Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/3077629acmconferencesBook PagePublication PagesfmcadConference Proceedingsconference-collections
FMCAD '16: Proceedings of the 16th Conference on Formal Methods in Computer-Aided Design
2016 Proceeding
Publisher:
  • FMCAD Inc
  • Austin
  • Texas
Conference:
FMCAD '16: International Conference on Formal Methods in Computer Aided Design Mountain View California October 3 - 6, 2016
ISBN:
978-0-9835678-6-8
Published:
03 October 2016
Sponsors:

Reflects downloads up to 12 Nov 2024Bibliometrics
Skip Abstract Section
Abstract

The International Conference on Formal Methods in Computer-Aided Design (FMCAD) is a series of meetings presenting groundbreaking results on the theory and application of rigorous formal techniques for the automated design of systems. The FMCAD conference covers the entire spectrum of formal aspects of specification, verification, synthesis, and testing, and is a leading forum for researchers and practitioners in academia and industry alike. The sixteenth meeting in the series was held in Mountain View, California, USA, October 3-6, 2016.

research-article
Formal verification for computer security: lessons learned and future directions
Page 1

Formal verification techniques have been fruitful for a broad spectrum of different security applications and domains. However, many important questions and considerations influence the success of applying formal verification techniques to security ...

research-article
Understanding evolution through algorithms
Page 2

Why is evolution so successful? What is the role of sex (recombination)? Why is there so much diversity in populations? How do novel traits arise? Are mutations random? And is evolution optimizing something? This talk will review recent work by the ...

research-article
Network verification: when Clarke meets Cerf
Page 3

Surveys reveal that network outages are prevalent, and that many outages take hours to resolve, resulting in significant lost revenue. Many bugs are caused by errors in configuration files which are programmed using arcane, low-level languages, akin to ...

research-article
Machine learning and systems for the next frontier in formal verification
Page 4

This tutorial covers basics of machine learning, systems and infrastructure considerations for performing machine learning at scale, and applications of machine learning to improve formal verification performance and usability. It starts with blackbox ...

research-article
Verifying hyperproperties of hardware systems
Page 5

This tutorial presents hardware verification techniques for hyperproperties. The most prominent application of hyperproperties is information flow security: information flow policies characterize the secrecy and integrity of a system by comparing two or ...

research-article
A paradigm shift in verification methodology
Page 6

Todays SoCs are driving unprecedented verification complexity. The combination of billions of gates, system-level functionality on a chip, complex design methodologies like asynchronous clock domains and an explosion of untimed paths on a chip, ...

research-article
Program synthesis for networks
Page 7

Software is eating the world. But how will we write all the programs to control everything from sensors to data centers? Program synthesis provides an answer. It increases the productivity of programmers by enabling them to capture their insights in a ...

research-article
The FMCAD 2016 graduate student forum
Page 8

The FMCAD Student Forum provides a platform for graduate students at any career stage to introduce their research to the wider Formal Methods community, and solicit feedback. In 2016, the event took place in Mountain View, California, as integral part ...

research-article
Soundness of the quasi-synchronous abstraction
Pages 9–16

Many critical real-time embedded systems are implemented as a set of processes that execute periodically with bounded jitter and communicate with bounded transmission delay. The quasi-synchronous abstraction was introduced by P. Caspi for model-checking ...

research-article
Synthesizing adaptive test strategies from temporal logic specifications
Pages 17–24

Constructing good test cases is difficult and time-consuming, especially if the system under test is still under development and its exact behavior is not yet fixed. We propose a new approach to compute test cases for reactive systems from a given ...

research-article
Reducing interpolant circuit size by ad-hoc logic synthesis and SAT-based weakening
Pages 25–32

We address the problem of reducing the size of Craig interpolants used in SAT-based Model Checking. Craig interpolants are AND-OR circuits, generated by post-processing refutation proofs of SAT solvers. Whereas it is well known that interpolants are ...

research-article
Extracting behaviour from an executable instruction set model
Pages 33–40

Presenting large formal instruction set models as executable functions makes them accessible to engineers and useful for less formal purposes such as simulation. However, it is more difficult to extract information about the behaviour of individual ...

research-article
Categorical semantics of digital circuits
Pages 41–48

This paper proposes a categorical theory of digital circuits based on monoidal categories and graph rewriting. The main goal of this paper is conceptual: to fill a foundational gap in reasoning about digital circuits, which is currently almost ...

research-article
Equivalence checking by logic relaxation
Pages 49–56

We introduce a new framework for Equivalence Checking (EC) of Boolean circuits based on a general technique called Logic Relaxation (LoR). LoR is meant for checking if a propositional formula G has only "good" satisfying assignments specified by a ...

research-article
Minimal unsatisfiable core extraction for SMT
Pages 57–64

Finding a minimal (i.e., irreducible) unsatisfiable core (MUC), and high-level minimal unsatisfiable core (also known as group MUC, or GMUC), are well-studied problems in the domain of propositional satisfiability. In contrast, in the domain of SMT, no ...

research-article
Efficient uninterpreted function abstraction and refinement for word-level model checking
Pages 65–72

Methods for word-level model checking based on purely bit-level techniques have difficulties with heavy arithmetic logic. Word-level and SMT approaches often are limited by relying on (incomplete) bounded model checking. UFAR, a hybrid word- and bit-...

research-article
Optimizing horn solvers for network repair
Pages 73–80

Automatic program repair modifies a faulty program to make it correct with respect to a specification. Previous approaches have typically been restricted to specific programming languages and a fixed set of syntactical mutation techniques---e.g., ...

research-article
On ∃ ∀ ∃! solving: a case study on automated synthesis of magic card tricks
Pages 81–84

In formal synthesis, the goal is to find a composition of components from a finite library such that the composition satisfies a given logical specification. In this paper, we consider the problem of synthesizing magic card tricks from component actions,...

research-article
Property-directed k-induction
Pages 85–92

IC3 and k-induction are commonly used in automated analysis of infinite-state systems. We present a reformulation of IC3 that separates reachability checking from induction reasoning. This makes the algorithm more modular, and allows us to integrate IC3 ...

research-article
Lazy proofs for DPLL(T)-based SMT solvers
Pages 93–100

With the integration of SMT solvers into analysis frameworks aimed at ensuring a system's end-to-end correctness, having a high level of confidence in these solvers' results has become crucial. For unsatisfiable queries, a reasonable approach is to have ...

research-article
Verifiable hierarchical protocols with network invariants on parametric systems
Pages 101–108

We present Neo, a framework for designing pre-verified protocol components that can be instantiated and connected in an arbitrarily large hierarchy (tree), with a guarantee that the whole system satisfies a given safety property. We employ the idea of ...

research-article
Modular specification and verification of a cache-coherent interface
Pages 109–116

We consider the problem of constructing a modular specification for a cache coherence protocol implementing a weakly consistent shared memory model. That is, we wish to specify the interface between components in a way that, if all components locally ...

research-article
Proof certificates for SMT-based model checkers for infinite-state systems
Pages 117–124

We present a dual technique for generating and verifying proof certificates in SMT-based model checkers, focusing on proofs of invariant properties. Certificates for two major model checking algorithms are extracted as k-inductive invariants, minimized ...

research-article
Routing under constraints
Pages 125–132

Routing is an essential stage in physical design, where already placed components are connected by wires. Routing must satisfy various manufacturing requirements, referred to as design rules. We formalize the problem of design-rule-aware routing and ...

research-article
A consistency checker for memory subsystem traces
Pages 133–140

Verifying the memory subsystem in a modern shared-memory multiprocessor is a big challenge. Optimized implementations are highly sophisticated, yet must provide subtle consistency and liveness guarantees for the correct execution of concurrent programs. ...

research-article
Hybrid partial order reduction with under-approximate dynamic points-to and determinacy information
Pages 141–148

Verification techniques for concurrent systems are often based on systematic state space traversal. An important piece of such techniques is partial order reduction (POR). Many algorithms of POR have been already developed, each having specific ...

research-article
Formal verification of division and square root implementations, an Oracle report
Pages 149–152

Oracle has developed new implementations for integer division and floating-point division and square root. Our task was to verify the correctness of the new designs by formally proving equivalence between the RTL for these designs and their ...

research-article
Integrating proxy theories and numeric model lifting for floating-point arithmetic
Pages 153–160

Precise reasoning for floating-point arithmetic (FPA) is as critical for accurate software analysis as it is hard to achieve. Several recent approaches reduce solving an FPA formula f to reasoning over a related but easier-to-solve proxy theory. The ...

research-article
Trustworthy specifications of ARM® v8-A and v8-M system level architecture
Pages 161–168

Processor specifications are of critical importance for verifying programs, compilers, operating systems/hypervisors, and, of course, for verifying microprocessors themselves. But to be useful, the scope of these specifications must be sufficient for ...

research-article
Equivalence checking using Gröbner bases
Pages 169–176

Motivated by the recent success of the algebraic computation technique in formal verification of large and optimized gate-level multipliers, this paper proposes algebraic equivalence checking for handling circuits that contain both complex arithmetic ...

Contributors
  • Yale University
  • Intel Corporation
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations