Search Results - "Sagiv, Mooly"

Refine Results
  1. 1

    Temporal prophecy for proving temporal properties of infinite-state systems by Padon, Oded, Hoenicke, Jochen, McMillan, Kenneth L., Podelski, Andreas, Sagiv, Mooly, Shoham, Sharon

    Published in Formal methods in system design (01-08-2021)
    “…Various verification techniques for temporal properties transform temporal verification to safety verification. For infinite-state systems, these…”
    Get full text
    Journal Article
  2. 2

    Bounded Quantifier Instantiation for Checking Inductive Invariants by Yotam M. Y. Feldman, Oded Padon, Neil Immerman, Mooly Sagiv, Sharon Shoham

    Published in Logical methods in computer science (01-01-2019)
    “…We consider the problem of checking whether a proposed invariant $\varphi$ expressed in first-order logic with quantifier alternation is inductive, i.e…”
    Get full text
    Journal Article
  3. 3

    Simulating reachability using first-order logic with applications to verification of linked data structures by Lev-Ami, Tal, Immerman, Neil, Reps, Thomas, Sagiv, Mooly, Srivastava, Siddharth, Yorsh, Greta

    Published in Logical methods in computer science (28-05-2009)
    “…This paper shows how to harness existing theorem provers for first-order logic to automatically verify safety properties of imperative programs that perform…”
    Get full text
    Journal Article
  4. 4

    Relaxed Effective Callback Freedom: A Parametric Correctness Condition for Sequential Modules With Callbacks by Albert, Elvira, Grossman, Shelly, Rinetzky, Noam, Rodriguez-Nunez, Clara, Rubio, Albert, Sagiv, Mooly

    “…Callbacks are an essential mechanism for event-driven programming. Unfortunately, callbacks make reasoning challenging because they introduce behaviors where…”
    Get full text
    Journal Article
  5. 5

    Synthesis of circular compositional program proofs via abduction by Dillig, Isil, Dillig, Thomas, Li, Boyang, McMillan, Ken, Sagiv, Mooly

    “…This paper presents a new technique for synthesizing circular compositional proofs of program correctness. Our technique uses abductive inference to decompose…”
    Get full text
    Journal Article
  6. 6

    Some complexity results for stateful network verification by Alpernas, Kalev, Panda, Aurojit, Rabinovich, Alexander, Sagiv, Mooly, Shenker, Scott, Shoham, Sharon, Velner, Yaron

    Published in Formal methods in system design (01-11-2019)
    “…In modern networks, forwarding of packets often depends on the history of previously transmitted traffic. Such networks contain stateful middleboxes, whose…”
    Get full text
    Journal Article
  7. 7

    Decidable fragments of many-sorted logic by Abadi, Aharon, Rabinovich, Alexander, Sagiv, Mooly

    Published in Journal of symbolic computation (01-02-2010)
    “…Many natural specifications use types. We investigate the decidability of fragments of many-sorted first-order logic. We identified some decidable fragments…”
    Get full text
    Journal Article
  8. 8

    A Decidable Case of Query Determinacy: Project-Select Views by Zhang, Wen, Panda, Aurojit, Sagiv, Mooly, Shenker, Scott

    Published 13-11-2024
    “…Query determinacy is decidable for project-select views and a project-select-join query with no self joins, as long as the selection predicates are in a…”
    Get full text
    Journal Article
  9. 9

    This is not the End: Rethinking Serverless Function Termination by Alpernas, Kalev, Panda, Aurojit, Sagiv, Mooly

    Published 04-11-2022
    “…Elastic scaling is one of the central benefits provided by serverless platforms, and requires that they scale resource up and down in response to changing…”
    Get full text
    Journal Article
  10. 10

    Precise interprocedural dataflow analysis with applications to constant propagation by Sagiv, Mooly, Reps, Thomas, Horwitz, Susan

    Published in Theoretical computer science (01-01-1996)
    “…This paper concerns interprocedural dataflow-analysis problems in which the dataflow information at a program point is represented by an environment (i.e., a…”
    Get full text
    Journal Article
  11. 11

    Summing Up Smart Transitions by Elad, Neta, Rain, Sophie, Immerman, Neil, Kovács, Laura, Sagiv, Mooly

    Published 17-05-2021
    “…Some of the most significant high-level properties of currencies are the sums of certain account balances. Properties of such sums can ensure the integrity of…”
    Get full text
    Journal Article
  12. 12

    Scaling model checking of dataraces using dynamic information by Shacham, Ohad, Sagiv, Mooly, Schuster, Assaf

    “…Dataraces in multithreaded programs often indicate severe bugs and can cause unexpected behaviors when different thread interleavings are executed. Because…”
    Get full text
    Journal Article
  13. 13

    Blockaid: Data Access Policy Enforcement for Web Applications by Zhang, Wen, Sheng, Eric, Chang, Michael, Panda, Aurojit, Sagiv, Mooly, Shenker, Scott

    Published 13-05-2022
    “…Modern web applications serve large amounts of sensitive user data, access to which is typically governed by data-access policies. Enforcing such policies is…”
    Get full text
    Journal Article
  14. 14

    Property-Directed Reachability as Abstract Interpretation in the Monotone Theory by Feldman, Yotam M. Y, Sagiv, Mooly, Shoham, Sharon, Wilcox, James R

    Published 30-10-2021
    “…Inferring inductive invariants is one of the main challenges of formal verification. The theory of abstract interpretation provides a rich framework to devise…”
    Get full text
    Journal Article
  15. 15

    Complexity and Information in Invariant Inference by Feldman, Yotam M. Y, Immerman, Neil, Sagiv, Mooly, Shoham, Sharon

    Published 27-10-2019
    “…This paper addresses the complexity of SAT-based invariant inference, a prominent approach to safety verification. We consider the problem of inferring an…”
    Get full text
    Journal Article
  16. 16

    Phoenix: A Formally Verified Regenerating Vault by Kirstein, Uri, Grossman, Shelly, Mirkin, Michael, Wilcox, James, Eyal, Ittay, Sagiv, Mooly

    Published 02-06-2021
    “…An attacker that gains access to a cryptocurrency user's private keys can perform any operation in her stead. Due to the decentralized nature of most…”
    Get full text
    Journal Article
  17. 17

    Some Complexity Results for Stateful Network Verification by Alpernas, Kalev, Panda, Aurojit, Rabinovich, Alexander, Sagiv, Mooly, Shenker, Scott, Shoham, Sharon, Velner, Yaron

    Published 02-06-2021
    “…Formal Methods in System Design 54 (2019) 191-231 In modern networks, forwarding of packets often depends on the history of previously transmitted traffic…”
    Get full text
    Journal Article
  18. 18

    Temporal Prophecy for Proving Temporal Properties of Infinite-State Systems by Padon, Oded, Hoenicke, Jochen, McMillan, Kenneth L, Podelski, Andreas, Sagiv, Mooly, Shoham, Sharon

    Published 02-06-2021
    “…Various verification techniques for temporal properties transform temporal verification to safety verification. For infinite-state systems, these…”
    Get full text
    Journal Article
  19. 19

    Temporal Prophecy for Proving Temporal Properties of Infinite-State Systems by Padon, Oded, Hoenicke, Jochen, McMillan, Kenneth L., Podelski, Andreas, Sagiv, Mooly, Shoham, Sharon

    “…Various verification techniques for temporal properties transform temporal verification to safety verification. For infinite-state systems, these…”
    Get full text
    Conference Proceeding
  20. 20

    Learning the Boundary of Inductive Invariants by Feldman, Yotam M. Y, Sagiv, Mooly, Shoham, Sharon, Wilcox, James R

    Published 22-08-2020
    “…We study the complexity of invariant inference and its connections to exact concept learning. We define a condition on invariants and their geometry, called…”
    Get full text
    Journal Article