Skip to main content

Showing 1–6 of 6 results for author: Tarrach, T

.
  1. arXiv:2210.03207  [pdf, other

    cs.CR cs.FL cs.LO

    Threat Repair with Optimization Modulo Theories

    Authors: Thorsten Tarrach, Masoud Ebrahimi, Sandra König, Christoph Schmittner, Roderick Bloem, Dejan Nickovic

    Abstract: We propose a model-based procedure for automatically preventing security threats using formal models. We encode system models and potential threats as satisfiability modulo theory (SMT) formulas. This model allows us to ask security questions as satisfiability queries. We formulate threat prevention as an optimization problem over the same formulas. The outcome of our threat prevention procedure i… ▽ More

    Submitted 6 October, 2022; originally announced October 2022.

  2. arXiv:2107.09986  [pdf, other

    cs.CR

    The analysis approach of ThreatGet

    Authors: Korbinian Christl, Thorsten Tarrach

    Abstract: Nowadays, almost all electronic devices include a communication interface that allows to interact with them, exchange data, or operate their services remotely. The trend toward increased interconnectivity simultaneously increases the vulnerability of these systems. Due to the high costs associated with comprehensive security analysis, many manufacturers neglect the safety aspect of a product in or… ▽ More

    Submitted 21 July, 2021; originally announced July 2021.

    Comments: This report gives a formal syntax and semantics of the analysis language used by the tool ThreatGet (www.threatget.com), developed and maintained by the AIT Austrian Institute of Technology

  3. arXiv:1911.06355  [pdf, other

    cs.FL

    Language Inclusion for Finite Prime Event Structures

    Authors: Andreas Fellner, Thorsten Tarrach, Georg Weissenbacher

    Abstract: We study the problem of language inclusion between finite, labeled prime event structures. Prime event structures are a formalism to compactly represent concurrent behavior of discrete systems. A labeled prime event structure induces a language of sequences of labels produced by the represented system. We study the problem of deciding inclusion and membership for languages encoded by finite prime… ▽ More

    Submitted 14 November, 2019; originally announced November 2019.

    Comments: 20 pages main text, 35 pages total

  4. arXiv:1511.07163  [pdf, other

    cs.PL

    Optimizing Solution Quality in Synchronization Synthesis

    Authors: Pavol Černý, Edmund M. Clarke, Thomas A. Henzinger, Arjun Radhakrishna, Leonid Ryzhyk, Roopsha Samanta, Thorsten Tarrach

    Abstract: Given a multithreaded program written assuming a friendly, non-preemptive scheduler, the goal of synchronization synthesis is to automatically insert synchronization primitives to ensure that the modified program behaves correctly, even with a preemptive scheduler. In this work, we focus on the quality of the synthesized solution: we aim to infer synchronization placements that not only ensure cor… ▽ More

    Submitted 23 November, 2015; originally announced November 2015.

  5. arXiv:1505.04533  [pdf, ps, other

    cs.PL

    From Non-preemptive to Preemptive Scheduling using Synchronization Synthesis

    Authors: Pavol Černý, Edmund M. Clarke, Thomas A. Henzinger, Arjun Radhakrishna, Leonid Ryzhyk, Roopsha Samanta, Thorsten Tarrach

    Abstract: We present a computer-aided programming approach to concurrency. The approach allows programmers to program assuming a friendly, non-preemptive scheduler, and our synthesis procedure inserts synchronization to ensure that the final program works even with a preemptive scheduler. The correctness specification is implicit, inferred from the non-preemptive behavior. Let us consider sequences of calls… ▽ More

    Submitted 18 May, 2015; originally announced May 2015.

    Comments: Liss is published as open-source at https://github.com/thorstent/Liss, Computer Aided Verification 2015

  6. Regression-free Synthesis for Concurrency

    Authors: Pavol Černý, Thomas A. Henzinger, Arjun Radhakrishna, Leonid Ryzhyk, Thorsten Tarrach

    Abstract: While fixing concurrency bugs, program repair algorithms may introduce new concurrency bugs. We present an algorithm that avoids such regressions. The solution space is given by a set of program transformations we consider in for repair process. These include reordering of instructions within a thread and inserting atomic sections. The new algorithm learns a constraint on the space of candidate so… ▽ More

    Submitted 14 July, 2014; originally announced July 2014.

    Comments: for source code see https://github.com/thorstent/ConRepair

    Journal ref: Computer Aided Verification, Lecture Notes in Computer Science Volume 8559, 2014, pp 568-584