Evaluating the correctness of code generated by AI is a challenging open problem. In this paper, we propose a fully automated method, named ACCA, to evaluate the correctness of AI-generated code for ...security purposes. The method uses symbolic execution to assess whether the AI-generated code behaves as a reference implementation. We use ACCA to assess four state-of-the-art models trained to generate security-oriented assembly code and compare the results of the evaluation with different baseline solutions, including output similarity metrics, widely used in the field, and the well-known ChatGPT, the AI-powered language model developed by OpenAI.
Our experiments show that our method outperforms the baseline solutions and assesses the correctness of the AI-generated code similar to the human-based evaluation, which is considered the ground truth for the assessment in the field. Moreover, ACCA has a very strong correlation with the human evaluation (Pearson’s correlation coefficient r=0.84 on average). Finally, since it is a full y automated solution that does not require any human intervention, the proposed method performs the assessment of every code snippet in ∼0.17 s on average, which is definitely lower than the average time required by human analysts to manually inspect the code, based on our experience.
•ACCA aligns with human evaluation for code correctness in the 93% of cases.•Code correctness computed by ACCA is the closest to the human evaluation.•ACCA is the most correlated to the human evaluation over all the predictions.•Computational time required by ACCA are lower than human evaluation, on average.
Federated Learning (FL) allows multiple clients to collaboratively train machine learning models while preserving the model privacy of the clients. However, when generating a global model during the ...aggregation process, a malicious FL server could derive clients’ local model weights. Such a threat cannot be completely eliminated, even if model aggregation is performed in the Trusted Execution Environment of the server, due to memory access pattern attacks. To tackle this challenge, our paper focuses on the top-k model aggregation algorithm in FL and introduces a space efficient and oblivious sparsified model aggregation algorithm named Sort-Then-Insert (STI), which removes the dependency of the memory access pattern on the model input, thus protecting the confidentiality of clients’ models. Compared with Path ORAM, STI is over 100 times faster, and compared with the state-of-the-art solution for the same problem, Olive, our theoretical analysis and experiments demonstrate that STI can achieve comparable performance overhead (O(nklog2(nk))+O(dlog2(d)) for STI vs. O((nk+d)log2(nk+d)) for Olive) and reduced space overhead (max(O(nk),O(d)) for STI vs. O(nk+d) for Olive).
•A top-k model aggregation algorithm for FL achieving memory access obliviousness.•Similar time complexity and reduced space complexity, compared with existing works.•Evaluated through experiments using two sorting networks and different parameters.
In the design of robot skills, the focus generally lies on increasing the flexibility and reliability of the robot execution process; however, typical skill representations are not designed for ...analysing execution failures if they occur or for explicitly learning from failures. In this paper, we describe a learning-based hybrid representation for skill parameterisation called an execution model, which considers execution failures to be a natural part of the execution process. We then (i) demonstrate how execution contexts can be included in execution models, (ii) introduce a technique for generalising models between object categories by combining generalisation attempts performed by a robot with knowledge about object similarities represented in an ontology, and (iii) describe a procedure that uses an execution model for identifying a likely hypothesis of a parameterisation failure. The feasibility of the proposed methods is evaluated in multiple experiments performed with a physical robot in the context of handle grasping, object grasping, and object pulling. The experimental results suggest that execution models contribute towards avoiding execution failures, but also represent a first step towards more introspective robots that are able to analyse some of their execution failures in an explicit manner.
•Design of execution models, a hybrid representation for skill parameterisation that makes it possible to analyse execution failures and learn from them.•Description of a procedure for learning how to generalise execution models between object categories.•Development of algorithms for identifying a likely cause of a parameterisation failure and proposing a parameter correction.
Divorce or the breaking up of a marriage between husband and wife through a court decision has legal consequences for both parties' rights and obligations, including children. In Indonesia, cases ...that are often problematic in divorce cases are the failure to achieve the execution of decisions, especially in the context of the right to support the wife and children and child custody. However, in this paper, the author is interested in examining more deeply the obstacles that occur in implementing the execution of child custody decisions that are seen from several legal perspectives, including the compilation of Islamic law, the Marriage Law, the Child Protection Law, and the regulation of the execution process of decisions. in Herziene Inlandsch Reglement (HIR). The legal research method used is Normative Law with a statutory approach or called the statute approach. This paper also uses secondary legal data sources, such as: scientific journals, books, related laws and regulations. The purpose of this paper is to provide solutions related to the obstacles that occur in the implementation of decisions on the execution of child custody rights, which until now often occur and still provide polemics both in society and within the scope of religious and state courts.
To fill the reference model gaps in the Manufacturing Execution System (MES) platform software field, the definitions for platform software and reference model are put forward, and a reference model ...for MES platform conforming to Industrie 4.0 specification is proposed. The MES platform was characterized by the reference model from three dimensions of problem space, lifetime and infrastructure, in which, each dimension was represented by a view that consists of a number of viewpoints. In building the reference model, the viewpoints selection processes were discussed based on the current standards in each area corresponding to each dimension, and then a concept of reference model building block was defined. Furthermore, in order to explain how the reference model can be applied in use, some examples were performed for a representative application scenario in Industrie 4.0 and illustrating the reference model in combination with the application of specific technologies. A conclusion and expectation for the reference model research were summarized in the end of the paper.
The culmination of a civil case in court is marked by the crucial step of decision implementation, commonly known as execution. Execution can only proceed when the decision attains permanent legal ...force ('inkracht van gewijsde'). While the losing party may voluntarily execute the decision, failure to fulfill stipulated obligations empowers the winning party, the plaintiff, to seek forced execution. Despite the irrevocable legal status of a decision, as signified by its permanent legal force, Indonesian civil procedural law affords opportunities for litigants and third parties to reassess such decisions. This reassessment is facilitated through challenges or rebuttals, as outlined in Article 195 paragraph (6) HIR, Article 206 paragraph (6) Rbg, Article 378 RV, Article 279 RV, and is guided by the Ius Curia Novit principle, as affirmed in Article 10 of Law Number 48 of 2009 concerning Power Justice. Utilizing a normative juridical approach, this study relies on secondary data to explore the nuances of execution and post-decision challenges, drawing on primary legal materials, secondary legal materials, and tertiary legal materials.
We introduce a method of reversing the execution of imperative concurrent programs. Given an irreversible program, we describe the process of producing two versions. The first performs forward ...execution and saves information necessary for reversal. The second uses this saved information to simulate reversal. We propose using identifiers to capture statement execution order, and to use this to correctly undo data races via backtracking reversibility. We prove this reversibility to be correct, showing that the initial program state is restored and that all saved information is used (garbage-clean).
•Reversal of a concurrent imperative programming language that stores minimal data to undo irreversible steps•Identifiers assigned to statements as they execute that determines reverse control flow and ensures correct reversibility•Proof of correctness confirms the method of reversal restores program states and does not produce garbage•Reversibility illustrated on an implementation of a parallel sorting algorithm, with forward and reverse execution described
Parallel and Asynchronous Smart Contract Execution Liu, Jian; Li, Peilun; Cheng, Raymond ...
IEEE transactions on parallel and distributed systems,
2022-May-1, 2022-5-1, Volume:
33, Issue:
5
Journal Article
Peer reviewed
Open access
Today's blockchains suffer from low throughput and high latency, which impedes their widespread adoption of more complex applications like smart contracts. In this article, we propose a novel ...paradigm for smart contract execution. It distinguishes between consensus nodes and execution nodes: different groups of execution nodes can execute transactions in parallel; meanwhile, consensus nodes can asynchronously order transactions and process execution results. Moreover, it requires no coordination among execution nodes and can effectively prevent livelocks. We show two ways of applying this paradigm to blockchains. First, we show how we can make Ethereum support parallel and asynchronous contract execution without hard-forks . Then, we propose a new public, permissionless blockchain. Our benchmark shows that, with a fast consensus layer, it can provide a high throughput even for complex transactions like Cryptokitties gene mixing. It can also protect simple transactions from being starved by complex transactions.
In today's volatile, uncertain, and complex business environments, manufacturing companies must not only adapt to market demands but also minimize the time between problem occurrence and resolution. ...The implementation of lean manufacturing systems has been crucial in this regard. However, traditional approaches have shown notable inefficiencies that can be effectively addressed through digitalization. By embracing digital solutions, manufacturing companies can ensure efficient continuous improvement, driving performance to higher levels. This study aims to find a digital solution for a specific company that faces daily challenges associated with low visibility into production. An investigation revealed that the Lean tools used by the company were outdated, directly affecting the generated information and consequently, decision-making. The integration of a Manufacturing Execution System into the factory's dynamics was the solution found. In this context, a step-by-step methodology is proposed to guide the implementation. As a result, a prototype of the system was designed. The validation of the system by end-users demonstrates the success of the proposed methodology.
Seamless application execution is vital for the usability of various delay-sensitive mobile cloud applications. However, the resource-intensive migration process and intrinsic limitations of the ...wireless medium impede the realization of seamless execution in mobile cloud computing (MCC) environment. This work is the first comprehensive survey that studies the state-of-the-art cloud-based mobile application execution frameworks (CMAEFs) in perspective of seamless application execution in MCC and investigates the frameworks suitability for the seamless execution. The seamless execution enabling approaches for the CMAEFs are identified and classified based on the implementation locations. We also investigate the seamless application execution enabling approaches to identify advantages and disadvantages of employing such approaches for attaining the seamless application execution in MCC. The existing frameworks are compared based on the significant parameters derived from the taxonomy of the seamless application execution enabling approaches. The principles for enabling the seamless application execution within the MCC are also highlighted. Finally, open research challenges in realizing the seamless application execution are discussed.