• Publications
  • Influence
Solving Non-linear Arithmetic
TLDR
We present a new algorithm for deciding satisfiability of non-linear arithmetic constraints that uses projection operators adapted from cylindrical algebraic decomposition to guide the search away from the conflicting states. Expand
  • 125
  • 11
A Model-Constructing Satisfiability Calculus
TLDR
We present a model-constructing satisfiability calculus where recent model-based decision procedures and techniques can be justified and combined with the standard DPLLT approach to satisfiability modulo theories. Expand
  • 77
  • 10
  • PDF
Property-directed k-induction
TLDR
We present a reformulation of IC3 that separates reachability checking from induction reasoning and allows us to integrate k-induction into the method. Expand
  • 28
  • 7
  • PDF
Polite Theories Revisited
TLDR
The classic method of Nelson and Oppen for combining decision procedures requires the theories to be stably-infinite. Expand
  • 25
  • 6
  • PDF
solc-verify: A Modular Verifier for Solidity Smart Contracts
TLDR
We present solc-verify, a source-level verification tool for Ethereum smart contracts written in Solidity and discharges verification conditions using modular program analysis and SMT solvers. Expand
  • 27
  • 5
  • PDF
Cutting to the Chase Solving Linear Integer Arithmetic
TLDR
We describe a new algorithm for solving linear integer programming problems. Expand
  • 62
  • 4
  • PDF
Template-based circuit understanding
When verifying or reverse-engineering digital circuits, one often wants to identify and understand small components in a larger system. A possible approach is to show that the sub-circuit underExpand
  • 34
  • 4
  • PDF
Logical Analysis of Hash Functions
TLDR
We report on a novel approach for uniform encoding of hash functions (but also other cryptographic functions) into propositional logic formulae, and reducing cryptanalysis problems to the satisfiability problem. Expand
  • 33
  • 4
  • PDF
Solving non-linear arithmetic
TLDR
We propose a new decision procedure for the existential theory of the reals. Expand
  • 107
  • 3
  • PDF
Safety envelope for security
TLDR
We present an approach for detecting sensor spoofing attacks on a cyber-physical system. Expand
  • 44
  • 3
  • PDF
...
1
2
3
4
...