Jorge A. Navas

Jorge A. Navas

Computer Scientist at SRI International


Contact Info

Computer Science Lab (CSL)
SRI International
jorge.navas@sri.com

Interests

My passion is the design and implementation of automatic tools that can boost programmers' productivity to make more reliable and secure code. The goal of my research is to improve the process of verifying and testing complex software systems.

Software

Current Projects

Past Projects

Recent Service Activitives

Peer-Reviewed Publications [ DBLP | Google Scholar ]

  1. Verifying Solidity Smart Contracts Via Communication Abstraction in SmartACE
    Scott Wesley, M. Christakis, A. Gurfinkel , J. A. Navas, R. Trefler, V. Wustholz .
    To appear in VMCAI'22.
  2. Compositional Verification of Smart Contracts Through Communication Abstraction (PDF).
    Scott Wesley, M. Christakis, A. Gurfinkel , J. A. Navas, R. Trefler, V. Wustholz .
    SAS'21.
  3. Disjunctive Interval Analysis (PDF).
    G. Gange, J. A. Navas, P. Schachte, H. Sondergaard, P. J. Stuckey.
    SAS'21.
  4. Abstract Interpretation of LLVM with a Region-Based Memory Model
    A. Gurfinkel , J. A. Navas
    To appear in VSTTE'21.
  5. Automated Safety Verification of Programs Invoking Neural Networks (PDF).
    M. Christakis, H. Ferit Eniser, H. Hermanns, J. Hoffmann, Y. Kothari, Jianlin Li, J. A. Navas, V. Wustholz .
    CAV'21. The code is available here, and the benchmarks here .
  6. Automatically Tailoring Abstract Interpretation to Custom Usage Scenarios (PDF).
    M. N. Mansur, B.  Mariano , M. Christakis, J. A. Navas, V. Wustholz .
    CAV'21. The code is available here.
  7. A Fresh Look at Zones and Octagons (PDF).
    G. Gange, Zequn Ma, J. A. Navas, P. Schachte, H. Sondergaard, P. J. Stuckey.
    ACM TOPLAS Volume 43, Issue 3 September 2021.
  8. Verification of an Optimized NTT Algorithm (PDF).
    J. A. Navas, B. Dutertre, I. Mason,
    VSTTE'20. The code of the verifier is available here.
  9. Dissecting Widening: Separating Termination from Information (PDF).
    **Distinguished Paper Award**
    G. Gange, J. A. Navas, P. Schachte, H. Sondergaard, P. J. Stuckey.
    APLAS'19.
  10. Unification-based Pointer Analysis without Oversharing (PDF).
    J. Kuderski , J. A. Navas, A. Gurfinkel .
    FMCAD'19.
  11. Simple and Precise Static Analysis of Untrusted Linux Kernel Extensions (PDF).
    E. Gershuni, N. Amit, A. Gurfinkel , N. Narodytska, J. A. Navas, N. Rinetzky, L. Ryzhyk and M. Sagiv.
    PLDI'19.
  12. Generating Component Interfaces by Integrating Static and Symbolic Analysis, Learning, and Runtime Monitoring (PDF).
    Falk Howard, Dimitra Giannakopoulou, Malte Maus, J. A. Navas.
    ISoLA'18.
  13. Executable Counterexamples in Software Model Checking (PDF).
    J. Gennari, A. Gurfinkel , T. Kahsai, J. A. Navas, E. J. Schwartz.
    VSTTE'18.
  14. Verification of Fault-Tolerant Protocols with Sally (PDF).
    B. Dutertre, D. Jovanovic, J. A. Navas.
    NFM'18.
  15. A Context-Sensitive Memory Model for Verification of C/C++ Programs (PDF).
    A. Gurfinkel , J. A. Navas.
    SAS'17.
  16. Exploiting Sparsity in Difference-Bound Matrices (PDF).
    G. Gange, J. A. Navas, P. Schachte, H. Sondergaard, P. J. Stuckey.
    SAS'16.
  17. An Abstract Domain of Uninterpreted Functions (PDF).
    G. Gange, J. A. Navas, P. Schachte, H. Sondergaard, P. J. Stuckey.
    VMCAI'16.
  18. A Complete Refinement Procedure for Regular Separability of Context-Free Languages (PDF).
    G. Gange, J. A. Navas, P. Schachte, H. Sondergaard, P. J. Stuckey.
    TCS 2016.
  19. Finding Inconsistencies in Programs with Loops (PDF).
    T. Kahsai, J. A. Navas, D. Jovanovic, M. Schaf.
    LPAR'15.
  20. The SeaHorn Verification Framework (PDF).
    A. Gurfinkel , T. Kahsai, A.   Komuravelli, J. A. Navas.
    CAV'15.
  21. Horn-Clauses as an Intermediate Representation for Program Analysis and Transformation (PDF).
    G. Gange, J. A. Navas, P. Schachte, H. Sondergaard, P. J. Stuckey.
    ICLP'15.
  22. A Tool for Intersecting Context-Free Grammars and Its Applications (PDF).
    G. Gange, J. A. Navas, P. Schachte, H. Sondergaard, P. J. Stuckey.
    NFM'15.
  23. SeaHorn: A Framework for Verifying C Programs (Competition Contribution) (PDF).
    A. Gurfinkel , T. Kahsai, J. A. Navas.
    TACAS'15.
  24. Interval Analysis and Machine Arithmetic: Why Signedness Ignorance is Bliss (PDF).
    G. Gange, J. A. Navas, P. Schachte, H. Sondergaard, P. J. Stuckey.
    ACM TOPLAS Volume 37, Issue 1 January 2015.
  25. Analyzing array manipulating programs by program transformation (PDF) .
    J. R. Cornish, G. Gange, J. A. Navas, P. Schachte, H. Sondergaard, P. J. Stuckey.
    LOPSTR'14.
  26. IKOS: A Framework for Static Analysis based on Abstract Interpretation (PDF).
    G. Brat, J. A. Navas, N. Shi, A. Venet.
    SEFM'14.
  27. Verification of Programs by Combining Iterated Specialization with Interpolation (PDF) .
    E. De Angelis, F. Fioravanti, J. A. Navas, M. Proietti.
    HCVS'14.
  28. Abstract Interpretation over Non-Lattice Abstract Domains (PDF).
    G. Gange, J. A. Navas, P. Schachte, H. Sondergaard, P. J. Stuckey.
    SAS'13.
  29. Unbounded Model Checking with Interpolation for Regular Language Constraints (PDF).
    G. Gange, J. A. Navas, P. Schachte, H. Sondergaard, P. J. Stuckey.
    TACAS'13.
  30. Boosting Concolic Testing with Interpolation (PDF).
    J. Jaffar, V. Murali, J. A. Navas.
    FSE'13.
  31. Failure Tabled Constraint Logic Programming by Interpolation (PDF) (PDF appendix).
    G. Gange, J. A. Navas, P. Schachte, H. Sondergaard, P. J. Stuckey.
    ICLP'13.
  32. Modelling Destructive Assignments (PDF).
    K.  Francis, J. A. Navas, P. J. Stuckey.
    CP'13.
  33. Signedness-Agnostic Program Analysis: Precise Integer Bounds for Low-Level Code (PDF).
    J. A. Navas, P. Schachte, H. Sondergaard, P. J. Stuckey.
    APLAS'12.
  34. TRACER: A Symbolic Execution Tool for Verification (PDF).
    J. Jaffar, V. Murali, J. A. Navas, A. E. Santosa.
    CAV'12.
  35. Path-Sensitive Backward Slicing (PDF).
    J. Jaffar, V. Murali, J. A. Navas, A. E. Santosa.
    SAS'12.
  36. Unbounded Symbolic Execution for Program Verification (PDF).
    RV'11.
    J. Jaffar, J. A. Navas, A. E. Santosa.
  37. Negative Ternary Set-Sharing (PDF).
    E. Trias, J. A. Navas, E. S. Ackley, S. Forrest, M. Hermenegildo.
    ICLP'08.
  38. User-Definable Resource Bounds Analysis for Logic Programs (PDF).
    **Test of Time Award (10 years)**
    J. A. Navas, E. Mera, P. Lopez-Garcia, M. Hermenegildo.
    ICLP'07.
  39. A Flexible, (C)LP-based Approach to the Analysis of Object-Oriented Programs (PDF).
    M. Mendez-Lojo, J. A. Navas, M. Hermenegildo.
    LOPSTR'07.
  40. Efficient, Parametric Fixpoint Algorithm for Analysis of Java Bytecode (PDF).
    M. Mendez-Lojo, J. A. Navas, M. Hermenegildo.
    BYTECODE'07.
  41. Efficient top-down set-sharing analysis using cliques (PDF).
    J. A. Navas, F. Bueno, M. Hermenegildo .
    PADL'06.

Non-Peer-Reviewed Publications

  1. Algorithmic Logic-Based Verification (PDF).
    A. Gurfinkel , T. Kahsai, J. A. Navas.
    ACM Special Interest Group on Logic and Computation (SIGLOG) April, 2015.

Unpublished Technical Reports

  1. A Partial-Order Approach to Array Content Analysis (PDF).
    G. Gange, J. A. Navas, P. Schachte, H. Sondergaard, P. J. Stuckey.

Doctoral Dissertation