Skip to main content

Showing 1–18 of 18 results for author: Christakis, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.14400  [pdf, other

    cs.LO

    Verifying Global Two-Safety Properties in Neural Networks with Confidence

    Authors: Anagha Athavale, Ezio Bartocci, Maria Christakis, Matteo Maffei, Dejan Nickovic, Georg Weissenbacher

    Abstract: We present the first automated verification technique for confidence-based 2-safety properties, such as global robustness and global fairness, in deep neural networks (DNNs). Our approach combines self-composition to leverage existing reachability analysis techniques and a novel abstraction of the softmax function, which is amenable to automated verification. We characterize and prove the soundnes… ▽ More

    Submitted 17 June, 2024; v1 submitted 23 May, 2024; originally announced May 2024.

    Comments: Accepted at the 36th International Conference on Computer Aided Verification, 2024

  2. arXiv:2405.11514  [pdf, other

    cs.SE

    Towards Translating Real-World Code with LLMs: A Study of Translating to Rust

    Authors: Hasan Ferit Eniser, Hanliang Zhang, Cristina David, Meng Wang, Maria Christakis, Brandon Paulsen, Joey Dodds, Daniel Kroening

    Abstract: Large language models (LLMs) show promise in code translation - the task of translating code written in one programming language to another language - due to their ability to write code in most programming languages. However, LLM's effectiveness on translating real-world code remains largely unstudied. In this work, we perform the first substantial study on LLM-based translation to Rust by assessi… ▽ More

    Submitted 21 May, 2024; v1 submitted 19 May, 2024; originally announced May 2024.

    Comments: 11 pages, 12 figures

  3. arXiv:2309.12813  [pdf, other

    cs.SE cs.LG cs.PL

    Automatically Testing Functional Properties of Code Translation Models

    Authors: Hasan Ferit Eniser, Valentin Wüstholz, Maria Christakis

    Abstract: Large language models are becoming increasingly practical for translating code across programming languages, a process known as $transpiling$. Even though automated transpilation significantly boosts developer productivity, a key concern is whether the generated code is correct. Existing work initially used manually crafted test suites to test the translations of a small corpus of programs; these… ▽ More

    Submitted 29 January, 2024; v1 submitted 7 September, 2023; originally announced September 2023.

    Comments: 13 pages including appendix and references

  4. arXiv:2305.17518  [pdf, other

    cs.AI cs.CY

    Synthesizing a Progression of Subtasks for Block-Based Visual Programming Tasks

    Authors: Alperen Tercan, Ahana Ghosh, Hasan Ferit Eniser, Maria Christakis, Adish Singla

    Abstract: Block-based visual programming environments play an increasingly important role in introducing computing concepts to K-12 students. In recent years, they have also gained popularity in neuro-symbolic AI, serving as a benchmark to evaluate general problem-solving and logical reasoning skills. The open-ended and conceptual nature of these visual programming tasks make them challenging, both for stat… ▽ More

    Submitted 27 May, 2023; originally announced May 2023.

  5. arXiv:2206.06054  [pdf, other

    cs.LG cs.SE

    Specifying and Testing $k$-Safety Properties for Machine-Learning Models

    Authors: Maria Christakis, Hasan Ferit Eniser, Jörg Hoffmann, Adish Singla, Valentin Wüstholz

    Abstract: Machine-learning models are becoming increasingly prevalent in our lives, for instance assisting in image-classification or decision-making tasks. Consequently, the reliability of these models is of critical importance and has resulted in the development of numerous approaches for validating and verifying their robustness and fairness. However, beyond such specific properties, it is challenging to… ▽ More

    Submitted 13 June, 2022; originally announced June 2022.

  6. arXiv:2107.08583  [pdf, other

    cs.SE

    Compositional Verification of Smart Contracts Through Communication Abstraction (Extended)

    Authors: Scott Wesley, Maria Christakis, Jorge A. Navas, Richard Trefler, Valentin Wüstholz, Arie Gurfinkel

    Abstract: Solidity smart contracts are programs that manage up to 2^160 users on a blockchain. Verifying a smart contract relative to all users is intractable due to state explosion. Existing solutions either restrict the number of users to under-approximate behaviour, or rely on manual proofs. In this paper, we present local bundles that reduce contracts with arbitrarily many users to sequential programs w… ▽ More

    Submitted 31 August, 2021; v1 submitted 18 July, 2021; originally announced July 2021.

  7. arXiv:2009.13860  [pdf, ps, other

    cs.SE

    Automatically Tailoring Static Analysis to Custom Usage Scenarios

    Authors: Muhammad Numair Mansur, Benjamin Mariano, Maria Christakis, Jorge A. Navas, Valentin Wüstholz

    Abstract: In recent years, there has been significant progress in the development and industrial adoption of static analyzers. Such analyzers typically provide a large, if not huge, number of configurable options controlling the precision and performance of the analysis. A major hurdle in integrating static analyzers in the software-development life cycle is tuning their options to custom usage scenarios, s… ▽ More

    Submitted 30 September, 2020; v1 submitted 29 September, 2020; originally announced September 2020.

  8. arXiv:2006.16913  [pdf, other

    cs.CY cs.AI cs.LG

    Synthesizing Tasks for Block-based Programming

    Authors: Umair Z. Ahmed, Maria Christakis, Aleksandr Efremov, Nigel Fernandez, Ahana Ghosh, Abhik Roychoudhury, Adish Singla

    Abstract: Block-based visual programming environments play a critical role in introducing computing concepts to K-12 students. One of the key pedagogical challenges in these environments is in designing new practice tasks for a student that match a desired level of difficulty and exercise specific programming concepts. In this paper, we formalize the problem of synthesizing visual programming tasks. In part… ▽ More

    Submitted 4 November, 2020; v1 submitted 17 June, 2020; originally announced June 2020.

    Comments: NeurIPS 2020

  9. arXiv:2004.05934  [pdf, other

    cs.SE

    Detecting Critical Bugs in SMT Solvers Using Blackbox Mutational Fuzzing

    Authors: Muhammad Numair Mansur, Maria Christakis, Valentin Wüstholz, Fuyuan Zhang

    Abstract: Formal methods use SMT solvers extensively for deciding formula satisfiability, for instance, in software verification, systematic test generation, and program synthesis. However, due to their complex implementations, solvers may contain critical bugs that lead to unsound results. Given the wide applicability of solvers in software reliability, relying on such unsound results may have detrimental… ▽ More

    Submitted 13 April, 2020; originally announced April 2020.

  10. arXiv:2002.02776  [pdf, other

    cs.LG cs.CR

    RAID: Randomized Adversarial-Input Detection for Neural Networks

    Authors: Hasan Ferit Eniser, Maria Christakis, Valentin Wüstholz

    Abstract: In recent years, neural networks have become the default choice for image classification and many other learning tasks, even though they are vulnerable to so-called adversarial attacks. To increase their robustness against these attacks, there have emerged numerous detection mechanisms that aim to automatically determine if an input is adversarial. However, state-of-the-art detection mechanisms ei… ▽ More

    Submitted 7 February, 2020; originally announced February 2020.

    Comments: 10 pages of content plus 2 pages of bibliography. Submitted to ISSTA

  11. arXiv:1912.02499  [pdf, other

    cs.PL cs.CY cs.LG cs.LO

    Perfectly Parallel Fairness Certification of Neural Networks

    Authors: Caterina Urban, Maria Christakis, Valentin Wüstholz, Fuyuan Zhang

    Abstract: Recently, there is growing concern that machine-learning models, which currently assist or even automate decision making, reproduce, and in the worst case reinforce, bias of the training data. The development of tools and techniques for certifying fairness of these models or describing their biased behavior is, therefore, critical. In this paper, we propose a perfectly parallel static analysis for… ▽ More

    Submitted 21 April, 2020; v1 submitted 5 December, 2019; originally announced December 2019.

  12. arXiv:1910.06296  [pdf, other

    cs.LG

    DeepSearch: A Simple and Effective Blackbox Attack for Deep Neural Networks

    Authors: Fuyuan Zhang, Sankalan Pal Chowdhury, Maria Christakis

    Abstract: Although deep neural networks have been very successful in image-classification tasks, they are prone to adversarial attacks. To generate adversarial inputs, there has emerged a wide variety of techniques, such as black- and whitebox attacks for neural networks. In this paper, we present DeepSearch, a novel fuzzing-based, query-efficient, blackbox attack for image classifiers. Despite its simplici… ▽ More

    Submitted 15 August, 2020; v1 submitted 14 October, 2019; originally announced October 2019.

  13. arXiv:1905.07147  [pdf, other

    cs.SE cs.CR

    Targeted Greybox Fuzzing with Static Lookahead Analysis

    Authors: Valentin Wüstholz, Maria Christakis

    Abstract: Automatic test generation typically aims to generate inputs that explore new paths in the program under test in order to find bugs. Existing work has, therefore, focused on guiding the exploration toward program parts that are more likely to contain bugs by using an offline static analysis. In this paper, we introduce a novel technique for targeted greybox fuzzing using an online static analysis… ▽ More

    Submitted 17 May, 2019; originally announced May 2019.

  14. arXiv:1905.06944  [pdf, other

    cs.SE cs.CR

    Harvey: A Greybox Fuzzer for Smart Contracts

    Authors: Valentin Wüstholz, Maria Christakis

    Abstract: We present Harvey, an industrial greybox fuzzer for smart contracts, which are programs managing accounts on a blockchain. Greybox fuzzing is a lightweight test-generation approach that effectively detects bugs and security vulnerabilities. However, greybox fuzzers randomly mutate program inputs to exercise new paths; this makes it challenging to cover code that is guarded by narrow checks, which… ▽ More

    Submitted 15 May, 2019; originally announced May 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1807.07875

  15. arXiv:1812.05033  [pdf, other

    cs.SE

    Differentially Testing Soundness and Precision of Program Analyzers

    Authors: Christian Klinger, Maria Christakis, Valentin Wüstholz

    Abstract: In the last decades, numerous program analyzers have been developed both by academia and industry. Despite their abundance however, there is currently no systematic way of comparing the effectiveness of different analyzers on arbitrary code. In this paper, we present the first automated technique for differentially testing soundness and precision of program analyzers. We used our technique to comp… ▽ More

    Submitted 16 December, 2018; v1 submitted 12 December, 2018; originally announced December 2018.

  16. arXiv:1807.07875  [pdf, other

    cs.CR cs.SE

    Learning Inputs in Greybox Fuzzing

    Authors: Valentin Wüstholz, Maria Christakis

    Abstract: Greybox fuzzing is a lightweight testing approach that effectively detects bugs and security vulnerabilities. However, greybox fuzzers randomly mutate program inputs to exercise new paths; this makes it challenging to cover code that is guarded by complex checks. In this paper, we present a technique that extends greybox fuzzing with a method for learning new inputs based on already explored pro… ▽ More

    Submitted 20 July, 2018; originally announced July 2018.

  17. arXiv:1807.07822  [pdf, other

    cs.SE cs.PL

    Specification Mining for Smart Contracts with Automatic Abstraction Tuning

    Authors: Florentin Guth, Valentin Wüstholz, Maria Christakis, Peter Müller

    Abstract: Smart contracts are programs that manage digital assets according to a certain protocol, expressing for instance the rules of an auction. Understanding the possible behaviors of a smart contract is difficult, which complicates development, auditing, and the post-mortem analysis of attacks. This paper presents the first specification mining technique for smart contracts. Our technique extracts th… ▽ More

    Submitted 20 July, 2018; originally announced July 2018.

  18. arXiv:1706.04468  [pdf, other

    cs.SE cs.PL

    Failure-Directed Program Trimming (Extended Version)

    Authors: Kostas Ferles, Valentin Wüstholz, Maria Christakis, Isil Dillig

    Abstract: This paper describes a new program simplification technique called program trimming that aims to improve the scalability and precision of safety checking tools. Given a program ${\mathcal P}$, program trimming generates a new program ${\mathcal P}'$ such that ${\mathcal P}$ and ${\mathcal P}'$ are equi-safe (i.e., ${\mathcal P}'$ has a bug if and only if ${\mathcal P}$ has a bug), but… ▽ More

    Submitted 14 June, 2017; originally announced June 2017.