default search action
Michael Emmi
Person information
- affiliation: University of California, Los Angeles, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c41]Subarno Banerjee, Siwei Cui, Michael Emmi, Antonio Filieri, Liana Hadarean, Peixuan Li, Linghui Luo, Goran Piskachev, Nicolás Rosner, Aritra Sengupta, Omer Tripp, Jingbo Wang:
Compositional Taint Analysis for Enforcing Security Policies at Scale. ESEC/SIGSOFT FSE 2023: 1985-1996 - [e1]Cezara Dragoi, Michael Emmi, Jingbo Wang:
Verification, Model Checking, and Abstract Interpretation - 24th International Conference, VMCAI 2023, Boston, MA, USA, January 16-17, 2023, Proceedings. Lecture Notes in Computer Science 13881, Springer 2023, ISBN 978-3-031-24949-5 [contents] - 2021
- [c40]Michael Emmi, Liana Hadarean, Ranjit Jhala, Lee Pike, Nicolás Rosner, Martin Schäf, Aritra Sengupta, Willem Visser:
RAPID: checking API usage for the cloud in the cloud. ESEC/SIGSOFT FSE 2021: 1416-1426 - 2020
- [c39]Siddharth Krishna, Michael Emmi, Constantin Enea, Dejan Jovanovic:
Verifying Visibility-Based Weak Consistency. ESOP 2020: 280-307 - [c38]Shaobo He, Michael Emmi, Gabriela F. Ciocarlie:
ct-fuzz: Fuzzing for Timing Leaks. ICST 2020: 466-471 - [c37]Sidi Mohamed Beillahi, Gabriela F. Ciocarlie, Michael Emmi, Constantin Enea:
Behavioral simulation for smart contracts. PLDI 2020: 470-486
2010 – 2019
- 2019
- [j5]Michael Emmi, Constantin Enea:
Weak-consistency specification via visibility relaxation. Proc. ACM Program. Lang. 3(POPL): 60:1-60:28 (2019) - [c36]Ranadeep Biswas, Michael Emmi, Constantin Enea:
On the Complexity of Checking Consistency for Replicated Data Types. CAV (2) 2019: 324-343 - [c35]Michael Emmi, Constantin Enea:
Violat: Generating Tests of Observational Refinement for Concurrent Objects. CAV (2) 2019: 534-546 - [c34]Ioannis Agadakos, Gabriela F. Ciocarlie, Bogdan Copos, Michael Emmi, Jemin George, Nandi Leslie, James Michaelis:
Application of Trust Assessment Techniques to IoBT Systems. MILCOM 2019: 833-840 - [i5]Shaobo He, Michael Emmi, Gabriela F. Ciocarlie:
ct-fuzz: Fuzzing for Timing Leaks. CoRR abs/1904.07280 (2019) - [i4]Siddharth Krishna, Michael Emmi, Constantin Enea, Dejan Jovanovic:
Verifying Visibility-Based Weak Consistency. CoRR abs/1911.01508 (2019) - 2018
- [j4]Ahmed Bouajjani, Michael Emmi, Constantin Enea, Jad Hamza:
On reducing linearizability to state reachability. Inf. Comput. 261: 383-400 (2018) - [j3]Michael Emmi, Constantin Enea:
Sound, complete, and tractable linearizability monitoring for concurrent collections. Proc. ACM Program. Lang. 2(POPL): 25:1-25:27 (2018) - [c33]Michael Emmi, Constantin Enea:
Monitoring Weak Consistency. CAV (1) 2018: 487-506 - [c32]Konstantinos Athanasiou, Byron Cook, Michael Emmi, Colm MacCárthaigh, Daniel Schwartz-Narbonne, Serdar Tasiran:
SideTrail: Verifying Time-Balancing of Cryptosystems. VSTTE 2018: 215-228 - 2017
- [c31]Ahmed Bouajjani, Michael Emmi, Constantin Enea, Suha Orhun Mutluergil:
Proving Linearizability Using Forward Simulations. CAV (2) 2017: 542-563 - [c30]Ahmed Bouajjani, Michael Emmi, Constantin Enea, Burcu Kulahcioglu Ozkan, Serdar Tasiran:
Verifying Robustness of Event-Driven Asynchronous Programs Against Concurrency. ESOP 2017: 170-200 - [i3]Ahmed Bouajjani, Michael Emmi, Constantin Enea, Suha Orhun Mutluergil:
Proving linearizability using forward simulations. CoRR abs/1702.02705 (2017) - [i2]Michael Emmi, Constantin Enea:
Exposing Non-Atomic Methods of Concurrent Objects. CoRR abs/1706.09305 (2017) - 2016
- [c29]Montgomery Carter, Shaobo He, Jonathan Whitaker, Zvonimir Rakamaric, Michael Emmi:
SMACK software verification toolchain. ICSE (Companion Volume) 2016: 589-592 - [c28]Michael Emmi, Constantin Enea:
Symbolic abstract data type inference. POPL 2016: 513-525 - [c27]José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Michael Emmi:
Verifying Constant-Time Implementations. USENIX Security Symposium 2016: 53-70 - 2015
- [c26]Burcu Kulahcioglu Ozkan, Michael Emmi, Serdar Tasiran:
Systematic Asynchrony Bug Exploration for Android Apps. CAV (1) 2015: 455-461 - [c25]Michael Emmi, Pierre Ganty, Rupak Majumdar, Fernando Rosa-Velardo:
Analysis of Asynchronous Programs with Event-Based Synchronization. ESOP 2015: 535-559 - [c24]Ahmed Bouajjani, Michael Emmi, Constantin Enea, Jad Hamza:
Checking Correctness of Concurrent Objects: Tractable Reductions to Reachability (Invited Talk). FSTTCS 2015: 2-4 - [c23]Ahmed Bouajjani, Michael Emmi, Constantin Enea, Jad Hamza:
On Reducing Linearizability to State Reachability. ICALP (2) 2015: 95-107 - [c22]Michael Emmi, Constantin Enea, Jad Hamza:
Monitoring refinement via symbolic reasoning. PLDI 2015: 260-269 - [c21]Ahmed Bouajjani, Michael Emmi, Constantin Enea, Jad Hamza:
Tractable Refinement Checking for Concurrent Objects. POPL 2015: 651-662 - [c20]Arvind Haran, Montgomery Carter, Michael Emmi, Akash Lal, Shaz Qadeer, Zvonimir Rakamaric:
SMACK+Corral: A Modular Verifier - (Competition Contribution). TACAS 2015: 451-454 - [i1]Ahmed Bouajjani, Michael Emmi, Constantin Enea, Jad Hamza:
On Reducing Linearizability to State Reachability. CoRR abs/1502.06882 (2015) - 2014
- [j2]Ahmed Bouajjani, Michael Emmi:
Bounded phase analysis of message-passing programs. Int. J. Softw. Tools Technol. Transf. 16(2): 127-146 (2014) - [c19]Zvonimir Rakamaric, Michael Emmi:
SMACK: Decoupling Source Language Details from Verifier Implementations. CAV 2014: 106-113 - [c18]Michael Emmi, Burcu Kulahcioglu Ozkan, Serdar Tasiran:
Exploiting synchronization in the analysis of shared-memory asynchronous programs. SPIN 2014: 20-29 - 2013
- [j1]Ahmed Bouajjani, Michael Emmi:
Analysis of Recursively Parallel Programs. ACM Trans. Program. Lang. Syst. 35(3): 10:1-10:49 (2013) - [c17]Ahmed Bouajjani, Michael Emmi, Constantin Enea, Jad Hamza:
Verifying Concurrent Programs against Sequential Specifications. ESOP 2013: 290-309 - 2012
- [c16]Mohamed Faouzi Atig, Ahmed Bouajjani, Michael Emmi, Akash Lal:
Detecting Fair Non-termination in Multithreaded Programs. CAV 2012: 210-226 - [c15]Ahmed Bouajjani, Michael Emmi:
Analysis of recursively parallel programs. POPL 2012: 203-214 - [c14]Michael Emmi, Akash Lal:
Finding Non-terminating Executions in Distributed Asynchronous Programs. SAS 2012: 439-455 - [c13]Michael Emmi, Akash Lal, Shaz Qadeer:
Asynchronous programs with prioritized task-buffers. SIGSOFT FSE 2012: 48 - [c12]Ahmed Bouajjani, Michael Emmi:
Bounded Phase Analysis of Message-Passing Programs. TACAS 2012: 451-465 - 2011
- [c11]Michael Emmi, Shaz Qadeer, Zvonimir Rakamaric:
Delay-bounded scheduling. POPL 2011: 411-422 - [c10]Ahmed Bouajjani, Michael Emmi, Gennaro Parlato:
On Sequentializing Concurrent Programs. SAS 2011: 129-145 - 2010
- [c9]Michael Emmi, Rupak Majumdar, Roman Manevich:
Parameterized verification of transactional memories. PLDI 2010: 134-145
2000 – 2009
- 2009
- [c8]Michael Emmi, Ranjit Jhala, Eddie Kohler, Rupak Majumdar:
Verifying Reference Counting Implementations. TACAS 2009: 352-367 - 2008
- [c7]Michael Emmi, Dimitra Giannakopoulou, Corina S. Pasareanu:
Assume-Guarantee Verification for Interface Automata. FM 2008: 116-131 - [c6]Juan Chen, Chris Hawblitzel, Frances Perry, Michael Emmi, Jeremy Condit, Derrick Coetzee, Polyvios Pratikakis:
Type-preserving compilation for large-scale optimizing object-oriented compilers. PLDI 2008: 183-192 - 2007
- [c5]Michael Emmi, Rupak Majumdar, Koushik Sen:
Dynamic test input generation for database applications. ISSTA 2007: 151-162 - [c4]Michael Emmi, Jeffrey S. Fischer, Ranjit Jhala, Rupak Majumdar:
Lock allocation. POPL 2007: 291-296 - [c3]Alice Wang, Michael Emmi, Petros Faloutsos:
Assembling an expressive facial animation system. Sandbox@SIGGRAPH 2007: 21-26 - [c2]Michael Emmi, Rupak Majumdar:
Verifying Compensating Transactions. VMCAI 2007: 29-43 - 2006
- [c1]Michael Emmi, Rupak Majumdar:
Decision Problems for the Verification of Real-Time Software. HSCC 2006: 200-211
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-03 00:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint