Establishing trust in black-box programs | IEEE Conference Publication | IEEE Xplore