Skip to main content

Showing 1–9 of 9 results for author: Itzhaky, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2305.19203  [pdf, other

    cs.PL

    Colored E-Graph: Equality Reasoning with Conditions

    Authors: Eytan Singher, Shachar Itzhaky

    Abstract: E-graphs are a prominent data structure that has been increasing in popularity in recent years due to their expanding range of applications in various formal reasoning tasks. Often, they are used for equality saturation, a process of deriving consequences through repeatedly applying universally quantified equality formulas via term rewriting. They handle equality reasoning over a large spaces of t… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

  2. arXiv:2304.12588  [pdf, other

    cs.LO

    Hyperproperty Verification as CHC Satisfiability

    Authors: Shachar Itzhaky, Sharon Shoham, Yakir Vizel

    Abstract: Hyperproperties govern the behavior of a system or systems across multiple executions, and are being recognized as an important extension of regular temporal properties. So far, such properties have resisted comprehensive treatment by modern software model-checking approaches such as IC3/PDR, due to the need to find not only an inductive invariant but also a \emph{total} alignment of different exe… ▽ More

    Submitted 31 January, 2024; v1 submitted 25 April, 2023; originally announced April 2023.

  3. arXiv:2212.06472  [pdf, ps, other

    cs.LO

    SMT Sampling via Model-Guided Approximation

    Authors: Matan Peled, Bat-Chen Rothenberg, Shachar Itzhaky

    Abstract: We investigate the domain of satisfiable formulas in satisfiability modulo theories (SMT), in particular, automatic generation of a multitude of satisfying assignments to such formulas. Despite the long and successful history of SMT in model checking and formal verification, this aspect is relatively under-explored. Prior work exists for generating such assignments, or samples, for Boolean formula… ▽ More

    Submitted 13 December, 2022; originally announced December 2022.

  4. arXiv:2211.07185  [pdf, other

    cs.CR

    Securing Access to Untrusted Services From TEEs with GateKeeper

    Authors: Meni Orenbach, Bar Raveh, Alon Berkenstadt, Yan Michalevsky, Shachar Itzhaky, Mark Silberstein

    Abstract: Applications running in Trusted Execution Environments (TEEs) commonly use untrusted external services such as host File System. Adversaries may maliciously alter the normal service behavior to trigger subtle application bugs that would have never occurred under correct service operation, causing data leaks and integrity violations. Unfortunately, existing manual protections are incomplete and ad-… ▽ More

    Submitted 14 November, 2022; originally announced November 2022.

  5. AmiGo: Computational Design of Amigurumi Crochet Patterns

    Authors: Michal Edelstein, Hila Peleg, Shachar Itzhaky, Mirela Ben-Chen

    Abstract: We propose an approach for generating crochet instructions (patterns) from an input 3D model. We focus on Amigurumi, which are knitted stuffed toys. Given a closed triangle mesh, and a single point specified by the user, we generate crochet instructions, which when knitted and stuffed result in a toy similar to the input geometry. Our approach relies on constructing the geometry and connectivity o… ▽ More

    Submitted 2 November, 2022; originally announced November 2022.

    Comments: 11 pages, 10 figures, SCF 2022

  6. arXiv:2106.00937  [pdf, ps, other

    cs.PL cs.CC

    Putting the Squeeze on Array Programs: Loop Verification via Inductive Rank Reduction

    Authors: Oren Ish Shalom, Shachar Itzhaky, Noam Rinetzky, Sharon Shoham

    Abstract: Automatic verification of array manipulating programs is a challenging problem because it often amounts to the inference of in ductive quantified loop invariants which, in some cases, may not even be firstorder expressible. In this paper, we suggest a novel verification tech nique that is based on induction on userdefined rank of program states as an alternative to loopinvariants. Our technique, d… ▽ More

    Submitted 2 June, 2021; originally announced June 2021.

  7. Theory Exploration Powered By Deductive Synthesis

    Authors: Eytan Singher, Shachar Itzhaky

    Abstract: Recent years have seen tremendous growth in the amount of verified software. Proofs for complex properties can now be achieved using higher-order theories and calculi. Complex properties lead to an ever-growing number of definitions and associated lemmas, which constitute an integral part of proof construction. Following this -- whether automatic or semi-automatic -- methods for computer-aided lem… ▽ More

    Submitted 25 November, 2021; v1 submitted 10 September, 2020; originally announced September 2020.

    ACM Class: I.2.3; D.2.4; F.3.1

    Journal ref: CAV (2) 2021: 125-148

  8. arXiv:1610.02101  [pdf, other

    cs.LO

    On the automated verification of web applications with embedded SQL

    Authors: Shachar Itzhaky, Tomer Kotek, Noam Rinetzky, Mooly Sagiv, Orr Tamir, Helmut Veith, Florian Zuleger

    Abstract: A large number of web applications is based on a relational database together with a program, typically a script, that enables the user to interact with the database through embedded SQL queries and commands. In this paper, we introduce a method for formal automated verification of such systems which connects database theory to mainstream program analysis. We identify a fragment of SQL which captu… ▽ More

    Submitted 6 October, 2016; originally announced October 2016.

    Comments: 25 pages

    MSC Class: 68P15; 68Q60 ACM Class: D.3.2; F.3.1

  9. arXiv:1607.03445  [pdf, other

    cs.PL

    Liquid Information Flow Control

    Authors: Nadia Polikarpova, Deian Stefan, Jean Yang, Shachar Itzhaky, Travis Hance, Armando Solar-Lezama

    Abstract: We present Lifty, a domain-specific language for data-centric applications that manipulate sensitive data. A Lifty programmer annotates the sources of sensitive data with declarative security policies, and the language statically and automatically verifies that the application handles the data according to the policies. Moreover, if verification fails, Lifty suggests a provably correct repair, the… ▽ More

    Submitted 30 June, 2020; v1 submitted 12 July, 2016; originally announced July 2016.