Skip to main content
  • Conference proceedings
  • Open Access
  • © 2018

Computer Aided Verification

30th International Conference, CAV 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 14-17, 2018, Proceedings, Part II

Part of the book series: Theoretical Computer Science and General Issues (LNTCS, volume 10982)

Conference series link(s): CAV: International Conference on Computer Aided Verification

Conference proceedings info: CAV 2018.

Buying options

Softcover Book USD 59.99
Price excludes VAT (USA)

Table of contents (31 papers)

  1. Front Matter

    Pages I-XX
  2. Tools

    1. Front Matter

      Pages 1-1
    2. Let this Graph Be Your Witness!

      • Hannah Arndt, Christina Jansen, Joost-Pieter Katoen, Christoph Matheja, Thomas Noll
      Pages 3-11Open Access
    3. MaxSMT-Based Type Inference for Python 3

      • Mostafa Hassan, Caterina Urban, Marco Eilers, Peter Müller
      Pages 12-19Open Access
    4. The JKind Model Checker

      • Andrew Gacek, John Backes, Mike Whalen, Lucas Wagner, Elaheh Ghassabani
      Pages 20-27Open Access
    5. The DEEPSEC Prover

      • Vincent Cheval, Steve Kremer, Itsaka Rakotonirina
      Pages 28-36Open Access
    6. SimpleCAR: An Efficient Bug-Finding Tool Based on Approximate Reachability

      • Jianwen Li, Rohit Dureja, Geguang Pu, Kristin Yvonne Rozier, Moshe Y. Vardi
      Pages 37-44Open Access
    7. StringFuzz: A Fuzzer for String Solvers

      • Dmitry Blotsky, Federico Mora, Murphy Berzish, Yunhui Zheng, Ifaz Kabir, Vijay Ganesh
      Pages 45-51Open Access
  3. Static Analysis

    1. Front Matter

      Pages 53-53
    2. Permission Inference for Array Programs

      • Jérôme Dohrau, Alexander J. Summers, Caterina Urban, Severin Münger, Peter Müller
      Pages 55-74Open Access
    3. Program Analysis Is Harder Than Verification: A Computability Perspective

      • Patrick Cousot, Roberto Giacobazzi, Francesco Ranzato
      Pages 75-95Open Access
  4. Theory and Security

    1. Front Matter

      Pages 97-97
    2. Automata vs Linear-Programming Discounted-Sum Inclusion

      • Suguman Bansal, Swarat Chaudhuri, Moshe Y. Vardi
      Pages 99-116Open Access
    3. Model Checking Indistinguishability of Randomized Security Protocols

      • Matthew S. Bauer, Rohit Chadha, A. Prasad Sistla, Mahesh Viswanathan
      Pages 117-135Open Access
    4. Lazy Self-composition for Security Verification

      • Weikun Yang, Yakir Vizel, Pramod Subramanyan, Aarti Gupta, Sharad Malik
      Pages 136-156Open Access
    5. SCInfer: Refinement-Based Verification of Software Countermeasures Against Side-Channel Attacks

      • Jun Zhang, Pengfei Gao, Fu Song, Chao Wang
      Pages 157-177Open Access
    6. Symbolic Algorithms for Graphs and Markov Decision Processes with Fairness Objectives

      • Krishnendu Chatterjee, Monika Henzinger, Veronika Loitzenbauer, Simin Oraee, Viktor Toman
      Pages 178-197Open Access
    7. Attracting Tangles to Solve Parity Games

      • Tom van Dijk
      Pages 198-215Open Access
  5. SAT, SMT and Decision Procedures

    1. Front Matter

      Pages 217-217
    2. Delta-Decision Procedures for Exists-Forall Problems over the Reals

      • Soonho Kong, Armando Solar-Lezama, Sicun Gao
      Pages 219-235Open Access

Other Volumes

  1. Computer Aided Verification

About this book

This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference on Computer Aided Verification, CAV 2018, held in Oxford, UK, in July 2018.

The 52 full and 13 tool papers presented together with 3 invited papers and 2 tutorials were carefully reviewed and selected from 215 submissions. The papers cover a wide range of topics and techniques, from algorithmic and logical foundations of verification to practical applications in distributed, networked, cyber-physical, and autonomous systems. They are organized in topical sections on model checking, program analysis using polyhedra, synthesis, learning, runtime verification, hybrid and timed systems, tools, probabilistic systems, static analysis, theory and security, SAT, SMT and decisions procedures, concurrency, and CPS, hardware, industrial applications.

Keywords

  • artificial intelligence
  • data security
  • decision theory
  • evolutionary algorithms
  • formal logic
  • formal methods
  • formal verifications
  • genetic algorithms
  • learning algorithms
  • model checker
  • model checking
  • program compilers
  • programming languages
  • satisfiability
  • semantics
  • software engineering
  • software evaluation
  • specifications
  • static analysis
  • verification

Editors and Affiliations

  • King’s College, London, United Kingdom

    Hana Chockler

  • TU Wien, Vienna, Austria

    Georg Weissenbacher

Bibliographic Information

Buying options

Softcover Book USD 59.99
Price excludes VAT (USA)