default search action
Sandip Ray
Person information
- affiliation: University of Florida, Gainesville, FL, USA
- affiliation (former): University of Texas at Austin, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j41]Kelsey L. Horace-Herron, Naren Vikram Raj Masna, Swarup Bhunia, Soumyajit Mandal, Sandip Ray:
Nuclear Quadrupole Resonance for Substance Detection. IEEE Access 12: 111709-111722 (2024) - [j40]Xiangru Chen, Dipal Halder, Kazi Mejbaul Islam, Sandip Ray:
Guarding Deep Learning Systems With Boosted Evasion Attack Detection and Model Update. IEEE Internet Things J. 11(6): 9382-9391 (2024) - [j39]Md Rafiul Kabir, Sandip Ray:
ViSE: Digital Twin Exploration for Automotive Functional Safety and Cybersecurity. J. Hardw. Syst. Secur. 8(2): 133-144 (2024) - [j38]Jin Yang, Zhenkun Yang, Jeremy Casas, Sandip Ray:
Correct-by-Construction Design of Custom Accelerator Microarchitectures. IEEE Trans. Computers 73(1): 278-291 (2024) - [j37]Samit Shahnawaz Miftah, Kshitij Raj, Xingyu Meng, Sandip Ray, Kanad Basu:
System-on-Chip Information Flow Validation Under Asynchronous Resets. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(9): 2825-2838 (2024) - [c81]Dipal Halder, Sandip Ray:
PhD Project: Reconfigurable Network on Chip Architecture Through Topology Obfuscation For Protecting SoC Against Reverse Engineering. FCCM 2024: 227-228 - [c80]Arhona Bhadra, Sandip Ray:
Adaptive Robotic Arm System for Wheelchair Assistance in Autonomous Vehicles. ICCE 2024: 1-3 - [c79]Kshitij Raj, Aritra Bhattacharyay, Swarup Bhunia, Sandip Ray:
Trimming The Fat: A Minimum-Security Architecture for Protecting SoC Designs Against Supply Chain Threats. ISQED 2024: 1 - [c78]Md Rafiul Kabir, Sandip Ray:
DT-IoMT: A Digital Twin Reference Model for Secure Internet of Medical Things. ISVLSI 2024: 433-438 - [c77]Richard Owoputi, Srivalli Boddupalli, Jabari Wilson, Sandip Ray:
DRIFT: Resilient Distributed Coordinated Fleet Management Against Communication Attacks. IV 2024: 2309-2316 - 2023
- [j36]Md Rafiul Kabir, Sandip Ray:
Virtual Prototyping for Modern Internet-of-Things Applications: A Survey. IEEE Access 11: 31384-31398 (2023) - [j35]Md Rafiul Kabir, Bhagawat Baanav Yedla Ravi, Sandip Ray:
A Virtual Prototyping Platform for Exploration of Vehicular Electronics. IEEE Internet Things J. 10(18): 16144-16155 (2023) - [j34]Xiangru Chen, Maneesh Merugu, Jiaqi Zhang, Sandip Ray:
AroMa: Evaluating Deep Learning Systems for Stealthy Integrity Attacks on Multi-tenant Accelerators. ACM J. Emerg. Technol. Comput. Syst. 19(2): 13:1-13:17 (2023) - [j33]Jiaqi Zhang, Xiangru Chen, Sandip Ray:
AINNS: All-Inclusive Neural Network Scheduling Via Accelerator Formalization. IEEE Trans. Computers 72(2): 559-571 (2023) - [j32]Patanjali SLPSK, Sandip Ray, Swarup Bhunia:
TREEHOUSE: A Secure Asset Management Infrastructure for Protecting 3DIC Designs. IEEE Trans. Computers 72(8): 2306-2320 (2023) - [j31]Xingyu Meng, Kshitij Raj, Sandip Ray, Kanad Basu:
SeVNoC: Security Validation of System-on-Chip Designs With NoC Fabrics. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(2): 672-682 (2023) - [j30]Dipal Halder, Maneesh Merugu, Sandip Ray:
ObNoCs: Protecting Network-on-Chip Fabrics Against Reverse-Engineering Attacks. ACM Trans. Embed. Comput. Syst. 22(5s): 112:1-112:21 (2023) - [c76]Xiangru Chen, Dipal Halder, Kazi Mejbaul Islam, Sandip Ray:
Work-in-Progress: Towards Evaluating CNNs Against Integrity Attacks on Multi-tenant Computation. CASES 2023: 7-8 - [c75]Venkata Sai Gireesh Chamarthi, Xiangru Chen, Bhagawat Baanav Yedla Ravi, Sandip Ray:
Exploration of Machine Learning Attacks in Automotive Systems Using Physical and Mixed Reality Platforms. ICCE 2023: 1-4 - [c74]Sumaiya Afroz Mila, Md Rafiul Kabir, Sandip Ray:
Continuous Monitoring for Diagnosis: A Wearable for Covid-19 Detection in Symptomatic Patients. ICCE 2023: 1-6 - [c73]Richard Owoputi, Md Rafiul Kabir, Sandip Ray:
sc IVE: An Immersive Virtual Environment for Automotive Security Exploration. iLRN 2023: 484-496 - [c72]Xiangru Chen, Sandip Ray:
GERALT: Real-time Detection of Evasion Attacks in Deep Learning Systems. ISCAS 2023: 1-5 - [c71]Aidan Kwok, Richard Owoputi, Sandip Ray:
Poster: Scenario Creation for Immersive Automotive Security Exploration. MobiHoc 2023: 565-567 - [c70]Patrick M. Mendoza, Tashfique Hasnine Choudhury, Sandip Ray:
Poster: Vehicle-to-Infrastructure Security for Reduced Speed Work Zone. MobiHoc 2023: 571-573 - [c69]Jack Carter, Bhagawat Baanav Yedla Ravi, Md Rafiul Kabir, Sandip Ray:
Poster: Efficient Exploration of Automotive Ranging Sensor Attacks. MobiHoc 2023: 589-591 - [c68]Darshith Madvinkodi Prakash, Bhagawat Baanav Yedla Ravi, Srivalli Boddupalli, Sandip Ray:
VeCAEP: A Hands-on Exploration Platform for Vehicular Communication Attacks. VTC2023-Spring 2023: 1-5 - [i6]Dipal Halder, Maneesh Merugu, Sandip Ray:
ObNoCs: Protecting Network-on-Chip Fabrics Against Reverse-Engineering Attacks. CoRR abs/2307.05815 (2023) - 2022
- [j29]Richard Owoputi, Sandip Ray:
Security of Multi-Agent Cyber-Physical Systems: A Survey. IEEE Access 10: 121465-121479 (2022) - [j28]Prabuddha Chakraborty, Jonathan Cruz, Christopher Posada, Sandip Ray, Swarup Bhunia:
HASTE: Software Security Analysis for Timing Attacks on Clear Hardware Assumption. IEEE Embed. Syst. Lett. 14(2): 71-74 (2022) - [j27]Jiaqi Zhang, Xiangru Chen, Sandip Ray:
GCONV Chain: Optimizing the Whole-Life Cost in End-to-end CNN Acceleration. IEEE Trans. Computers 71(9): 2300-2312 (2022) - [j26]Xiangru Chen, Jiaqi Zhang, Sandip Ray:
Dandelion: Boosting DNN Usability Under Dataset Scarcity. IEEE Trans. Computers 71(10): 2487-2498 (2022) - [j25]Srivalli Boddupalli, Akash Someshwar Rao, Sandip Ray:
Resilient Cooperative Adaptive Cruise Control for Autonomous Vehicles Using Machine Learning. IEEE Trans. Intell. Transp. Syst. 23(9): 15655-15672 (2022) - [j24]Atul Prasad Deb Nath, Kshitij Raj, Swarup Bhunia, Sandip Ray:
SoCCom: Automated Synthesis of System-on-Chip Architectures. IEEE Trans. Very Large Scale Integr. Syst. 30(4): 449-462 (2022) - [c67]Tashfia Alam, Zhenkun Yang, Bo Chen, Nicholas Armour, Sandip Ray:
FirVer: Concolic Testing for Systematic Validation of Firmware Binaries. ASP-DAC 2022: 352-357 - [c66]Srivalli Boddupalli, Richard Owoputi, Chengwei Duan, Tashfique Hasnine Choudhury, Sandip Ray:
Resiliency in Connected Vehicle Applications: Challenges and Approaches for Security Validation. ACM Great Lakes Symposium on VLSI 2022: 475-480 - [c65]Bhagawat Baanav Yedla Ravi, Md Rafiul Kabir, Neha Mishra, Srivalli Boddupalli, Sandip Ray:
Autohal: An Exploration Platform for Ranging Sensor Attacks on Automotive Systems. ICCE 2022: 1-2 - [c64]Srivalli Boddupalli, Venkata Sai Gireesh Chamarthi, Chung-Wei Lin, Sandip Ray:
CAVELIER: Automated Security Evaluation for Connected Autonomous Vehicle Applications. ITSC 2022: 4335-4340 - [c63]Sheng-Li Wang, Chien Lin, Srivalli Boddupalli, Chung-Wei Lin, Sandip Ray:
Deep-Learning-Based Anomaly Detection for Lane-Changing Decisions. IV 2022: 1536-1542 - 2021
- [c62]Kshitij Raj, Arrush Hegde, Atul Prasad Deb Nath, Swarup Bhunia, Sandip Ray:
SSEL: An Extensible Specification Language for SoC Security. AsianHOST 2021: 1-6 - [c61]Xingyu Meng, Kshitij Raj, Atul Prasad Deb Nath, Kanad Basu, Sandip Ray:
SoCCAR: Detecting System-on-Chip Security Violations Under Asynchronous Resets. DAC 2021: 625-630 - [c60]Sandip Ray, Atul Prasad Deb Nath, Kshitij Raj, Swarup Bhunia:
CASTLE: Architecting Assured System-on-Chip Firmware Integrity. DATE 2021: 1781-1786 - [c59]Sandip Ray, Arani Sinha:
Synergies Between Delay Test and Post-silicon Speed Path Validation: A Tutorial Introduction. ETS 2021: 1-4 - [c58]Sandip Ray, Atul Prasad Deb Nath, Kshitij Raj, Swarup Bhunia:
The Curious Case of Trusted IC Provisioning in Untrusted Testing Facilities. ACM Great Lakes Symposium on VLSI 2021: 207-212 - [c57]Jiaqi Zhang, Xiangru Chen, Sandip Ray:
Universal Neural Network Acceleration via Real-Time Loop Blocking. ICCD 2021: 285-289 - [c56]Divy Chhibber, Aditi Tripathi, Sandip Ray:
Do VIR: Virtualizing Food Donation Distribution through Mobile Application and Cloud-Based Supply Chain Management. ICCE 2021: 1-5 - [c55]Sheng-Li Wang, Sing-Yao Wu, Ching-Chu Lin, Srivalli Boddupalli, Po-Jui Chang, Chung-Wei Lin, Chi-Sheng Shih, Sandip Ray:
Deep-Learning-Based Intrusion Detection for Autonomous Vehicle-Following Systems. ITSC 2021: 865-872 - [c54]Srivalli Boddupalli, Ashwini Hegde, Sandip Ray:
Replace: Real-time Security Assurance in Vehicular Platoons Against V2V Attacks. ITSC 2021: 1179-1185 - [c53]Md Rafiul Kabir, Neha Mishra, Sandip Ray:
VIVE: Virtualization of Vehicular Electronics for System-level Exploration. ITSC 2021: 3307-3312 - [i5]Srivalli Boddupalli, Akash Someshwar Rao, Sandip Ray:
Resilient Cooperative Adaptive Cruise Control for Autonomous Vehicles Using Machine Learning. CoRR abs/2103.10533 (2021) - [i4]Jiaqi Zhang, Xiangru Chen, Sandip Ray, Tao Li:
Optimizing the Whole-life Cost in End-to-end CNN Acceleration. CoRR abs/2104.05541 (2021) - [i3]Xingyu Meng, Kshitij Raj, Atul Prasad Deb Nath, Kanad Basu, Sandip Ray:
SoCCAR: Detecting System-on-Chip Security Violations Under Asynchronous Resets. IACR Cryptol. ePrint Arch. 2021: 309 (2021) - 2020
- [j23]Atul Prasad Deb Nath, Srivalli Boddupalli, Swarup Bhunia, Sandip Ray:
Resilient System-on-Chip Designs With NoC Fabrics. IEEE Trans. Inf. Forensics Secur. 15: 2808-2823 (2020) - [e1]Augusto Casaca, Srinivas Katkoori, Sandip Ray, Leon Strous:
Internet of Things. A Confluence of Many Disciplines - Second IFIP International Cross-Domain Conference, IFIPIoT 2019, Tampa, FL, USA, October 31 - November 1, 2019, Revised Selected Papers. IFIP Advances in Information and Communication Technology 574, Springer 2020, ISBN 978-3-030-43604-9 [contents] - [i2]Yuting Cao, Hao Zheng, Sandip Ray, Jin Yang:
A Post-Silicon Trace Analysis Approach for System-on-Chip Protocol Debug. CoRR abs/2005.02550 (2020)
2010 – 2019
- 2019
- [j22]Hamid Nejatollahi, Nikil D. Dutt, Sandip Ray, Francesco Regazzoni, Indranil Banerjee, Rosario Cammarota:
Post-Quantum Lattice-Based Cryptography Implementations: A Survey. ACM Comput. Surv. 51(6): 129:1-129:41 (2019) - [j21]Sandip Ray, Ahmad-Reza Sadeghi, Mohammad Abdullah Al Faruque:
Guest Editors' Introduction: Secure Automotive Systems. IEEE Des. Test 36(6): 5-6 (2019) - [j20]Anthony Bahadir Lopez, Arnav Vaibhav Malawade, Mohammad Abdullah Al Faruque, Srivalli Boddupalli, Sandip Ray:
Security of Emergent Automotive Systems: A Tutorial Introduction and Perspectives on Practice. IEEE Des. Test 36(6): 10-38 (2019) - [c52]Sandip Ray:
Safety, Security, and Reliability: The Automotive Robustness Problem and an Architectural Solution. ICCE 2019: 1-4 - [c51]Srivalli Boddupalli, Sandip Ray:
REDEM: Real-Time Detection and Mitigation of Communication Attacks in Connected Autonomous Vehicle Applications. IFIPIoT 2019: 105-122 - [c50]Yuting Cao, Hao Zheng, Sandip Ray:
A Communication-Centric Observability Selection for Post-Silicon System-on-Chip Integration Debug. ISQED 2019: 278-283 - [p1]Atul Prasad Deb Nath, Tamzidul Hoque, Sandip Ray, Swarup Bhunia:
An Adaptable System-on-Chip Security Architecture for Internet of Things Applications. Security and Fault Tolerance in Internet of Things 2019: 61-85 - [i1]Yuting Cao, Hao Zheng, Sandip Ray:
A Communication-Centric Observability Selection for Post-Silicon System-on-Chip Integration Debug. CoRR abs/1907.12901 (2019) - 2018
- [j19]Kejun Chen, Shuai Zhang, Zhikun Li, Yi Zhang, Qingxu Deng, Sandip Ray, Yier Jin:
Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice. J. Hardw. Syst. Secur. 2(2): 97-110 (2018) - [j18]Sandip Ray, Eric Peeters, Mark M. Tehranipoor, Swarup Bhunia:
System-on-Chip Platform Security Assurance: Architecture and Validation. Proc. IEEE 106(1): 21-37 (2018) - [c49]Atul Prasad Deb Nath, Sandip Ray, Abhishek Basak, Swarup Bhunia:
System-on-chip security architecture and CAD framework for hardware patch. ASP-DAC 2018: 733-738 - [c48]Sandip Ray, Wen Chen, Rosario Cammarota:
Protecting the supply chain for automotives and IoTs. DAC 2018: 89:1-89:4 - [c47]Debjit Pal, Abhishek Sharma, Sandip Ray, Flavio M. de Paula, Shobha Vasudevan:
Application level hardware tracing for scaling post-silicon debug. DAC 2018: 92:1-92:6 - [c46]Atul Prasad Deb Nath, Swarup Bhunia, Sandip Ray:
ArtiFact: Architecture and CAD Flow for Efficient Formal Verification of SoC Security Policies. ISVLSI 2018: 411-416 - [c45]Yuting Cao, Hernan M. Palombo, Sandip Ray, Hao Zheng:
Enhancing Observability for Post-Silicon Debug with On-chip Communication Monitors. ISVLSI 2018: 602-607 - 2017
- [j17]Prabhat Mishra, Ronny Morad, Avi Ziv, Sandip Ray:
Post-Silicon Validation in the SoC Era: A Tutorial Introduction. IEEE Des. Test 34(3): 68-92 (2017) - [j16]Wen Chen, Sandip Ray, Jayanta Bhadra, Magdy S. Abadir, Li-C. Wang:
Challenges and Trends in Modern SoC Design Verification. IEEE Des. Test 34(5): 7-22 (2017) - [j15]Sandip Ray, Yier Jin:
Guest Editorial: Security Challenges in the IoT Regime. J. Hardw. Syst. Secur. 1(4): 297 (2017) - [j14]Abhishek Basak, Swarup Bhunia, Thomas E. Tkacik, Sandip Ray:
Security Assurance for System-on-Chip Designs With Untrusted IPs. IEEE Trans. Inf. Forensics Secur. 12(7): 1515-1528 (2017) - [j13]Kamran Rahmani, Sandip Ray, Prabhat Mishra:
Postsilicon Trace Signal Selection Using Machine Learning Techniques. IEEE Trans. Very Large Scale Integr. Syst. 25(2): 570-580 (2017) - [c44]Robert Karam, Tamzidul Hoque, Sandip Ray, Mark M. Tehranipoor, Swarup Bhunia:
MUTARCH: Architectural diversity for FPGA device and IP security. ASP-DAC 2017: 611-616 - [c43]Sandip Ray:
System-on-chip security assurance for IoT devices: Cooperations and conflicts. CICC 2017: 1-4 - [c42]Sandip Ray, Wen Chen, Jayanta Bhadra, Mohammad Abdullah Al Faruque:
Extensibility in Automotive Security: Current Practice and Challenges: Invited. DAC 2017: 14:1-14:6 - [c41]Sandip Ray:
Transportation security in the era of autonomous vehicles: Challenges and practice. ICCAD 2017: 1034-1038 - [c40]Yuting Cao, Hao Zheng, Hernan M. Palombo, Sandip Ray, Jin Yang:
A Post-Silicon Trace Analysis Approach for System-on-Chip Protocol Debug. ICCD 2017: 177-184 - 2016
- [j12]Sandip Ray, Yier Jin, Arijit Raychowdhury:
The Changing Computing Paradigm With Internet of Things: A Tutorial Introduction. IEEE Des. Test 33(2): 76-96 (2016) - [j11]Sandip Ray, Jongsun Park, Swarup Bhunia:
Wearables, Implants, and Internet of Things: The Technology Needs in the Evolving Landscape. IEEE Trans. Multi Scale Comput. Syst. 2(2): 123-128 (2016) - [c39]Abhishek Basak, Swarup Bhunia, Sandip Ray:
Exploiting design-for-debug for flexible SoC security architecture. DAC 2016: 167:1-167:6 - [c38]Farimah Farahmandi, Prabhat Mishra, Sandip Ray:
Exploiting transaction level models for observability-aware post-silicon test generation. DATE 2016: 1477-1480 - [c37]Zhenkun Yang, Kecheng Hao, Kai Cong, Li Lei, Sandip Ray, Fei Xie:
Validating scheduling transformation for behavioral synthesis. DATE 2016: 1652-1657 - [c36]Sandip Ray, Ian G. Harris, Görschwin Fey, Mathias Soeken:
Multilevel design understanding: from specification to logic (invited paper). ICCAD 2016: 133 - [c35]Sandip Ray, Tamzidul Hoque, Abhishek Basak, Swarup Bhunia:
The power play: Security-energy trade-offs in the IoT regime. ICCD 2016: 690-693 - [c34]Hao Zheng, Yuting Cao, Sandip Ray, Jin Yang:
Protocol-guided analysis of post-silicon traces under limited observability. ISQED 2016: 301-306 - [c33]Robert Karam, Tamzidul Hoque, Sandip Ray, Mark M. Tehranipoor, Swarup Bhunia:
Technical demonstration session: Software toolflow for FPGA bitstream obfuscation. ReConFig 2016: 1-2 - [c32]Robert Karam, Tamzidul Hoque, Sandip Ray, Mark M. Tehranipoor, Swarup Bhunia:
Robust bitstream protection in FPGA-based systems through low-overhead obfuscation. ReConFig 2016: 1-8 - [c31]Sandip Ray, Jayanta Bhadra:
Security challenges in mobile and IoT systems. SoCC 2016: 356-361 - [c30]Sandip Ray, Swarup Bhunia, Yier Jin, Mark M. Tehranipoor:
Security validation in IoT space. VTS 2016: 1 - 2015
- [j10]Sandip Ray, Jongsun Park, Swarup Bhunia:
Guest Editors' Introduction: Wearables, Implants, and Internet of Things. IEEE Trans. Multi Scale Comput. Syst. 1(2): 60-61 (2015) - [c29]Sandip Ray, Jin Yang, Abhishek Basak, Swarup Bhunia:
Correctness and security at odds: post-silicon validation of modern SoC designs. DAC 2015: 146:1-146:6 - [c28]Murali Talupur, Sandip Ray, John Erickson:
Transaction Flows and Executable Models: Formalization and Analysis of Message passing Protocols. FMCAD 2015: 168-175 - [c27]Sai Ma, Debjit Pal, Rui Jiang, Sandip Ray, Shobha Vasudevan:
Can't See the Forest for the Trees: State Restoration's Limitations in Post-silicon Trace Signal Selection. ICCAD 2015: 1-8 - [c26]Sandip Ray, Yier Jin:
Security Policy Enforcement in Modern SoC Designs. ICCAD 2015: 345-350 - [c25]Abhishek Basak, Swarup Bhunia, Sandip Ray:
A Flexible Architecture for Systematic Implementation of SoC Security Policies. ICCAD 2015: 536-543 - 2014
- [c24]Zhenkun Yang, Kecheng Hao, Kai Cong, Li Lei, Sandip Ray, Fei Xie:
Scalable Certification Framework for Behavioral Synthesis Front-End. DAC 2014: 149:1-149:6 - [c23]Kecheng Hao, Sandip Ray, Fei Xie:
Equivalence checking for function pipelining in behavioral synthesis. DATE 2014: 1-6 - [c22]Kamran Rahmani, Prabhat Mishra, Sandip Ray:
Efficient trace signal selection using augmentation and ILP techniques. ISQED 2014: 148-155 - [c21]Disha Puri, Sandip Ray, Kecheng Hao, Fei Xie:
Mechanical Certification of Loop Pipelining Transformations: A Preview. ITP 2014: 549-554 - [c20]Disha Puri, Sandip Ray, Kecheng Hao, Fei Xie:
Using ACL2 to Verify Loop Pipelining in Behavioral Synthesis. ACL2 2014: 111-128 - 2013
- [j9]Sandip Ray, Jay Bhadra, Magdy S. Abadir, Li-C. Wang:
Guest Editorial: Test and Verification Challenges for Future Microprocessors and SoC Designs. J. Electron. Test. 29(5): 621-623 (2013) - [j8]Sandip Ray, Rob Sumners:
Specification and Verification of Concurrent Programs Through Refinements. J. Autom. Reason. 51(3): 241-280 (2013) - [c19]Zhenkun Yang, Sandip Ray, Kecheng Hao, Fei Xie:
Handling design and implementation optimizations in equivalence checking for behavioral synthesis. DAC 2013: 117:1-117:6 - [c18]Barbara Jobstmann, Sandip Ray:
Preface. FMCAD 2013 - [c17]Kamran Rahmani, Prabhat Mishra, Sandip Ray:
Scalable trace signal selection using machine learning. ICCD 2013: 384-389 - [c16]Zhenkun Yang, Kecheng Hao, Kai Cong, Sandip Ray, Fei Xie:
Equivalence checking for compiler transformations in behavioral synthesis. ICCD 2013: 491-494 - 2012
- [j7]Sandip Ray, Jayanta Bhadra, Magdy S. Abadir, Li-C. Wang, Aarti Gupta:
Introduction to special section on verification challenges in the concurrent world. ACM Trans. Design Autom. Electr. Syst. 17(3): 19:1-19:3 (2012) - [c15]Kecheng Hao, Sandip Ray, Fei Xie:
Equivalence checking for behaviorally synthesized pipelines. DAC 2012: 344-349 - 2011
- [j6]Michael J. C. Gordon, Matt Kaufmann, Sandip Ray:
The Right Tools for the Job: Correctness of Cone of Influence Reduction Proved Using ACL2 and HOL4. J. Autom. Reason. 47(1): 1-16 (2011) - [c14]Oswaldo Olivo, Sandip Ray, Jayanta Bhadra, Vivekananda M. Vedula:
A Unified Formal Framework for Analyzing Functional and Speed-path Properties. MTV 2011: 44-45 - 2010
- [b1]Sandip Ray:
Scalable Techniques for Formal Verification. Springer 2010, ISBN 978-1-4419-5997-3, pp. I-XIV, 1-243 - [c13]Kecheng Hao, Fei Xie, Sandip Ray, Jin Yang:
Optimizing equivalence checking for behavioral synthesis. DATE 2010: 1500-1505 - [c12]Sandip Ray, Jayanta Bhadra, Thomas Portlock, Ronald Syzdek:
Modeling and verification of industrial flash memories. ISQED 2010: 705-712 - [c11]Sandip Ray, Jayanta Bhadra:
Innovative practices session 7C: Verification and testing challenges in high-level synthesis. VTS 2010: 250
2000 – 2009
- 2009
- [j5]Matt Kaufmann, J Strother Moore, Sandip Ray, Erik Reeber:
Integrating external deduction tools with ACL2. J. Appl. Log. 7(1): 3-25 (2009) - [c10]Sandip Ray, Kecheng Hao, Yan Chen, Fei Xie, Jin Yang:
Formal Verification for High-Assurance Behavioral Synthesis. ATVA 2009: 337-351 - [c9]Sandip Ray, Warren A. Hunt Jr.:
Connecting pre-silicon and post-silicon verification. FMCAD 2009: 160-163 - 2008
- [j4]Sandip Ray, Warren A. Hunt Jr., John Matthews, J Strother Moore:
A Mechanical Analysis of Program Verification Strategies. J. Autom. Reason. 40(4): 245-269 (2008) - [j3]David A. Greve, Matt Kaufmann, Panagiotis Manolios, J Strother Moore, Sandip Ray, José-Luis Ruiz-Reina, Rob Sumners, Daron Vroon, Matthew Wilding:
Efficient execution in an automated reasoning environment. J. Funct. Program. 18(1): 15-46 (2008) - [c8]Warren A. Hunt Jr., Robert Bellarmine Krug, Sandip Ray, William D. Young:
Mechanized Information Flow Analysis through Inductive Assertions. FMCAD 2008: 1-4 - [c7]Sandip Ray:
Abstraction as a Practical Debugging Tool. MTV 2008: 45-48 - 2007
- [j2]Jayanta Bhadra, Magdy S. Abadir, Li-C. Wang, Sandip Ray:
A Survey of Hybrid Techniques for Functional Verification. IEEE Des. Test Comput. 24(2): 112-122 (2007) - [j1]Sandip Ray, Rob Sumners:
Combining Theorem Proving with Model Checking through Predicate Abstraction. IEEE Des. Test Comput. 24(2): 132-139 (2007) - [c6]Sandip Ray, Jayanta Bhadra:
A Mechanized Refinement Framework for Analysis of Custom Memories. FMCAD 2007: 239-242 - [c5]Sandip Ray, Warren A. Hunt Jr.:
Mechanized Certification of Secure Hardware Designs. MTV 2007: 25-32 - 2006
- [c4]Sandip Ray:
Quantification in tail-recursive function definitions. ACL2 2006: 95-98 - [c3]John Matthews, J Strother Moore, Sandip Ray, Daron Vroon:
Verification Condition Generation Via Theorem Proving. LPAR 2006: 362-376 - 2004
- [c2]Sandip Ray, Warren A. Hunt Jr.:
Deductive Verification of Pipelined Machines Using First-Order Quantification. CAV 2004: 31-43 - [c1]Sandip Ray, J Strother Moore:
Proof Styles in Operational Semantics. FMCAD 2004: 67-81
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint