Skip to main content

Showing 1–50 of 79 results for author: Cordeiro, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.17862  [pdf, other

    cs.LO

    ESBMC v7.6: Enhanced Model Checking of C++ Programs with Clang AST

    Authors: Xianzhiyu Li, Kunjian Song, Mikhail R. Gadelha, Franz Brauße, Rafael S. Menezes, Konstantin Korovin, Lucas C. Cordeiro

    Abstract: This paper presents Efficient SMT-Based Context-Bounded Model Checker (ESBMC) v7.6, an extended version based on previous work on ESBMC v7.3 by K. Song et al. The v7.3 introduced a new Clang-based C++ front-end to address the challenges posed by modern C++ programs. Although the new front-end has demonstrated significant potential in previous studies, it remains in the developmental stage and lack… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

    Comments: 27 pages, 2 figures. arXiv admin note: substantial text overlap with arXiv:2308.05649

  2. arXiv:2406.15281  [pdf, ps, other

    cs.SE

    Interval Analysis in Industrial-Scale BMC Software Verifiers: A Case Study

    Authors: Rafael Sá Menezes, Edoardo Manino, Fedor Shmarov, Mohannad Aldughaim, Rosiane de Freitas, Lucas C. Cordeiro

    Abstract: Bounded Model Checking (BMC) is a widely used software verification technique. Despite its successes, the technique has several limiting factors, from state-space explosion to lack of completeness. Over the years, interval analysis has repeatedly been proposed as a partial solution to these limitations. In this work, we evaluate whether the computational cost of interval analysis yields significan… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

    Comments: Submitted to IFM

  3. arXiv:2406.04375  [pdf, other

    cs.SE

    Verifying components of Arm(R) Confidential Computing Architecture with ESBMC

    Authors: Tong Wu, Shale Xiong, Edoardo Manino, Gareth Stockwell, Lucas C. Cordeiro

    Abstract: Realm Management Monitor (RMM) is an essential firmware component within the recent Arm Confidential Computing Architecture (Arm CCA). Previous work applies formal techniques to verify the specification and prototype reference implementation of RMM. However, relying solely on a single verification tool may lead to the oversight of certain bugs or vulnerabilities. This paper discusses the applicati… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

  4. arXiv:2405.08848  [pdf, other

    cs.SE cs.AI

    Automated Repair of AI Code with Large Language Models and Formal Verification

    Authors: Yiannis Charalambous, Edoardo Manino, Lucas C. Cordeiro

    Abstract: The next generation of AI systems requires strong safety guarantees. This report looks at the software implementation of neural networks and related memory safety properties, including NULL pointer deference, out-of-bound access, double-free, and memory leaks. Our goal is to detect these vulnerabilities, and automatically repair them with the help of large language models. To this end, we first ex… ▽ More

    Submitted 14 May, 2024; originally announced May 2024.

  5. arXiv:2405.00558  [pdf, other

    cs.NI

    Cross-Cluster Networking to Support Extended Reality Services

    Authors: Theodoros Theodoropoulos, Luis Rosa, Abderrahmane Boudi, Tarik Zakaria Benmerar, Antonios Makris, Tarik Taleb, Luis Cordeiro, Konstantinos Tserpes, JaeSeung Song

    Abstract: Extented Reality (XR) refers to a class of contemporary services that are intertwined with a plethora of rather demanding Quality of Service (QoS) and functional requirements. Despite Kubernetes being the de-facto standard in terms of deploying and managing contemporary containerized microservices, it lacks adequate support for cross-cluster networking, hindering service-to-service communication a… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

  6. arXiv:2404.18353  [pdf, other

    cs.CR cs.AI cs.PL

    Do Neutral Prompts Produce Insecure Code? FormAI-v2 Dataset: Labelling Vulnerabilities in Code Generated by Large Language Models

    Authors: Norbert Tihanyi, Tamas Bisztray, Mohamed Amine Ferrag, Ridhi Jain, Lucas C. Cordeiro

    Abstract: This study provides a comparative analysis of state-of-the-art large language models (LLMs), analyzing how likely they generate vulnerabilities when writing simple C programs using a neutral zero-shot prompt. We address a significant gap in the literature concerning the security properties of code produced by these models without specific directives. N. Tihanyi et al. introduced the FormAI dataset… ▽ More

    Submitted 28 April, 2024; originally announced April 2024.

  7. arXiv:2404.09384  [pdf, other

    cs.SE cs.AI cs.CL cs.LG

    Tasks People Prompt: A Taxonomy of LLM Downstream Tasks in Software Verification and Falsification Approaches

    Authors: Víctor A. Braberman, Flavia Bonomo-Braberman, Yiannis Charalambous, Juan G. Colonna, Lucas C. Cordeiro, Rosiane de Freitas

    Abstract: Prompting has become one of the main approaches to leverage emergent capabilities of Large Language Models [Brown et al. NeurIPS 2020, Wei et al. TMLR 2022, Wei et al. NeurIPS 2022]. During the last year, researchers and practitioners have been playing with prompts to see how to make the most of LLMs. By homogeneously dissecting 80 papers, we investigate in deep how software testing and verificati… ▽ More

    Submitted 14 April, 2024; originally announced April 2024.

    ACM Class: F.3.1; D.2.4; D.2.5; I.2.7

  8. arXiv:2404.06031  [pdf, other

    cs.CR

    FuSeBMC AI: Acceleration of Hybrid Approach through Machine Learning

    Authors: Kaled M. Alshmrany, Mohannad Aldughaim, Chenfeng Wei, Tom Sweet, Richard Allmendinger, Lucas C. Cordeiro

    Abstract: We present FuSeBMC-AI, a test generation tool grounded in machine learning techniques. FuSeBMC-AI extracts various features from the program and employs support vector machine and neural network models to predict a hybrid approach optimal configuration. FuSeBMC-AI utilizes Bounded Model Checking and Fuzzing as back-end verification engines. FuSeBMC-AI outperforms the default configuration of the u… ▽ More

    Submitted 9 April, 2024; originally announced April 2024.

  9. arXiv:2403.08027  [pdf, other

    cs.LG

    McCatch: Scalable Microcluster Detection in Dimensional and Nondimensional Datasets

    Authors: Braulio V. Sánchez Vinces, Robson L. F. Cordeiro, Christos Faloutsos

    Abstract: How could we have an outlier detector that works even with nondimensional data, and ranks together both singleton microclusters ('one-off' outliers) and nonsingleton microclusters by their anomaly scores? How to obtain scores that are principled in one scalable and 'hands-off' manner? Microclusters of outliers indicate coalition or repetition in fraud activities, etc.; their identification is thus… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

    Comments: \c{opyright} 2024 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

  10. arXiv:2312.14746  [pdf, ps, other

    cs.SE

    ESBMC v7.4: Harnessing the Power of Intervals

    Authors: Rafael Menezes, Mohannad Aldughaim, Bruno Farias, Xianzhiyu Li, Edoardo Manino, Fedor Shmarov, Kunjian Song, Franz Brauße, Mikhail R. Gadelha, Norbert Tihanyi, Konstantin Korovin, Lucas C. Cordeiro

    Abstract: ESBMC implements many state-of-the-art techniques for model checking. We report on new and improved features that allow us to obtain verification results for previously unsupported programs and properties. ESBMC employs a new static interval analysis of expressions in programs to increase verification performance. This includes interval-based reasoning over booleans and integers, forward and backw… ▽ More

    Submitted 22 December, 2023; originally announced December 2023.

  11. arXiv:2311.05281  [pdf, other

    cs.CR cs.SE

    Finding Software Vulnerabilities in Open-Source C Projects via Bounded Model Checking

    Authors: Janislley Oliveira de Sousa, Bruno Carvalho de Farias, Thales Araujo da Silva, Eddie Batista de Lima Filho, Lucas C. Cordeiro

    Abstract: Computer-based systems have solved several domain problems, including industrial, military, education, and wearable. Nevertheless, such arrangements need high-quality software to guarantee security and safety as both are mandatory for modern software products. We advocate that bounded model-checking techniques can efficiently detect vulnerabilities in general software systems. However, such an app… ▽ More

    Submitted 9 November, 2023; originally announced November 2023.

    Comments: 27 pages, submitted to STTT journal

  12. arXiv:2309.03617  [pdf, other

    cs.SE cs.AI cs.CR

    NeuroCodeBench: a plain C neural network benchmark for software verification

    Authors: Edoardo Manino, Rafael Sá Menezes, Fedor Shmarov, Lucas C. Cordeiro

    Abstract: Safety-critical systems with neural network components require strong guarantees. While existing neural network verification techniques have shown great progress towards this goal, they cannot prove the absence of software faults in the network implementation. This paper presents NeuroCodeBench - a verification benchmark for neural network code written in plain C. It contains 32 neural networks wi… ▽ More

    Submitted 7 September, 2023; originally announced September 2023.

    Comments: Submitted to the 2023 AFRiTS workshop

  13. arXiv:2308.05649  [pdf, other

    cs.LO

    ESBMC v7.3: Model Checking C++ Programs using Clang AST

    Authors: Kunjian Song, Mikhail R. Gadelha, Franz Brauße, Rafael S. Menezes, Lucas C. Cordeiro

    Abstract: This paper introduces ESBMC v7.3, the latest Efficient SMT-Based Context-Bounded Model Checker version, which now incorporates a new clang-based C++ front-end. While the previous CPROVER-based front-end served well for handling C++03 programs, it encountered challenges kee** up with the evolving C++ language. As new language and library features were added in each C++ version, the limitations of… ▽ More

    Submitted 10 August, 2023; originally announced August 2023.

  14. arXiv:2307.06616  [pdf, other

    cs.CR cs.AI

    SecureFalcon: Are We There Yet in Automated Software Vulnerability Detection with LLMs?

    Authors: Mohamed Amine Ferrag, Ammar Battah, Norbert Tihanyi, Ridhi Jain, Diana Maimut, Fatima Alwahedi, Thierry Lestable, Narinderjit Singh Thandi, Abdechakour Mechri, Merouane Debbah, Lucas C. Cordeiro

    Abstract: Software vulnerabilities can cause numerous problems, including crashes, data loss, and security breaches. These issues greatly compromise quality and can negatively impact the market adoption of software applications and systems. Traditional bug-fixing methods, such as static analysis, often produce false positives. While bounded model checking, a form of Formal Verification (FV), can provide mor… ▽ More

    Submitted 29 May, 2024; v1 submitted 13 July, 2023; originally announced July 2023.

  15. arXiv:2307.04501  [pdf, other

    cs.CR cs.CE

    A Privacy-Preserving and Accountable Billing Protocol for Peer-to-Peer Energy Trading Markets

    Authors: Kamil Erdayandi, Lucas C. Cordeiro, Mustafa A. Mustafa

    Abstract: This paper proposes a privacy-preserving and accountable billing (PA-Bill) protocol for trading in peer-to-peer energy markets, addressing situations where there may be discrepancies between the volume of energy committed and delivered. Such discrepancies can lead to challenges in providing both privacy and accountability while maintaining accurate billing. To overcome these challenges, a universa… ▽ More

    Submitted 11 September, 2023; v1 submitted 10 July, 2023; originally announced July 2023.

    Comments: 6-pages, 1 Figure, Accepted for International Conference on Smart Energy Systems and Technologies (SEST2023)

  16. The FormAI Dataset: Generative AI in Software Security Through the Lens of Formal Verification

    Authors: Norbert Tihanyi, Tamas Bisztray, Ridhi Jain, Mohamed Amine Ferrag, Lucas C. Cordeiro, Vasileios Mavroeidis

    Abstract: This paper presents the FormAI dataset, a large collection of 112, 000 AI-generated compilable and independent C programs with vulnerability classification. We introduce a dynamic zero-shot prompting technique constructed to spawn diverse programs utilizing Large Language Models (LLMs). The dataset is generated by GPT-3.5-turbo and comprises programs with varying levels of complexity. Some program… ▽ More

    Submitted 28 March, 2024; v1 submitted 5 July, 2023; originally announced July 2023.

    Comments: https://github.com/FormAI-Dataset PLEASE USE PUBLISHED VERSION FOR CITATION: https://doi.org/10.1145/3617555.3617874

    Journal ref: PROMISE 2023: Proceedings of the 19th International Conference on Predictive Models and Data Analytics in Software Engineering December 2023 Pages 33 to 43

  17. arXiv:2306.14263  [pdf, other

    cs.CR cs.AI

    Revolutionizing Cyber Threat Detection with Large Language Models: A privacy-preserving BERT-based Lightweight Model for IoT/IIoT Devices

    Authors: Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, Lucas C. Cordeiro, Merouane Debbah, Thierry Lestable, Narinderjit Singh Thandi

    Abstract: The field of Natural Language Processing (NLP) is currently undergoing a revolutionary transformation driven by the power of pre-trained Large Language Models (LLMs) based on groundbreaking Transformer architectures. As the frequency and diversity of cybersecurity attacks continue to rise, the importance of incident detection has significantly increased. IoT devices are expanding rapidly, resultin… ▽ More

    Submitted 8 February, 2024; v1 submitted 25 June, 2023; originally announced June 2023.

    Comments: This paper has been accepted for publication in IEEE Access: http://dx.doi.org/10.1109/ACCESS.2024.3363469

  18. arXiv:2306.13793  [pdf, other

    cs.LG cs.NE

    QNNRepair: Quantized Neural Network Repair

    Authors: Xidan Song, Youcheng Sun, Mustafa A. Mustafa, Lucas C. Cordeiro

    Abstract: We present QNNRepair, the first method in the literature for repairing quantized neural networks (QNNs). QNNRepair aims to improve the accuracy of a neural network model after quantization. It accepts the full-precision and weight-quantized neural networks and a repair dataset of passing and failing tests. At first, QNNRepair applies a software fault localization method to identify the neurons tha… ▽ More

    Submitted 10 September, 2023; v1 submitted 23 June, 2023; originally announced June 2023.

  19. arXiv:2306.10309  [pdf, other

    cs.CR

    Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses

    Authors: Mohamed Amine Ferrag, Othmane Friha, Burak Kantarci, Norbert Tihanyi, Lucas Cordeiro, Merouane Debbah, Djallel Hamouda, Muna Al-Hawawreh, Kim-Kwang Raymond Choo

    Abstract: The ongoing deployment of the fifth generation (5G) wireless networks constantly reveals limitations concerning its original concept as a key driver of Internet of Everything (IoE) applications. These 5G challenges are behind worldwide efforts to enable future networks, such as sixth generation (6G) networks, to efficiently support sophisticated applications ranging from autonomous driving capabil… ▽ More

    Submitted 8 February, 2024; v1 submitted 17 June, 2023; originally announced June 2023.

    Comments: This paper has been accepted for publication in IEEE Communications Surveys \& Tutorials

  20. arXiv:2305.14752  [pdf, other

    cs.SE cs.AI cs.FL cs.LG

    A New Era in Software Security: Towards Self-Healing Software via Large Language Models and Formal Verification

    Authors: Norbert Tihanyi, Ridhi Jain, Yiannis Charalambous, Mohamed Amine Ferrag, Youcheng Sun, Lucas C. Cordeiro

    Abstract: This paper introduces an innovative approach that combines Large Language Models (LLMs) with Formal Verification strategies for automatic software vulnerability repair. Initially, we employ Bounded Model Checking (BMC) to identify vulnerabilities and extract counterexamples. These counterexamples are supported by mathematical proofs and the stack trace of the vulnerabilities. Using a specially des… ▽ More

    Submitted 27 June, 2024; v1 submitted 24 May, 2023; originally announced May 2023.

  21. arXiv:2304.10346  [pdf, other

    cs.CL

    Interventional Probing in High Dimensions: An NLI Case Study

    Authors: Julia Rozanova, Marco Valentino, Lucas Cordeiro, Andre Freitas

    Abstract: Probing strategies have been shown to detect the presence of various linguistic features in large language models; in particular, semantic features intermediate to the "natural logic" fragment of the Natural Language Inference task (NLI). In the case of natural logic, the relation between the intermediate features and the entailment label is explicitly known: as such, this provides a ripe setting… ▽ More

    Submitted 20 April, 2023; originally announced April 2023.

  22. arXiv:2303.11745  [pdf, other

    cs.CR cs.AI

    Poisoning Attacks in Federated Edge Learning for Digital Twin 6G-enabled IoTs: An Anticipatory Study

    Authors: Mohamed Amine Ferrag, Burak Kantarci, Lucas C. Cordeiro, Merouane Debbah, Kim-Kwang Raymond Choo

    Abstract: Federated edge learning can be essential in supporting privacy-preserving, artificial intelligence (AI)-enabled activities in digital twin 6G-enabled Internet of Things (IoT) environments. However, we need to also consider the potential of attacks targeting the underlying AI systems (e.g., adversaries seek to corrupt data on the IoT devices during local updates or corrupt the model updates); hence… ▽ More

    Submitted 21 March, 2023; originally announced March 2023.

    Comments: The paper is accepted and will be published in the IEEE ICC 2023 Conference Proceedings

  23. arXiv:2302.02381  [pdf, other

    cs.SE cs.LO cs.PL

    JBMC: A Bounded Model Checking Tool for Java Bytecode

    Authors: Romain Brenguier, Lucas Cordeiro, Daniel Kroening, Peter Schrammel

    Abstract: JBMC is an open-source SAT- and SMT-based bounded model checking tool for verifying Java bytecode. JBMC relies on an operational model of the Java libraries, which conservatively approximates their semantics, to verify assertion violations, array out-of-bounds, unintended arithmetic overflows, and other kinds of functional and runtime errors in Java bytecode. JBMC can be used to either falsify pro… ▽ More

    Submitted 5 February, 2023; originally announced February 2023.

    Comments: Book chapter preview

  24. arXiv:2301.09142  [pdf, ps, other

    cs.LG

    LF-checker: Machine Learning Acceleration of Bounded Model Checking for Concurrency Verification (Competition Contribution)

    Authors: Tong Wu, Edoardo Manino, Fatimah Aljaafari, Pavlos Petoumenos, Lucas C. Cordeiro

    Abstract: We describe and evaluate LF-checker, a metaverifier tool based on machine learning. It extracts multiple features of the program under test and predicts the optimal configuration (flags) of a bounded model checker with a decision tree. Our current work is specialised in concurrency verification and employs ESBMC as a back-end verification engine. In the paper, we demonstrate that LF-checker achiev… ▽ More

    Submitted 22 January, 2023; originally announced January 2023.

  25. arXiv:2212.04310  [pdf, other

    cs.CL

    Montague semantics and modifier consistency measurement in neural language models

    Authors: Danilo S. Carvalho, Edoardo Manino, Julia Rozanova, Lucas Cordeiro, André Freitas

    Abstract: In recent years, distributional language representation models have demonstrated great practical success. At the same time, the need for interpretability has elicited questions on their intrinsic properties and capabilities. Crucially, distributional models are often inconsistent when dealing with compositional phenomena in natural language, which has significant implications for their safety and… ▽ More

    Submitted 3 April, 2023; v1 submitted 10 October, 2022; originally announced December 2022.

  26. AIREPAIR: A Repair Platform for Neural Networks

    Authors: Xidan Song, Youcheng Sun, Mustafa A. Mustafa, Lucas Cordeiro

    Abstract: We present AIREPAIR, a platform for repairing neural networks. It features the integration of existing network repair tools. Based on AIREPAIR, one can run different repair methods on the same model, thus enabling the fair comparison of different repair techniques. We evaluate AIREPAIR with three state-of-the-art repair tools on popular deep-learning datasets and models. Our evaluation confirms th… ▽ More

    Submitted 21 March, 2023; v1 submitted 24 November, 2022; originally announced November 2022.

  27. arXiv:2210.12054  [pdf, other

    cs.LG

    Towards Global Neural Network Abstractions with Locally-Exact Reconstruction

    Authors: Edoardo Manino, Iury Bessa, Lucas Cordeiro

    Abstract: Neural networks are a powerful class of non-linear functions. However, their black-box nature makes it difficult to explain their behaviour and certify their safety. Abstraction techniques address this challenge by transforming the neural network into a simpler, over-approximated function. Unfortunately, existing abstraction techniques are slack, which limits their applicability to small local reg… ▽ More

    Submitted 31 March, 2023; v1 submitted 21 October, 2022; originally announced October 2022.

    Comments: Under submission to the Neural Networks Journal (revised version). Sections 2, 4.7, 5.4, Appendix A and B have been added

  28. arXiv:2210.08212  [pdf, other

    cs.LG cs.AI

    D.MCA: Outlier Detection with Explicit Micro-Cluster Assignments

    Authors: Shuli Jiang, Robson Leonardo Ferreira Cordeiro, Leman Akoglu

    Abstract: How can we detect outliers, both scattered and clustered, and also explicitly assign them to respective micro-clusters, without knowing apriori how many micro-clusters exist? How can we perform both tasks in-house, i.e., without any post-hoc processing, so that both detection and assignment can benefit simultaneously from each other? Presenting outliers in separate micro-clusters is informative to… ▽ More

    Submitted 15 October, 2022; originally announced October 2022.

    Comments: Proceedings of the 22nd IEEE International Conference on Data Mining (ICDM 2022)

  29. arXiv:2207.04231  [pdf, other

    cs.LG cs.AI cs.SE

    CEG4N: Counter-Example Guided Neural Network Quantization Refinement

    Authors: João Batista P. Matos Jr., Iury Bessa, Edoardo Manino, Xidan Song, Lucas C. Cordeiro

    Abstract: Neural networks are essential components of learning-based software systems. However, their high compute, memory, and power requirements make using them in low resources domains challenging. For this reason, neural networks are often quantized before deployment. Existing quantization techniques tend to degrade the network accuracy. We propose Counter-Example Guided Neural Network Quantization Refi… ▽ More

    Submitted 9 July, 2022; originally announced July 2022.

  30. arXiv:2206.14068  [pdf, other

    cs.SE

    FuSeBMC v4: Improving code coverage with smart seeds via BMC, fuzzing and static analysis

    Authors: Kaled M. Alshmrany, Mohannad Aldughaim, Ahmed Bhayat, Lucas C. Cordeiro

    Abstract: Bounded model checking (BMC) and fuzzing techniques are among the most effective methods for detecting errors and security vulnerabilities in software. However, there are still shortcomings in detecting these errors due to the inability of existent methods to cover large areas in target code. We propose FuSeBMC v4, a test generator that synthesizes seeds with useful properties, that we refer to as… ▽ More

    Submitted 18 April, 2024; v1 submitted 28 June, 2022; originally announced June 2022.

    Comments: 24 pages, In The Formal Aspects of Computing Journal (FAC 2024)

  31. arXiv:2206.06043  [pdf, other

    cs.SE eess.SY

    Combining BMC and Fuzzing Techniques for Finding Software Vulnerabilities in Concurrent Programs

    Authors: Fatimah K. Aljaafari, Rafael Menezes, Edoardo Manino, Fedor Shmarov, Mustafa A. Mustafa, Lucas C. Cordeiro

    Abstract: Finding software vulnerabilities in concurrent programs is a challenging task due to the size of the state-space exploration, as the number of interleavings grows exponentially with the number of program threads and statements. We propose and evaluate EBF (Ensembles of Bounded Model Checking with Fuzzing) -- a technique that combines Bounded Model Checking (BMC) and Gray-Box Fuzzing (GBF) to find… ▽ More

    Submitted 20 October, 2022; v1 submitted 13 June, 2022; originally announced June 2022.

  32. ESBMC-Jimple: Verifying Kotlin Programs via Jimple Intermediate Representation

    Authors: Rafael Menezes, Daniel Moura, Helena Cavalcante, Rosiane de Freitas, Lucas C. Cordeiro

    Abstract: In this work, we describe and evaluate the first model checker for verifying Kotlin programs through the Jimple intermediate representation. The verifier, named ESBMC-Jimple, is built on top of the Efficient SMT-based Context-Bounded Model Checker (ESBMC). It uses the Soot framework to obtain the Jimple IR, representing a simplified version of the Kotlin source code, containing a maximum of three… ▽ More

    Submitted 20 July, 2022; v1 submitted 9 June, 2022; originally announced June 2022.

    Comments: ACM SIGSOFT International Symposium on Software Testing and Analysis 2022

  33. arXiv:2204.12316  [pdf, other

    cs.CL

    Systematicity, Compositionality and Transitivity of Deep NLP Models: a Metamorphic Testing Perspective

    Authors: Edoardo Manino, Julia Rozanova, Danilo Carvalho, Andre Freitas, Lucas Cordeiro

    Abstract: Metamorphic testing has recently been used to check the safety of neural NLP models. Its main advantage is that it does not rely on a ground truth to generate test cases. However, existing studies are mostly concerned with robustness-like metamorphic relations, limiting the scope of linguistic properties they can test. We propose three new classes of metamorphic relations, which address the proper… ▽ More

    Submitted 26 April, 2022; originally announced April 2022.

    Comments: Findings of the Association for Computational Linguistics 2022

  34. arXiv:2201.01810  [pdf, other

    cs.GT cs.AI cs.CR cs.MA

    Privacy-Friendly Peer-to-Peer Energy Trading: A Game Theoretical Approach

    Authors: Kamil Erdayandi, Amrit Paudel, Lucas Cordeiro, Mustafa A. Mustafa

    Abstract: In this paper, we propose a decentralized, privacy-friendly energy trading platform (PFET) based on game theoretical approach - specifically Stackelberg competition. Unlike existing trading schemes, PFET provides a competitive market in which prices and demands are determined based on competition, and computations are performed in a decentralized manner which does not rely on trusted third parties… ▽ More

    Submitted 28 May, 2022; v1 submitted 5 January, 2022; originally announced January 2022.

    Comments: To be published in IEEE Power & Energy Society General Meeting (GM), 2022

    ACM Class: E.3; I.2.11

  35. arXiv:2112.10627  [pdf, other

    cs.CR cs.CY cs.SC cs.SE

    FuSeBMC v.4: Smart Seed Generation for Hybrid Fuzzing

    Authors: Kaled M. Alshmrany, Mohannad Aldughaim, Ahmed Bhayat, Lucas C. Cordeiro

    Abstract: FuSeBMC is a test generator for finding security vulnerabilities in C programs. In earlier work [4], we described a previous version that incrementally injected labels to guide Bounded Model Checking (BMC) and Evolutionary Fuzzing engines to produce test cases for code coverage and bug finding. This paper introduces a new version of FuSeBMC that utilizes both engines to produce smart seeds. First,… ▽ More

    Submitted 20 December, 2021; originally announced December 2021.

    Comments: 4 pages, 2 figures, International Conference on Fundamental Approaches to Software Engineering (FASE 2022)

  36. arXiv:2111.13117  [pdf, other

    cs.LO

    ESBMC-Solidity: An SMT-Based Model Checker for Solidity Smart Contracts

    Authors: Kunjian Song, Nedas Matulevicius, Eddie B. de Lima Filho, Lucas C. Cordeiro

    Abstract: Smart contracts written in Solidity are programs used in blockchain networks, such as Etherium, for performing transactions. However, as with any piece of software, they are prone to errors and may present vulnerabilities, which malicious attackers could then use. This paper proposes a solidity frontend for the efficient SMT-based context-bounded model checker (ESBMC), named ESBMC-Solidity, which… ▽ More

    Submitted 25 November, 2021; originally announced November 2021.

    Comments: 4 pages, 2 figures, 2 tables

    ACM Class: D.2.4; F.3.1

  37. arXiv:2111.13110  [pdf, other

    cs.AI cs.LG cs.LO

    QNNVerifier: A Tool for Verifying Neural Networks using SMT-Based Model Checking

    Authors: Xidan Song, Edoardo Manino, Luiz Sena, Erickson Alves, Eddie de Lima Filho, Iury Bessa, Mikel Lujan, Lucas Cordeiro

    Abstract: QNNVerifier is the first open-source tool for verifying implementations of neural networks that takes into account the finite word-length (i.e. quantization) of their operands. The novel support for quantization is achieved by employing state-of-the-art software model checking (SMC) techniques. It translates the implementation of neural networks to a decidable fragment of first-order logic based o… ▽ More

    Submitted 25 November, 2021; originally announced November 2021.

    Comments: Submitted to the Demo track of the ICSE 2022 conference

  38. arXiv:2110.08257  [pdf, other

    cs.LG cs.AI

    C-AllOut: Catching & Calling Outliers by Type

    Authors: Guilherme D. F. Silva, Leman Akoglu, Robson L. F. Cordeiro

    Abstract: Given an unlabeled dataset, wherein we have access only to pairwise similarities (or distances), how can we effectively (1) detect outliers, and (2) annotate/tag the outliers by type? Outlier detection has a large literature, yet we find a key gap in the field: to our knowledge, no existing work addresses the outlier annotation problem. Outliers are broadly classified into 3 types, representing di… ▽ More

    Submitted 13 October, 2021; originally announced October 2021.

    Comments: 9+4 pages, 3 figures, 11 tables

  39. arXiv:2107.01093  [pdf, other

    cs.SE

    Model Checking C++ Programs

    Authors: Felipe R. Monteiro, Mikhail R. Gadelha, Lucas C. Cordeiro

    Abstract: In the last three decades, memory safety issues in system programming languages such as C or C++ have been one of the significant sources of security vulnerabilities. However, there exist only a few attempts with limited success to cope with the complexity of C++ program verification. Here we describe and evaluate a novel verification approach based on bounded model checking (BMC) and satisfiabili… ▽ More

    Submitted 2 July, 2021; originally announced July 2021.

    Comments: 30 pages

  40. arXiv:2106.05997  [pdf, other

    cs.LG cs.CR cs.LO cs.SC

    Verifying Quantized Neural Networks using SMT-Based Model Checking

    Authors: Luiz Sena, Xidan Song, Erickson Alves, Iury Bessa, Edoardo Manino, Lucas Cordeiro, Eddie de Lima Filho

    Abstract: Artificial Neural Networks (ANNs) are being deployed for an increasing number of safety-critical applications, including autonomous cars and medical diagnosis. However, concerns about their reliability have been raised due to their black-box nature and apparent fragility to adversarial attacks. These concerns are amplified when ANNs are deployed on restricted system, which limit the precision of m… ▽ More

    Submitted 16 September, 2021; v1 submitted 10 June, 2021; originally announced June 2021.

    Comments: Changes with respect to the previous version: improved explanation of our methodology in Section 3; improved and extended experimental evaluation in Section 4; added comparison with the state of the art in Section 4.5

  41. arXiv:2103.11363  [pdf, other

    cs.CR

    Finding Security Vulnerabilities in IoT Cryptographic Protocol and Concurrent Implementations

    Authors: Fatimah Aljaafari, Rafael Menezes, Mustafa A. Mustafa, Lucas C. Cordeiro

    Abstract: Internet of Things (IoT) consists of a large number of devices connected through a network, which exchange a high volume of data, thereby posing new security, privacy, and trust issues. One way to address these issues is ensuring data confidentiality using lightweight encryption algorithms for IoT protocols. However, the design and implementation of such protocols is an error-prone task; flaws in… ▽ More

    Submitted 27 April, 2021; v1 submitted 21 March, 2021; originally announced March 2021.

  42. arXiv:2102.02368  [pdf, other

    cs.CR

    Verifying Security Vulnerabilities in Large Software Systems using Multi-Core k-Induction

    Authors: Thales Silva, Carmina Porto, Erickson Alves, Lucas Cordeiro, Herbert Rocha

    Abstract: Computer-based systems have been used to solve several domain problems, such as industrial, military, education, and wearable. Those systems need high-quality software to guarantee security and safety. We advocate that Bounded Model Checking (BMC) techniques can detect security vulnerabilities in the early stages of development processes. However, this technique struggles to scale up and verify la… ▽ More

    Submitted 3 February, 2021; originally announced February 2021.

  43. arXiv:2012.11245  [pdf, other

    cs.SE cs.LO

    Incremental Symbolic Bounded Model Checking of Software Using Interval Methods via Contractors

    Authors: Mohannad Aldughaim, Kaled Alshmrany, Rafael Menezes, Lucas Cordeiro, Alexandru Stancu

    Abstract: Bounded model checking (BMC) is vital for finding program property violations. For unsafe programs, BMC can quickly find an execution path from an initial state to the violated state that refutes a given safety property. However, BMC techniques struggle to falsify programs that contain loops. BMC needs to incrementally unfold the program loops up to the bound $k$, exposing the property violation,… ▽ More

    Submitted 21 September, 2022; v1 submitted 21 December, 2020; originally announced December 2020.

  44. arXiv:2012.11223  [pdf, other

    cs.CR cs.LO

    FuSeBMC: A White-Box Fuzzer for Finding Security Vulnerabilities in C Programs

    Authors: Kaled M. Alshmrany, Rafael S. Menezes, Mikhail R. Gadelha, Lucas C. Cordeiro

    Abstract: We describe and evaluate a novel white-box fuzzer for C programs named FuSeBMC, which combines fuzzing and symbolic execution, and applies Bounded Model Checking (BMC) to find security vulnerabilities in C programs. FuSeBMC explores and analyzes C programs (1) to find execution paths that lead to property violations and (2) to incrementally inject labels to guide the fuzzer and the BMC engine to p… ▽ More

    Submitted 21 December, 2020; originally announced December 2020.

    Comments: 4 pages

  45. arXiv:2012.11220  [pdf, other

    cs.LO cs.AI

    Incremental Verification of Fixed-Point Implementations of Neural Networks

    Authors: Luiz Sena, Erickson Alves, Iury Bessa, Eddie Filho, Lucas Cordeiro

    Abstract: Implementations of artificial neural networks (ANNs) might lead to failures, which are hardly predicted in the design phase since ANNs are highly parallel and their parameters are barely interpretable. Here, we develop and evaluate a novel symbolic verification framework using incremental bounded model checking (BMC), satisfiability modulo theories (SMT), and invariant inference, to obtain adversa… ▽ More

    Submitted 21 December, 2020; originally announced December 2020.

    Comments: arXiv admin note: text overlap with arXiv:1907.12933

  46. arXiv:2007.05315  [pdf, other

    cs.LG cs.CR stat.ML

    Generating Adversarial Inputs Using A Black-box Differential Technique

    Authors: João Batista Pereira Matos Juúnior, Lucas Carvalho Cordeiro, Marcelo d'Amorim, Xiaowei Huang

    Abstract: Neural Networks (NNs) are known to be vulnerable to adversarial attacks. A malicious agent initiates these attacks by perturbing an input into another one such that the two inputs are classified differently by the NN. In this paper, we consider a special class of adversarial examples, which can exhibit not only the weakness of NN models - as do for the typical adversarial examples - but also the d… ▽ More

    Submitted 10 July, 2020; originally announced July 2020.

  47. arXiv:2004.12699  [pdf, other

    cs.LO cs.SE

    An Efficient Floating-Point Bit-Blasting API for Verifying C Programs

    Authors: Mikhail R. Gadelha, Lucas C. Cordeiro, Denis A. Nicole

    Abstract: We describe a new SMT bit-blasting API for floating-points and evaluate it using different out-of-the-shelf SMT solvers during the verification of several C programs. The new floating-point API is part of the SMT backend in ESBMC, a state-of-the-art bounded model checker for C and C++. For the evaluation, we compared our floating-point API against the native floating-point APIs in Z3 and MathSAT.… ▽ More

    Submitted 29 April, 2020; v1 submitted 27 April, 2020; originally announced April 2020.

    Comments: 20 pages

  48. arXiv:2001.09837  [pdf, other

    cs.CR cs.SE

    Verifying Software Vulnerabilities in IoT Cryptographic Protocols

    Authors: Fatimah Aljaafari, Lucas C. Cordeiro, Mustafa A. Mustafa

    Abstract: Internet of Things (IoT) is a system that consists of a large number of smart devices connected through a network. The number of these devices is increasing rapidly, which creates a massive and complex network with a vast amount of data communicated over that network. One way to protect this data in transit, i.e., to achieve data confidentiality, is to use lightweight encryption algorithms for IoT… ▽ More

    Submitted 27 January, 2020; originally announced January 2020.

  49. arXiv:2001.09592  [pdf, other

    cs.CR cs.NI

    Finding Security Vulnerabilities in Network Protocol Implementations

    Authors: Kaled Alshmrany, Lucas Cordeiro

    Abstract: Implementations of network protocols are often prone to vulnerabilities caused by developers' mistakes when accessing memory regions and dealing with arithmetic operations. Finding practical approaches for checking the security of network protocol implementations has proven to be a challenging problem. The main reason is that the protocol software state-space is too large to be explored. Here we p… ▽ More

    Submitted 27 January, 2020; originally announced January 2020.

  50. arXiv:1909.13139  [pdf, other

    eess.SY cs.FL

    Optimal Sizing of Stand-alone Solar PV Systems via Automated Formal Synthesis

    Authors: Alessandro Trindade, Lucas Cordeiro

    Abstract: There exist various methods and tools to size solar photovoltaic systems; however, these tools rely on simulations, which do not cover all aspects of the design space during the search for optimal solution. In prior studies in optimal sizing, the focus was always on criteria or objectives. Here, we present a new sound and automated approach to obtain optimal sizing using an unprecedented program s… ▽ More

    Submitted 28 September, 2019; originally announced September 2019.