• Publications
  • Influence
A Fast Linear-Arithmetic Solver for DPLL(T)
TLDR
A new Simplex-based linear arithmetic solver that can be integrated efficiently in the DPLL(T) framework by enabling fast backtracking, supporting a priori simplification to reduce the problem size, and providing an efficient form of theory propagation. Expand
The YICES SMT Solver
SMT stands for Satisfiability Modulo Theories. An SMT solver decides the satisfiability of propositionally complex formulas in theories such as arithmetic and uninterpreted functions with equality.Expand
Yices 2.2
TLDR
The latest release of Yices is described, namely, Yices 2.2.0, which presents the tool's architecture and discusses the algorithms it implements, and describes recent developments such as support for the SMT-LIBa 2.0 notation and various performance improvements. Expand
Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust
TLDR
Using initial trust built from a small set of shared keys, low-cost protocols enable neighboring sensors to authenticate and establish secure local links and are applied to secure a perimeter monitoring application. Expand
Integrating Simplex with DPLL(T )
TLDR
A new Simplex-based linear arithmetic solver that can be integrated efficiently in the DPLL(T ) framework and is even competitive with state-of-the-art tools specialized for the difference logic fragment is presented. Expand
Modeling and Verification of a Fault-Tolerant Real-Time Startup Protocol Using Calendar Automata
TLDR
A new modeling framework based on event calendars enables dense timed systems to be described without relying on continuously varying clocks and is applied to the fault-tolerant real-time startup protocol used in the Timed Triggered Architecture. Expand
A Tutorial on Satisfiability Modulo Theories
TLDR
This tutorial presentation is primarily directed at those who wish to build satisfiability solvers or to use existing solvers more effectively. Expand
Using Model-based Intrusion Detection for SCADA Networks
In a model-based intrusion detection approach for protecting SCADA networks, we construct models that characterize the expected/acceptable behavior of the system, and detect attacks that causeExpand
Timed Systems in SAL
Property-directed k-induction
TLDR
This work presents a reformulation of IC3 that separates reachability checking from induction reasoning, and calls this new method property-directed k-induction (PD-KIND), which is shown to be more powerful than regular induction. Expand
...
1
2
3
4
5
...