Search Results for author: Heike Wehrheim

Found 8 papers, 3 papers with code

Can ChatGPT support software verification?

no code implementations4 Nov 2023 Christian Janßen, Cedric Richter, Heike Wehrheim

Loop invariant generation is a core task in software verification, and the generation of valid and useful invariants would likely help formal verifiers.

Code Generation valid

Can we learn from developer mistakes? Learning to localize and repair real bugs from real bug fixes

1 code implementation1 Jul 2022 Cedric Richter, Heike Wehrheim

In contrast, artificial bugs -- produced by mutating existing source code -- can be easily obtained at a sufficient scale and are therefore often preferred in the training of existing approaches.

DeepMutants: Training neural bug detectors with contextual mutations

no code implementations14 Jul 2021 Cedric Richter, Heike Wehrheim

Learning-based bug detectors promise to find bugs in large code bases by exploiting natural hints such as names of variables and functions or comments.

Language Modelling

Modularising Verification Of Durable Opacity

no code implementations30 Nov 2020 Eleni Bila, John Derrick, Simon Doherty, Brijesh Dongol, Gerhard Schellhorn, Heike Wehrheim

For NOrec, this allows us to re-use an existing opacity proof and complement it with a proof of the durability of accesses to shared state.

Distributed, Parallel, and Cluster Computing

Defining and Verifying Durable Opacity: Correctness for Persistent Software Transactional Memory

no code implementations17 Apr 2020 Eleni Bila, Simon Doherty, Brijesh Dongol, John Derrick, Gerhard Schellhorn, Heike Wehrheim

In this paper, we transfer the principle of durable concurrent correctness to the area of software transactional memory (STM).

Distributed, Parallel, and Cluster Computing Logic in Computer Science Programming Languages

Testing Monotonicity of Machine Learning Models

no code implementations27 Feb 2020 Arnab Sharma, Heike Wehrheim

This induces an urgent need for quality assurance of ML models with respect to (often domain-dependent) requirements.

Attribute BIG-bench Machine Learning +1

Do Android Taint Analysis Tools Keep their Promises?

2 code implementations9 Apr 2018 Felix Pauck, Eric Bodden, Heike Wehrheim

In yet other cases, the evaluations differ in terms of the data leaks searched for, or lack a ground truth to compare against.

Software Engineering

Predicting Rankings of Software Verification Competitions

2 code implementations2 Mar 2017 Mike Czech, Eyke Hüllermeier, Marie-Christine Jakobs, Heike Wehrheim

Software verification competitions, such as the annual SV-COMP, evaluate software verification tools with respect to their effectivity and efficiency.

Cannot find the paper you are looking for? You can Submit a new open access paper.