Skip to main content

Showing 1–3 of 3 results for author: Zitoun, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2002.12447  [pdf, other

    cs.AI

    Bringing freedom in variable choice when searching counter-examples in floating point programs

    Authors: Heytem Zitoun, Claude Michel, Laurent Michel, Michel Rueher

    Abstract: Program verification techniques typically focus on finding counter-examples that violate properties of a program. Constraint programming offers a convenient way to verify programs by modeling their state transformations and specifying searches that seek counter-examples. Floating-point computations present additional challenges for verification given the semantic subtleties of floating point arith… ▽ More

    Submitted 27 February, 2020; originally announced February 2020.

  2. arXiv:2002.12441  [pdf, other

    cs.AI

    An efficient constraint based framework forhandling floating point SMT problems

    Authors: Heytem Zitoun, Claude Michel, Laurent Michel, Michel Rueher

    Abstract: This paper introduces the 2019 version of \us{}, a novel Constraint Programming framework for floating point verification problems expressed with the SMT language of SMTLIB. SMT solvers decompose their task by delegating to specific theories (e.g., floating point, bit vectors, arrays, ...) the task to reason about combinatorial or otherwise complex constraints for which the SAT encoding would be c… ▽ More

    Submitted 27 February, 2020; originally announced February 2020.

  3. arXiv:1910.07921  [pdf, other

    cs.NI cs.CR

    FASHION: Functional and Attack graph Secured HybrId Optimization of virtualized Networks

    Authors: Devon Callahan, Timothy Curry, Hazel Davidson, Heytem Zitoun, Benjamin Fuller, Laurent Michel

    Abstract: Maintaining a resilient computer network is a delicate task with conflicting priorities. Flows should be served while controlling risk due to attackers. Upon publication of a vulnerability, administrators scramble to manually mitigate risk while waiting for a patch. We introduce FASHION: a linear optimizer that balances routing flows with the security risk posed by these flows. FASHION formalize… ▽ More

    Submitted 8 August, 2022; v1 submitted 17 October, 2019; originally announced October 2019.

    Comments: Accepted to IEEE TDSC. This version adds an online evaluation Sections 4.2 and 5.2.4

    ACM Class: C.2.1; C.2.3; G.1.6