publications
2025
- POPL 2025
2024
- OOPSLA 2024Plume: Efficient and Complete Black-box Checking of Weak Isolation LevelsProc. ACM Program. Lang., 2024
- SIGMOD 2024
- VLDB 2024 Demo
- USENIX SEC 2024CAMP: Compositional Amplification Attacks against DNSIn 33rd USENIX Security Symposium (USENIX Security 24), 2024
- CAV 2024Unifying Qualitative and Quantitative Safety Verification of DNN-Controlled SystemsIn Computer Aided Verification - 36th International Conference, CAV 2024, Montreal, QC, Canada, July 24-27, 2024, Proceedings, Part II, 2024
- VMCAI 2024Taming Reachability Analysis of DNN-Controlled Systems via Abstraction-Based TrainingIn Verification, Model Checking, and Abstract Interpretation: 25th International Conference, VMCAI 2024, London, United Kingdom, January 15–16, 2024, Proceedings, Part II, London, United Kingdom, 2024
2023
- VLDB 2023
- OSDI 2023Detecting Transactional Bugs in Database Engines via Graph-Based Oracle ConstructionIn 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23), 2023
- SIGCOMM 2023A Formal Framework for End-to-End DNS ResolutionIn Proceedings of the ACM SIGCOMM 2023 Conference, New York, NY, USA, 2023
- NSDI 2023RHINE: Robust and High-performance Internet Naming with E2E AuthenticityIn 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23), 2023
- NeurIPS 2023Boosting Verification of Deep Reinforcement Learning via Piece-Wise Linear Decision Neural NetworksIn Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023, 2023
- CVPR 2023Boosting Verified Training for Robust Image Classifications via AbstractionIn IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2023, Vancouver, BC, Canada, June 17-24, 2023, 2023
- ISSTA 2023A Tale of Two Approximations: Tightening Over-Approximation for DNN Robustness Verification via Under-ApproximationIn Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, Seattle, WA, USA, 2023
2022
- OOPSLA 2022Bridging the semantic gap between qualitative and quantitative models of distributed systemsProc. ACM Program. Lang., Oct 2022
- TOSEM 2022All in One: Design, Verification, and Implementation of SNOW-optimal Read Atomic TransactionsACM Trans. Softw. Eng. Methodol., Mar 2022
- CSF 2022N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware Internet ArchitecturesIn 2022 IEEE 35th Computer Security Foundations Symposium (CSF), Mar 2022
- Book ChapterDesign-Level VerificationMar 2022
- Book ChapterExtensions for the Data PlaneMar 2022
- ASE 2022Provably Tightest Linear Approximation for Robustness Verification of Sigmoid-like Neural NetworksIn Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, Rochester, MI, USA, Mar 2022
2021
- TASE 2021Exploring Design Alternatives for Replicated RAMP Transactions Using MaudeIn 2021 International Symposium on Theoretical Aspects of Software Engineering (TASE), Mar 2021
2020
- NFM 2020Generating Correct-by-Construction Distributed Implementations from Formal Maude DesignsIn NASA Formal Methods - 12th International Symposium, NFM 2020, Moffett Field, CA, USA, May 11-15, 2020, Proceedings, Mar 2020
2019
- TACAS 2019Automatic Analysis of Consistency Properties of Distributed Transaction Systems in MaudeIn Tools and Algorithms for the Construction and Analysis of Systems - 25th International Conference, TACAS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, Part II, Mar 2019
- FAoC 2019Read atomic transactions with prevention of lost updates: ROLA and its formal analysisFormal Aspects Comput., Mar 2019
- CCS 2019Charting the Attack Surface of Trigger-Action IoT PlatformsIn Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019, Mar 2019
- PhD ThesisDesign, verification and automatic implementation of correct-by-construction distributed transaction systems in MaudeUniversity of Illinois Urbana-Champaign, USA, Mar 2019
2018
- FASE 2018ROLA: A New Distributed Transaction Protocol and Its Formal AnalysisIn Fundamental Approaches to Software Engineering, 21st International Conference, FASE 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, Mar 2018
- WRLA 2018Formal Modeling and Analysis of the Walter Transactional Data StoreIn Rewriting Logic and Its Applications - 12th International Workshop, WRLA 2018, Held as a Satellite Event of ETAPS, Thessaloniki, Greece, June 14-15, 2018, Proceedings, Mar 2018
- Book ChapterSurvivability: Design, Formal Modeling, and Validation of Cloud Storage Systems Using MaudeMar 2018
2017
- LITES 2017Quantitative Analysis of Consistency in NoSQL Key-Value StoresLeibniz Trans. Embed. Syst., Mar 2017
- ICFEM 2017Exploring Design Alternatives for RAMP Transactions Through Statistical Model CheckingIn Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods, ICFEM 2017, Xi’an, China, November 13-17, 2017, Proceedings, Mar 2017
2016
- JLAMP 2016Modeling and analyzing mobile ad hoc networks in Real-Time MaudeJ. Log. Algebraic Methods Program., Mar 2016
- SAC 2016Formal modeling and analysis of RAMP transaction systemsIn Proceedings of the 31st Annual ACM Symposium on Applied Computing, Pisa, Italy, April 4-8, 2016, Mar 2016
2015
- SSS 2015Formal Analysis of Leader Election in MANETs Using Real-Time MaudeIn Software, Services, and Systems - Essays Dedicated to Martin Wirsing on the Occasion of His Retirement from the Chair of Programming and Software Engineering, Mar 2015
- QEST 2015Quantitative Analysis of Consistency in NoSQL Key-Value StoresIn Quantitative Evaluation of Systems, 12th International Conference, QEST 2015, Madrid, Spain, September 1-3, 2015, Proceedings, Mar 2015
2014
- ICFEM 2014Formal Modeling and Analysis of Cassandra in MaudeIn Formal Methods and Software Engineering - 16th International Conference on Formal Engineering Methods, ICFEM 2014, Luxembourg, Luxembourg, November 3-5, 2014. Proceedings, Mar 2014
- WRLA 2014A Framework for Mobile Ad hoc Networks in Real-Time MaudeIn Rewriting Logic and Its Applications - 10th International Workshop, WRLA 2014, Held as a Satellite Event of ETAPS, Grenoble, France, April 5-6, 2014, Revised Selected Papers, Mar 2014
- PRDC 2014Reasoning about Group-Based Mobility in MANETsIn 20th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2014, Singapore, November 18-21, 2014, Mar 2014
2013
- ComSIS 2013Modeling and verifying the Ariadne protocol using process algebraComput. Sci. Inf. Syst., Mar 2013
2012
- ECBS 2012Modeling and Verifying the Ariadne Protocol Using CSPIn IEEE 19th International Conference and Workshops on Engineering of Computer-Based Systems, ECBS 2012, Novi Sad, Serbia, April 11-13, 2012, Mar 2012
2011
- HASE 2011A Calculus for Mobile Ad Hoc Networks from a Group Probabilistic PerspectiveIn 13th IEEE International Symposium on High-Assurance Systems Engineering, HASE 2011, Boca Raton, FL, USA, November 10-12, 2011, Mar 2011
- ICECCS 2011Formal Model of Interrupt Program from a Probabilistic PerspectiveIn 16th IEEE International Conference on Engineering of Complex Computer Systems, ICECCS 2011, Las Vegas, Nevada, USA, 27-29 April 2011, Mar 2011
- SSIRI 2011Formal Approaches to Wireless Sensor NetworksIn Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea - Companion Volume, Mar 2011
- SSIRI 2011Towards Denotational Semantics for Verilog in PVSIn Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea - Companion Volume, Mar 2011
- TASE 2011Towards a Probabilistic Calculus for Mobile Ad Hoc NetworksIn 5th IEEE International Symposium on Theoretical Aspects of Software Engineering, TASE 2011, Xi’an, China, 29-31 August 2011, Mar 2011
- TASE 2011Modeling and Analyzing the (mu)TESLA Protocol Using CSPIn 5th IEEE International Symposium on Theoretical Aspects of Software Engineering, TASE 2011, Xi’an, China, 29-31 August 2011, Mar 2011
2010
- UTP 2010Promoting ModelsIn Unifying Theories of Programming - Third International Symposium, UTP 2010, Shanghai, China, November 15-16, 2010. Proceedings, Mar 2010