Skip to main content

Showing 1–26 of 26 results for author: Lal, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.19673  [pdf, other

    cs.LG cs.AI stat.ML

    Bridging Model-Based Optimization and Generative Modeling via Conservative Fine-Tuning of Diffusion Models

    Authors: Masatoshi Uehara, Yulai Zhao, Ehsan Hajiramezanali, Gabriele Scalia, Gökcen Eraslan, Avantika Lal, Sergey Levine, Tommaso Biancalani

    Abstract: AI-driven design problems, such as DNA/protein sequence design, are commonly tackled from two angles: generative modeling, which efficiently captures the feasible design space (e.g., natural images or biological sequences), and model-based optimization, which utilizes reward models for extrapolation. To combine the strengths of both approaches, we adopt a hybrid method that fine-tunes cutting-edge… ▽ More

    Submitted 31 May, 2024; v1 submitted 29 May, 2024; originally announced May 2024.

    Comments: Under review

  2. arXiv:2404.01096  [pdf, other

    cs.SE cs.PL

    Enabling Memory Safety of C Programs using LLMs

    Authors: Nausheen Mohammed, Akash Lal, Aseem Rastogi, Subhajit Roy, Rahul Sharma

    Abstract: Memory safety violations in low-level code, written in languages like C, continues to remain one of the major sources of software vulnerabilities. One method of removing such violations by construction is to port C code to a safe C dialect. Such dialects rely on programmer-supplied annotations to guarantee safety with minimal runtime overhead. This porting, however, is a manual process that impose… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

  3. arXiv:2312.01912  [pdf, ps, other

    cs.PL

    Resource Leak Checker (RLC#) for C# Code using CodeQL

    Authors: Pritam Gharat, Narges Shadab, Shrey Tiwari, Shuvendu Lahiri, Akash Lal

    Abstract: Resource leaks occur when a program fails to release a finite resource after it is no longer needed. These leaks are a significant cause of real-world crashes and performance issues. Given their critical impact on software performance and security, detecting and preventing resource leaks is a crucial problem. Recent research has proposed a specify-and-check approach to prevent resource leaks. In… ▽ More

    Submitted 5 December, 2023; v1 submitted 4 December, 2023; originally announced December 2023.

  4. arXiv:2311.07948  [pdf, other

    cs.PL cs.LG

    Finding Inductive Loop Invariants using Large Language Models

    Authors: Adharsh Kamath, Aditya Senthilnathan, Saikat Chakraborty, Pantazis Deligiannis, Shuvendu K. Lahiri, Akash Lal, Aseem Rastogi, Subhajit Roy, Rahul Sharma

    Abstract: Loop invariants are fundamental to reasoning about programs with loops. They establish properties about a given loop's behavior. When they additionally are inductive, they become useful for the task of formal verification that seeks to establish strong mathematical guarantees about program's runtime behavior. The inductiveness ensures that the invariants can be checked locally without consulting t… ▽ More

    Submitted 14 November, 2023; originally announced November 2023.

  5. arXiv:2311.04319  [pdf, other

    cs.PL cs.FL cs.LO

    On-The-Fly Static Analysis via Dynamic Bidirected Dyck Reachability

    Authors: Shankaranarayanan Krishna, Aniket Lal, Andreas Pavlogiannis, Omkar Tuppe

    Abstract: Dyck reachability is a principled, graph-based formulation of a plethora of static analyses. Bidirected graphs are used for capturing dataflow through mutable heap data, and are usual formalisms of demand-driven points-to and alias analyses. The best (offline) algorithm runs in $O(m+n\cdot α(n))$ time, where $n$ is the number of nodes and $m$ is the number of edges in the flow graph, which becomes… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

  6. arXiv:2310.09342  [pdf, other

    cs.PL cs.AI cs.CL cs.SE

    Ranking LLM-Generated Loop Invariants for Program Verification

    Authors: Saikat Chakraborty, Shuvendu K. Lahiri, Sarah Fakhoury, Madanlal Musuvathi, Akash Lal, Aseem Rastogi, Aditya Senthilnathan, Rahul Sharma, Nikhil Swamy

    Abstract: Synthesizing inductive loop invariants is fundamental to automating program verification. In this work, we observe that Large Language Models (such as gpt-3.5 or gpt-4) are capable of synthesizing loop invariants for a class of programs in a 0-shot setting, yet require several samples to generate the correct invariants. This can lead to a large number of calls to a program verifier to establish an… ▽ More

    Submitted 12 February, 2024; v1 submitted 13 October, 2023; originally announced October 2023.

    Comments: Findings of The 2023 Conference on Empirical Methods in Natural Language Processing (EMNLP-findings 2023)

  7. arXiv:2308.05177  [pdf, other

    cs.SE cs.PL

    Fixing Rust Compilation Errors using LLMs

    Authors: Pantazis Deligiannis, Akash Lal, Nikita Mehrotra, Aseem Rastogi

    Abstract: The Rust programming language, with its safety guarantees, has established itself as a viable choice for low-level systems programming language over the traditional, unsafe alternatives like C/C++. These guarantees come from a strong ownership-based type system, as well as primitive support for features like closures, pattern matching, etc., that make the code more concise and amenable to reasonin… ▽ More

    Submitted 9 August, 2023; originally announced August 2023.

  8. arXiv:2306.11953  [pdf, ps, other

    cs.SE cs.PL

    Inference of Resource Management Specifications

    Authors: Narges Shadab, Pritam Gharat, Shrey Tiwari, Michael D. Ernst, Martin Kellogg, Shuvendu Lahiri, Akash Lal, Manu Sridharan

    Abstract: A resource leak occurs when a program fails to free some finite resource after it is no longer needed. Such leaks are a significant cause of real-world crashes and performance problems. Recent work proposed an approach to prevent resource leaks based on checking resource management specifications. A resource management specification expresses how the program allocates resources, passes them around… ▽ More

    Submitted 21 September, 2023; v1 submitted 20 June, 2023; originally announced June 2023.

  9. arXiv:2212.13607  [pdf, other

    cs.LG cs.AI

    EDoG: Adversarial Edge Detection For Graph Neural Networks

    Authors: Xiaojun Xu, Yue Yu, Hanzhang Wang, Alok Lal, Carl A. Gunter, Bo Li

    Abstract: Graph Neural Networks (GNNs) have been widely applied to different tasks such as bioinformatics, drug design, and social networks. However, recent studies have shown that GNNs are vulnerable to adversarial attacks which aim to mislead the node or subgraph classification prediction by adding subtle perturbations. Detecting these attacks is challenging due to the small magnitude of perturbation and… ▽ More

    Submitted 27 December, 2022; originally announced December 2022.

    Comments: Accepted by IEEE Conference on Secure and Trustworthy Machine Learning 2023

  10. arXiv:2208.06499  [pdf

    physics.app-ph cs.AR

    HZO-based FerroNEMS MAC for In-Memory Computing

    Authors: Shubham Jadhav, Ved Gund, Benyamin Davaji, Debdeep Jena, Huili, Xing, Amit Lal

    Abstract: This paper demonstrates a hafnium zirconium oxide (HZO)-based ferroelectric NEMS unimorph as the fundamental building block for very low-energy capacitive readout in-memory computing. The reported device consists of a 250 $μ$m $\times$ 30 $μ$m unimorph cantilever with 20 nm thick ferroelectric HZO on 1 $μ$m $SiO_2$.Partial ferroelectric switching in HZO achieves analog programmable control of the… ▽ More

    Submitted 12 August, 2022; originally announced August 2022.

  11. arXiv:2103.02830  [pdf, other

    cs.PL

    MonkeyDB: Effectively Testing Correctness against Weak Isolation Levels

    Authors: Ranadeep Biswas, Diptanshu Kakwani, Jyothi Vedurada, Constantin Enea, Akash Lal

    Abstract: Modern applications, such as social networking systems and e-commerce platforms are centered around using large-scale storage systems for storing and retrieving data. In the presence of concurrent accesses, these storage systems trade off isolation for performance. The weaker the isolation level, the more behaviors a storage system is allowed to exhibit and it is up to the developer to ensure that… ▽ More

    Submitted 3 March, 2021; originally announced March 2021.

  12. arXiv:2101.04285  [pdf, other

    cs.LG

    Explainable Deep Behavioral Sequence Clustering for Transaction Fraud Detection

    Authors: Wei Min, Weiming Liang, Hang Yin, Zhurong Wang, Mei Li, Alok Lal

    Abstract: In e-commerce industry, user behavior sequence data has been widely used in many business units such as search and merchandising to improve their products. However, it is rarely used in financial services not only due to its 3V characteristics - i.e. Volume, Velocity and Variety - but also due to its unstructured nature. In this paper, we propose a Financial Service scenario Deep learning based Be… ▽ More

    Submitted 11 January, 2021; originally announced January 2021.

    Comments: Accepted by AAAI2021 KDF Workshop

  13. arXiv:2005.11935  [pdf

    q-bio.QM cs.HC

    A Novel Approach of using AR and Smart Surgical Glasses Supported Trauma Care

    Authors: Anurag Lal, Ming-Hsien Hu, Pei-Yuan Lee, Min Liang Wang

    Abstract: BACKGROUND: Augmented reality (AR) is gaining popularity in varying field such as computer gaming and medical education fields. However, still few of applications in real surgeries. Orthopedic surgical applications are currently limited and underdeveloped. - METHODS: The clinic validation was prepared with the currently available AR equipment and software. A total of 1 Vertebroplasty, 2 ORIF Pelvi… ▽ More

    Submitted 25 May, 2020; originally announced May 2020.

    Comments: 10 pages, 9 Figures, Conference. arXiv admin note: text overlap with arXiv:1801.01560 by other authors

  14. arXiv:2005.08063  [pdf, other

    cs.PL cs.SE

    Distributed Bounded Model Checking

    Authors: Prantik Chatterjee, Subhajit Roy, Bui Phi Diep, Akash Lal

    Abstract: Program verification is a resource-hungry task. This paper looks at the problem of parallelizing SMT-based automated program verification, specifically bounded model-checking, so that it can be distributed and executed on a cluster of machines. We present an algorithm that dynamically unfolds the call graph of the program and frequently splits it to create sub-tasks that can be solved in parallel.… ▽ More

    Submitted 16 May, 2020; originally announced May 2020.

  15. arXiv:2002.04903  [pdf, other

    cs.PL

    Building Reliable Cloud Services Using P# (Experience Report)

    Authors: Pantazis Deligiannis, Narayanan Ganapathy, Akash Lal, Shaz Qadeer

    Abstract: Cloud services must typically be distributed across a large number of machines in order to make use of multiple compute and storage resources. This opens the programmer to several sources of complexity such as concurrency, order of message delivery, lossy network, timeouts and failures, all of which impose a high cognitive burden. This paper presents evidence that technology inspired by formal-met… ▽ More

    Submitted 12 February, 2020; originally announced February 2020.

  16. arXiv:1905.09996  [pdf, other

    cs.PL cs.FL cs.LO

    Verifying Asynchronous Event-Driven Programs Using Partial Abstract Transformers (Extended Manuscript)

    Authors: Peizun Liu, Thomas Wahl, Akash LaL

    Abstract: We address the problem of analyzing asynchronous event-driven programs, in which concurrent agents communicate via unbounded message queues. The safety verification problem for such programs is undecidable. We present in this paper a technique that combines queue-bounded exploration with a convergence test: if the sequence of certain abstractions of the reachable states, for increasing queue bound… ▽ More

    Submitted 23 May, 2019; originally announced May 2019.

    Comments: This is an extended technical report of a paper published in CAV 2019

  17. arXiv:1902.09502  [pdf, other

    cs.PL

    Reliable State Machines: A Framework for Programming Reliable Cloud Services

    Authors: Suvam Mukherjee, Nitin John Raj, Krishnan Govindraj, Pantazis Deligiannis, Chandramouleswaran Ravichandran, Akash Lal, Aseem Rastogi, Raja Krishnaswamy

    Abstract: Building reliable applications for the cloud is challenging because of unpredictable failures during a program's execution. This paper presents a programming framework called Reliable State Machines (RSMs), that offers fault-tolerance by construction. Using our framework, a programmer can build an application as several (possibly distributed) RSMs that communicate with each other via messages, muc… ▽ More

    Submitted 27 February, 2019; v1 submitted 25 February, 2019; originally announced February 2019.

    Comments: R1: This replacement contains minor formatting improvements over the original R2: Anonymized "popular cloud service provider" phrase replaced with "Microsoft Azure"

  18. arXiv:1810.00398  [pdf

    q-bio.QM cs.LG stat.ML

    Vector Quantized Spectral Clustering applied to Soybean Whole Genome Sequences

    Authors: Aditya A. Shastri, Kapil Ahuja, Milind B. Ratnaparkhe, Aditya Shah, Aishwary Gagrani, Anant Lal

    Abstract: We develop a Vector Quantized Spectral Clustering (VQSC) algorithm that is a combination of Spectral Clustering (SC) and Vector Quantization (VQ) sampling for grou** Soybean genomes. The inspiration here is to use SC for its accuracy and VQ to make the algorithm computationally cheap (the complexity of SC is cubic in-terms of the input size). Although the combination of SC and VQ is not new, the… ▽ More

    Submitted 30 September, 2018; originally announced October 2018.

    Comments: 10 Pages, 3 Tables, 2 Figures

    MSC Class: 68T01; 68T10; 68W40

  19. arXiv:1711.11396  [pdf, other

    cs.PL

    CONFLLVM: A Compiler for Enforcing Data Confidentiality in Low-Level Code

    Authors: Ajay Brahmakshatriya, Piyus Kedia, Derrick Paul McKee, Pratik Bhatu, Deepak Garg, Akash Lal, Aseem Rastogi

    Abstract: We present an instrumenting compiler for enforcing data confidentiality in low-level applications (e.g. those written in C) in the presence of an active adversary. In our approach, the programmer marks secret data by writing lightweight annotations on top-level definitions in the source code. The compiler then uses a static flow analysis coupled with efficient runtime instrumentation, a custom mem… ▽ More

    Submitted 13 March, 2019; v1 submitted 30 November, 2017; originally announced November 2017.

    Comments: Technical report for CONFLLVM: A Compiler for Enforcing Data Confidentiality in Low-Level Code, appearing at EuroSys 2019

  20. arXiv:1702.05807  [pdf, ps, other

    cs.PL

    Precise Null Pointer Analysis Through Global Value Numbering

    Authors: Ankush Das, Akash Lal

    Abstract: Precise analysis of pointer information plays an important role in many static analysis techniques and tools today. The precision, however, must be balanced against the scalability of the analysis. This paper focusses on improving the precision of standard context and flow insensitive alias analysis algorithms at a low scalability cost. In particular, we present a semantics-preserving program tran… ▽ More

    Submitted 19 February, 2017; originally announced February 2017.

    Comments: 17 pages, 1 section in Appendix

  21. Structured illumination microscopy image reconstruction algorithm

    Authors: Amit Lal, Chunyan Shan, Peng Xi

    Abstract: Structured illumination microscopy (SIM) is a very important super-resolution microscopy technique, which provides high speed super-resolution with about two-fold spatial resolution enhancement. Several attempts aimed at improving the performance of SIM reconstruction algorithm have been reported. However, most of these highlight only one specific aspect of the SIM reconstruction -- such as the de… ▽ More

    Submitted 18 February, 2016; originally announced February 2016.

    Comments: OpenSIM code may be downloaded from: https://github.com/LanMai/OpenSIM

  22. arXiv:1403.1749  [pdf, ps, other

    cs.SE

    Automatically finding atomic regions for fixing bugs in Concurrent programs

    Authors: Saurabh Joshi, Akash Lal

    Abstract: This paper presents a technique for automatically constructing a fix for buggy concurrent programs: given a concurrent program that does not satisfy user-provided assertions, we infer atomic blocks that fix the program. An atomic block protects a piece of code and ensures that it runs without interruption from other threads. Our technique uses a verification tool as a subroutine to find the smalle… ▽ More

    Submitted 7 March, 2014; originally announced March 2014.

    Comments: 16 pages, 6 figures, 1 table

  23. arXiv:1207.2544  [pdf, ps, other

    cs.PL

    Variable and Thread Bounding for Systematic Testing of Multithreaded Programs

    Authors: Sandeep Bindal, Sorav Bansal, Akash Lal

    Abstract: Previous approaches to systematic state-space exploration for testing multi-threaded programs have proposed context-bounding and depth-bounding to be effective ranking algorithms for testing multithreaded programs. This paper proposes two new metrics to rank thread schedules for systematic state-space exploration. Our metrics are based on characterization of a concurrency bug using v (the minimum… ▽ More

    Submitted 5 February, 2013; v1 submitted 11 July, 2012; originally announced July 2012.

  24. arXiv:cs/0602063  [pdf, ps, other

    cs.CR

    Group Signature Schemes Using Braid Groups

    Authors: Tony Thomas, Arbind Kumar Lal

    Abstract: Artin's braid groups have been recently suggested as a new source for public-key cryptography. In this paper we propose the first group signature schemes based on the conjugacy problem, decomposition problem and root problem in the braid groups which are believed to be hard problems.

    Submitted 17 February, 2006; originally announced February 2006.

  25. arXiv:cs/0601049  [pdf, ps, other

    cs.CR

    Undeniable Signature Schemes Using Braid Groups

    Authors: Tony Thomas, Arbind Kumar Lal

    Abstract: Artin's braid groups have been recently suggested as a new source for public-key cryptography. In this paper we propose the first undeniable signature schemes using the conjugacy problem and the decomposition problem in the braid groups which are believed to be hard problems.

    Submitted 13 January, 2006; originally announced January 2006.

  26. arXiv:cs/0406048  [pdf, ps, other

    cs.IT

    On Expanders Graphs: Parameters and Applications

    Authors: H. L. Janwa A. K. Lal

    Abstract: We give a new lower bound on the expansion coefficient of an edge-vertex graph of a $d$-regular graph. As a consequence, we obtain an improvement on the lower bound on relative minimum distance of the expander codes constructed by Sipser and Spielman. We also derive some improved results on the vertex expansion of graphs that help us in improving the parameters of the expander codes of Alon, Bru… ▽ More

    Submitted 25 June, 2004; originally announced June 2004.

    Comments: Submitted to SIAM J. DAM on Feb. 1, 2001