Number of items: 58.
Conference or Workshop Item (A Paper)
Künnemann, Robert and Garg, Deepak and Backes, Michael
(2021)
Accountability in the Decentralised-Adversary Setting.
(In Press)
El-Korashy, Akram and Tsampas, Stelios and Patrignani, Marco and Devriese, Dominique and Garg, Deepak and Piessens, Frank
(2021)
CapablePtrs: Securely Compiling Partial Programs
Using the Pointers-as-Capabilities Principle.
Abate, Carmine and Blanco, Roberto and Ciobaca, Stefan and Durier, Adrien and Garg, Deepak and Hritcu, Catalin and Patrignani, Marco and Tanter, Éric and Thibault, Jérémy
(2020)
Trace-Relating Compiler Correctness and Secure Compilation.
Abate, Carmine and Blanco, Roberto and Garg, Deepak and Hritcu, Catalin and Patrignani, Marco and Thibault, Jeremy
(2019)
Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation.
Patrignani, Marco and Garg, Deepak
(2019)
Robustly Safe Compilation.
Brahmakshatriya, Ajay and Kedia, Piyus and Nemati, Hamed and McKee, Derrick and Bhatu, Pratik and Garg, Deepak and Lal, Akash and Rastogi, Aseem
(2019)
ConfLLVM: A Compiler for Enforcing Data Confidentiality in Low-Level Code.
Künnemann, Robert and Garg, Deepak and Backes, Michael
(2019)
Causality & Control flow.
(In Press)
Brahmakshatriya, Ajay and Kedia, Piyus and Nemati, Hamed and McKee, Derrick and Bhatu, Pratik and Garg, Deepak and Lal, Akash and Rastogi, Aseem
(2018)
CONFLLVM: Compiler-Based Information Flow Control in Low-Level Code.
(Submitted)
Garg, Deepak and Hriţcu, Cătălin and Patrignani, Marco and Stronati, Marco and Swasey, David
(2017)
Robust Hyperproperty Preservation for Secure Compilation (Extended Abstract).
Çiçek, Ezgi and Barthe, Gilles and Gaboardi, Marco and Garg, Deepak and Hoffmann, Jan
(2017)
Relational cost analysis.
Mehta, Aastha and Elnikety, Eslam and Harvey, Katura and Garg, Deepak and Druschel, Peter
(2017)
Qapla: Policy compliance for database-backed systems.
Patrignani, Marco and Garg, Deepak
(2017)
Secure Compilation and Hyperproperty Preservation.
Bichhawat, Abhishek and Rajani, Vineet and Jain, Jinank and Garg, Deepak and Hammer, Christian
(2017)
WebPol: Fine-Grained Information Flow Policies for Web Browsers.
Vahldiek-Oberwanger, Anjo and Bhattacharjee, Bobby and Garg, Deepak and Elnikety, Eslam and Druschel, Peter and Litton, James
(2016)
Light-Weight Contexts: An OS Abstraction for Safety and Performance.
Garg, Deepak and Cheney, James and Perera, Roly
(2016)
Causally Consistent Dynamic Slicing.
Elnikety, Eslam and Mehta, Aastha and Vahldiek-Oberwanger, Anjo and Garg, Deepak and Druschel, Peter
(2016)
T3: Comprehensive policy compliance in data retrieval systems.
Elnikety, Eslam and Mehta, Aastha and Vahldiek-Oberwanger, Anjo and Garg, Deepak and Druschel, Peter
(2016)
Thoth: Comprehensive Policy Compliance in Data Retrieval Systems.
Garg, Deepak and Rezk, Tamara and Rajani, Vineet
(2016)
On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks.
Garg, Deepak and Rafnsson, Willard and Sabelfeld, Andrei
(2016)
Progress-Sensitive Security for SPARK.
Garg, Deepak and Bolosteanu, Iulia
(2016)
Asymmetric Secure Multi-execution with Declassification.
Garg, Deepak and Çiçek, Ezgi and Paraskevopoulou, Zoe
(2016)
A type theory for incremental computational complexity with control flow changes.
Chowdhury, Omar and Garg, Deepak and Jia, Limin and Datta, Anupam
(2015)
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits.
Bichhawat, Abhishek and Hammer, Christian and Garg, Deepak and Rajani, Vineet
(2015)
Information Flow Control for Event Handling and the DOM in Web Browsers.
Datta, Anupam and Garg, Deepak and Jia, Limin and Sen, Shayak
(2015)
A Logic of Programs with Interface-Confined Code.
Datta, Anupam and Garg, Deepak and Kaynar, Dilsun Kirli and Sharma, Divya and Sinha, Arunesh
(2015)
Program Actions as Actual Causes: A Building Block for Accountability.
Mehta, Aastha and Vahldiek-Oberwanger, Anjo and Post, Ansley and Garg, Deepak and Elnikety, Eslam and Gehrke, Johannes and Druschel, Peter and Rodrigues, Rodrigo
(2015)
Guardat: enforcing data policies at the storage layer.
Garg, Deepak and Çiçek, Ezgi and Acar, Umut A.
(2015)
Refinement Types for Incremental Computational Complexity.
Datta, Anupam and Garg, Deepak and Jia, Limin and Chowdhury, Omar
(2014)
Temporal Mode-Checking for Runtime Monitoring of Privacy Policies.
Bichhawat, Abhishek and Rajani, Vineet and Garg, Deepak and Hammer, Christian
(2014)
Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis.
Oh, Se Eun and Chun, Ji Young and Jia, Limin and Garg, Deepak and Gunter, Carl A. and Datta, Anupam
(2014)
Privacy-preserving audit for broker-based health information exchange.
Chowdhury, Omar and Jia, Limin and Garg, Deepak and Datta, Anupam
(2014)
Temporal Mode-Checking for Runtime Monitoring of Privacy Policies.
Genovese, Valerio and Garg, Deepak and Rispoli, Daniele
(2012)
Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction.
Garg, Deepak and Genovese, Valerio and Negri, Sara
(2012)
Countermodels from Sequent Calculi in Multi-Modal Logics.
Genovese, Valerio and Garg, Deepak and Rispoli, Daniele
(2012)
Labeled Goal-Directed Search in Access Control Logic.
Krishnaswami, Neelakantan R. and Turon, Aaron and Dreyer, Derek and Garg, Deepak
(2012)
Superficially substructural types.
Vahldiek, Anjo and Elnikety, Eslam and Post, Ansley and Druschel, Peter and Garg, Deepak and Gehrke, Johannes and Rodrigues, Rodrigo
(2012)
Trusted Storage.
Datta, Anupam and Garg, Deepak and Jia, Limin
(2011)
Policy auditing over incomplete logs: theory, implementation and applications.
Nanevski, Aleksandar and Banerjee, Anindya and Garg, Deepak
(2011)
Verification of Information Flow and Access Control Policies with Dependent Types.
Datta, Anupam and Blocki, Jeremiah and Christin, Nicolas and DeYoung, Henry and Garg, Deepak and Jia, Limin and Kaynar, Dilsun Kirli and Sinha, Arunesh
(2011)
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
Genovese, Valerio and Garg, Deepak
(2011)
New Modalities for Access Control Logics: Permission, Control and Ratification.
Morgenstern, Jamie and Garg, Deepak and Pfenning, Frank
(2011)
A Proof-Carrying File System with Revocable and Use-Once Certificates.
DeYoung, Henry and Garg, Deepak and Jia, Limin and Kaynar, Dilsun Kirli and Datta, Anupam
(2010)
Experiences in the logical specification of the HIPAA and GLBA privacy laws.
Garg, Deepak and Pfenning, Frank
(2010)
A Proof-Carrying File System.
Garg, Deepak and Pfenning, Frank
(2010)
Stateful Authorization Logic: - Proof Theory and a Case Study.
Article
Vahldiek-Oberwanger, Anjo and Elnikety, Eslam and Garg, Deepak and Druschel, Peter
(2018)
ERIM: Secure and Efficient In-process Isolation with Memory Protection Keys.
CoRR, abs/18.
Radicek, Ivan and Barthe, Gilles and Gaboardi, Marco and Garg, Deepak and Zuleger, Florian
(2018)
Monadic refinements for relational cost analysis.
PACMPL, 2 (POPL).
36:1–36:32.
Elnikety, Eslam and Garg, Deepak and Druschel, Peter
(2018)
Shai: Enforcing Data-Specific Policies with Near-Zero Runtime Overhead.
CoRR, abs/18.
Brahmakshatriya, Ajay and Kedia, Piyus and McKee, Derrick Paul and Bhatu, Pratik and Garg, Deepak and Lal, Akash and Rastogi, Aseem
(2017)
An Instrumenting Compiler for Enforcing Confidentiality in Low-Level Code.
CoRR, abs/17.
Swasey, David and Garg, Deepak and Dreyer, Derek
(2017)
Robust and compositional verification of object capability patterns.
OOPSLA, 1.
89:1–89:26.
Rajani, Vineet and Bastys, Iulia and Rafnsson, Willard and Garg, Deepak
(2017)
Type systems for information flow control: the question of granularity.
SIGLOG News, 4 (1).
6–21.
Aguirre, Alejandro and Barthe, Gilles and Gaboardi, Marco and Garg, Deepak and Strub, Pierre-Yves
(2017)
A relational logic for higher-order programs.
PACMPL, 1 (ICFP).
21:1–21:29.
Datta, Anupam and Garg, Deepak and Jia, Limin and Sen, Shayak
(2015)
System M: A Program Logic for Code Sandboxing and Identification.
The Computing Research Repository (CoRR).
Nanevski, Aleksandar and Banerjee, Anindya and Garg, Deepak
(2013)
Dependent Type Theory for Verification of Information Flow and Access Control Policies.
ACM Transactions on Programming Languages and Systems, 35 (2).
Garg, Deepak and Pfenning, Frank
(2012)
Stateful authorization logic - Proof theory and a case study.
Journal of Computer Security, 20 (4).
pp. 353-391.
Datta, Anupam and Garg, Deepak and Kaynar, Dilsun Kirli and Jia, Limin and Franklin, Jason
(2011)
On Adversary Models and Compositional Security.
IEEE Security & Privacy, 9 (3).
pp. 26-32.
Garg, Deepak and Jia, Limin and Datta, Anupam
(2011)
A Logical Method for Policy Enforcement over Evolving Audit Logs.
CoRR, abs/11.
Garg, Deepak and Franklin, Jason and Kaynar, Dilsun Kirli and Datta, Anupam
(2010)
Compositional System Security with Interface-Confined Adversaries.
Electr. Notes Theor. Comput. Sci., 265.
49–71.
Book Section
Bichhawat, Abhishek and Rajani, Vineet and Garg, Deepak and Hammer, Christian
(2014)
Information Flow Control in WebKit's JavaScript Bytecode.
In:
Principles of Security and Trust.
Springer.
This list was generated on Thu Nov 21 12:41:26 2024 CET.