Skip to main content
Top

Formal Methods

26th International Symposium, FM 2024, Milan, Italy, September 9–13, 2024, Proceedings, Part I

  • Open Access
  • 2025
  • Open Access
  • Book

About this book

The open access book set LNCS 14933 + 14934 constitutes the refereed proceedings of the 26th International Symposium on Formal Methods, FM 2024, which took place in Milan, Italy, in September 2024.

The 51 full and 4 short papers included in these proceedings were carefully reviewed and selected from 219 submissions. They also include 2 invited talks in full paper length and 10 tutorial papers. The contributions were organized in topical sections as follows:

Part I: Invited papers; fundamentals of formal verification; foundations; learn and repair; programming languages.- logic and automata;

Part II: Tools and case studies; embedded systems track; industry day track; tutorial papers.

Table of Contents

Next
  • current Page 1
  • 2
  • 3
  1. Invited Papers

    1. Frontmatter

    2. Adversarial Robustness Certification for Bayesian Neural Networks

      • Open Access
      Matthew Wicker, Andrea Patane, Luca Laurenti, Marta Kwiatkowska
      The chapter discusses the vulnerability of neural networks to adversarial attacks and the necessity of developing methods to mitigate these vulnerabilities. It introduces Bayesian Neural Networks (BNNs) as a promising approach for probabilistically principled evaluation of model uncertainty. The main focus is on the development of a probabilistic verification framework to quantify the adversarial robustness of BNNs. The framework addresses two key properties: probabilistic robustness, which measures the probability that a network sampled from the posterior distribution is robust, and decision robustness, which evaluates the robustness of the optimal decision made by a BNN. The chapter presents algorithms for computing lower and upper bounds for both properties, using techniques such as Interval Bound Propagation (IBP) and Linear Bound Propagation (LBP). Empirical validation is provided through case studies in airborne collision avoidance, medical image recognition, and autonomous driving. The framework is shown to be effective in certifying BNNs with multiple hidden layers and hundreds of neurons per layer, and in providing non-trivial certificates of adversarial robustness and predictive uncertainty properties. The chapter also highlights the challenges and limitations of the Bayesian approach, particularly the need to bound and partition at the weight space level. Overall, the work provides a comprehensive and practical technique for the verification of probabilistic and decision robustness in Bayesian Neural Networks, with potential applications in safety-critical scenarios.
      Download PDF-version
    3. Getting Chip Card Payments Right

      • Open Access
      David Basin, Xenia Hofmeier, Ralf Sasse, Jorge Toro-Pozo
      The chapter 'Getting Chip Card Payments Right' delves into the EMV standard for smart card payments, focusing on the new C8 kernel. EMV, named after Europay, Mastercard, and Visa, is the dominant protocol for in-person payments worldwide. The C8 kernel introduces advanced security features such as modern cryptographic algorithms and privacy protection mechanisms. The chapter explores the use of the Tamarin prover to analyze the security of C8, identifying both secure and insecure configurations. Notable findings include vulnerabilities in configurations lacking certain authentication methods and the effectiveness of relay resistance protocols. The analysis underscores the importance of adhering to EMVCo's requirements for secure implementation. The chapter concludes by emphasizing the need for rigorous formal modeling and proof construction in ensuring the security of complex payment protocols.
      Download PDF-version
  2. Fundamentals of Formal Verification

    1. Frontmatter

    2. A Local Search Algorithm for MaxSMT(LIA)

      • Open Access
      Xiang He, Bohan Li, Mengyu Zhao, Shaowei Cai
      The chapter discusses the MaxSMT(LIA) problem, which is an optimization version of the satisfiability problem with linear integer arithmetic constraints. It introduces PairLS, a local search algorithm that employs a novel pairwise operator to enrich the search space and a compensation-based picking heuristic to determine effective operations. The algorithm is evaluated on extensive benchmarks, demonstrating competitive performance against state-of-the-art solvers. The chapter also highlights the extensibility of the pairwise operator, showing its potential for enhancing local search algorithms in related domains.
      Download PDF-version
    3. Integrating Loop Acceleration Into Bounded Model Checking

      • Open Access
      Florian Frohn, Jürgen Giesl
      The chapter explores the integration of loop acceleration into Bounded Model Checking (BMC) to enhance the detection of deep counterexamples. It introduces a new technique called Accelerated Bounded Model Checking (ABMC) that leverages acceleration to compute shortcuts in transition formulas, significantly improving BMC’s ability to find long error traces. The approach is particularly useful for systems with deeply nested loops, where traditional BMC methods struggle. The chapter also discusses the use of blocking clauses to prevent redundant work and to prove safety in cases where BMC would otherwise fail. The method is evaluated through experiments, demonstrating its effectiveness in finding long counterexamples and proving safety in various scenarios. The chapter concludes by highlighting the potential for future work, including support for additional theories and non-linear constraints.
      Download PDF-version
    4. Nonlinear Craig Interpolant Generation Over Unbounded Domains by Separating Semialgebraic Sets

      • Open Access
      Hao Wu, Jie Wang, Bican Xia, Xiakun Li, Naijun Zhan, Ting Gan
      The chapter delves into the synthesis of Craig interpolants for nonlinear polynomial formulas over unbounded domains, a crucial aspect of formal verification and automated theorem proving. It introduces a novel approach utilizing homogenization techniques to revive the Archimedean condition, enabling the separation of semialgebraic sets and the generation of interpolants. The authors provide SOS programming procedures for finding polynomial and semialgebraic interpolants, demonstrating the effectiveness and efficiency of their method through concrete examples. This work extends the existing research by removing restrictions on formula forms and variable domains, offering a more general and practical solution for interpolant generation in verification tasks.
      Download PDF-version
    5. Practical Approximate Quantifier Elimination for Non-linear Real Arithmetic

      • Open Access
      S. Akshay, Supratik Chakraborty, Amir Kafshdar Goharshady, R. Govind, Harshit Jitendra Motwani, Sai Teja Varanasi
      The chapter focuses on the challenging problem of quantifier elimination (QE) in non-linear real arithmetic (NRA), a crucial area in computer algebra and real algebraic geometry. It introduces a practical algorithm that approximates NRA constraints using Boolean combinations of real interval constraints, enabling efficient approximate QE over NRA. The approach leverages Handelman's Theorem and dynamic adaptive gridding to reduce the approximation problem to multiple linear programming instances, discharged by a state-of-the-art LP solver. The algorithm provides strong guarantees of approximation and allows users to trade off precision for performance. The chapter also demonstrates the practical effectiveness of the algorithm through experiments with POQER, a tool implementing the algorithm, showing significant improvements over existing tools in solving QE problems and enabling the use of approximate QE in combinations of theories including NRA. Additionally, the chapter highlights the potential of the algorithm in solving quantified SMT problems over mixed theories, such as NRA+ADT, which are beyond the reach of modern SMT solvers.
      Download PDF-version
    6. A Divide-and-Conquer Approach to Variable Elimination in Linear Real Arithmetic

      • Open Access
      Valentin Promies, Erika Ábrahám
      The chapter introduces a divide-and-conquer approach to variable elimination in linear real arithmetic (LRA), a crucial problem in various applications such as static program analysis, scheduling, and neural network verification. The method, derived from the FMplex method, focuses on polyhedron projection, which involves projecting a convex polyhedron onto a subspace. The authors present a new algorithm that returns the result as a set of linear constraints, demonstrating its correctness, complexity, and improvements over existing methods. The chapter also discusses interesting relations to other methods like virtual term substitution and provides an experimental evaluation showing the superior performance of the new approach compared to established tools. Additionally, it highlights potential future improvements and the parallelizability of the method.
      Download PDF-version
  3. Foundations

    1. Frontmatter

    2. Free Facts: An Alternative to Inefficient Axioms in Dafny

      • Open Access
      Tabea Bordis, K. Rustan M. Leino
      The chapter discusses the challenges of proof brittleness in software verification using Dafny, a programming language with an automated verifier. It introduces 'free facts' as an alternative to universally quantified axioms, which can lead to instability in verification results. Free facts are automatically generated properties based on concrete instances of program code, reducing the complexity and brittleness of proof obligations. The chapter provides a detailed implementation and evaluation of free facts in Dafny, demonstrating their potential to improve verification time and resource efficiency. It also compares free facts with traditional axioms, highlighting their advantages in specific use cases. The evaluation is based on large-scale subject systems, showcasing the practical applicability of free facts in reducing proof brittleness and enhancing the overall verification process.
      Download PDF-version
    3. Understanding Synthesized Reactive Systems Through Invariants

      • Open Access
      Rüdiger Ehlers
      The chapter delves into the challenges of scalability and trust in reactive synthesis, where systems are automatically generated from specifications. It proposes a method to identify and explain invariants in synthesized systems, focusing on generalized reactivity(1) specifications. The approach involves computing Boolean functions that characterize input/output combinations to avoid, enhancing the understandability of system behavior. The chapter also discusses the application of this method in two case studies, demonstrating its effectiveness in specification debugging and synthesizing understandable invariants. Additionally, it highlights the potential of this approach to improve the scalability and trustworthiness of reactive synthesis in practical applications.
      Download PDF-version
    4. Combining Classical and Probabilistic Independence Reasoning to Verify the Security of Oblivious Algorithms

      • Open Access
      Pengbo Yan, Toby Murray, Olga Ohrimenko, Van-Thuan Pham, Robert Sison
      The chapter introduces a program logic designed to formally verify the security of probabilistic oblivious algorithms, which aim to protect secrets by hiding their access patterns. It combines classical and probabilistic independence reasoning to tackle complex semantics and invariants that previous methods could not handle. The logic is applied to several non-trivial case studies, demonstrating its effectiveness in verifying the security of real-world oblivious algorithms. The chapter highlights the unique challenges posed by probabilistic oblivious algorithms and the innovative approach of the proposed logic in addressing them.
      Download PDF-version
    5. Efficient Formally Verified Maximal End Component Decomposition for MDPs

      • Open Access
      Arnd Hartmanns, Bram Kohlen, Peter Lammich
      The chapter introduces a formally verified Maximal End Component (MEC) decomposition algorithm for Markov Decision Processes (MDPs), crucial for probabilistic model checking. It outlines the importance of MECs in ensuring the correctness of model checking algorithms and the challenges in achieving formal verification. The authors propose a bottom-up approach to integrate verified components into an existing model checker, mcsta, demonstrating the practicality of their method. The algorithm is refined using the Isabelle Refinement Framework and integrated into mcsta, showcasing its efficiency and reliability. The chapter also includes experimental evaluations comparing the performance of the verified implementation with existing tools, highlighting its competitive edge and potential for future advancements in formal verification.
      Download PDF-version
    6. Introducing SWIRL: An Intermediate Representation Language for Scientific Workflows

      • Open Access
      Iacopo Colonnelli, Doriana Medić, Alberto Mulone, Viviana Bono, Luca Padovani, Marco Aldinucci
      The chapter 'Introducing SWIRL: An Intermediate Representation Language for Scientific Workflows' addresses the limitations of current Workflow Management Systems (WMSs) in handling modern scientific applications. It introduces SWIRL, a low-level language designed for distributed workflow execution plans, enabling interoperability and automatic optimisation of data communications. SWIRL models workflows using send/receive communication primitives and provides a formal method for encoding workflow instances into distributed execution plans. The chapter also includes a set of rewriting rules for optimising data transfers and discusses the implementation of a SWIRL compiler toolchain. The SWIRL language aims to improve the efficiency and effectiveness of scientific workflows, making it a promising solution for large-scale, distributed scientific computations.
      Download PDF-version
    7. Fast Attack Graph Defense Localization via Bisimulation

      • Open Access
      Nimrod Busany, Rafi Shalom, Dan Klein, Shahar Maoz
      The chapter 'Fast Attack Graph Defense Localization via Bisimulation' explores the use of bisimulation to analyze and optimize analytical attack graphs (AAGs). AAGs represent potential cyber attack paths within a network, but their size can be prohibitively large for practical analysis. The authors introduce the concept of an AAG-fold, a compact representation of an AAG that preserves essential topological properties. By applying bisimulation, the AAG-fold allows for faster and more efficient computation of defense cores, which are minimal sets of rules whose removal prevents attacks. The chapter also discusses the implementation and evaluation of these methods, demonstrating their practical applicability in real-world scenarios. The innovative use of bisimulation sets this work apart from previous approaches, offering a scalable and efficient solution for cybersecurity defense.
      Download PDF-version
Next
  • current Page 1
  • 2
  • 3
Title
Formal Methods
Editors
André Platzer
Kristin Yvonne Rozier
Matteo Pradella
Matteo Rossi
Copyright Year
2025
Electronic ISBN
978-3-031-71162-6
Print ISBN
978-3-031-71161-9
DOI
https://doi.org/10.1007/978-3-031-71162-6

Accessibility information for this book is coming soon. We're working to make it available as quickly as possible. Thank you for your patience.

Premium Partner

    Image Credits
    Neuer Inhalt/© ITandMEDIA, Nagarro GmbH/© Nagarro GmbH, AvePoint Deutschland GmbH/© AvePoint Deutschland GmbH, AFB Gemeinnützige GmbH/© AFB Gemeinnützige GmbH, USU GmbH/© USU GmbH, Ferrari electronic AG/© Ferrari electronic AG