{"id":"https://openalex.org/W4247353207","doi":"https://doi.org/10.1145/3090064.3090069","title":"Verification column","display_name":"Verification column","publication_year":2017,"publication_date":"2017-05-03","ids":{"openalex":"https://openalex.org/W4247353207","doi":"https://doi.org/10.1145/3090064.3090069"},"language":"en","primary_location":{"id":"doi:10.1145/3090064.3090069","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3090064.3090069","pdf_url":null,"source":{"id":"https://openalex.org/S4210221220","display_name":"ACM SIGLOG News","issn_l":"2372-3491","issn":["2372-3491"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGLOG News","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047763549","display_name":"Neha Rungta","orcid":"https://orcid.org/0000-0001-5143-8940"},"institutions":[{"id":"https://openalex.org/I1311688040","display_name":"Amazon (United States)","ror":"https://ror.org/04mv4n011","country_code":"US","type":"company","lineage":["https://openalex.org/I1311688040"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Neha Rungta","raw_affiliation_strings":["Amazon Web Services, Inc"],"affiliations":[{"raw_affiliation_string":"Amazon Web Services, Inc","institution_ids":["https://openalex.org/I1311688040"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5047763549"],"corresponding_institution_ids":["https://openalex.org/I1311688040"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.32036155,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"4","issue":"2","first_page":"54","last_page":"54"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9646999835968018,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7948887348175049},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6521518230438232},{"id":"https://openalex.org/keywords/concurrency","display_name":"Concurrency","score":0.6273810863494873},{"id":"https://openalex.org/keywords/software-verification","display_name":"Software verification","score":0.6053612232208252},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.5430899858474731},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.5401514768600464},{"id":"https://openalex.org/keywords/symbolic-execution","display_name":"Symbolic execution","score":0.5243028402328491},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.5044838190078735},{"id":"https://openalex.org/keywords/functional-verification","display_name":"Functional verification","score":0.5044180154800415},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4787815809249878},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4639759659767151},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.44796162843704224},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.43728581070899963},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.42209330201148987},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4019266664981842},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3839719593524933},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3295990526676178},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.22890758514404297},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.130977064371109},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10211732983589172}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7948887348175049},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6521518230438232},{"id":"https://openalex.org/C193702766","wikidata":"https://www.wikidata.org/wiki/Q1414548","display_name":"Concurrency","level":2,"score":0.6273810863494873},{"id":"https://openalex.org/C33054407","wikidata":"https://www.wikidata.org/wiki/Q6504747","display_name":"Software verification","level":5,"score":0.6053612232208252},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.5430899858474731},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.5401514768600464},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.5243028402328491},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.5044838190078735},{"id":"https://openalex.org/C62460635","wikidata":"https://www.wikidata.org/wiki/Q5508853","display_name":"Functional verification","level":3,"score":0.5044180154800415},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4787815809249878},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4639759659767151},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.44796162843704224},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.43728581070899963},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.42209330201148987},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4019266664981842},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3839719593524933},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3295990526676178},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.22890758514404297},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.130977064371109},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10211732983589172},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3090064.3090069","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3090064.3090069","pdf_url":null,"source":{"id":"https://openalex.org/S4210221220","display_name":"ACM SIGLOG News","issn_l":"2372-3491","issn":["2372-3491"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGLOG News","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","score":0.44999998807907104,"id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2118572231","https://openalex.org/W3036403349","https://openalex.org/W3120172095","https://openalex.org/W2108860137","https://openalex.org/W1522369122","https://openalex.org/W2162615969","https://openalex.org/W2117425003","https://openalex.org/W2013077575","https://openalex.org/W2809618173","https://openalex.org/W2138343703"],"abstract_inverted_index":{"The":[0,46,65,92,119,139,180],"growing":[1],"popularity":[2],"of":[3,42,55,83,101,104,124,129,157,186,201],"verification":[4,168,199],"competitions":[5],"such":[6,57],"as":[7,20,22,58],"VerifyThis":[8,26,74],"Verification":[9,16,95],"Competition":[10,13],"and":[11,40,110,116,132,160,169,189,198],"the":[12,34,69,86,89,125,130,137,196,202],"on":[14,38,107,136,177,184],"Software":[15,43],"(SV-COMP),":[17],"both,":[18],"incentivize":[19],"well":[21],"reward":[23],"tool":[24],"developers.":[25],"2016":[27,75],"was":[28],"held":[29],"in":[30,68],"Eindhoven":[31],"colocated":[32],"with":[33],"European":[35],"Joint":[36],"Conferences":[37],"Theory":[39],"Practice":[41],"(ETAPS)":[44],"2016.":[45],"competition":[47],"presents":[48,85,121],"challenges":[49,90],"to":[50,73,88,113,148,172],"evaluate":[51],"a":[52,102,127],"broad":[53],"range":[54],"tools":[56],"Danfy,":[59],"KeY,":[60],"VeriFast,":[61],"CIVL,":[62],"among":[63],"others.":[64],"first":[66],"article":[67,120,141,194],"newsletter":[70],"\"CIVL":[71],"Solutions":[72],"Challenges\"":[76],"by":[77,143,152],"Stephen":[78],"F.":[79],"Siegel":[80],"at":[81],"University":[82,156],"Delaware":[84],"solutions":[87],"using":[91],"Concurrency":[93],"Intermediate":[94],"Language":[96],"(CIVL)":[97],"verifier.":[98],"CIVL":[99,134],"supports":[100],"variety":[103],"techniques":[105],"based":[106],"symbolic":[108],"execution":[109],"model":[111],"checking":[112],"verify":[114],"sequential":[115],"concurrent":[117],"programs.":[118],"an":[122],"overview":[123],"framework,":[126],"description":[128],"challenges,":[131],"how":[133],"performs":[135],"benchmarks.":[138],"second":[140],"\"Security":[142],"Compilation:":[144],"An":[145],"Automated":[146],"Approach":[147],"Comprehensive":[149],"Side-channel":[150],"resistance\"":[151],"Chao":[153],"Wang":[154],"from":[155,163],"Southern":[158],"California":[159],"Patrick":[161],"Schaumont":[162],"Virginia":[164],"Tech":[165],"leverage":[166],"formal":[167],"program":[170],"synthesis":[171],"detect":[173],"side":[174],"challenge":[175],"attacks":[176],"mobile":[178],"devices.":[179],"approach":[181],"is":[182],"evaluated":[183],"implementations":[185],"MAC-Keccak,":[187],"AES":[188],"other":[190],"cryptographic":[191],"algorithms.":[192],"This":[193],"bridges":[195],"security":[197],"forums":[200],"newsletter.":[203]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
