Blog Posts
Verifying Software with Timers and Clocks (STACs)
Software with timers and clocks (STACs) exchange clock values to set timers and perform computation. STACs are key elements of safety-critical systems that make up the infrastructure of our daily …
• By Sagar Chaki, Dionisio de Niz
Verifying Distributed Adaptive Real-Time Systems
In 2011, the U.S. Government maintained a fleet of approximately 8,000 unmanned aerial systems (UAS), commonly referred to as "drones," a number that continues to grow. "No weapon system has …
• By James Edmondson, Sagar Chaki
In Artificial Intelligence Engineering
Using Machine Learning to Detect Malware Similarity
Malware, which is short for "malicious software," consists of programming aimed at disrupting or denying operation, gathering private information without consent, gaining unauthorized access to system resources, and other inappropriate …
• By Sagar Chaki
In Artificial Intelligence Engineering
Learning a Portfolio-Based Checker for Provenance-Similarity of Binaries
As software becomes an ever-increasing part of our daily lives, organizations find themselves relying on software that originates from unknown and untrusted sources. The vast majority of such software is …