Follow
Shengyi Wang
Shengyi Wang
PhD candidate in NUS
Verified email at comp.nus.edu.sg - Homepage
Title
Cited by
Cited by
Year
Besfs: A POSIX filesystem for enclaves with a mechanized safety proof
S Shinde, S Wang, P Yuan, A Hobor, A Roychoudhury, P Saxena
Proceedings of the 29th USENIX Conference on Security Symposium, 523-540, 2020
182020
Certifying graph-manipulating C programs via localizations within data structures
S Wang, Q Cao, A Mohan, A Hobor
Proceedings of the ACM on Programming Languages 3 (OOPSLA), 1-30, 2019
162019
Besfs: Mechanized proof of an iago-safe filesystem for enclaves
S Shinde, S Wang, P Yuan, A Hobor, A Roychoudhury, P Saxena
ArXiv e-prints, 2018
72018
Certified reasoning with infinity
A Sharma, S Wang, A Costea, A Hobor, WN Chin
FM 2015: Formal Methods: 20th International Symposium, Oslo, Norway, June 24 …, 2015
72015
Proof pearl: Magic wand as frame
Q Cao, S Wang, A Hobor, AW Appel
arXiv preprint arXiv:1909.08789, 2019
52019
Stack bound inference for abstract java bytecode
S Wang, Z Qiu, S Qin, WN Chin
2010 4th IEEE International Symposium on Theoretical Aspects of Software …, 2010
32010
Proving Logical Atomicity Using Lock Invariants
R Sharma, S Wang, A Oey, A Evdokimova, L Beringer, W Mansky
A Machine-Checked C Implementation of Dijkstra’s Shortest Path Algorithm
A Mohan, S Wang, A Hobor
The Ramifications of Mechanized Localizations within Data Structures
SWQCA Sharma, X Aquinas Hobor
The system can't perform the operation now. Try again later.
Articles 1–9