Abstract is missing.
- A Unifying Approach for Control-Flow-Based Loop AbstractionDirk Beyer 0001, Marian Lingsch Rosenfeld, Martin Spiessl. 3-19 [doi]
- Auto-Active Verification of Floating-Point Programs via Nonlinear Real ProversJunaid Rasheed, Michal Konecný. 20-36 [doi]
- Information Exchange Between Over- and Underapproximating Software AnalysesJan Haltermann, Heike Wehrheim. 37-54 [doi]
- A Query Language for Language AnalysisMatteo Cimini. 57-73 [doi]
- Field-Sensitive Program SlicingCarlos Galindo 0002, Jens Krinke, Sergio Pérez 0001, Josep Silva. 74-90 [doi]
- SPouT: Symbolic Path Recording During Testing - A Concolic Executor for the JVMMalte Mues, Falk Howar, Simon Dierl. 91-107 [doi]
- Cooperation Between Automatic and Interactive Software VerifiersDirk Beyer 0001, Martin Spiessl, Sven Umbricht. 111-128 [doi]
- Strategy Switching: Smart Fault-Tolerance for Weakly-Hard Resource-Constrained Real-Time ApplicationsLukas Miedema, Clemens Grelck. 129-145 [doi]
- A Program Slicer for Java (Tool Paper)Carlos Galindo 0002, Sergio Pérez 0001, Josep Silva. 146-151 [doi]
- Constrained Training of Recurrent Neural Networks for Automata LearningBernhard K. Aichernig, Sandra König, Cristinel Mateis, Andrea Pferscher, Dominik Schmidt, Martin Tappler. 155-172 [doi]
- Neural Network Verification Using Residual ReasoningYizhak Yisrael Elboher, Elazar Cohen, Guy Katz. 173-189 [doi]
- Training Agents to Satisfy Timed and Untimed Signal Temporal Logic Specifications with Reinforcement LearningNathaniel Hamilton, Preston Robinette, Taylor T. Johnson. 190-206 [doi]
- Information Flow Control-by-Construction for an Object-Oriented LanguageTobias Runge, Alexander Kittelmann, Marco Servetto, Alex Potanin, Ina Schaefer. 209-226 [doi]
- Specification is Law: Safe Creation and Upgrade of Ethereum Smart ContractsPedro Antonino, Juliandson Ferreira, Augusto Sampaio, A. W. Roscoe 0001. 227-243 [doi]
- SKLEE: A Dynamic Symbolic Analysis Tool for Ethereum Smart Contracts (Tool Paper)Namrata Jain, Kosuke Kaneko, Subodh Sharma 0001. 244-250 [doi]
- Weighted Games for User JourneysPaul Kobialka, Silvia Lizeth Tapia Tarifa, Gunnar Rye Bergersen, Einar Broch Johnsen. 253-270 [doi]
- Safety Controller Synthesis for a Mobile Manufacturing CobotIoannis Stefanakos, Radu Calinescu, James A. Douthwaite, Jonathan M. Aitken, James Law. 271-287 [doi]
- Timely Specification Repair for Alloy 6Jorge Cerqueira, Alcino Cunha, Nuno Macedo. 288-303 [doi]
- BehaVerify: Verifying Temporal Logic Specifications for Behavior TreesBernard Serbinowski, Taylor T. Johnson. 307-323 [doi]
- CHA: Supporting SVA-Like Assertions in Formal Verification of Chisel Programs (Tool Paper)Shizhen Yu, Yifan Dong, Jiuyang Liu, Yong Li 0031, Zhilin Wu, David N. Jansen, Lijun Zhang 0001. 324-331 [doi]
- Runtime Verification with Imperfect Information Through Indistinguishability RelationsAngelo Ferrando 0001, Vadim Malvone. 335-351 [doi]
- Runtime Enforcement for IEC 61499 ApplicationsYliès Falcone, Irman Faqrizal, Gwen Salaün. 352-368 [doi]