Follow
Chao Wang
Title
Cited by
Cited by
Year
Monotonic partial order reduction: An optimal symbolic partial order reduction technique
V Kahlon, C Wang, A Gupta
International Conference on Computer Aided Verification, 398-413, 2009
1402009
Shield synthesis: runtime enforcement for reactive systems
R Bloem, B Konighofer, R Konighofer, C Wang
International Conference on Tools and Algorithms for Construction and …, 2015
1352015
Model checking C programs using F-Soft
F Ivancic, I Shlyakhter, A Gupta, MK Ganai, V Kahlon, C Wang, Z Yang
2005 International Conference on Computer Design, 297-308, 2005
1322005
Symbolic predictive analysis for concurrent programs
C Wang, S Kundu, M Ganai, A Gupta
International Symposium on Formal Methods, 256-272, 2009
1232009
Coverage guided systematic concurrency testing
C Wang, M Said, A Gupta
Proceedings of the 33rd International Conference on Software Engineering …, 2011
1202011
Eliminating timing side-channel leaks using program repair
M Wu, S Guo, P Schaumont, C Wang
International Symposium on Software Testing and Analysis, 2018
1192018
Peephole partial order reduction
C Wang, Z Yang, V Kahlon, A Gupta
International Conference on Tools and Algorithms for the Construction and …, 2008
1172008
Generating data race witnesses by an SMT-based analysis
M Said, C Wang, Z Yang, K Sakallah
NASA Formal Methods Symposium, 313-327, 2011
1112011
Interlocking obfuscation for anti-tamper hardware
AR Desai, MS Hsiao, C Wang, L Nazhandali, S Hall
Proceedings of the eighth annual cyber security and information intelligence …, 2013
1102013
Universal causality graphs: A precise happens-before model for detecting bugs in concurrent programs
V Kahlon, C Wang
Computer Aided Verification: 22nd International Conference, CAV 2010 …, 2010
110*2010
Dynamic partial order reduction for relaxed memory models
N Zhang, M Kusano, C Wang
ACM SIGPLAN Conference on Programming Language Design and Implementation, 2015
1052015
Trace-based symbolic analysis for atomicity violations
C Wang, R Limaye, M Ganai, A Gupta
International Conference on Tools and Algorithms for the Construction and …, 2010
942010
Synthesis of masking countermeasures against side channel attacks
H Eldib, C Wang
International Conference on Computer Aided Verification, 2014
852014
ConcBugAssist: Constraint solving for diagnosis and repair of concurrency bugs
S Khoshnood, M Kusano, C Wang
International Symposium on Software Testing and Analysis, 2015
832015
Formal verification of software countermeasures against side-channel attacks
H Eldib, C Wang, P Schaumont
ACM Transactions on Software Engineering and Methodology 24 (2), 2014
832014
Learning from BDDs in SAT-based bounded model checking
A Gupta, M Ganai, C Wang, Z Yang, P Ashar
Proceedings of the 40th annual Design Automation Conference, 824-829, 2003
762003
Shield synthesis
B Könighofer, M Alshiekh, R Bloem, L Humphrey, R Könighofer, U Topcu, ...
Formal Methods in System Design 51, 332-361, 2017
752017
Staged concurrent program analysis
N Sinha, C Wang
Proceedings of the eighteenth ACM SIGSOFT international symposium on …, 2010
732010
Eliminating path redundancy via postconditioned symbolic execution
Q Yi, Z Yang, S Guo, C Wang, J Liu, C Zhao
IEEE Transactions on Software Engineering 44 (1), 25-43, 2017
69*2017
Assertion guided symbolic execution of multithreaded programs
S Guo, M Kusano, C Wang, Z Yang, A Gupta
ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2015
692015
The system can't perform the operation now. Try again later.
Articles 1–20