Follow
Chao Wang
Title
Cited by
Cited by
Year
Shield synthesis: runtime enforcement for reactive systems
R Bloem, B Konighofer, R Konighofer, C Wang
International Conference on Tools and Algorithms for Construction and …, 2015
1552015
Monotonic partial order reduction: An optimal symbolic partial order reduction technique
V Kahlon, C Wang, A Gupta
International Conference on Computer Aided Verification, 398-413, 2009
1412009
Eliminating timing side-channel leaks using program repair
M Wu, S Guo, P Schaumont, C Wang
International Symposium on Software Testing and Analysis, 2018
1342018
Model checking C programs using F-Soft
F Ivancic, I Shlyakhter, A Gupta, MK Ganai, V Kahlon, C Wang, Z Yang
2005 International Conference on Computer Design, 297-308, 2005
1332005
Symbolic predictive analysis for concurrent programs
C Wang, S Kundu, M Ganai, A Gupta
International Symposium on Formal Methods, 256-272, 2009
1282009
Coverage guided systematic concurrency testing
C Wang, M Said, A Gupta
Proceedings of the 33rd International Conference on Software Engineering …, 2011
1272011
Interlocking obfuscation for anti-tamper hardware
AR Desai, MS Hsiao, C Wang, L Nazhandali, S Hall
Proceedings of the eighth annual cyber security and information intelligence …, 2013
1242013
Peephole partial order reduction
C Wang, Z Yang, V Kahlon, A Gupta
International Conference on Tools and Algorithms for the Construction and …, 2008
1192008
Generating data race witnesses by an SMT-based analysis
M Said, C Wang, Z Yang, K Sakallah
NASA Formal Methods Symposium, 313-327, 2011
1142011
Universal causality graphs: A precise happens-before model for detecting bugs in concurrent programs
V Kahlon, C Wang
Computer Aided Verification: 22nd International Conference, CAV 2010 …, 2010
113*2010
Dynamic partial order reduction for relaxed memory models
N Zhang, M Kusano, C Wang
ACM SIGPLAN Conference on Programming Language Design and Implementation, 2015
1092015
Trace-based symbolic analysis for atomicity violations
C Wang, R Limaye, M Ganai, A Gupta
International Conference on Tools and Algorithms for the Construction and …, 2010
962010
ConcBugAssist: Constraint solving for diagnosis and repair of concurrency bugs
S Khoshnood, M Kusano, C Wang
International Symposium on Software Testing and Analysis, 2015
862015
Synthesis of masking countermeasures against side channel attacks
H Eldib, C Wang
International Conference on Computer Aided Verification, 2014
842014
Shield synthesis
B Könighofer, M Alshiekh, R Bloem, L Humphrey, R Könighofer, U Topcu, ...
Formal Methods in System Design 51, 332-361, 2017
832017
Formal verification of software countermeasures against side-channel attacks
H Eldib, C Wang, P Schaumont
ACM Transactions on Software Engineering and Methodology 24 (2), 2014
822014
Eliminating path redundancy via postconditioned symbolic execution
Q Yi, Z Yang, S Guo, C Wang, J Liu, C Zhao
IEEE Transactions on Software Engineering 44 (1), 25-43, 2017
81*2017
Staged concurrent program analysis
N Sinha, C Wang
Proceedings of the eighteenth ACM SIGSOFT international symposium on …, 2010
752010
Learning from BDDs in SAT-based bounded model checking
A Gupta, M Ganai, C Wang, Z Yang, P Ashar
Proceedings of the 40th annual Design Automation Conference, 824-829, 2003
752003
Assertion guided symbolic execution of multithreaded programs
S Guo, M Kusano, C Wang, Z Yang, A Gupta
ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2015
742015
The system can't perform the operation now. Try again later.
Articles 1–20