Seminar in Theoretical CS, Winter Semester 2015/16
News
- 05.11.2015: Topics assigned
- 22.06.2015: we are online
Deadlines
Wed, 28.10.2015, 16:00 | Introduction at room 9U09 |
30.11.2015 | Detailed outline due |
11.01.2016 | Seminar report due |
22.01.2016 | Presentation slides due |
28./29.01.2016 | Seminar at Inf. 2 (room 4201b) |
Overview
The goal of this seminar is to give an overview of the related research activities of the MOVES group. It covers several areas of computer science to which computed-aided verification techniques are central, and which represent the research fields of the respective supervisors. Each area features a number of topics which are described in a scientific journal or conference article. These research articles are the basis on which students have to prepare their report and presentation.
The following list gives an overview of the areas that will be covered. For getting an overview of possible related topics, we refer to the previous seminar in winter semester 2014/15.
- Abstraction methods for pointer programs
- Verification methods for Programmable Logic Controller (PLC) software
- Semantics and verification of probabilistic systems
- Formal methods for security analysis
Topics
Inductive Verification
- Efficient Abstraction Refinement
- Literature:
- Supervisor: Tim Lange
- Student: Nico Wübbels
- Efficient Computation of Weakest Preconditions
- Literature:
- Supervisor: Tim Lange
- Student: Patricia Wessel
- Property-Directed Inference
- Literature: A. Karbyshev, N. Bjørner, S. Itzhaky, N. Rinetzky, S. Shoham: Property-Directed Inference of Universal Invariants or Proving Their Absence
- Supervisor: Tim Lange
- Student: Frederick Prinz
Analysis of Dynamic Communication and Data Structures
- Analysis of infinite-state graph transformation systems
- Literature:
- Supervisor: Christina Jansen
- Student: Isabelle Tülleners
- Analysis of heap structures with data
- Literature:
- Supervisor: Christina Jansen
- Student: Lukas Oßmann
- Analysis of concurrent data structures
- Literature:
- Supervisor: Christina Jansen
- Student: Tristan Döhl
Probabilistic and Approximate Computations
- Cost-Based Analysis of Probabilistic Programs (English only!)
- Literature:
- Supervisor: Federico Olmedo
- Student: Ravi Singh
- Relational Hoare Logic for Probabilistic Programs (English only!)
- Literature:
- Supervisor: Federico Olmedo
- Student: Diwahar Jawahar
- Correctness of Approximate Computations (English only!)
Formal Approaches to Systems Engineering
- Formal requirements engineering(English only!)
- Contract-based safety assessment (English only!)
- Literature:
- Supervisor: Harold Bruintjes
- Student: Oleg Chernikov
- Probabilistic safety and liveness (English only!)
- Literature:
- Supervisor: Harold Bruintjes
- Student: Alina Shigabutdinova
Automata, Logics, and Games
- The Cyclic-Routing Problem (English only!)
- Literature:
- Supervisor: Souymodip Chakraborty
- Student: Umair Muslim
- Pareto Curves for probabilistic Model Checking (English only!)
- Finite Optimal Control for Time-Bounded Reachability in CTMDPs and Continuous-Time Markov Games (English only!)
- Literature:
- Markus N. Rabe and Sven Schewe: Finite Optimal Control for Time-Bounded Reachability in CTMDPs and Continuous-Time Markov Games
- Martin R. Neuhäußer Lijun Zhang: Time-Bounded Reachability Probabilities in Continuous-Time Markov Decision Processes
- Krishnendu Chatterjee, Marcin Jurdziński, Thomas A. Henzinger: Quantitative Stochastic Parity Games
- Supervisor: Souymodip Chakraborty
- Student: –
- Literature:
Information Flow Analysis for Security
- Type-based information flow analysis
- Literature: S. Hunt, D. Sands: On Flow-Sensitive Security Types
- Supervisor: Thomas Noll
- Student: Louis Wachtmeister
- Information flow analysis based on program dependence graphs
- Literature: Christian Hammer, Gregor Snelting: Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs
- Supervisor: Thomas Noll
- Student: Moritz Dederichs
- Model-driven information flow analysis
- Literature: Najah Ben Said, Takoua Abdellatif, Saddek Bensalem, Marius Bozga: Model-Driven Information Flow Security for Component-Based Systems
- Supervisor: Thomas Noll
- Student: Thomas Mertens
Formal Methods in System Design
- Model checking and performance of shared-memory mutual exclusion protocols
- Literature: R. Mateescu and W. Serwe: Model checking and performance evaluation with CADP illustrated on shared-memory mutual exclusion protocols
- Supervisor: Hao Wu
- Student: Raoul Schaffranek
- Modelling and Analysis of Markov Automata
- Literature: D. Guck, H. Hatefi, H. Hermanns, J.-P. Katoen, M. Timmer:Analysis of Timed and Long-Run Objectives for Markov Automata
- Supervisor: Hao Wu
- Student: Cagatay Ogut
- Model Checking Linearizability via Refinement
- Literature: Y. Liu, W. Chen, Y. A. Liu, and J. Su: Model Checking Linearizability via Refinement
- Supervisor: Hao Wu
- Student: –
Schedule of Talks
Thursday 28.01.2016 | |
---|---|
09:00-11:15 | 7, 8, 13 |
11:30-13:00 | 19, 20 |
14:00-16:15 | 1, 2, 3 |
Friday 29.01.2016 | |
09:00-11:15 | 4, 5, 6 |
11:30-13:00 | 11, 12 |
14:00-16:15 | 16, 17, 18 |
Prerequisites
Basic knowledge in the following areas is expected:
- Formal languages and automata theory
- Mathematical logic
- Previous knowledge in semantics of programming languages and concurrency theory is helpful but not mandatory
Registration
Registration to the seminar is handled between June 25 and July 8, 2015, via the central online form.
Additional Material
Contact
Thomas Noll <noll at cs.rwth-aachen.de>