We propose ProSpeCT, a generic formal processor model providing provably...
Many software analysis techniques attempt to determine whether bugs are
...
We consider the problem of program clone search, i.e. given a target pro...
This paper tackles the problem of designing efficient binary-level
verif...
While recent progress in quantum hardware open the door for significant
...
Inline assembly is still a common practice in low-level C programming,
t...
Code obfuscation aims at protecting Intellectual Property and other secr...
The kernel is the most safety- and security-critical component of many
c...
Operating system kernels are the security keystone of most computer syst...
While recent progress in quantum hardware open the door for significant
...
Directed fuzzing focuses on automatically testing specific parts of the ...
The constant-time programming discipline (CT) is an efficient countermea...
Code obfuscation is a major tool for protecting software intellectual
pr...
Formal methods for software development have made great strides in the l...
We focus in this paper on generating models of quantified first-order
fo...
The traditional abstract domain framework for imperative programs suffer...
Testing is the primary approach for detecting software defects. A major
...
Arrays are ubiquitous in the context of software verification. However,
...