ML + FV = $\heartsuit$? A Survey on the Application of Machine Learning to Formal Verification

作者: Moussa Amrani , Levi Lúcio , Adrien Bibal

DOI:

关键词: Domain (software engineering)Systems modelingCorrectnessFormal verificationPoint (typography)Probabilistic logicArtificial intelligenceSoftwareStatic analysisMachine learningComputer science

摘要: Formal Verification (FV) and Machine Learning (ML) can seem incompatible due to their opposite mathematical foundations use in real-life problems: FV mostly relies on discrete mathematics aims at ensuring correctness; ML often probabilistic models consists of learning patterns from training data. In this paper, we postulate that they are complementary practice, explore how helps its classical approaches: static analysis, model-checking, theorem-proving, SAT solving. We draw a landscape the current practice catalog some most prominent uses inside tools, thus offering new perspective techniques help researchers practitioners better locate possible synergies. discuss lessons learned our work, point improvements offer visions for future domain light science software systems modeling.

参考文章(59)
Jiří Vyskočil, Josef Urban, Cezary Kaliszyk, Machine Learner for Automated Reasoning 0.4 and 0.5 arXiv: Learning. ,(2014)
James P. Bridge, Sean B. Holden, Lawrence C. Paulson, Machine Learning for First-Order Theorem Proving Journal of Automated Reasoning. ,vol. 53, pp. 141- 172 ,(2014) , 10.1007/S10817-014-9301-5
Jasmin Christian Blanchette, Lukas Bulwahn, Tobias Nipkow, Automatic proof and disproof in Isabelle/HOL frontiers of combining systems. pp. 12- 27 ,(2011) , 10.1007/978-3-642-24364-6_2
Daniel Kühlwein, Jasmin Christian Blanchette, Cezary Kaliszyk, Josef Urban, MaSh: Machine Learning for Sledgehammer Interactive Theorem Proving. pp. 35- 50 ,(2013) , 10.1007/978-3-642-39634-2_6
Hiran V. Nath, Babu M. Mehtre, Static Malware Analysis Using Machine Learning Methods International Conference on Security in Computer Networks and Distributed Systems. pp. 440- 450 ,(2014) , 10.1007/978-3-642-54525-2_39
Matthias Fuchs, A feature-based learning method for theorem proving national conference on artificial intelligence. pp. 457- 462 ,(1998)
Yongshao Ruan, Eric Horvitz, Henry Kautz, Restart Policies with Dependence among Runs: A Dynamic Programming Approach principles and practice of constraint programming. pp. 573- 586 ,(2002) , 10.1007/3-540-46135-3_38
Suleiman Y. Yerima, Sakir Sezer, Igor Muttik, Android malware detection: An eigenspace analysis approach science and information conference. pp. 1236- 1242 ,(2015) , 10.1109/SAI.2015.7237302
Sagar Chaki, Edmund Clarke, Nishant Sinha, Prasanna Thati, Automated Assume-Guarantee Reasoning for Simulation Conformance Computer Aided Verification. pp. 534- 547 ,(2005) , 10.1007/11513988_51
Nina Amla, Xiaoqun Du, Andreas Kuehlmann, Robert P. Kurshan, Kenneth L. McMillan, An Analysis of SAT-Based Model Checking Techniques in an Industrial Environment Lecture Notes in Computer Science. pp. 254- 268 ,(2005) , 10.1007/11560548_20