default search action
Sagar Chaki
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j15]Pritam Roy, Sagar Chaki:
Achieving high coverage in hardware equivalence checking via concolic verification. Formal Methods Syst. Des. 60(3): 329-349 (2022)
2010 – 2019
- 2019
- [c66]Pritam Roy, Sagar Chaki, Pankaj Chauhan:
High Coverage Concolic Equivalence Checking. DATE 2019: 462-467 - 2018
- [c65]Amit Vasudevan, Sagar Chaki:
Have Your PI and Eat it Too: Practical Security on a Low-Cost Ubiquitous Computing Platform. EuroS&P 2018: 183-198 - [p1]Sagar Chaki, Arie Gurfinkel:
BDD-Based Symbolic Model Checking. Handbook of Model Checking 2018: 219-245 - 2017
- [j14]Sagar Chaki, Dionisio de Niz:
Formal Verification of a Timing Enforcer Implementation. ACM Trans. Embed. Comput. Syst. 16(5s): 168:1-168:19 (2017) - [c64]Gabriel A. Moreno, Ofer Strichman, Sagar Chaki, Radislav Vaisman:
Decision-Making with Cross-Entropy for Self-Adaptation. SEAMS@ICSE 2017: 90-101 - [c63]Björn Andersson, Sagar Chaki, Dionisio de Niz:
Combining Symbolic Runtime Enforcers for Cyber-Physical Systems. RV 2017: 68-84 - 2016
- [j13]Anvesh Komuravelli, Arie Gurfinkel, Sagar Chaki:
SMT-based model checking for recursive programs. Formal Methods Syst. Des. 48(3): 175-205 (2016) - [c62]Stanley Bak, Sagar Chaki:
Verifying cyber-physical systems by combining software model checking with hybrid systems reachability. EMSOFT 2016: 10:1-10:10 - [c61]Seyed Kaveh Fayaz, Tianlong Yu, Yoshiaki Tobioka, Sagar Chaki, Vyas Sekar:
BUZZ: Testing Context-Dependent Policies in Stateful Networks. NSDI 2016: 275-289 - [c60]Jeffery P. Hansen, Sagar Chaki, Scott A. Hissam, James R. Edmondson, Gabriel A. Moreno, David Kyle:
Input Attribution for Statistical Model Checking Using Logistic Regression. RV 2016: 185-200 - [c59]Amit Vasudevan, Sagar Chaki, Petros Maniatis, Limin Jia, Anupam Datta:
überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor. USENIX Security Symposium 2016: 87-104 - [c58]Sagar Chaki, Derrick Karimi:
Model Checking with Multi-threaded IC3 Portfolios. VMCAI 2016: 517-535 - 2015
- [j12]Sagar Chaki, Arie Gurfinkel, Ofer Strichman:
Regression verification for multi-threaded programs (with extensions to locks and dynamic thread creation). Formal Methods Syst. Des. 47(3): 287-301 (2015) - [c57]Ivan Ruchkin, Ashwini Rao, Dionisio de Niz, Sagar Chaki, David Garlan:
Eliminating Inter-Domain Vulnerabilities in Cyber-Physical Systems: An Analysis Contracts Approach. CPS-SPC@CCS 2015: 11-22 - [c56]Scott A. Hissam, Sagar Chaki, Gabriel A. Moreno:
High Assurance for Distributed Cyber Physical Systems. ECSA Workshops 2015: 6:1-6:4 - [c55]David Kyle, Jeffery P. Hansen, Sagar Chaki:
Statistical Model Checking of Distributed Adaptive Real-Time Software. RV 2015: 269-274 - [c54]Jeffery P. Hansen, Lutz Wrage, Sagar Chaki, Dionisio de Niz, Mark H. Klein:
Semantic Importance Sampling for Statistical Model Checking. TACAS 2015: 241-255 - [i4]Seyed Kaveh Fayaz, Yoshiaki Tobioka, Sagar Chaki, Vyas Sekar:
Scalable Testing of Context-Dependent Policies over Stateful Data Planes with Armstrong. CoRR abs/1505.03356 (2015) - 2014
- [c53]Anvesh Komuravelli, Arie Gurfinkel, Sagar Chaki:
SMT-Based Model Checking for Recursive Programs. CAV 2014: 17-34 - [c52]Ivan Ruchkin, Dionisio de Niz, Sagar Chaki, David Garlan:
Contract-based integration of cyber-physical analyses. EMSOFT 2014: 23:1-23:10 - [c51]Sagar Chaki, Arie Gurfinkel, Nishant Sinha:
Efficient verification of periodic programs using sequential consistency and snapshots. FMCAD 2014: 51-58 - [c50]Sagar Chaki, James R. Edmondson:
Model-Driven Verifying Compilation of Synchronous Distributed Applications. MoDELS 2014: 201-217 - [c49]Wesley Jin, Cory F. Cohen, Jeffrey Gennari, Charles Hines, Sagar Chaki, Arie Gurfinkel, Jeffrey Havrilla, Priya Narasimhan:
Recovering C++ Objects From Binaries Using Inter-Procedural Data-Flow Analysis. PPREW@POPL 2014: 1:1-1:11 - [c48]Sagar Chaki, Joseph Andrew Giampapa, David Kyle, John P. Lehoczky:
Optimizing Robotic Team Performance with Probabilistic Model Checking. SIMPAR 2014: 134-145 - [c47]Sagar Chaki, James R. Edmondson:
Toward parameterized verification of synchronous distributed applications. SPIN 2014: 109-112 - [i3]Anvesh Komuravelli, Arie Gurfinkel, Sagar Chaki:
SMT-based Model Checking for Recursive Programs. CoRR abs/1405.4028 (2014) - 2013
- [j11]Sagar Chaki, Christian Schallhart, Helmut Veith:
Verification across Intellectual Property Boundaries. ACM Trans. Softw. Eng. Methodol. 22(2): 15:1-15:12 (2013) - [c46]Anvesh Komuravelli, Arie Gurfinkel, Sagar Chaki, Edmund M. Clarke:
Automatic Abstraction in SMT-Based Unbounded Software Model Checking. CAV 2013: 846-862 - [c45]Sagar Chaki, Arie Gurfinkel, Ofer Strichman:
Verifying periodic programs with priority inheritance locks. FMCAD 2013: 137-144 - [c44]Samir Sapra, Marius Minea, Sagar Chaki, Arie Gurfinkel, Edmund M. Clarke:
Finding Errors in Python Programs Using Dynamic Symbolic Execution. ICTSS 2013: 283-289 - [c43]Sagar Chaki:
Bounded model checking of high-integrity software. HILT 2013: 9-10 - [c42]Amit Vasudevan, Sagar Chaki, Limin Jia, Jonathan M. McCune, James Newsome, Anupam Datta:
Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework. IEEE Symposium on Security and Privacy 2013: 430-444 - [c41]Sagar Chaki, Joseph Andrew Giampapa:
Probabilistic Verification of Coordinated Multi-robot Missions. SPIN 2013: 135-153 - [c40]Aws Albarghouthi, Arie Gurfinkel, Yi Li, Sagar Chaki, Marsha Chechik:
UFO: Verification with Interpolants and Abstract Interpretation - (Competition Contribution). TACAS 2013: 637-640 - [c39]Sagar Chaki, Arie Gurfinkel, Soonho Kong, Ofer Strichman:
Compositional Sequentialization of Periodic Programs. VMCAI 2013: 536-554 - [i2]Anvesh Komuravelli, Arie Gurfinkel, Sagar Chaki, Edmund M. Clarke:
Automatic Abstraction in SMT-Based Unbounded Software Model Checking. CoRR abs/1306.1945 (2013) - 2012
- [c38]Björn Andersson, Sagar Chaki, Dionisio de Niz, Brian Dougherty, Russell Kegley, Jules White:
Non-preemptive Scheduling with History-Dependent Execution Time. ECRTS 2012: 363-372 - [c37]Wesley Jin, Sagar Chaki, Cory F. Cohen, Arie Gurfinkel, Jeffrey Havrilla, Charles Hines, Priya Narasimhan:
Binary Function Clustering Using Semantic Hashes. ICMLA (1) 2012: 386-391 - [c36]Jason Franklin, Sagar Chaki, Anupam Datta, Jonathan M. McCune, Amit Vasudevan:
Parametric Verification of Address Space Separation. POST 2012: 51-68 - [c35]Sagar Chaki, Arie Gurfinkel, Ofer Strichman:
Regression Verification for Multi-threaded Programs. VMCAI 2012: 119-135 - 2011
- [j10]Sagar Chaki, Arie Gurfinkel:
Automated assume-guarantee reasoning for omega-regular systems and specifications. Innov. Syst. Softw. Eng. 7(2): 131-139 (2011) - [c34]Sagar Chaki, Arie Gurfinkel, Ofer Strichman:
Time-bounded analysis of real-time systems. FMCAD 2011: 72-80 - [c33]Sagar Chaki, Cory F. Cohen, Arie Gurfinkel:
Supervised learning for provenance-similarity of binaries. KDD 2011: 15-23 - [c32]Arie Gurfinkel, Sagar Chaki, Samir Sapra:
Efficient Predicate Abstraction of Program Summaries. NASA Formal Methods 2011: 131-145 - 2010
- [j9]Sagar Chaki, James Ivers:
Software model checking without source code. Innov. Syst. Softw. Eng. 6(3): 233-242 (2010) - [j8]Arie Gurfinkel, Sagar Chaki:
Combining predicate and numeric abstraction for software model checking. Int. J. Softw. Tools Technol. Transf. 12(6): 409-427 (2010) - [c31]Ipek Ozkaya, J. Andrés Díaz Pace, Arie Gurfinkel, Sagar Chaki:
Using Architecturally Significant Requirements for Guiding System Evolution. CSMR 2010: 127-136 - [c30]Sagar Chaki, Arie Gurfinkel:
Automated Assume-Guarantee Reasoning for Omega-Regular Systems and Specifications. NASA Formal Methods 2010: 57-66 - [c29]Arie Gurfinkel, Sagar Chaki:
Boxes: A Symbolic Abstract Domain of Boxes. SAS 2010: 287-303 - [c28]Jason Franklin, Sagar Chaki, Anupam Datta, Arvind Seshadri:
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size. IEEE Symposium on Security and Privacy 2010: 365-379
2000 – 2009
- 2009
- [c27]Sagar Chaki, Anupam Datta:
ASPIER: An Automated Framework for Verifying Security Protocol Implementations. CSF 2009: 172-185 - [c26]William R. Harris, Nicholas Kidd, Sagar Chaki, Somesh Jha, Thomas W. Reps:
Verifying Information Flow Control over Unbounded Processes. FM 2009: 773-789 - [c25]Sagar Chaki, Arie Gurfinkel, Ofer Strichman:
Decision diagrams for linear arithmetic. FMCAD 2009: 53-60 - [c24]Sagar Chaki, J. Andrés Díaz Pace, David Garlan, Arie Gurfinkel, Ipek Ozkaya:
Towards engineered architecture evolution. MiSE@ICSE 2009: 1-6 - [c23]Sagar Chaki, James Ivers:
Software Model Checking without Source Code. NASA Formal Methods 2009: 36-45 - 2008
- [j7]Sagar Chaki, Edmund M. Clarke, Natasha Sharygina, Nishant Sinha:
Verification of evolving software via component substitutability analysis. Formal Methods Syst. Des. 32(3): 235-266 (2008) - [j6]Sagar Chaki, Ofer Strichman:
Three optimizations for Assume-Guarantee reasoning with L*. Formal Methods Syst. Des. 32(3): 267-284 (2008) - [c22]Arie Gurfinkel, Sagar Chaki:
Combining Predicate and Numeric Abstraction for Software Model Checking. FMCAD 2008: 1-9 - 2007
- [c21]Sagar Chaki, Christian Schallhart, Helmut Veith:
Verification Across Intellectual Property Boundaries. CAV 2007: 82-94 - [c20]Sagar Chaki, James Ivers, Peter Lee, Kurt C. Wallnau, Noam Zeilberger:
Model-Driven Construction of Certified Binaries. MoDELS 2007: 666-681 - [c19]Sagar Chaki, Ofer Strichman:
Optimized L*-Based Assume-Guarantee Reasoning. TACAS 2007: 276-291 - [i1]Sagar Chaki, Christian Schallhart, Helmut Veith:
Verification Across Intellectual Property Boundaries. CoRR abs/cs/0701187 (2007) - 2006
- [j5]Alex Groce, Sagar Chaki, Daniel Kroening, Ofer Strichman:
Error explanation with distance metrics. Int. J. Softw. Tools Technol. Transf. 8(3): 229-247 (2006) - [c18]Sagar Chaki, Nishant Sinha:
Assume-Guarantee Reasoning for Deadlock. FMCAD 2006: 134-144 - [c17]Sagar Chaki:
SAT-Based Software Certification. TACAS 2006: 151-166 - [c16]Sagar Chaki, Edmund M. Clarke, Nicholas Kidd, Thomas W. Reps, Tayssir Touili:
Verifying Concurrent Message-Passing C Programs with Recursive Calls. TACAS 2006: 334-349 - 2005
- [j4]Sagar Chaki, Edmund M. Clarke, Joël Ouaknine, Natasha Sharygina, Nishant Sinha:
Concurrent software verification with states, events, and deadlocks. Formal Aspects Comput. 17(4): 461-483 (2005) - [j3]Sagar Chaki, Edmund M. Clarke, Somesh Jha, Helmut Veith:
An Iterative Framework for Simulation Conformance. J. Log. Comput. 15(4): 465-488 (2005) - [c15]Sagar Chaki, James Ivers, Natasha Sharygina, Kurt C. Wallnau:
The ComFoRT Reasoning Framework. CAV 2005: 164-169 - [c14]Sagar Chaki, Edmund M. Clarke, Nishant Sinha, Prasanna Thati:
Automated Assume-Guarantee Reasoning for Simulation Conformance. CAV 2005: 534-547 - [c13]Natasha Sharygina, Sagar Chaki, Edmund M. Clarke, Nishant Sinha:
Dynamic Component Substitutability Analysis. FM 2005: 512-528 - [c12]Sagar Chaki, Edmund M. Clarke, Orna Grumberg, Joël Ouaknine, Natasha Sharygina, Tayssir Touili, Helmut Veith:
State/Event Software Verification for Branching-Time Specifications. IFM 2005: 53-69 - [c11]Murray Stokely, Sagar Chaki, Joël Ouaknine:
Parallel Assignments in Software Model Checking. SVV@ICFEM 2005: 77-94 - 2004
- [j2]Sagar Chaki, Edmund M. Clarke, Alex Groce, Joël Ouaknine, Ofer Strichman, Karen Yorav:
Efficient Verification of Sequential and Concurrent C Programs. Formal Methods Syst. Des. 25(2-3): 129-166 (2004) - [j1]Sagar Chaki, Edmund M. Clarke, Alex Groce, Somesh Jha, Helmut Veith:
Modular Verification of Software Components in C. IEEE Trans. Software Eng. 30(6): 388-402 (2004) - [c10]Sagar Chaki, Edmund M. Clarke, Joël Ouaknine, Natasha Sharygina, Nishant Sinha:
State/Event-Based Software Model Checking. IFM 2004: 128-147 - [c9]Sagar Chaki, Edmund M. Clarke, Joël Ouaknine, Natasha Sharygina:
Automated, compositional and iterative deadlock detection. MEMOCODE 2004: 201-210 - [c8]Sagar Chaki, Alex Groce, Ofer Strichman:
Explaining abstract counterexamples. SIGSOFT FSE 2004: 73-82 - 2003
- [c7]Sagar Chaki, Edmund M. Clarke, Alex Groce, Ofer Strichman:
Predicate Abstraction with Minimum Predicates. CHARME 2003: 19-34 - [c6]Sagar Chaki, Edmund M. Clarke, Alex Groce, Somesh Jha, Helmut Veith:
Modular Verification of Software Components in C. ICSE 2003: 385-395 - [c5]Sagar Chaki, Pascal Fenkam, Harald C. Gall, Somesh Jha, Engin Kirda, Helmut Veith:
Integrating Publish/Subscribe into a Mobile Teamwork Support Platform. SEKE 2003: 510-517 - [c4]Sagar Chaki, Joël Ouaknine, Karen Yorav, Edmund M. Clarke:
Automated Compositional Abstraction Refinement for Concurrent C Programs: A Two-Level Approach. SoftMC@CAV 2003: 417-432 - 2002
- [c3]Sagar Chaki, Sriram K. Rajamani, Jakob Rehof:
Types as models: model checking message-passing programs. POPL 2002: 45-57 - 2001
- [c2]Alexis Campailla, Sagar Chaki, Edmund M. Clarke, Somesh Jha, Helmut Veith:
Efficient Filtering in Publish-Subscribe Systems Using Binary Decision. ICSE 2001: 443-452 - [c1]Thomas Ball, Sagar Chaki, Sriram K. Rajamani:
Parameterized Verification of Multithreaded Software Libraries. TACAS 2001: 158-173
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint