• Bargmann L, Dongol B and Wehrheim H. Unifying Weak Memory Verification Using Potentials. Formal Methods. (519-537).

    https://doi.org/10.1007/978-3-031-71162-6_27

  • Coughlin N, Lam K, Smith G and Winter K. Detecting Speculative Execution Vulnerabilities on Weak Memory Models. Formal Methods. (482-500).

    https://doi.org/10.1007/978-3-031-71162-6_25

  • Dongol B, Lahav O and Wehrheim H. (2024). A Rely-Guarantee Framework for Proving Deadlock Freedom Under Causal Consistency. The Practice of Formal Methods. 10.1007/978-3-031-66676-6_5. (88-108).

    https://link.springer.com/10.1007/978-3-031-66676-6_5

  • Colvin R, Hayes I, Heiner S, Höfner P, Meinicke L and Su R. (2024). Practical Rely/Guarantee Verification of an Efficient Lock for seL4 on Multicore Architectures. The Practice of Formal Methods. 10.1007/978-3-031-66676-6_4. (65-87).

    https://link.springer.com/10.1007/978-3-031-66676-6_4

  • Lahav O, Dongol B and Wehrheim H. Rely-Guarantee Reasoning for Causally Consistent Shared Memory. Computer Aided Verification. (206-229).

    https://doi.org/10.1007/978-3-031-37706-8_11

  • Wright D, Dalvandi S, Batty M and Dongol B. (2023). Mechanised Operational Reasoning for C11 Programs with Relaxed Dependencies. Formal Aspects of Computing. 35:2. (1-27). Online publication date: 30-Jun-2023.

    https://doi.org/10.1145/3580285