e.g., method contract generation, noninterference verification, branch prediction, etc.).
13+

talks/kern.md

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,24 @@
22
author: "Philipp Kern"
33
kind: "Regular Talk (20 min. + 10 min.)"
44
track: "Common Track, KeY-only Track"
5-
title: "TBD: Sth about NN Verification (probably verification of LSTMs)"
5+
title: "Towards Precise Linear Relaxations for Verification of LSTMs"
66
length: 30
77
slot: 32
88
order: 104
99
---
1010

11+
Verification of neural networks is essential for their deployment in
12+
safety-critical applications. While most verification approaches target
13+
ReLU networks, the activation functions used in Long Short-Term Memory
14+
(LSTM) networks, crucial for sequence and time series data, still pose
15+
significant challenges.
16+
17+
Existing approaches for verification of LSTMs neglect dependencies
18+
between input variables, when computing linear relaxations of their
19+
activation functions.
20+
21+
In this talk, I am going to present ongoing work for enhancing the
22+
precision of the linear relaxations by leveraging zonotopes to capture
23+
such input dependencies.
24+
25+

0 commit comments

Comments
 (0)