共 50 条
- [21] Verification of Concurrent Programs on Weak Memory Models THEORETICAL ASPECTS OF COMPUTING - ICTAC 2016, 2016, 9965 : 3 - 24
- [23] Certifying Concurrent Programs Using Transactional Memory Journal of Computer Science and Technology, 2009, 24 : 110 - 121
- [25] On Transactional Memory Concurrency Control in Distributed Real-Time Programs 2013 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING (CLUSTER), 2013,
- [26] Towards Automated Detection of Higher-Order Memory Corruption Vulnerabilities in Embedded Devices PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), 2021, : 1707 - 1710
- [27] Safe Optimisations for Shared-Memory Concurrent Programs PLDI 11: PROCEEDINGS OF THE 2011 ACM CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION, 2011, : 306 - 316
- [28] Verifying Safe Memory Reclamation in Concurrent Programs with CafeOBJ REWRITING LOGIC AND ITS APPLICATIONS, WRLA 2024, 2024, 14953 : 45 - 61
- [30] A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes International Journal of Information Security, 2023, 22 : 1277 - 1290