


default search action
Akash Lal
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Prantik Chatterjee, Subhajit Roy, Bui Phi Diep, Akash Lal:
Distributed bounded model checking. Formal Methods Syst. Des. 64(1): 50-72 (2024) - [c54]Kaushik Rajan, Aseem Rastogi, Akash Lal, Sampath Rajendra, Krithika Subramanian, Krut Patel:
Welding Natural Language Queries to Analytics IRs with LLMs. CIDR 2024 - [c53]Akash Lal
:
Concurrency Testing: A Journey from Research to Practice. ISEC 2024: 1:1 - [c52]Mayank Solanki
, Prantik Chatterjee
, Akash Lal
, Subhajit Roy
:
Accelerated Bounded Model Checking Using Interpolation Based Summaries. TACAS (2) 2024: 155-174 - [i15]Nausheen Mohammed, Akash Lal, Aseem Rastogi, Subhajit Roy, Rahul Sharma:
Enabling Memory Safety of C Programs using LLMs. CoRR abs/2404.01096 (2024) - 2023
- [j8]Narges Shadab
, Pritam M. Gharat
, Shrey Tiwari
, Michael D. Ernst
, Martin Kellogg
, Shuvendu K. Lahiri
, Akash Lal
, Manu Sridharan
:
Inference of Resource Management Specifications. Proc. ACM Program. Lang. 7(OOPSLA2): 1705-1728 (2023) - [c51]Saikat Chakraborty, Shuvendu K. Lahiri, Sarah Fakhoury, Akash Lal, Madanlal Musuvathi, Aseem Rastogi, Aditya Senthilnathan, Rahul Sharma, Nikhil Swamy:
Ranking LLM-Generated Loop Invariants for Program Verification. EMNLP (Findings) 2023: 9164-9175 - [c50]Tamal Mondal, Scott Barnett, Akash Lal, Jyothi Vedurada:
Cell2Doc: ML Pipeline for Generating Documentation in Computational Notebooks. ASE 2023: 384-396 - [c49]Pantazis Deligiannis
, Aditya Senthilnathan, Fahad Nayyar, Chris Lovett, Akash Lal:
Industrial-Strength Controlled Concurrency Testing for sc C tt # Programs with sc Coyote. TACAS (2) 2023: 433-452 - [e6]Constantin Enea
, Akash Lal:
Computer Aided Verification - 35th International Conference, CAV 2023, Paris, France, July 17-22, 2023, Proceedings, Part I. Lecture Notes in Computer Science 13964, Springer 2023, ISBN 978-3-031-37705-1 [contents] - [e5]Constantin Enea
, Akash Lal:
Computer Aided Verification - 35th International Conference, CAV 2023, Paris, France, July 17-22, 2023, Proceedings, Part II. Lecture Notes in Computer Science 13965, Springer 2023, ISBN 978-3-031-37702-0 [contents] - [e4]Constantin Enea
, Akash Lal:
Computer Aided Verification - 35th International Conference, CAV 2023, Paris, France, July 17-22, 2023, Proceedings, Part III. Lecture Notes in Computer Science 13966, Springer 2023, ISBN 978-3-031-37708-2 [contents] - [e3]Akash Lal, Stefano Tonetta
:
Verified Software. Theories, Tools and Experiments - 14th International Conference, VSTTE 2022, Trento, Italy, October 17-18, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13800, Springer 2023, ISBN 978-3-031-25802-2 [contents] - [i14]Narges Shadab, Pritam M. Gharat, Shrey Tiwari, Michael D. Ernst, Martin Kellogg, Shuvendu K. Lahiri, Akash Lal, Manu Sridharan:
Automatic Inference of Resource Leak Specifications. CoRR abs/2306.11953 (2023) - [i13]Pantazis Deligiannis, Akash Lal, Nikita Mehrotra, Aseem Rastogi:
Fixing Rust Compilation Errors using LLMs. CoRR abs/2308.05177 (2023) - [i12]Saikat Chakraborty, Shuvendu K. Lahiri, Sarah Fakhoury, Madanlal Musuvathi, Akash Lal, Aseem Rastogi, Aditya Senthilnathan, Rahul Sharma, Nikhil Swamy:
Ranking LLM-Generated Loop Invariants for Program Verification. CoRR abs/2310.09342 (2023) - [i11]Adharsh Kamath
, Aditya Senthilnathan, Saikat Chakraborty, Pantazis Deligiannis, Shuvendu K. Lahiri, Akash Lal, Aseem Rastogi, Subhajit Roy, Rahul Sharma:
Finding Inductive Loop Invariants using Large Language Models. CoRR abs/2311.07948 (2023) - [i10]Pritam M. Gharat, Narges Shadab, Shrey Tiwari, Shuvendu K. Lahiri, Akash Lal:
Resource Leak Checker (RLC#) for C# Code using CodeQL. CoRR abs/2312.01912 (2023) - 2022
- [c48]Prantik Chatterjee
, Jaydeepsinh Meda, Akash Lal, Subhajit Roy
:
Proof-Guided Underapproximation Widening for Bounded Model Checking. CAV (1) 2022: 304-324 - 2021
- [j7]Ranadeep Biswas, Diptanshu Kakwani, Jyothi Vedurada, Constantin Enea, Akash Lal:
MonkeyDB: effectively testing correctness under weak isolation levels. Proc. ACM Program. Lang. 5(OOPSLA): 1-27 (2021) - [c47]Pantazis Deligiannis
, Narayanan Ganapathy, Akash Lal, Shaz Qadeer:
Building Reliable Cloud Services Using Coyote Actors. SoCC 2021: 108-121 - [c46]Samvid Dharanikota, Suvam Mukherjee, Chandrika Bhardwaj, Aseem Rastogi, Akash Lal:
Celestial: A Smart Contracts Verification Framework. FMCAD 2021: 133-142 - [c45]Udit Agarwal, Pantazis Deligiannis
, Cheng Huang, Kumseok Jung, Akash Lal, Immad Naseer, Matthew Parkinson, Arun Thangamani, Jyothi Vedurada, Yunpeng Xiao:
Nekara: Generalized Concurrency Testing. ASE 2021: 679-691 - [c44]Jayaraj Poroor, Akash Lal, Sandesh Ghanta:
Robust I/O-compute concurrency for machine learning pipelines in constrained cyber-physical devices. LCTES 2021: 1-11 - [i9]Ranadeep Biswas, Diptanshu Kakwani, Jyothi Vedurada, Constantin Enea, Akash Lal:
MonkeyDB: Effectively Testing Correctness against Weak Isolation Levels. CoRR abs/2103.02830 (2021) - 2020
- [j6]Suvam Mukherjee
, Pantazis Deligiannis
, Arpita Biswas
, Akash Lal:
Learning-based controlled concurrency testing. Proc. ACM Program. Lang. 4(OOPSLA): 230:1-230:31 (2020) - [c43]Prantik Chatterjee, Subhajit Roy, Bui Phi Diep, Akash Lal:
Distributed Bounded Model Checking. FMCAD 2020: 47-56 - [c42]Shuvendu K. Lahiri, Akash Lal, Sridhar Gopinath, Alexander Nutz, Vladimir Levin, Rahul Kumar, Nate Deisinger, Jakob Lichtenberg, Chetan Bansal:
Angelic Checking within Static Driver Verifier: Towards high-precision defects without (modeling) cost. FMCAD 2020: 169-178 - [c41]Partho Sarthi, Kaushik Rajan, Akash Lal, Abhishek Modi, Prakhar Jain, Mo Liu, Ashit Gosalia, Saurabh Kalikar:
Generalized Sub-Query Fusion for Eliminating Redundant I/O from Big-Data Queries. OSDI 2020: 209-224 - [i8]Pantazis Deligiannis, Narayanan Ganapathy, Akash Lal, Shaz Qadeer:
Building Reliable Cloud Services Using P# (Experience Report). CoRR abs/2002.04903 (2020) - [i7]Prantik Chatterjee, Subhajit Roy, Bui Phi Diep, Akash Lal:
Distributed Bounded Model Checking. CoRR abs/2005.08063 (2020)
2010 – 2019
- 2019
- [c40]Peizun Liu, Thomas Wahl, Akash Lal:
Verifying Asynchronous Event-Driven Programs Using Partial Abstract Transformers. CAV (2) 2019: 386-404 - [c39]Suvam Mukherjee
, Nitin John Raj, Krishnan Govindraj, Pantazis Deligiannis
, Chandramouleswaran Ravichandran, Akash Lal, Aseem Rastogi, Raja Krishnaswamy:
Reliable State Machines: A Framework for Programming Reliable Cloud Services. ECOOP 2019: 18:1-18:29 - [c38]Ajay Brahmakshatriya, Piyus Kedia, Derrick Paul McKee
, Deepak Garg, Akash Lal, Aseem Rastogi, Hamed Nemati
, Anmol Panda, Pratik Bhatu:
ConfLLVM: A Compiler for Enforcing Data Confidentiality in Low-Level Code. EuroSys 2019: 4:1-4:15 - [i6]Suvam Mukherjee, Nitin John Raj, Krishnan Govindraj, Pantazis Deligiannis, Chandramouleswaran Ravichandran, Akash Lal, Aseem Rastogi, Raja Krishnaswamy:
Reliable State Machines: A Framework for Programming Reliable Cloud Services. CoRR abs/1902.09502 (2019) - [i5]Peizun Liu, Thomas Wahl, Akash Lal:
Verifying Asynchronous Event-Driven Programs Using Partial Abstract Transformers (Extended Manuscript). CoRR abs/1905.09996 (2019) - 2017
- [j5]Deepak D'Souza, Akash Lal:
Special issue on the 16th International Conference on Verification, Model Checking, and Abstract Interpretation. Comput. Lang. Syst. Struct. 47: 1 (2017) - [c37]Ankush Das
, Akash Lal:
Precise Null Pointer Analysis Through Global Value Numbering. ATVA 2017: 25-41 - [c36]Rashmi Mudduluru, Pantazis Deligiannis
, Ankush Desai, Akash Lal, Shaz Qadeer:
Lasso detection using partial-state caching. FMCAD 2017: 84-91 - [c35]Matthias Schlaipfer
, Kaushik Rajan
, Akash Lal, Malavika Samak:
Optimizing Big-Data Queries Using Program Synthesis. SOSP 2017: 631-646 - [i4]Ankush Das, Akash Lal:
Precise Null Pointer Analysis Through Global Value Numbering. CoRR abs/1702.05807 (2017) - [i3]Ajay Brahmakshatriya, Piyus Kedia, Derrick Paul McKee, Pratik Bhatu, Deepak Garg, Akash Lal, Aseem Rastogi:
An Instrumenting Compiler for Enforcing Confidentiality in Low-Level Code. CoRR abs/1711.11396 (2017) - 2016
- [c34]Pantazis Deligiannis, Matt McCutchen, Paul Thomson, Shuo Chen, Alastair F. Donaldson, John Erickson, Cheng Huang, Akash Lal, Rashmi Mudduluru, Shaz Qadeer, Wolfram Schulte:
Uncovering Bugs in Distributed Storage Systems during Testing (Not in Production!). FAST 2016: 249-262 - [c33]Zvonimir Pavlinovic, Akash Lal, Rahul Sharma:
Inferring annotations for device drivers from verification histories. ASE 2016: 450-460 - [c32]Rohit Sinha, Manuel Costa, Akash Lal, Nuno P. Lopes
, Sriram K. Rajamani, Sanjit A. Seshia, Kapil Vaswani:
A design and verification methodology for secure isolated regions. PLDI 2016: 665-681 - [e2]Akash Lal, S. Akshay, Saket Saurabh, Sandeep Sen:
36th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2016, December 13-15, 2016, Chennai, India. LIPIcs 65, Schloss Dagstuhl - Leibniz-Zentrum für Informatik 2016, ISBN 978-3-95977-027-9 [contents] - 2015
- [c31]Ankush Das
, Shuvendu K. Lahiri, Akash Lal, Yi Li
:
Angelic Verification: Precise Verification Modulo Unknowns. CAV (1) 2015: 324-342 - [c30]Pantazis Deligiannis
, Alastair F. Donaldson, Jeroen Ketema, Akash Lal, Paul Thomson:
Asynchronous programming, analysis and testing with state machines. PLDI 2015: 154-164 - [c29]Akash Lal, Shaz Qadeer:
DAG inlining: a decision procedure for reachability-modulo-theories in hierarchical programs. PLDI 2015: 280-290 - [c28]Arvind Haran, Montgomery Carter, Michael Emmi, Akash Lal, Shaz Qadeer, Zvonimir Rakamaric:
SMACK+Corral: A Modular Verifier - (Competition Contribution). TACAS 2015: 451-454 - 2014
- [c27]Akash Lal, Shaz Qadeer:
A program transformation for faster goal-directed search. FMCAD 2014: 147-154 - [c26]Varun Tulsian, Aditya Kanade, Rahul Kumar, Akash Lal, Aditya V. Nori:
MUX: algorithm selection for software model checkers. MSR 2014: 132-141 - [c25]Akash Lal, Shaz Qadeer:
Powering the static driver verifier using corral. SIGSOFT FSE 2014: 202-212 - [e1]Deepak D'Souza, Akash Lal, Kim Guldstrand Larsen
:
Verification, Model Checking, and Abstract Interpretation - 16th International Conference, VMCAI 2015, Mumbai, India, January 12-14, 2015. Proceedings. Lecture Notes in Computer Science 8931, Springer 2014, ISBN 978-3-662-46080-1 [contents] - [i2]Saurabh Joshi, Akash Lal:
Automatically finding atomic regions for fixing bugs in Concurrent programs. CoRR abs/1403.1749 (2014) - 2013
- [c24]Arun Tejasvi Chaganty, Akash Lal, Aditya V. Nori, Sriram K. Rajamani:
Combining Relational Learning with SMT Solvers Using CEGAR. CAV 2013: 447-462 - [c23]Sandeep Bindal, Sorav Bansal, Akash Lal:
Variable and thread bounding for systematic testing of multithreaded programs. ISSTA 2013: 145-155 - [c22]Akash Lal, Shaz Qadeer:
Reachability Modulo Theories. RP 2013: 23-44 - [c21]Aditya V. Thakur, Akash Lal, Junghee Lim, Thomas W. Reps:
PostHat and All That: Automating Abstract Interpretation. TAPAS@SAS 2013: 15-32 - 2012
- [c20]Mohamed Faouzi Atig, Ahmed Bouajjani, Michael Emmi, Akash Lal:
Detecting Fair Non-termination in Multithreaded Programs. CAV 2012: 210-226 - [c19]Akash Lal, Shaz Qadeer, Shuvendu K. Lahiri:
A Solver for Reachability Modulo Theories. CAV 2012: 427-443 - [c18]Saurabh Joshi, Shuvendu K. Lahiri, Akash Lal:
Underspecified harnesses and interleaved bugs. POPL 2012: 19-30 - [c17]Michael Emmi, Akash Lal:
Finding Non-terminating Executions in Distributed Asynchronous Programs. SAS 2012: 439-455 - [c16]Michael Emmi, Akash Lal, Shaz Qadeer:
Asynchronous programs with prioritized task-buffers. SIGSOFT FSE 2012: 48 - [i1]Sandeep Bindal, Sorav Bansal, Akash Lal:
Variable and Thread Bounding for Systematic Testing of Multithreaded Programs. CoRR abs/1207.2544 (2012) - 2011
- [j4]Junghee Lim, Akash Lal, Thomas W. Reps:
Symbolic analysis via semantic reinterpretation. Int. J. Softw. Tools Technol. Transf. 13(1): 61-87 (2011) - 2010
- [j3]Akash Lal, G. Ramalingam:
Reference count analysis with shallow aliasing. Inf. Process. Lett. 111(2): 57-63 (2010) - [c15]Thomas W. Reps, Junghee Lim, Aditya V. Thakur, Gogul Balakrishnan, Akash Lal:
There's Plenty of Room at the Bottom: Analyzing and Verifying Machine Code. CAV 2010: 41-56 - [c14]Aditya V. Thakur, Junghee Lim, Akash Lal, Amanda Burton, Evan Driscoll, Matt Elder, Tycho Andersen, Thomas W. Reps:
Directed Proof Generation for Machine Code. CAV 2010: 288-305 - [c13]William R. Harris, Akash Lal, Aditya V. Nori, Sriram K. Rajamani:
Alternation for Termination. SAS 2010: 304-319
2000 – 2009
- 2009
- [j2]Akash Lal, Thomas W. Reps:
Reducing concurrent analysis under a context bound to sequential analysis. Formal Methods Syst. Des. 35(1): 73-97 (2009) - [c12]Junghee Lim, Akash Lal, Thomas W. Reps:
Symbolic Analysis via Semantic Reinterpretation. SPIN 2009: 148-168 - 2008
- [c11]Akash Lal, Thomas W. Reps:
Reducing Concurrent Analysis Under a Context Bound to Sequential Analysis. CAV 2008: 37-51 - [c10]Akash Lal, Thomas W. Reps:
Solving Multiple Dataflow Queries Using WPDSs. SAS 2008: 93-109 - [c9]Nicholas Kidd, Akash Lal, Thomas W. Reps:
Language Strength Reduction. SAS 2008: 283-298 - [c8]Akash Lal, Tayssir Touili, Nicholas Kidd, Thomas W. Reps:
Interprocedural Analysis of Concurrent Programs Under a Context Bound. TACAS 2008: 282-298 - 2007
- [c7]Thomas W. Reps, Akash Lal, Nicholas Kidd:
Program Analysis Using Weighted Pushdown Systems. FSTTCS 2007: 23-51 - [c6]Akash Lal, Nicholas Kidd, Thomas W. Reps, Tayssir Touili:
Abstract Error Projection. SAS 2007: 200-217 - 2006
- [j1]François Fages, Akash Lal:
A constraint programming approach to cutset problems. Comput. Oper. Res. 33(10): 2852-2865 (2006) - [c5]Akash Lal, Thomas W. Reps:
Improving Pushdown System Model Checking. CAV 2006: 343-357 - [c4]Akash Lal, Junghee Lim, Marina Polishchuk, Ben Liblit
:
Path Optimization in Programs and Its Application to Debugging. ESOP 2006: 246-263 - 2005
- [c3]Gogul Balakrishnan, Thomas W. Reps, Nicholas Kidd, Akash Lal, Junghee Lim, David Melski, Radu Gruian, Suan Hsi Yong, Chi-Hua Chen, Tim Teitelbaum:
Model Checking x86 Executables with CodeSurfer/x86 and WPDS++. CAV 2005: 158-163 - [c2]Akash Lal, Thomas W. Reps, Gogul Balakrishnan:
Extended Weighted Pushdown Systems. CAV 2005: 434-448 - 2004
- [c1]Deepak Garg, Akash Lal, Sanjiva Prasad:
Effective Chemistry for Synchrony and Asynchrony. IFIP TCS 2004: 479-492
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-29 21:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint