


default search action
25th VMCAI 2024: London, UK - Part II
- Rayna Dimitrova, Ori Lahav
, Sebastian Wolff
:
Verification, Model Checking, and Abstract Interpretation - 25th International Conference, VMCAI 2024, London, United Kingdom, January 15-16, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14500, Springer 2024, ISBN 978-3-031-50520-1
Concurrency
- Matthias Heizmann
, Dominik Klumpp
, Lars Nitzke, Frank Schüssele
:
Petrification: Software Model Checking for Programs with Dynamic Thread Management. 3-25 - Stefan Bodenmüller
, John Derrick
, Brijesh Dongol
, Gerhard Schellhorn
, Heike Wehrheim
:
A Fully Verified Persistency Library. 26-47 - Roman Lakenbrink, Markus Müller-Olm, Christoph Ohrem, Jens Oliver Gutsfeld:
A Navigation Logic for Recursive Programs with Dynamic Thread Creation. 48-70
Neural Networks
- Jiaxu Tian, Dapeng Zhi, Si Liu
, Peixin Wang
, Guy Katz, Min Zhang
:
Taming Reachability Analysis of DNN-Controlled Systems via Abstraction-Based Training. 73-97 - Roie Reshef, Anan Kabaha, Olga Seleznova, Dana Drachsler-Cohen:
Verification of Neural Networks' Local Differential Classification Privacy. 98-123 - Akshay Dhonthi, Marcello Eiermann, Ernst Moritz Hahn, Vahid Hashemi:
AGNES: Abstraction-Guided Framework for Deep Neural Networks Security. 124-138
Probabilistic and Quantum Programs
- Michele Boreale, Luisa Collodi:
Guaranteed Inference for Probabilistic Programs: A Parallelisable, Small-Step Operational Approach. 141-162 - Yuxin Deng, Huiling Wu, Ming Xu:
Local Reasoning About Probabilistic Behaviour for Classical-Quantum Programs. 163-184
Program and System Verification
- Philip Tasche
, Raúl E. Monti
, Stefanie Eva Drerup
, Pauline Blohm
, Paula Herber
, Marieke Huisman
:
Deductive Verification of Parameterized Embedded Systems Modeled in SystemC. 187-209 - Twain Byrnes
, Yoshiki Takashima
, Limin Jia
:
Automatically Enforcing Rust Trait Properties. 210-223 - Takashi Nakayama
, Yusuke Matsushita
, Ken Sakayori
, Ryosuke Sato
, Naoki Kobayashi
:
Borrowable Fractional Ownership Types for Verification. 224-246
Runtime Verification
- Klaus Havelund, Panagiotis Katsaros, Moran Omer, Doron Peled, Anastasios Temperekidis:
TP-DejaVu: Combining Operational and Declarative Runtime Verification. 249-263 - Ritam Raha
, Rajarshi Roy
, Nathanaël Fijalkow
, Daniel Neider
, Guillermo A. Pérez
:
Synthesizing Efficiently Monitorable Formulas in Metric Temporal Logic. 264-288
Security and Privacy
- Joachim Bard, Swen Jacobs, Yakir Vizel:
Automatic and Incremental Repair for Speculative Information Leaks. 291-313 - Francesco Parolini
, Antoine Miné
:
Sound Abstract Nonexploitability Analysis. 314-337

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.