Chao Wang
Zitiert von
Zitiert von
Monotonic partial order reduction: An optimal symbolic partial order reduction technique
V Kahlon, C Wang, A Gupta
International Conference on Computer Aided Verification, 398-413, 2009
Model checking C programs using F-Soft
F Ivancic, I Shlyakhter, A Gupta, MK Ganai, V Kahlon, C Wang, Z Yang
2005 International Conference on Computer Design, 297-308, 2005
Symbolic predictive analysis for concurrent programs
C Wang, S Kundu, M Ganai, A Gupta
FM 2009: Formal Methods: Second World Congress, Eindhoven, The Netherlands …, 2009
Peephole partial order reduction
C Wang, Z Yang, V Kahlon, A Gupta
International Conference on Tools and Algorithms for the Construction and …, 2008
Shield synthesis: runtime enforcement for reactive systems
R Bloem, B Konighofer, R Konighofer, C Wang
International Conference on Tools and Algorithms for Construction and …, 2015
Coverage guided systematic concurrency testing
C Wang, M Said, A Gupta
Proceedings of the 33rd International Conference on Software Engineering …, 2011
Universal Causality Graphs: A Precise Happens-Before Model for Detecting Bugs in Concurrent Programs.
V Kahlon, C Wang
CAV, 434-449, 2010
Dynamic partial order reduction for relaxed memory models
N Zhang, M Kusano, C Wang
ACM SIGPLAN Conference on Programming Language Design and Implementation, 2015
Interlocking obfuscation for anti-tamper hardware
AR Desai, MS Hsiao, C Wang, L Nazhandali, S Hall
Proceedings of the eighth annual cyber security and information intelligence …, 2013
Generating data race witnesses by an SMT-based analysis
M Said, C Wang, Z Yang, K Sakallah
NASA Formal Methods: Third International Symposium, NFM 2011, Pasadena, CA …, 2011
Eliminating timing side-channel leaks using program repair
M Wu, S Guo, P Schaumont, C Wang
International Symposium on Software Testing and Analysis, 2018
Trace-based symbolic analysis for atomicity violations
C Wang, R Limaye, M Ganai, A Gupta
Tools and Algorithms for the Construction and Analysis of Systems: 16th …, 2010
Synthesis of masking countermeasures against side channel attacks
H Eldib, C Wang
International Conference on Computer Aided Verification, 2014
ConcBugAssist: Constraint solving for diagnosis and repair of concurrency bugs
S Khoshnood, M Kusano, C Wang
International Symposium on Software Testing and Analysis, 2015
Staged concurrent program analysis
N Sinha, C Wang
Proceedings of the eighteenth ACM SIGSOFT international symposium on …, 2010
Learning from BDDs in SAT-based bounded model checking
A Gupta, M Ganai, C Wang, Z Yang, P Ashar
Proceedings of the 40th annual Design Automation Conference, 824-829, 2003
Formal verification of software countermeasures against side-channel attacks
H Eldib, C Wang, P Schaumont
ACM Transactions on Software Engineering and Methodology 24 (2), 2014
On interference abstractions
N Sinha, C Wang
ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages 46 (1 …, 2011
Assertion guided symbolic execution of multithreaded programs
S Guo, M Kusano, C Wang, Z Yang, A Gupta
ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2015
Shield synthesis
B Könighofer, M Alshiekh, R Bloem, L Humphrey, R Könighofer, U Topcu, ...
Formal Methods in System Design 51, 332-361, 2017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20