2017
DOI: 10.1007/978-3-319-66845-1_20
|View full text |Cite
|
Sign up to set email alerts
|

SemSlice: Exploiting Relational Verification for Automatic Program Slicing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 16 publications
0
9
0
Order By: Relevance
“…We start the discussion by reiterating the evaluation results of the implementation of the framework consisting of the tool SemSlice [5], as shown in Table 1. For the evaluation, we used a collection of small but intricate examples (e.g., the example of Fig.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…We start the discussion by reiterating the evaluation results of the implementation of the framework consisting of the tool SemSlice [5], as shown in Table 1. For the evaluation, we used a collection of small but intricate examples (e.g., the example of Fig.…”
Section: Discussionmentioning
confidence: 99%
“…A solution for dealing with language complexity is to perform the analysis on a simpler, intermediate representation. While the implementation of our slicing framework [5] works on LLVM IR [1] programs, to keep the definitions in this paper easy to understand, we here use a language whose computational model is similar to that of LLVM IR but that has only four instructions: skip, halt, assign, and jnz . We formalize the notions of slice candidate, slicing criterion and valid slice using a computation model based on a register machine with an unbounded number of registers.…”
Section: Static Backward Slicingmentioning
confidence: 99%
See 1 more Smart Citation
“…Relational properties are useful when reasoning about program refinement, approximation, equivalence, provenance, as well as many notions of security. A great many relational program analyses have been proposed in the recent literature, including works by Antonopoulos et al (2017); Asada et al (2016); Banerjee et al (2016); Barthe et al (2012Barthe et al ( , 2013bBarthe et al ( , 2014Barthe et al ( , 2015; Beckert et al ( , 2017; Benton et al (2009); Ştefan ; Godlin and Strichman (2010); Hedin and Sabelfeld (2012); Kundu et al (2009); Küsters et al (2015); Yang (2007); Zaks and Pnueli (2008); Murray et al (2013); Fehrenbach and Cheney (2016); Bauereiß et al (2016Bauereiß et al ( , 2017; and Çiçek et al (2017). While some systems have been designed for the efficient verification of specialized relational properties of programs (notably information-flow type systems, e.g., Sabelfeld and Myers (2003a)), others support larger classes of properties.…”
Section: Introductionmentioning
confidence: 99%
“…Trust and accountability requirements for a smart contract can be expressed through a combination of authority algebra and FOL [87]. Correctness of smart contracts is also successfully verified using a dynamic logic developed for Java programs [14,48,49]. Last but not least, formalisms that are based on deontic logic enable analysis over legal smart contracts, which are challenging to formalize otherwise [172].…”
Section: Program Logicsmentioning
confidence: 99%