Items where Author is "Garg, Deepak"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 58.

Künnemann, Robert and Garg, Deepak and Backes, Michael
(2021) Accountability in the Decentralised-Adversary Setting.
In: CSF 2021.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)
(In Press)

El-Korashy, Akram and Tsampas, Stelios and Patrignani, Marco and Devriese, Dominique and Garg, Deepak and Piessens, Frank
(2021) CapablePtrs: Securely Compiling Partial Programs Using the Pointers-as-Capabilities Principle.
In: 34th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Abate, Carmine and Blanco, Roberto and Ciobaca, Stefan and Durier, Adrien and Garg, Deepak and Hritcu, Catalin and Patrignani, Marco and Tanter, Éric and Thibault, Jérémy
(2020) Trace-Relating Compiler Correctness and Secure Compilation.
In: Programming Languages and Systems.
Conference: ESOP European Symposium on Programming

Abate, Carmine and Blanco, Roberto and Garg, Deepak and Hritcu, Catalin and Patrignani, Marco and Thibault, Jeremy
(2019) Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation.
In: csf.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Patrignani, Marco and Garg, Deepak
(2019) Robustly Safe Compilation.
In: ESOP.
Conference: ESOP European Symposium on Programming

Brahmakshatriya, Ajay and Kedia, Piyus and Nemati, Hamed and McKee, Derrick and Bhatu, Pratik and Garg, Deepak and Lal, Akash and Rastogi, Aseem
(2019) ConfLLVM: A Compiler for Enforcing Data Confidentiality in Low-Level Code.
In: Proceedings of the Fourteenth EuroSys Conference 2019, March 25-28, 2019, Dresden, Germany.
Conference: EuroSys Eurosys Conference

Künnemann, Robert and Garg, Deepak and Backes, Michael
(2019) Causality & Control flow.
In: 4th Workshop on Formal Reasoning about Causation, Responsibility, & Explanations in Science & Technology.
Conference: CREST Workshop on Formal Reasoning about Causation, Responsibility, & Explanations in Science & Technology
(In Press)

Brahmakshatriya, Ajay and Kedia, Piyus and Nemati, Hamed and McKee, Derrick and Bhatu, Pratik and Garg, Deepak and Lal, Akash and Rastogi, Aseem
(2018) CONFLLVM: Compiler-Based Information Flow Control in Low-Level Code.
In: In Submission.
Conference: EuroS&P IEEE European Symposium on Security and Privacy
(Submitted)

Vahldiek-Oberwanger, Anjo and Elnikety, Eslam and Garg, Deepak and Druschel, Peter
(2018) ERIM: Secure and Efficient In-process Isolation with Memory Protection Keys.
CoRR, abs/18.

Radicek, Ivan and Barthe, Gilles and Gaboardi, Marco and Garg, Deepak and Zuleger, Florian
(2018) Monadic refinements for relational cost analysis.
PACMPL, 2 (POPL). 36:1–36:32.

Elnikety, Eslam and Garg, Deepak and Druschel, Peter
(2018) Shai: Enforcing Data-Specific Policies with Near-Zero Runtime Overhead.
CoRR, abs/18.

Garg, Deepak and Hriţcu, Cătălin and Patrignani, Marco and Stronati, Marco and Swasey, David
(2017) Robust Hyperproperty Preservation for Secure Compilation (Extended Abstract).
In: 1st Workshop on Principles of Secure Compilation.

Çiçek, Ezgi and Barthe, Gilles and Gaboardi, Marco and Garg, Deepak and Hoffmann, Jan
(2017) Relational cost analysis.
In: Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL'17).
Conference: POPL ACM-SIGACT Symposium on Principles of Programming Languages

Brahmakshatriya, Ajay and Kedia, Piyus and McKee, Derrick Paul and Bhatu, Pratik and Garg, Deepak and Lal, Akash and Rastogi, Aseem
(2017) An Instrumenting Compiler for Enforcing Confidentiality in Low-Level Code.
CoRR, abs/17.

Mehta, Aastha and Elnikety, Eslam and Harvey, Katura and Garg, Deepak and Druschel, Peter
(2017) Qapla: Policy compliance for database-backed systems.
In: 26th USENIX Security Symposium (USENIX Security 17).
Conference: USENIX-Security Usenix Security Symposium

Swasey, David and Garg, Deepak and Dreyer, Derek
(2017) Robust and compositional verification of object capability patterns.
OOPSLA, 1. 89:1–89:26.

Patrignani, Marco and Garg, Deepak
(2017) Secure Compilation and Hyperproperty Preservation.
In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Rajani, Vineet and Bastys, Iulia and Rafnsson, Willard and Garg, Deepak
(2017) Type systems for information flow control: the question of granularity.
SIGLOG News, 4 (1). 6–21.

Bichhawat, Abhishek and Rajani, Vineet and Jain, Jinank and Garg, Deepak and Hammer, Christian
(2017) WebPol: Fine-Grained Information Flow Policies for Web Browsers.
In: Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I.
Conference: ESORICS European Symposium On Research In Computer Security

Aguirre, Alejandro and Barthe, Gilles and Gaboardi, Marco and Garg, Deepak and Strub, Pierre-Yves
(2017) A relational logic for higher-order programs.
PACMPL, 1 (ICFP). 21:1–21:29.

Vahldiek-Oberwanger, Anjo and Bhattacharjee, Bobby and Garg, Deepak and Elnikety, Eslam and Druschel, Peter and Litton, James
(2016) Light-Weight Contexts: An OS Abstraction for Safety and Performance.
In: Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI '16).
Conference: OSDI Usenix Symposium on Operating Systems Design and Implementation

Garg, Deepak and Cheney, James and Perera, Roly
(2016) Causally Consistent Dynamic Slicing.
In: Proceedings of the 27th International Conference on Concurrency Theory (CONCUR '16).
Conference: CONCUR International Conference on Concurrency Theory

Elnikety, Eslam and Mehta, Aastha and Vahldiek-Oberwanger, Anjo and Garg, Deepak and Druschel, Peter
(2016) T3: Comprehensive policy compliance in data retrieval systems.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Elnikety, Eslam and Mehta, Aastha and Vahldiek-Oberwanger, Anjo and Garg, Deepak and Druschel, Peter
(2016) Thoth: Comprehensive Policy Compliance in Data Retrieval Systems.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Garg, Deepak and Rezk, Tamara and Rajani, Vineet
(2016) On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks.
In: Proceedings of the 29th Computer Security Foundations Symposium 2016 (CSF '16).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Garg, Deepak and Rafnsson, Willard and Sabelfeld, Andrei
(2016) Progress-Sensitive Security for SPARK.
In: Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS '16).

Garg, Deepak and Bolosteanu, Iulia
(2016) Asymmetric Secure Multi-execution with Declassification.
In: Proceedings of Principles of Security and Trust - 5th International Conference (POST '16).

Garg, Deepak and Çiçek, Ezgi and Paraskevopoulou, Zoe
(2016) A type theory for incremental computational complexity with control flow changes.
In: Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming (ICFP '16).
Conference: ICFP International Conference on Functional Programming

Chowdhury, Omar and Garg, Deepak and Jia, Limin and Datta, Anupam
(2015) Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits.
In: Proceedings of the 22nd ACM conference on Computer and communications security (ACM CCS 2015).
Conference: CCS ACM Conference on Computer and Communications Security

Bichhawat, Abhishek and Hammer, Christian and Garg, Deepak and Rajani, Vineet
(2015) Information Flow Control for Event Handling and the DOM in Web Browsers.
In: Proceedings of the 28th Computer Security Foundations Symposium (CSF '15).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Datta, Anupam and Garg, Deepak and Jia, Limin and Sen, Shayak
(2015) A Logic of Programs with Interface-Confined Code.
In: Proceedings of the 28th Computer Security Foundations Symposium (CSF '15).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Datta, Anupam and Garg, Deepak and Kaynar, Dilsun Kirli and Sharma, Divya and Sinha, Arunesh
(2015) Program Actions as Actual Causes: A Building Block for Accountability.
In: Proceedings of the 28th Computer Security Foundations Symposium (CSF '15).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Mehta, Aastha and Vahldiek-Oberwanger, Anjo and Post, Ansley and Garg, Deepak and Elnikety, Eslam and Gehrke, Johannes and Druschel, Peter and Rodrigues, Rodrigo
(2015) Guardat: enforcing data policies at the storage layer.
In: Proceedings of the 10th European Conference on Computer Systems (EuroSys '15).
Conference: EuroSys Eurosys Conference

Garg, Deepak and Çiçek, Ezgi and Acar, Umut A.
(2015) Refinement Types for Incremental Computational Complexity.
In: Proceedings of the 24th European Symposium on Programming (ESOP '15).
Conference: ESOP European Symposium on Programming

Datta, Anupam and Garg, Deepak and Jia, Limin and Sen, Shayak
(2015) System M: A Program Logic for Code Sandboxing and Identification.
The Computing Research Repository (CoRR).

Datta, Anupam and Garg, Deepak and Jia, Limin and Chowdhury, Omar
(2014) Temporal Mode-Checking for Runtime Monitoring of Privacy Policies.
In: Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF '14).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Bichhawat, Abhishek and Rajani, Vineet and Garg, Deepak and Hammer, Christian
(2014) Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis.
In: Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security.

Bichhawat, Abhishek and Rajani, Vineet and Garg, Deepak and Hammer, Christian
(2014) Information Flow Control in WebKit's JavaScript Bytecode.
In: Principles of Security and Trust. Springer.

Oh, Se Eun and Chun, Ji Young and Jia, Limin and Garg, Deepak and Gunter, Carl A. and Datta, Anupam
(2014) Privacy-preserving audit for broker-based health information exchange.
In: Proceedings of the 4th ACM conference on Data and application security and privacy (CODASPY'14).

Chowdhury, Omar and Jia, Limin and Garg, Deepak and Datta, Anupam
(2014) Temporal Mode-Checking for Runtime Monitoring of Privacy Policies.
In: Proc. 26th International Conference on Computer Aided Verification (CAV 2014).
Conference: CAV Computer Aided Verification

Nanevski, Aleksandar and Banerjee, Anindya and Garg, Deepak
(2013) Dependent Type Theory for Verification of Information Flow and Access Control Policies.
ACM Transactions on Programming Languages and Systems, 35 (2).

Genovese, Valerio and Garg, Deepak and Rispoli, Daniele
(2012) Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction.
In: Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF '12).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Garg, Deepak and Genovese, Valerio and Negri, Sara
(2012) Countermodels from Sequent Calculi in Multi-Modal Logics.
In: Proc. of the 27th Annual IEEE Symposium on Logic in Computer Science (LICS 2012).
Conference: LICS IEEE Symposium on Logic in Computer Science

Genovese, Valerio and Garg, Deepak and Rispoli, Daniele
(2012) Labeled Goal-Directed Search in Access Control Logic.
In: Proc. of the 8th International Workshop on Security and Trust Management (STM 2012).

Garg, Deepak and Pfenning, Frank
(2012) Stateful authorization logic - Proof theory and a case study.
Journal of Computer Security, 20 (4). pp. 353-391.

Krishnaswami, Neelakantan R. and Turon, Aaron and Dreyer, Derek and Garg, Deepak
(2012) Superficially substructural types.
In: ACM SIGPLAN International Conference on Functional Programming (ICFP 2012).
Conference: ICFP International Conference on Functional Programming

Vahldiek, Anjo and Elnikety, Eslam and Post, Ansley and Druschel, Peter and Garg, Deepak and Gehrke, Johannes and Rodrigues, Rodrigo
(2012) Trusted Storage.
In: Presented at USENIX FAST'12 WiP.
Conference: FAST Conference on File and Storage Technologies

Datta, Anupam and Garg, Deepak and Jia, Limin
(2011) Policy auditing over incomplete logs: theory, implementation and applications.
In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11).
Conference: CCS ACM Conference on Computer and Communications Security

Nanevski, Aleksandar and Banerjee, Anindya and Garg, Deepak
(2011) Verification of Information Flow and Access Control Policies with Dependent Types.
In: Proceedings of the 32nd IEEE Symposium on Security and Privacy (S&P '11).
Conference: SP IEEE Symposium on Security and Privacy

Datta, Anupam and Garg, Deepak and Kaynar, Dilsun Kirli and Jia, Limin and Franklin, Jason
(2011) On Adversary Models and Compositional Security.
IEEE Security & Privacy, 9 (3). pp. 26-32.

Datta, Anupam and Blocki, Jeremiah and Christin, Nicolas and DeYoung, Henry and Garg, Deepak and Jia, Limin and Kaynar, Dilsun Kirli and Sinha, Arunesh
(2011) Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
In: Proc. of the 7th International Conference Information Systems Security (ICISS 2011).

Garg, Deepak and Jia, Limin and Datta, Anupam
(2011) A Logical Method for Policy Enforcement over Evolving Audit Logs.
CoRR, abs/11.

Genovese, Valerio and Garg, Deepak
(2011) New Modalities for Access Control Logics: Permission, Control and Ratification.
In: Security and Trust Management - 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers.

Morgenstern, Jamie and Garg, Deepak and Pfenning, Frank
(2011) A Proof-Carrying File System with Revocable and Use-Once Certificates.
In: Security and Trust Management - 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers.

Garg, Deepak and Franklin, Jason and Kaynar, Dilsun Kirli and Datta, Anupam
(2010) Compositional System Security with Interface-Confined Adversaries.
Electr. Notes Theor. Comput. Sci., 265. 49–71.

DeYoung, Henry and Garg, Deepak and Jia, Limin and Kaynar, Dilsun Kirli and Datta, Anupam
(2010) Experiences in the logical specification of the HIPAA and GLBA privacy laws.
In: Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, WPES 2010, Chicago, Illinois, USA, October 4, 2010.

Garg, Deepak and Pfenning, Frank
(2010) A Proof-Carrying File System.
In: 31st IEEE Symposium on Security and Privacy, S&P 2010, 16-19 May 2010, Berleley/Oakland, California, USA.

Garg, Deepak and Pfenning, Frank
(2010) Stateful Authorization Logic: - Proof Theory and a Case Study.
In: Security and Trust Management - 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers.

This list was generated on Sun Jun 26 00:04:01 2022 CEST.