{"title":"dZ3: Artifact for \"Symbolic Boolean Derivatives for Efficiently Solving Extended Regular Expression Constraints\"","authors":"C. Stanford, Margus Veanes, N. Bjørner","doi":"10.1145/3410296","DOIUrl":"https://doi.org/10.1145/3410296","url":null,"abstract":"","PeriodicalId":152027,"journal":{"name":"Artifact Digital Object Group","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121457238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software artifact for the paper \"Quantum Abstract Interpretation\"","authors":"Nengkun Yu, J. Palsberg","doi":"10.1145/3410291","DOIUrl":"https://doi.org/10.1145/3410291","url":null,"abstract":"","PeriodicalId":152027,"journal":{"name":"Artifact Digital Object Group","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121045724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Mirman, A. Hägele, Pavol Bielik, Timon Gehr, Martin T. Vechev
{"title":"Replication Package for Robustness Certification with Generative Models","authors":"M. Mirman, A. Hägele, Pavol Bielik, Timon Gehr, Martin T. Vechev","doi":"10.1145/3410308","DOIUrl":"https://doi.org/10.1145/3410308","url":null,"abstract":"","PeriodicalId":152027,"journal":{"name":"Artifact Digital Object Group","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124455814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artifact for \"Concurrent Deferred Reference Counting with Constant-Time Overhead\"","authors":"Daniel Anderson, G. Blelloch, Yuanhao Wei","doi":"10.1145/3410290","DOIUrl":"https://doi.org/10.1145/3410290","url":null,"abstract":"","PeriodicalId":152027,"journal":{"name":"Artifact Digital Object Group","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121933093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Source code and virtual machine image for CompCertO: Compiling Certified Open C Components","authors":"Jérémie Koenig, Zhong Shao","doi":"10.1145/3410306","DOIUrl":"https://doi.org/10.1145/3410306","url":null,"abstract":"","PeriodicalId":152027,"journal":{"name":"Artifact Digital Object Group","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130648283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kevin Ellis, Catherine Wong, Maxwell Nye, Mathias Sablé-Meyer, Lucas Morales, Luke B. Hewitt, Luc Cary, Armando Solar-Lezama, J. Tenenbaum
{"title":"DreamCoder software and data","authors":"Kevin Ellis, Catherine Wong, Maxwell Nye, Mathias Sablé-Meyer, Lucas Morales, Luke B. Hewitt, Luc Cary, Armando Solar-Lezama, J. Tenenbaum","doi":"10.1145/3410302","DOIUrl":"https://doi.org/10.1145/3410302","url":null,"abstract":"","PeriodicalId":152027,"journal":{"name":"Artifact Digital Object Group","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133846512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Replication Package for Article: Sound Probabilistic Inference via Guide Types","authors":"Di Wang, Jan Hoffmann, T. Reps","doi":"10.1145/3410300","DOIUrl":"https://doi.org/10.1145/3410300","url":null,"abstract":"","PeriodicalId":152027,"journal":{"name":"Artifact Digital Object Group","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134276387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gregory Bonaert, Dimitar I. Dimitrov, Maximilian Baader, Martin T. Vechev
{"title":"Artifact for PLDI'21 paper #156 \"Fast and Precise Certification of Transformers\"","authors":"Gregory Bonaert, Dimitar I. Dimitrov, Maximilian Baader, Martin T. Vechev","doi":"10.1145/3410287","DOIUrl":"https://doi.org/10.1145/3410287","url":null,"abstract":"","PeriodicalId":152027,"journal":{"name":"Artifact Digital Object Group","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127470609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cosku Acay, Rolph Recto, Joshua Gancher, A. Myers, Elaine Shi
{"title":"Replication Package for Viaduct: An Extensible, Optimizing Compiler for Secure Distributed Programs","authors":"Cosku Acay, Rolph Recto, Joshua Gancher, A. Myers, Elaine Shi","doi":"10.1145/3410299","DOIUrl":"https://doi.org/10.1145/3410299","url":null,"abstract":"Modern distributed systems involve interactions between principals with limited trust, so cryptographic mechanisms are needed to protect confidentiality and integrity. At the same time, most developers lack the training to securely employ cryptography.We present Viaduct, a compiler that transforms high-level programs into secure, efficient distributed realizations. Viaduct’s source language allows developers to declaratively specify security policies by annotating their programs with information flow labels. The compiler uses these labels to synthesize distributed programs that use cryptography efficiently while still defending the source-level security policy. The Viaduct approach is general, and can be easily extended with new security mechanisms. Our implementation of the Viaduct compiler comes with an extensible runtime system that includes plug-in support for multiparty computation, commitments, and zero-knowledge proofs. We have evaluated the system on a set of benchmarks, and the results indicate that our approach is feasible and can use cryptography in efficient, nontrivial ways. CCS Concepts: • Security and privacy → Information flow control; Cryptography; Domain-specific security and privacy architectures.","PeriodicalId":152027,"journal":{"name":"Artifact Digital Object Group","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114686729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}