Filters








25,124 Hits in 3.6 sec

A Framework for the Verification of Certifying Computations

Eyad Alkassar, Sascha Böhme, Kurt Mehlhorn, Christine Rizkallah
2013 Journal of automated reasoning  
The verification of checkers is feasible with current tools and leads to computations that can be completely trusted. We describe a framework to seamlessly verify certifying computations.  ...  Certifying algorithms compute in addition to each output a witness certifying that the output is correct.  ...  Moreover, we thank Lars Noschinski for developing a powerful graph library in Isabelle/HOL.  ... 
doi:10.1007/s10817-013-9289-2 fatcat:m5yhhyinprewdd6cc44zrks55y

A Framework for the Verification of Certifying Computations [article]

Eyad Alkassar and Sascha Böhme and Kurt Mehlhorn and Christine Rizkallah
2013 arXiv   pre-print
The verification of checkers is feasible with current tools and leads to computations that can be completely trusted. We describe a framework to seamlessly verify certifying computations.  ...  Certifying algorithms compute in addition to each output a witness certifying that the output is correct.  ...  Moreover, we thank Lars Noschinski for developing a powerful graph library in Isabelle/HOL.  ... 
arXiv:1301.7462v1 fatcat:25jkpadgqrblbnr4jqrsxwjipq

A component-based framework for certification of components in a cloud of HPC services

Allberson Bruno de Oliveira Dantas, Francisco Heron de Carvalho Junior, Luis Soares Barbosa
2020 Science of Computer Programming  
This paper presents a Verification-as-a-Service (VaaS) framework for component certification on HPC Shelf.  ...  The certification framework is naturally based on parallel computing techniques to speed up verification tasks.  ...  C4: certifiers for computation components Using the certification framework introduced in Section 3, a class of certifiers for computation components, called C4, is proposed.  ... 
doi:10.1016/j.scico.2019.102379 fatcat:edpmeirlxbdmzgl4gfp5tepoie

On the Feasibility of Byzantine Agreement to Secure Fog/Edge Data Management [chapter]

Ali Shoker, Houssam Yactine
2021 Advances in Information Security  
This paper presents a Verification-as-a-Service (VaaS) framework for component certification on HPC Shelf.  ...  The certification framework is naturally based on parallel computing techniques to speed up verification tasks.  ...  C4: certifiers for computation components Using the certification framework introduced in Section 3, a class of certifiers for computation components, called C4, is proposed.  ... 
doi:10.1007/978-3-030-57328-7_5 fatcat:7bbgcsplazb7bi2cjopwaxdql4

Can pruning improve certified robustness of neural networks? [article]

Zhangheng Li, Tianlong Chen, Linyi Li, Bo Li, Zhangyang Wang
2022 arXiv   pre-print
This paper for the first time demonstrates that pruning can generally improve certified robustness for ReLU-based NNs under the complete verification setting.  ...  Using the popular Branch-and-Bound (BaB) framework, we find that pruning can enhance the estimated bound tightness of certified robustness verification, by alleviating linear relaxation and sub-domain  ...  To this end, a series of verifiers based on the BaB framework were recently proposed for efficient and parallelizable complete verification.  ... 
arXiv:2206.07311v2 fatcat:eylsuhltjjcgpndurehodmwqgq

How to Evaluate the Security of Real-Life Cryptographic Protocols? [chapter]

Shin'ichiro Matsuo, Kunihiko Miyazaki, Akira Otsuka, David Basin
2010 Lecture Notes in Computer Science  
This is a serious problem as many protocols proposed in the past have failed to achieve their stated security properties. In this paper, we propose a framework for certifying cryptographic protocols.  ...  As a case study in the application of our proposal, we also present the plan for the open evaluation of entityauthentication protocols within the CRYPTREC project.  ...  As explained in the previous section, ISO/IEC 29128 is a framework for certifying cryptographic protocols using formal verification methods.  ... 
doi:10.1007/978-3-642-14992-4_16 fatcat:tywbtwtxmndxzi4mbomwryprvu

Testing and certification of trustworthy systems introduction to minitrack

A.R. Hevner, R.C. Linger, G.H. Walton
2004 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the  
The paper introduces a framework for reasoning about and certifying online adaptive systems. In Breeding Software Test Cases for Complex Systems, authors A. Watkins, D. Berndt, K. Aebischer, J.  ...  In their paper A Multi-layered Approach to Security in High Assurance System Development, authors Jim Alves-Foss, Carol Taylor, and Paul Oman present a framework for design and verification of embedded  ... 
doi:10.1109/hicss.2004.1265706 dblp:conf/hicss/HevnerLW04 fatcat:ja5ohw56wre5tpdvswv5rs7npy

Testing and certification of trustworthy systems introduction to minitrack

A.R. Hevner, R.C. Linger, G. Walton
2003 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the  
The paper introduces a framework for reasoning about and certifying online adaptive systems. In Breeding Software Test Cases for Complex Systems, authors A. Watkins, D. Berndt, K. Aebischer, J.  ...  In their paper A Multi-layered Approach to Security in High Assurance System Development, authors Jim Alves-Foss, Carol Taylor, and Paul Oman present a framework for design and verification of embedded  ... 
doi:10.1109/hicss.2003.1174913 dblp:conf/hicss/HevnerLW03 fatcat:rkbmhi7rmvaeff45m3mp7kkvjy

On Constructing Dynamic and Forward Secure Authenticated Group Key Agreement Scheme from Multikey Encapsulation Mechanism

Iraj Fathirad, John Devlin
2015 The Scientific World Journal  
To enrich thismKEM-based GAKE construction, we suggest an efficient solution to convert this static GAKE framework into a partially dynamic scheme.  ...  In spite of the limitations of this approach, for example, lack of forward secrecy, it is very useful in group environments when maximum communication efficiency is desirable.  ...  Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper.  ... 
doi:10.1155/2015/275496 pmid:26451388 pmcid:PMC4588352 fatcat:n7mp22mvafepvgywwdjcadna3u

3DVerifier: Efficient Robustness Verification for 3D Point Cloud Models [article]

Ronghui Mu, Wenjie Ruan, Leandro S. Marcolino, Qiang Ni
2022 arXiv   pre-print
propagation to compute the certified bounds of the outputs of the point cloud models.  ...  Notably, our approach achieves an orders-of-magnitude improvement in verification efficiency for the large network, and the obtained certified bounds are also significantly tighter than the state-of-the-art  ...  Some works focus on computing a certified lower bound for the .  ... 
arXiv:2207.07539v1 fatcat:tixof4gl6naovpu7uwoigdh3hy

Verification of Certifying Computations through AutoCorres and Simpl [chapter]

Lars Noschinski, Christine Rizkallah, Kurt Mehlhorn
2014 Lecture Notes in Computer Science  
Certifying algorithms compute not only an output, but also a witness that certifies the correctness of the output for a particular input.  ...  We re-verify the checker for connectedness of graphs and present a verification of the LEDA checker for nonplanarity of graphs.  ...  Acknowledgement We thank David Greenaway and Thomas Sewell for their advice on using AutoCorres.  ... 
doi:10.1007/978-3-319-06200-6_4 fatcat:inwj5x43pzbljd5bcwrd4fjgsq

A Framework for Certified Program Analysis and Its Applications to Mobile-Code Safety [chapter]

Bor-Yuh Evan Chang, Adam Chlipala, George C. Necula
2005 Lecture Notes in Computer Science  
At the core of the framework is a novel technique for automatically extracting Coq proof-assistant specifications from ML implementations of program analyses, while preserving to a large extent the structure  ...  We present a framework whose purpose is to simplify the development of certified program analyses without compromising the run-time efficiency of the analyses.  ...  [24] is the most similar with respect to the overall goal of our work-that of providing a realistic framework for certified program analyses.  ... 
doi:10.1007/11609773_12 fatcat:jmfa4odzovcsva2a7bpgukznpu

Clean-Slate Development of Certified OS Kernels

Zhong Shao
2015 Proceedings of the 2015 Conference on Certified Programs and Proofs - CPP '15  
We advocate a modular certification framework for kernel components, which mirrors and enhances the modularity of the kernel itself.  ...  We propose a new open framework for supporting certified low-level programming and cross-abstraction linking of heterogenous components.  ...  This way, the OCAP-style certified linking can be supported and the trusted computing base of the verification process is kept at a minimum.  ... 
doi:10.1145/2676724.2693180 dblp:conf/cpp/Shao15 fatcat:ffiwrhqsdnbcflselj27eevbre

Towards a Runtime Verification Framework for the Ada Programming Language [chapter]

André de Matos Pedro, David Pereira, Luís Miguel Pinho, Jorge Sousa Pinto
2014 Lecture Notes in Computer Science  
"Towards a Runtime Verification Framework for the Ada Programming Language".  ...  in deductive reasoning, even with recent advances in SAT and SMT solvers. • Most of the data important to certify a real-time embedded system is related to extra-functional properties: • Duration of tasks  ... 
doi:10.1007/978-3-319-08311-7_6 fatcat:hiijc4gtpzdmzjm6ijeqwafccy

Fast Training of Provably Robust Neural Networks by SingleProp

Akhilan Boopathy, Lily Weng, Sijia Liu, Pin-Yu Chen, Gaoyuan Zhang, Luca Daniel
2021 PROCEEDINGS OF THE THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE TWENTY-EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE  
Through experiments on MNIST and CIFAR-10 we demonstrate improvements in training speed and comparable certified accuracy compared to state-of-the-art certified defenses.  ...  However, these techniques can be computationally costly due to the use of certification during training.  ...  We have conducted a comprehensive comparison on SingleProp and current SOTA most efficient certified training framework, IBP, in terms of the training schedules, verifiers and complementary verification  ... 
doi:10.1609/aaai.v35i8.16840 fatcat:ieowif2j4rcsll5l5htobccvd4
« Previous Showing results 1 — 15 out of 25,124 results