Name
Affiliation
Papers
XI WANG
MIT CSAIL
33
Collaborators
Citations 
PageRank 
70
540
29.04
Referers 
Referees 
References 
1465
1116
553
Search Limit
1001000
Title
Citations
PageRank
Year
A Formal Foundation for Symbolic Evaluation with Merging00.342022
Noninterference specifications for secure systems00.342020
Specification And Verification In The Field: Applying Formal Methods To Bpf, Just-In-Time Compilers In The Linux Kernel00.342020
Scaling symbolic evaluation for automated verification of systems code with Serval20.372019
Nickel: A Framework for Design and Verification of Information Flow Control Systems.00.342018
MultiNyx: a multi-level abstraction framework for systematic analysis of hypervisors.00.342018
Customizing Progressive JPEG for Efficient Image Storage.00.342017
Push-Button Verification of File Systems via Crash Refinement.40.402017
An Empirical Study on the Correctness of Formally Verified Distributed Systems.120.602017
Hyperkernel: Push-Button Verification of an OS Kernel.40.422017
Investigating Safety Of A Radiotherapy Machine Using System Models With Pluggable Checkers10.402016
A Differential Approach to Undefined Behavior Detection100.512015
Toward a Dependability Case Language and Workflow for a Radiation Therapy System.20.362015
Verdi: a framework for implementing and formally verifying distributed systems581.422015
Jitk: a trustworthy in-kernel interpreter infrastructure180.742014
Why does cryptographic software fail?: a case study and open problems140.772014
Identifying information disclosure in web applications with retroactive auditing40.392014
Cybertron: pushing the limit on I/O reduction in data-parallel programs20.362014
Towards optimization-safe systems: analyzing the impact of undefined behavior441.772013
Security bugs in embedded interpreters10.362013
Improving integer security for systems with KINT311.112012
Undefined behavior: what happened to my code?120.762012
Software fault isolation with API integrity and multi-principal modules371.072011
Retroactive auditing30.462011
Linux kernel vulnerabilities: state-of-the-art defenses and open problems421.612011
Language-based replay via data flow cut60.472010
Intrusion recovery using selective re-execution261.032010
Api hyperlinking via structural overlap251.282009
Improving application security with data flow assertions642.862009
R2: an application-level kernel for record and replay744.502008
D3S: debugging deployed distributed systems341.732008
Towards automatic inference of task hierarchies in complex systems10.502008
Hang analysis: fighting responsiveness bugs90.762008