{"id":244223,"date":"2025-04-22T05:59:04","date_gmt":"2025-04-22T05:59:04","guid":{"rendered":"https:\/\/cyprusconferences.org\/tase2025\/?page_id=244223"},"modified":"2025-04-22T07:14:04","modified_gmt":"2025-04-22T07:14:04","slug":"accepted-papers","status":"publish","type":"page","link":"https:\/\/cyprusconferences.org\/tase2025\/accepted-papers\/","title":{"rendered":"Accepted Papers"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.22.2&#8243; background_image=&#8221;https:\/\/cyprusconferences.org\/tase2025\/wp-content\/uploads\/2023\/05\/24857899916_6d7d641e3e_o-scaled-1.jpg&#8221; background_blend=&#8221;luminosity&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; header_font=&#8221;|800|||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;35px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1 style=\"text-align: left;\">Accepted Papers<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 style=\"text-align: center;\">List of Accepted Papers<\/h3>\n<p>&nbsp;<\/p>\n<p><strong>Robust Deep Reinforcement Learning Using Formal Verification <\/strong><br \/>Avraham Raviv, Shaiel Vistuch, Erel Dekel, Boaz Gurevich and Hillel Kugler<\/p>\n<p><strong>Detecting speculative data flow vulnerabilities using weakest precondition reasoning<\/strong><br \/>Graeme Smith<\/p>\n<p><strong>Mining Diamonds in labeled Transition Systems<\/strong><br \/>Flip van Spaendonck and Kevin Jilissen<\/p>\n<p><strong>Stable Ranges: Shared Dichotomy in Large Version-Controlled Repositories<\/strong><br \/>Laurent Bulteau, Pierre-Yves David, Florian Horn and Euxane Tran-Girard<\/p>\n<p><strong>Unleash the Hidden Power of CAR-based Model Checking through Dynamic Traversal<\/strong><br \/>Yibo Dong, Yu Chen, Jianwen Li and Geguang Pu<\/p>\n<p><strong>State Significance-Guided Fuzzing for Stateful Protocol Program<\/strong><br \/>Kunpeng Jian, Yanyan Zou, Chen Wang, Ning Li, Menghao Li and Wei Huo<\/p>\n<p><strong>Operational Semantics for Crystality: A Smart Contract Language for Parallel EVMs<\/strong><br \/>Ziyun Xu, Hao Wang and Meng Sun<\/p>\n<p><strong>Random Testing of Model Checkers for Timed Automata with Automated Oracle Generation<\/strong><br \/>Andrea Manini, Matteo Rossi and Pierluigi San Pietro<\/p>\n<p><strong>Failure divergence refinement for Event-B<\/strong><br \/>Sebastian Stock, Michael Leuschel and Atif Mashkoor<\/p>\n<p><strong>Portability of Optimizations from SC to TSO<\/strong><br \/>Akshay Gopalakrishnan and Clark Verbrugge<\/p>\n<p><strong>Dependent Assertion Logic for Modular Software Verification<\/strong><br \/>Lukas Gr\u00e4tz<\/p>\n<p><strong>FAMiT: Mitigating False Alarms for Program Analysis Using Large Language Models<\/strong><br \/>Jiabao Zeng, Yuanlin Li, Ran Zhang, Yuanmin Xie, Kejia Li and Min Zhou<\/p>\n<p><strong>A Formally Verified Neural Network Converter for the Interactive Theorem Prover Coq<\/strong><br \/>Leo Alexander Gummersbach, Kim V\u00f6llinger and Andrei Aleksandrov<\/p>\n<p><strong>CASTLE: Benchmarking Dataset for Static Code Analyzers and LLMs towards CWE Detection<\/strong><br \/>Richard A. Dubniczky, Krisztofer Zolt\u00e1n Horv\u00e1t, Tam\u00e1s Bisztray, Mohamed Amine Ferrag, Lucas C. Cordeiro and Norbert Tihanyi<\/p>\n<p><strong>A Formal Framework for Naturally Specifying and Verifying Sequential Algorithms<\/strong><br \/>Chengxi Yang, Shushu Wu and Qinxiang Cao<\/p>\n<p><strong>Machine-Checked Compositional Specification and Proofs for Embedded Systems<\/strong><br \/>Karl Palmskog, Mattias Nyberg and Dilian Gurov<\/p>\n<p><strong>Adaptive Clause Management in SMT Solvers: A Dynamic Weighting Framework for Formal Verification<\/strong><br \/>Wenda Leng, Meihua Liu and Yufeng Jin<\/p>\n<p><strong>A Cross-domain Data Sharing Scheme Based on Federated Blockchain<\/strong><br \/>Honglin Mao, Jie Zhang, Yao Zhang and Xiaohong Li<\/p>\n<p><strong>Testing-Based Formal Verification with Program Slicing on Functional Soundness and Completeness<\/strong><br \/>Ai Liu, Yang Liu, Shaoying Liu and Zhibin Yang<\/p>\n<p><strong>COMPASS: An Agent for MLIR Compilation Pass Pipeline Generation<\/strong><br \/>Hongbin Zhang, Shihao Gao, Yang Liu, Mingjie Xing, Yanjun Wu and Chen Zhao<\/p>\n<p><strong>SNRWLS: Improve (W)PMS Solver with Weighting Strategies Related to Number of Soft Clauses<\/strong><br \/>Chen Shuhao, Jiang Menghua and Chen Yin<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Accepted PapersList of Accepted Papers &nbsp; Robust Deep Reinforcement Learning Using Formal Verification Avraham Raviv, Shaiel Vistuch, Erel Dekel, Boaz Gurevich and Hillel Kugler Detecting speculative data flow vulnerabilities using weakest precondition reasoningGraeme Smith Mining Diamonds in labeled Transition SystemsFlip van Spaendonck and Kevin Jilissen Stable Ranges: Shared Dichotomy in Large Version-Controlled RepositoriesLaurent Bulteau, Pierre-Yves David, Florian Horn and Euxane Tran-Girard Unleash the Hidden Power of CAR-based Model Checking through Dynamic TraversalYibo Dong, Yu Chen, Jianwen Li and Geguang Pu State Significance-Guided Fuzzing for Stateful Protocol ProgramKunpeng Jian, Yanyan Zou, Chen Wang, Ning Li, Menghao Li and Wei Huo Operational Semantics for Crystality: A Smart Contract Language for Parallel EVMsZiyun Xu, Hao Wang and Meng Sun Random Testing of Model Checkers for Timed Automata with Automated Oracle GenerationAndrea Manini, Matteo Rossi and Pierluigi San Pietro Failure divergence refinement for Event-BSebastian Stock, Michael Leuschel and Atif Mashkoor Portability of Optimizations from SC to TSOAkshay Gopalakrishnan and Clark Verbrugge Dependent Assertion Logic for Modular Software VerificationLukas Gr\u00e4tz FAMiT: Mitigating False Alarms for Program Analysis Using Large Language ModelsJiabao Zeng, Yuanlin Li, Ran Zhang, Yuanmin Xie, Kejia Li and Min Zhou A Formally Verified Neural Network Converter for the Interactive Theorem Prover CoqLeo [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"_links":{"self":[{"href":"https:\/\/cyprusconferences.org\/tase2025\/wp-json\/wp\/v2\/pages\/244223"}],"collection":[{"href":"https:\/\/cyprusconferences.org\/tase2025\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyprusconferences.org\/tase2025\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyprusconferences.org\/tase2025\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cyprusconferences.org\/tase2025\/wp-json\/wp\/v2\/comments?post=244223"}],"version-history":[{"count":6,"href":"https:\/\/cyprusconferences.org\/tase2025\/wp-json\/wp\/v2\/pages\/244223\/revisions"}],"predecessor-version":[{"id":244231,"href":"https:\/\/cyprusconferences.org\/tase2025\/wp-json\/wp\/v2\/pages\/244223\/revisions\/244231"}],"wp:attachment":[{"href":"https:\/\/cyprusconferences.org\/tase2025\/wp-json\/wp\/v2\/media?parent=244223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}