Skip to main content

Showing 1–36 of 36 results for author: Alipour, M A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.14200  [pdf, ps, other

    cs.SE

    Capturing the Effects of Quantization on Trojans in Code LLMs

    Authors: Aftab Hussain, Sadegh AlMahdi Kazemi Zarkouei, Md Rafiqul Islam Rabin, Mohammad Amin Alipour, Sen Lin, Bowen Xu

    Abstract: Large language models of code exhibit high capability in performing diverse software engineering tasks, such as code translation, defect detection, text-to-code generation, and code summarization. While their ability to enhance developer productivity has spurred widespread use, these models have also seen substantial growth in size, often reaching billions of parameters. This scale demands efficie… ▽ More

    Submitted 20 May, 2025; originally announced May 2025.

  2. arXiv:2504.18691  [pdf, other

    cs.HC cs.AI cs.SE

    From Prompts to Propositions: A Logic-Based Lens on Student-LLM Interactions

    Authors: Ali Alfageeh, Sadegh AlMahdi Kazemi Zarkouei, Daye Nam, Daniel Prol, Matin Amoozadeh, Souti Chattopadhyay, James Prather, Paul Denny, Juho Leinonen, Michael Hilton, Sruti Srinivasa Ragavan, Mohammad Amin Alipour

    Abstract: Background and Context. The increasing integration of large language models (LLMs) in computing education presents an emerging challenge in understanding how students use LLMs and craft prompts to solve computational tasks. Prior research has used both qualitative and quantitative methods to analyze prompting behavior, but these approaches lack scalability or fail to effectively capture the semant… ▽ More

    Submitted 25 April, 2025; originally announced April 2025.

  3. arXiv:2408.12416  [pdf, other

    cs.SE cs.LG

    Unlearning Trojans in Large Language Models: A Comparison Between Natural Language and Source Code

    Authors: Mahdi Kazemi, Aftab Hussain, Md Rafiqul Islam Rabin, Mohammad Amin Alipour, Sen Lin

    Abstract: This work investigates the application of Machine Unlearning (MU) for mitigating the impact of trojans embedded in conventional large language models of natural language (Text-LLMs) and large language models of code (Code-LLMs) We propose a novel unlearning approach, LYA, that leverages both gradient ascent and elastic weight consolidation, a Fisher Information Matrix (FIM) based regularization te… ▽ More

    Submitted 22 August, 2024; originally announced August 2024.

  4. arXiv:2407.05202  [pdf, other

    cs.SE cs.AI

    Harnessing the Power of LLMs: Automating Unit Test Generation for High-Performance Computing

    Authors: Rabimba Karanjai, Aftab Hussain, Md Rafiqul Islam Rabin, Lei Xu, Weidong Shi, Mohammad Amin Alipour

    Abstract: Unit testing is crucial in software engineering for ensuring quality. However, it's not widely used in parallel and high-performance computing software, particularly scientific applications, due to their smaller, diverse user base and complex logic. These factors make unit testing challenging and expensive, as it requires specialized knowledge and existing automated tools are often ineffective.… ▽ More

    Submitted 6 July, 2024; originally announced July 2024.

  5. arXiv:2407.00305  [pdf, other

    cs.HC

    Student-AI Interaction: A Case Study of CS1 students

    Authors: Matin Amoozadeh, Daye Nam, Daniel Prol, Ali Alfageeh, James Prather, Michael Hilton, Sruti Srinivasa Ragavan, Mohammad Amin Alipour

    Abstract: The new capabilities of generative artificial intelligence tools Generative AI, such as ChatGPT, allow users to interact with the system in intuitive ways, such as simple conversations, and receive (mostly) good-quality answers. These systems can support students' learning objectives by providing accessible explanations and examples even with vague queries. At the same time, they can encourage und… ▽ More

    Submitted 10 October, 2024; v1 submitted 29 June, 2024; originally announced July 2024.

    Comments: Koli Calling 2024

  6. arXiv:2406.04452  [pdf, ps, other

    cs.HC

    Revisiting Human Information Foraging: Adaptations for LLM-based Chatbots

    Authors: Sruti Srinivasa Ragavan, Mohammad Amin Alipour

    Abstract: Information Foraging Theory's (IFT) framing of human information seeking choices as decision-theoretic cost-value judgments has successfully explained how people seek information among linked patches of information (e.g., linked webpages). However, the theory has to be adopted and validated in non-patchy LLM-based chatbot environments, before its postulates can be reliably applied to the design of… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

  7. Measuring Impacts of Poisoning on Model Parameters and Embeddings for Large Language Models of Code

    Authors: Aftab Hussain, Md Rafiqul Islam Rabin, Mohammad Amin Alipour

    Abstract: Large language models (LLMs) have revolutionized software development practices, yet concerns about their safety have arisen, particularly regarding hidden backdoors, aka trojans. Backdoor attacks involve the insertion of triggers into training data, allowing attackers to manipulate the behavior of the model maliciously. In this paper, we focus on analyzing the model parameters to detect potential… ▽ More

    Submitted 19 May, 2024; originally announced May 2024.

    Comments: This work has been accepted at the 1st ACM International Conference on AI-powered Software (AIware), co-located with the ACM International Conference on the Foundations of Software Engineering (FSE) 2024, Porto de Galinhas, Brazil. arXiv admin note: substantial text overlap with arXiv:2402.12936

  8. arXiv:2405.02828  [pdf, other

    cs.SE cs.LG

    Trojans in Large Language Models of Code: A Critical Review through a Trigger-Based Taxonomy

    Authors: Aftab Hussain, Md Rafiqul Islam Rabin, Toufique Ahmed, Bowen Xu, Premkumar Devanbu, Mohammad Amin Alipour

    Abstract: Large language models (LLMs) have provided a lot of exciting new capabilities in software development. However, the opaque nature of these models makes them difficult to reason about and inspect. Their opacity gives rise to potential security risks, as adversaries can train and deploy compromised models to disrupt the software development process in the victims' organization. This work presents… ▽ More

    Submitted 5 May, 2024; originally announced May 2024.

    Comments: arXiv admin note: substantial text overlap with arXiv:2305.03803

  9. arXiv:2403.10968  [pdf

    cs.CR cs.AI cs.LG

    Enhancing IoT Security Against DDoS Attacks through Federated Learning

    Authors: Ghazaleh Shirvani, Saeid Ghasemshirazi, Mohammad Ali Alipour

    Abstract: The rapid proliferation of the Internet of Things (IoT) has ushered in transformative connectivity between physical devices and the digital realm. Nonetheless, the escalating threat of Distributed Denial of Service (DDoS) attacks jeopardizes the integrity and reliability of IoT networks. Conventional DDoS mitigation approaches are ill-equipped to handle the intricacies of IoT ecosystems, potential… ▽ More

    Submitted 16 March, 2024; originally announced March 2024.

  10. arXiv:2402.16896  [pdf, other

    cs.CR cs.LG cs.SE

    On Trojan Signatures in Large Language Models of Code

    Authors: Aftab Hussain, Md Rafiqul Islam Rabin, Mohammad Amin Alipour

    Abstract: Trojan signatures, as described by Fields et al. (2021), are noticeable differences in the distribution of the trojaned class parameters (weights) and the non-trojaned class parameters of the trojaned model, that can be used to detect the trojaned model. Fields et al. (2021) found trojan signatures in computer vision classification tasks with image models, such as, Resnet, WideResnet, Densenet, an… ▽ More

    Submitted 7 March, 2024; v1 submitted 23 February, 2024; originally announced February 2024.

    Comments: This work has been accepted at the International Conference on Learning Representations 2024 Workshop on Secure and Trustworthy Large Language Models, SeT LLM @ ICLR 2024 (Vienna, Austria)

  11. arXiv:2402.12936  [pdf, other

    cs.SE

    Measuring Impacts of Poisoning on Model Parameters and Neuron Activations: A Case Study of Poisoning CodeBERT

    Authors: Aftab Hussain, Md Rafiqul Islam Rabin, Navid Ayoobi, Mohammad Amin Alipour

    Abstract: Large language models (LLMs) have revolutionized software development practices, yet concerns about their safety have arisen, particularly regarding hidden backdoors, aka trojans. Backdoor attacks involve the insertion of triggers into training data, allowing attackers to manipulate the behavior of the model maliciously. In this paper, we focus on analyzing the model parameters to detect potential… ▽ More

    Submitted 5 March, 2024; v1 submitted 20 February, 2024; originally announced February 2024.

  12. arXiv:2312.04004  [pdf, other

    cs.SE

    Occlusion-based Detection of Trojan-triggering Inputs in Large Language Models of Code

    Authors: Aftab Hussain, Md Rafiqul Islam Rabin, Toufique Ahmed, Mohammad Amin Alipour, Bowen Xu

    Abstract: Large language models (LLMs) are becoming an integrated part of software development. These models are trained on large datasets for code, where it is hard to verify each data point. Therefore, a potential attack surface can be to inject poisonous data into the training data to make models vulnerable, aka trojaned. It can pose a significant threat by hiding manipulative behaviors inside models, le… ▽ More

    Submitted 10 December, 2023; v1 submitted 6 December, 2023; originally announced December 2023.

  13. arXiv:2311.14850  [pdf, other

    cs.SE

    TrojanedCM: A Repository of Trojaned Large Language Models of Code

    Authors: Aftab Hussain, Md Rafiqul Islam Rabin, Mohammad Amin Alipour

    Abstract: With the rapid growth of research in trojaning deep neural models of source code, we observe that there is a need of developing a benchmark trojaned models for testing various trojan detection and unlearning techniques. In this work, we aim to provide the scientific community with diverse trojaned code models, that cover a variety of state-of-the-art architectures, on which they can examine such t… ▽ More

    Submitted 11 December, 2023; v1 submitted 24 November, 2023; originally announced November 2023.

  14. arXiv:2310.04631  [pdf, other

    cs.HC

    Trust in Generative AI among students: An Exploratory Study

    Authors: Matin Amoozadeh, David Daniels, Daye Nam, Aayush Kumar, Stella Chen, Michael Hilton, Sruti Srinivasa Ragavan, Mohammad Amin Alipour

    Abstract: Generative artificial systems (GenAI) have experienced exponential growth in the past couple of years. These systems offer exciting capabilities, such as generating programs, that students can well utilize for their learning. Among many dimensions that might affect the effective adoption of GenAI, in this paper, we investigate students' \textit{trust}. Trust in GenAI influences the extent to which… ▽ More

    Submitted 1 February, 2024; v1 submitted 6 October, 2023; originally announced October 2023.

    Comments: Accepted at SIGCSE 2024

  15. arXiv:2309.03582  [pdf

    cs.CR

    Zero Trust: Applications, Challenges, and Opportunities

    Authors: Saeid Ghasemshirazi, Ghazaleh Shirvani, Mohammad Ali Alipour

    Abstract: The escalating complexity of cybersecurity threats necessitates innovative approaches to safeguard digital assets and sensitive information. The Zero Trust paradigm offers a transformative solution by challenging conventional security models and emphasizing continuous verification and least privilege access. This survey comprehensively explores the theoretical foundations, practical implementation… ▽ More

    Submitted 7 September, 2023; originally announced September 2023.

  16. arXiv:2305.03803  [pdf, other

    cs.SE

    A Survey of Trojans in Neural Models of Source Code: Taxonomy and Techniques

    Authors: Aftab Hussain, Md Rafiqul Islam Rabin, Toufique Ahmed, Navid Ayoobi, Bowen Xu, Prem Devanbu, Mohammad Amin Alipour

    Abstract: In this work, we study literature in Explainable AI and Safe AI to understand poisoning of neural models of code. In order to do so, we first establish a novel taxonomy for Trojan AI for code, and present a new aspect-based classification of triggers in neural models of code. Next, we highlight recent works that help us deepen our conception of how these models understand software code. Then we pi… ▽ More

    Submitted 18 April, 2024; v1 submitted 5 May, 2023; originally announced May 2023.

  17. arXiv:2303.04942  [pdf, other

    cs.LG cs.PL cs.SE

    A Study of Variable-Role-based Feature Enrichment in Neural Models of Code

    Authors: Aftab Hussain, Md Rafiqul Islam Rabin, Bowen Xu, David Lo, Mohammad Amin Alipour

    Abstract: Although deep neural models substantially reduce the overhead of feature engineering, the features readily available in the inputs might significantly impact training cost and the performance of the models. In this paper, we explore the impact of an unsuperivsed feature enrichment approach based on variable roles on the performance of neural models of code. The notion of variable roles (as introdu… ▽ More

    Submitted 12 March, 2023; v1 submitted 8 March, 2023; originally announced March 2023.

    Comments: Accepted in the 1st International Workshop on Interpretability and Robustness in Neural Software Engineering (InteNSE'23), Co-located with ICSE

  18. Study of Distractors in Neural Models of Code

    Authors: Md Rafiqul Islam Rabin, Aftab Hussain, Sahil Suneja, Mohammad Amin Alipour

    Abstract: Finding important features that contribute to the prediction of neural models is an active area of research in explainable AI. Neural models are opaque and finding such features sheds light on a better understanding of their predictions. In contrast, in this work, we present an inverse perspective of distractor features: features that cast doubt about the prediction by affecting the model's confid… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

    Comments: The 1st International Workshop on Interpretability and Robustness in Neural Software Engineering, Co-located with ICSE (InteNSE'23)

  19. arXiv:2210.01739  [pdf

    cs.CR cs.CY cs.NI

    Enabling a Zero Trust Architecture in a 5G-enabled Smart Grid

    Authors: Mohammad Ali Alipour, Saeid Ghasemshirazi, Ghazaleh Shirvani

    Abstract: One of the most promising applications of the IoT is the Smart Grid (SG). Integrating SG's data communications network into the power grid allows gathering and analyzing information from power lines, distribution power stations, and end users. A smart grid (SG) requires a prompt and dependable connection to provide real-time monitoring through the IoT. Hence 5G could be considered a catalyst for u… ▽ More

    Submitted 21 October, 2022; v1 submitted 4 October, 2022; originally announced October 2022.

  20. arXiv:2205.14374  [pdf, other

    cs.SE cs.LG cs.PL

    Syntax-Guided Program Reduction for Understanding Neural Code Intelligence Models

    Authors: Md Rafiqul Islam Rabin, Aftab Hussain, Mohammad Amin Alipour

    Abstract: Neural code intelligence (CI) models are opaque black-boxes and offer little insight on the features they use in making predictions. This opacity may lead to distrust in their prediction and hamper their wider adoption in safety-critical applications. Recently, input program reduction techniques have been proposed to identify key features in the input programs to improve the transparency of CI mod… ▽ More

    Submitted 14 June, 2022; v1 submitted 28 May, 2022; originally announced May 2022.

    Comments: The 6th ACM SIGPLAN International Symposium on Machine Programming (MAPS'22); Related to arXiv:2202.06474

  21. arXiv:2112.13297  [pdf, other

    cs.SE

    DIAR: Removing Uninteresting Bytes from Seeds in Software Fuzzing

    Authors: Aftab Hussain, Mohammad Amin Alipour

    Abstract: Software fuzzing mutates bytes in the test seeds to explore different behaviors of the program under test. Initial seeds can have great impact on the performance of a fuzzing campaign. Mutating a lot of uninteresting bytes in a large seed wastes the fuzzing resources. In this paper, we present the preliminary results of our approach that aims to improve the performance of fuzzers through identifyi… ▽ More

    Submitted 25 December, 2021; originally announced December 2021.

  22. arXiv:2112.13207  [pdf, other

    cs.SE

    FMViz: Visualizing Tests Generated by AFL at the Byte-level

    Authors: Aftab Hussain, Mohammad Amin Alipour

    Abstract: Software fuzzing is a strong testing technique that has become the de facto approach for automated software testing and software vulnerability detection in the industry. The random nature of fuzzing makes monitoring and understanding the behavior of fuzzers difficult. In this paper, we report the development of Fuzzer Mutation Visualizer (FMViz), a tool that focuses on visualizing byte-level mutat… ▽ More

    Submitted 25 December, 2021; originally announced December 2021.

  23. Code2Snapshot: Using Code Snapshots for Learning Representations of Source Code

    Authors: Md Rafiqul Islam Rabin, Mohammad Amin Alipour

    Abstract: There are several approaches for encoding source code in the input vectors of neural models. These approaches attempt to include various syntactic and semantic features of input programs in their encoding. In this paper, we investigate Code2Snapshot, a novel representation of the source code that is based on the snapshots of input programs. We evaluate several variations of this representation and… ▽ More

    Submitted 1 February, 2023; v1 submitted 1 November, 2021; originally announced November 2021.

    Comments: The 21st IEEE International Conference on Machine Learning and Applications (ICMLA'22)

  24. Memorization and Generalization in Neural Code Intelligence Models

    Authors: Md Rafiqul Islam Rabin, Aftab Hussain, Mohammad Amin Alipour, Vincent J. Hellendoorn

    Abstract: Deep Neural Networks (DNNs) are increasingly being used in software engineering and code intelligence tasks. These are powerful tools that are capable of learning highly generalizable patterns from large datasets through millions of parameters. At the same time, their large capacity can render them prone to memorizing data points. Recent work suggests that the memorization risk manifests especiall… ▽ More

    Submitted 12 September, 2022; v1 submitted 16 June, 2021; originally announced June 2021.

    Comments: Information and Software Technology, IST Journal 2022, Elsevier

  25. arXiv:2106.03353  [pdf, other

    cs.SE cs.LG cs.PL

    Understanding Neural Code Intelligence Through Program Simplification

    Authors: Md Rafiqul Islam Rabin, Vincent J. Hellendoorn, Mohammad Amin Alipour

    Abstract: A wide range of code intelligence (CI) tools, powered by deep neural networks, have been developed recently to improve programming productivity and perform program analysis. To reliably use such tools, developers often need to reason about the behavior of the underlying models and the factors that affect them. This is especially challenging for tools backed by deep neural networks. Various methods… ▽ More

    Submitted 9 September, 2021; v1 submitted 7 June, 2021; originally announced June 2021.

    Comments: The 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE'21)

  26. arXiv:2012.10662  [pdf, other

    cs.SE cs.LG cs.PL

    Configuring Test Generators using Bug Reports: A Case Study of GCC Compiler and Csmith

    Authors: Md Rafiqul Islam Rabin, Mohammad Amin Alipour

    Abstract: The correctness of compilers is instrumental in the safety and reliability of other software systems, as bugs in compilers can produce executables that do not reflect the intent of programmers. Such errors are difficult to identify and debug. Random test program generators are commonly used in testing compilers, and they have been effective in uncovering bugs. However, the problem of guiding these… ▽ More

    Submitted 18 March, 2021; v1 submitted 19 December, 2020; originally announced December 2020.

    Comments: The 36th ACM/SIGAPP Symposium on Applied Computing, Software Verification and Testing Track (SAC-SVT'21)

  27. arXiv:2008.13064  [pdf, other

    cs.LG cs.PL cs.SE stat.ML

    Towards Demystifying Dimensions of Source Code Embeddings

    Authors: Md Rafiqul Islam Rabin, Arjun Mukherjee, Omprakash Gnawali, Mohammad Amin Alipour

    Abstract: Source code representations are key in applying machine learning techniques for processing and analyzing programs. A popular approach in representing source code is neural source code embeddings that represents programs with high-dimensional vectors computed by training deep neural networks on a large volume of programs. Although successful, there is little known about the contents of these vector… ▽ More

    Submitted 28 September, 2020; v1 submitted 29 August, 2020; originally announced August 2020.

    Comments: 1st ACM SIGSOFT International Workshop on Representation Learning for Software Engineering and Program Languages, Co-located with ESEC/FSE (RL+SE&PL'20)

  28. On the Generalizability of Neural Program Models with respect to Semantic-Preserving Program Transformations

    Authors: Md Rafiqul Islam Rabin, Nghi D. Q. Bui, Ke Wang, Yijun Yu, Lingxiao Jiang, Mohammad Amin Alipour

    Abstract: With the prevalence of publicly available source code repositories to train deep neural network models, neural program models can do well in source code analysis tasks such as predicting method names in given programs that cannot be easily done by traditional program analysis techniques. Although such neural program models have been tested on various existing datasets, the extent to which they gen… ▽ More

    Submitted 18 March, 2021; v1 submitted 31 July, 2020; originally announced August 2020.

    Comments: Information and Software Technology, IST Journal 2021, Elsevier. Related to arXiv:2004.07313

  29. arXiv:2004.07313  [pdf, other

    cs.SE cs.LG cs.PL

    Evaluation of Generalizability of Neural Program Analyzers under Semantic-Preserving Transformations

    Authors: Md Rafiqul Islam Rabin, Mohammad Amin Alipour

    Abstract: The abundance of publicly available source code repositories, in conjunction with the advances in neural networks, has enabled data-driven approaches to program analysis. These approaches, called neural program analyzers, use neural networks to extract patterns in the programs for tasks ranging from development productivity to program reasoning. Despite the growing popularity of neural program ana… ▽ More

    Submitted 18 March, 2021; v1 submitted 15 April, 2020; originally announced April 2020.

    Comments: Related to arXiv:2008.01566

  30. arXiv:1908.10711  [pdf, other

    cs.LG cs.PL cs.SE stat.ML

    Testing Neural Program Analyzers

    Authors: Md Rafiqul Islam Rabin, Ke Wang, Mohammad Amin Alipour

    Abstract: Deep neural networks have been increasingly used in software engineering and program analysis tasks. They usually take a program and make some predictions about it, e.g., bug prediction. We call these models neural program analyzers. The reliability of neural programs can impact the reliability of the encompassing analyses. In this paper, we describe our ongoing efforts to develop effective techni… ▽ More

    Submitted 25 September, 2019; v1 submitted 25 August, 2019; originally announced August 2019.

    Comments: ASE 2019 Late Breaking Results

  31. arXiv:1908.10481  [pdf, other

    cs.SE cs.LG cs.PL

    K-CONFIG: Using Failing Test Cases to Generate Test Cases in GCC Compilers

    Authors: Md Rafiqul Islam Rabin, Mohammad Amin Alipour

    Abstract: The correctness of compilers is instrumental in the safety and reliability of other software systems, as bugs in compilers can produce programs that do not reflect the intents of programmers. Compilers are complex software systems due to the complexity of optimization. GCC is an optimizing C compiler that has been used in building operating systems and many other system software. In this paper, we… ▽ More

    Submitted 27 August, 2019; originally announced August 2019.

    Comments: ASE 2019 Late Breaking Results

  32. arXiv:1902.06384  [pdf, ps, other

    cs.HC

    Topics of Concern: Identifying User Issues in Reviews of IoT Apps and Devices

    Authors: Andrew Truelove, Farah Naz Chowdhury, Omprakash Gnawali, Mohammad Amin Alipour

    Abstract: Internet of Things (IoT) systems are bundles of networked sensors and actuators that are deployed in an environment and act upon the sensory data that they receive. These systems, especially consumer electronics, have two main cooperating components: a device and a mobile app. The unique combination of hardware and software in IoT systems presents challenges that are lesser known to mainstream sof… ▽ More

    Submitted 29 March, 2019; v1 submitted 17 February, 2019; originally announced February 2019.

    Comments: 1st International Workshop on Software Engineering Research & Practices for the Internet of Things (SERP4IoT 2019)

  33. arXiv:1902.06193  [pdf, other

    cs.HC cs.CL

    An Automated Testing Framework for Conversational Agents

    Authors: Soodeh Atefi, Mohammad Amin Alipour

    Abstract: Conversational agents are systems with a conversational interface that afford interaction in spoken language. These systems are becoming prevalent and are preferred in various contexts and for many users. Despite their increasing success, the automated testing infrastructure to support the effective and efficient development of such systems compared to traditional software systems is still limited… ▽ More

    Submitted 16 February, 2019; originally announced February 2019.

    Comments: work in progress

  34. arXiv:1611.01501  [pdf, other

    cs.SE

    Data Poisoning: Lightweight Soft Fault Injection for Python

    Authors: Mohammad Amin Alipour, Alex Groce

    Abstract: This paper introduces and explores the idea of data poisoning, a light-weight peer-architecture technique to inject faults into Python programs. This method requires very small modification to the original program, which facilitates evaluation of sensitivity of systems that are prototyped or modeled in Python. We propose different fault scenarios that can be injected to programs using data poisoni… ▽ More

    Submitted 4 November, 2016; originally announced November 2016.

    Comments: Draft- 6 pages

    ACM Class: D.4.5

  35. arXiv:1610.08020  [pdf, ps, other

    cs.SE

    Bounded Model Checking and Feature Omission Diversity

    Authors: Mohammad Amin Alipour, Alex Groce

    Abstract: In this paper we introduce a novel way to speed up the discovery of counterexamples in bounded model checking, based on parallel runs over versions of a system in which features have been randomly disabled. As shown in previous work, adding constraints to a bounded model checking problem can reduce the size of the verification problem and dramatically decrease the time required to find counterexam… ▽ More

    Submitted 20 September, 2016; originally announced October 2016.

    Comments: 5 pages

    ACM Class: D.2.4

  36. arXiv:1609.06382  [pdf, other

    cs.SE cs.LO cs.PL

    Finding Model-Checkable Needles in Large Source Code Haystacks: Modular Bug-Finding via Static Analysis and Dynamic Invariant Discovery

    Authors: Mohammad Amin Alipour, Alex Groce, Chaoqiang Zhang, Anahita Sanadaji, Gokul Caushik

    Abstract: In this paper, we present a novel marriage of static and dynamic analysis. Given a large code base with many functions and a mature test suite, we propose using static analysis to find functions 1) with assertions or other evident correctness properties (e.g., array bounds requirements or pointer access) and 2) with simple enough control flow and data use to be amenable to predicate-abstraction ba… ▽ More

    Submitted 20 September, 2016; originally announced September 2016.

    Comments: 6 pages

    ACM Class: D.2.4; D.2.5