Conference
Basilisk: Using Provenance Invariants to Automate Proofs of Undecidable Protocols
Basilisk: Using Provenance Invariants to Automate Proofs of Undecidable Protocols
Instability Track for SMT-COMP
Context Pruning for More Robust SMT-based Program Verification
FlowCert: Translation Validation for Asynchronous Dataflow via Dynamic Fractional Permissions
MSWasm: Soundly Enforcing Memory-Safe Execution of Unsafe Code
Owl: Compositional Verification of Security Protocols via an Information-Flow Type System
Degradation Attacks on Certifiably Robust Neural Networks