Shengyi Wang
Shengyi Wang
Verified email at - Homepage
Cited by
Cited by
{BesFS}: A {POSIX} Filesystem for Enclaves with a Mechanized Safety Proof
S Shinde, S Wang, P Yuan, A Hobor, A Roychoudhury, P Saxena
29th USENIX Security Symposium (USENIX Security 20), 523-540, 2020
Certifying graph-manipulating C programs via localizations within data structures
S Wang, Q Cao, A Mohan, A Hobor
Proceedings of the ACM on Programming Languages 3 (OOPSLA), 1-30, 2019
Besfs: Mechanized proof of an iago-safe filesystem for enclaves
S Shinde, S Wang, P Yuan, A Hobor, A Roychoudhury, P Saxena
ArXiv e-prints, 2018
Certified reasoning with infinity
A Sharma, S Wang, A Costea, A Hobor, WN Chin
FM 2015: Formal Methods: 20th International Symposium, Oslo, Norway, June 24 …, 2015
Proof pearl: Magic wand as frame
Q Cao, S Wang, A Hobor, AW Appel
Unpublished, 2018
Proof Pearl: Magic Wand as Frame
Q Cao, S Wang, A Hobor, AW Appel
arXiv preprint arXiv:1909.08789, 2019
Stack bound inference for abstract java bytecode
S Wang, Z Qiu, S Qin, WN Chin
2010 4th IEEE International Symposium on Theoretical Aspects of Software …, 2010
Proving Logical Atomicity using Lock Invariants
R Sharma, S Wang, A Oey, A Evdokimova, L Beringer, W Mansky
arXiv preprint arXiv:2304.13898, 2023
Foundational Verification of Stateful P4 Packet Processing
Q Wang, M Pan, S Wang, R Doenges, L Beringer, AW Appel
14th International Conference on Interactive Theorem Proving (ITP 2023), 2023
Compositional Verification of Concurrent C Programs with Search Structure Templates
DT Nguyen, L Beringer, W Mansky, S Wang
Proceedings of the 13th ACM SIGPLAN International Conference on Certified …, 2024
A Machine-Checked C Implementation of Dijkstra’s Shortest Path Algorithm
A Mohan, S Wang, A Hobor
The Ramifications of Mechanized Localizations within Data Structures
SWQCA Sharma, X Aquinas Hobor
The system can't perform the operation now. Try again later.
Articles 1–12