Fedor Shmarov

Fedor Shmarov
The University of Manchester · Department of Computer Science

PhD in Computer Science

About

24
Publications
1,609
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
150
Citations

Publications

Publications (24)
Preprint
Full-text available
Bounded Model Checking (BMC) is a widely used software verification technique. Despite its successes, the technique has several limiting factors, from state-space explosion to lack of completeness. Over the years, interval analysis has repeatedly been proposed as a partial solution to these limitations. In this work, we evaluate whether the computa...
Chapter
Full-text available
ESBMC implements many state-of-the-art techniques that combine abstract interpretation and model checking. Here, we report on new and improved features that allow us to obtain verification results for previously unsupported programs and properties. ESBMC now employs a new static interval analysis of expressions in programs to increase verification...
Preprint
Full-text available
Safety-critical systems with neural network components require strong guarantees. While existing neural network verification techniques have shown great progress towards this goal, they cannot prove the absence of software faults in the network implementation. This paper presents NeuroCodeBench - a verification benchmark for neural network code wri...
Chapter
Full-text available
Combining different verification and testing techniques together could, at least in theory, achieve better results than each individual one on its own. The challenge in doing so is how to take advantage of the strengths of each technique while compensating for their weaknesses. EBF 4.2 addresses this challenge for concurrency vulnerabilities by cre...
Article
Full-text available
Despite increased understanding about psoriasis pathophysiology, currently there is a lack of predictive computational models. We developed a personalisable ordinary differential equations model of human epidermis and psoriasis that incorporates immune cells and cytokine stimuli to regulate the transition between two stable steady states of clinica...
Preprint
Full-text available
Bounded model checking (BMC) and fuzzing techniques are among the most effective methods for detecting errors and security vulnerabilities in software. However, there is still a shortcoming in detecting these errors due to the inability to cover large areas in the target code. Coverage standards and measures are also an excellent way to ascertain t...
Preprint
Finding software vulnerabilities in concurrent programs is a challenging task due to the size of the state-space exploration, as the number of interleavings grows exponentially with the number of program threads and statements. We propose and evaluate EBF (Ensembles of Bounded Model Checking with Fuzzing) -- a technique that combines Bounded Model...
Article
Full-text available
Finding software vulnerabilities in concurrent programs is a challenging task due to the size of the state-space exploration, as the number of interleavings grows exponentially with the number of program threads and statements. We propose and evaluate EBF (Ensembles of Bounded Model Checking with Fuzzing) – a technique that combines Bounded Model C...
Preprint
Full-text available
Despite increased understanding about psoriasis pathophysiology, currently there is a lack of predictive computational models. We developed a personalisable ordinary differential equations model of human epidermis that features two stable steady states: healthy skin and psoriasis. In line with experimental data, an immune stimulus initiated transit...
Preprint
Full-text available
Memory corruption bugs continue to plague low-level systems software generally written in unsafe programming languages. In order to detect and protect against such exploits, many pre- and post-deployment techniques exist. In this position paper, we propose and motivate the need for a hybrid approach for the protection against memory safety vulnerab...
Article
Background: Remission duration and treatment response following phototherapy for psoriasis are highly variable and factors influencing these are poorly understood. Objectives: Our primary outcome was to investigate whether selected clinical/serum biomarkers were associated with remission duration, and secondly with psoriasis clearance at the end...
Preprint
Full-text available
Memory corruption bugs continue to plague low-level systems software generally written in unsafe programming languages. In order to detect and protect against such exploits, many pre- and post-deployment techniques exist. In this position paper, we propose and motivate the need for a hybrid approach for the protection against memory safety vulnerab...
Preprint
Full-text available
Memory corruption bugs continue to plague low-level systems software generally written in unsafe programming languages. In order to detect and protect against such exploits, many pre- and post-deployment techniques exist. In this position paper, we propose and motivate the need for a hybrid approach for the protection against memory safety vulnerab...
Article
Full-text available
We present a new method for the automated synthesis of digital controllers with formal safety guarantees for systems with nonlinear dynamics, noisy output measurements, and stochastic disturbances. Our method derives digital controllers such that the corresponding closed-loop system, modeled as a sampled-data stochastic control system, satisfies a...
Preprint
Full-text available
We present a new method for the automated synthesis of digital controllers with formal safety guarantees for systems with nonlinear dynamics, noisy output measurements, and stochastic disturbances. Our method derives digital controllers such that the corresponding closed-loop system, modeled as a sampled-data stochastic control system, satisfies a...
Conference Paper
Full-text available
We present a new method for the automated synthesis of safe and robust Proportional-Integral-Derivative (PID) controllers for stochastic hybrid systems. Despite their widespread use in industry, no automated method currently exists for deriving a PID controller (or any other type of controller, for that matter) with safety and performance guarantee...
Article
Full-text available
We present a new method for the automated synthesis of safe and robust Proportional-Integral-Derivative (PID) controllers for stochastic hybrid systems. Despite their widespread use in industry, no automated method currently exists for deriving a PID controller (or any other type of controller, for that matter) with safety and performance guarantee...
Conference Paper
We develop numerically rigorous Monte Carlo approaches for computing probabilistic reachability in hybrid systems subject to random and nondeterministic parameters. Instead of standard simulation we use \(\delta \)-complete SMT procedures, which enable formal reasoning for nonlinear systems up to a user-definable numeric precision. Monte Carlo appr...
Conference Paper
The parameter set synthesis problem consists of identifying sets of parameter values for which a given system model satisfies a desired behaviour. This paper presents BioPSy, a tool that performs guaranteed parameter set synthesis for ordinary differential equation (ODE) biological models expressed in the Systems Biology Markup Language (SBML) give...
Article
We present ProbReach, a tool for verifying probabilistic reachability for stochastic hybrid systems, i.e., computing the probability that the system reaches an unsafe region of the state space. In particular, ProbReach will compute an arbitrarily small interval which is guaranteed to contain the required probability. Standard (non-probabilistic) re...
Article
Verification of cyber-physical systems is a difficult, yet extremely important, problem. Hybrid systems offer a theoretical framework in which to perform formal verification of cyber-physical systems. In this paper we study the problem of bounded $\delta$-reachability in hybrid systems with random initial parameters. We devise a technique for compu...

Network

Cited By