Shield synthesis: runtime enforcement for reactive systems R Bloem, B Konighofer, R Konighofer, C Wang International Conference on Tools and Algorithms for Construction and …, 2015 | 159 | 2015 |
Eliminating timing side-channel leaks using program repair M Wu, S Guo, P Schaumont, C Wang International Symposium on Software Testing and Analysis, 2018 | 139 | 2018 |
Monotonic partial order reduction: An optimal symbolic partial order reduction technique V Kahlon, C Wang, A Gupta International Conference on Computer Aided Verification, 398-413, 2009 | 138 | 2009 |
Model checking C programs using F-Soft F Ivancic, I Shlyakhter, A Gupta, MK Ganai, V Kahlon, C Wang, Z Yang 2005 International Conference on Computer Design, 297-308, 2005 | 133 | 2005 |
Symbolic predictive analysis for concurrent programs C Wang, S Kundu, M Ganai, A Gupta International Symposium on Formal Methods, 256-272, 2009 | 129 | 2009 |
Interlocking obfuscation for anti-tamper hardware AR Desai, MS Hsiao, C Wang, L Nazhandali, S Hall Proceedings of the eighth annual cyber security and information intelligence …, 2013 | 125 | 2013 |
Coverage guided systematic concurrency testing C Wang, M Said, A Gupta Proceedings of the 33rd International Conference on Software Engineering …, 2011 | 123 | 2011 |
Peephole partial order reduction C Wang, Z Yang, V Kahlon, A Gupta International Conference on Tools and Algorithms for the Construction and …, 2008 | 120 | 2008 |
Generating data race witnesses by an SMT-based analysis M Said, C Wang, Z Yang, K Sakallah NASA Formal Methods Symposium, 313-327, 2011 | 115 | 2011 |
Universal causality graphs: A precise happens-before model for detecting bugs in concurrent programs V Kahlon, C Wang Computer Aided Verification: 22nd International Conference, CAV 2010 …, 2010 | 114* | 2010 |
Dynamic partial order reduction for relaxed memory models N Zhang, M Kusano, C Wang ACM SIGPLAN Conference on Programming Language Design and Implementation, 2015 | 110 | 2015 |
Trace-based symbolic analysis for atomicity violations C Wang, R Limaye, M Ganai, A Gupta International Conference on Tools and Algorithms for the Construction and …, 2010 | 97 | 2010 |
ConcBugAssist: Constraint solving for diagnosis and repair of concurrency bugs S Khoshnood, M Kusano, C Wang International Symposium on Software Testing and Analysis, 2015 | 86 | 2015 |
Shield synthesis B Könighofer, M Alshiekh, R Bloem, L Humphrey, R Könighofer, U Topcu, ... Formal Methods in System Design 51, 332-361, 2017 | 84 | 2017 |
Synthesis of masking countermeasures against side channel attacks H Eldib, C Wang International Conference on Computer Aided Verification, 2014 | 84 | 2014 |
Formal verification of software countermeasures against side-channel attacks H Eldib, C Wang, P Schaumont ACM Transactions on Software Engineering and Methodology 24 (2), 2014 | 83 | 2014 |
Learning from BDDs in SAT-based bounded model checking A Gupta, M Ganai, C Wang, Z Yang, P Ashar Proceedings of the 40th annual Design Automation Conference, 824-829, 2003 | 74 | 2003 |
Assertion guided symbolic execution of multithreaded programs S Guo, M Kusano, C Wang, Z Yang, A Gupta ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2015 | 73 | 2015 |
Staged concurrent program analysis N Sinha, C Wang Proceedings of the eighteenth ACM SIGSOFT international symposium on …, 2010 | 73 | 2010 |
On interference abstractions N Sinha, C Wang ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages 46 (1 …, 2011 | 68 | 2011 |