Home
News
People
Publications
Vacancies
Contact
Pulp Fictions
Light
Dark
Automatic
verification
Exact Bayesian Inference for Loopy Probabilistic Programs
We present an exact Bayesian inference method for inferring posterior distributions encoded by probabilistic programs featuring …
Lutz Klinkenberg
,
Christian Blumenthal
,
Mingshuai Chen
,
Joost-Pieter Katoen
PDF
Cite
Code
DOI
Probabilistic Program Verification via Inductive Synthesis of Inductive Invariants
Essential tasks for the verification of probabilistic programs include bounding expected outcomes and proving termination in finite …
Kevin Batz
,
Mingshuai Chen
,
Sebastian Junges
,
Benjamin Lucien Kaminski
,
Joost-Pieter Katoen
,
Christoph Matheja
PDF
Cite
DOI
Artifact Evaluated
Lower Bounds for Possibly Divergent Probabilistic Programs
We present a new proof rule for verifying lower bounds on quantities of probabilistic programs. Our proof rule is not confined to …
Shenghua Feng
,
Mingshuai Chen
,
Han Su
,
Benjamin Lucien Kaminski
,
Joost-Pieter Katoen
,
Naijun Zhan
PDF
Cite
Slides
DOI
Exact Probabilistic Inference Using Generating Functions
Probabilistic programs are typically normal-looking programs describing posterior probability distributions. They intrinsically code up …
Lutz Klinkenberg
,
Tobias Winkler
,
Mingshuai Chen
,
Joost-Pieter Katoen
PDF
Cite
Code
Encoding Inductive Invariants as Barrier Certificates
We present the
invariant barrier-certificate condition
that witnesses unbounded-time safety of differential dynamical systems. The …
Qiuye Wang
,
Mingshuai Chen
,
Bai Xue
,
Naijun Zhan
,
Joost-Pieter Katoen
PDF
Cite
Code
Slides
DOI
PA-Boot: A Formally Verified Authentication Protocol for Multiprocessor Secure Boot
Hardware supply-chain attacks are raising significant security threats to the boot process of multiprocessor systems. This paper …
Zhuoruo Zhang
,
Chenyang Yu
,
He Huang
,
Rui Chang
,
Mingshuai Chen
,
Qinming Dai
,
Wenbo Shen
,
Yongwang Zhao
,
Kui Ren
PDF
Cite
DOI
Does a Program Yield the Right Distribution?
We study discrete probabilistic programs with potentially unbounded looping behaviors over an infinite state space. We present, to the …
Mingshuai Chen
,
Joost-Pieter Katoen
,
Lutz Klinkenberg
,
Tobias Winkler
PDF
Cite
DOI
Artifact Evaluated
Latticed $k$-Induction with an Application to Probabilistic Programs
We revisit two well-established verification techniques,
$k$-induction
and
bounded model checking
(BMC), in the more general setting of …
Kevin Batz
,
Mingshuai Chen
,
Benjamin Lucien Kaminski
,
Joost-Pieter Katoen
,
Christoph Matheja
,
Philipp Schröer
PDF
Cite
Slides
DOI
Artifact Evaluated
Pulp Fiction
Synthesizing Invariant Barrier Certificates via Difference-of-Convex Programming
A barrier certificate often serves as an inductive invariant that isolates an unsafe region from the reachable set of states, and hence …
Qiuye Wang
,
Mingshuai Chen
,
Bai Xue
,
Naijun Zhan
,
Joost-Pieter Katoen
PDF
Cite
Slides
Video
DOI
Artifact Evaluated
Unbounded-Time Safety Verification of Stochastic Differential Dynamics
In this paper, we propose a method for bounding the probability that a stochastic differential equation (SDE) system violates a safety …
Shenghua Feng
,
Mingshuai Chen
,
Bai Xue
,
Sriram Sankaranarayanan
,
Naijun Zhan
PDF
Cite
Slides
Video
DOI
Artifact Evaluated
Pulp Fiction
»
Cite
×