BibTeX records: Deepak Garg 0001

download as .bib file

@article{DBLP:journals/pacmpl/LiuQGGU24,
  author       = {Jiawen Liu and
                  Weihao Qu and
                  Marco Gaboardi and
                  Deepak Garg and
                  Jonathan R. Ullman},
  title        = {Program Analysis for Adaptive Data Analysis},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {8},
  number       = {{PLDI}},
  pages        = {914--938},
  year         = {2024},
  url          = {https://doi.org/10.1145/3656414},
  doi          = {10.1145/3656414},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pacmpl/LiuQGGU24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-04297,
  author       = {Roberta De Viti and
                  Pierfrancesco Ingo and
                  Isaac Sheff and
                  Peter Druschel and
                  Deepak Garg},
  title        = {ProLoc: Robust Location Proofs in Hindsight},
  journal      = {CoRR},
  volume       = {abs/2404.04297},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.04297},
  doi          = {10.48550/ARXIV.2404.04297},
  eprinttype    = {arXiv},
  eprint       = {2404.04297},
  timestamp    = {Wed, 15 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-04297.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftpl/VassenaRGRS23,
  author       = {Marco Vassena and
                  Alejandro Russo and
                  Deepak Garg and
                  Vineet Rajani and
                  Deian Stefan},
  title        = {From Fine- to Coarse-Grained Dynamic Information Flow Control and
                  Back},
  journal      = {Found. Trends Program. Lang.},
  volume       = {8},
  number       = {1},
  pages        = {1--117},
  year         = {2023},
  url          = {https://doi.org/10.1561/2500000046},
  doi          = {10.1561/2500000046},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ftpl/VassenaRGRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/MenzHLG23,
  author       = {Jan Menz and
                  Andrew K. Hirsch and
                  Peixuan Li and
                  Deepak Garg},
  title        = {Compositional Security Definitions for Higher-Order Where Declassification},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {7},
  number       = {{OOPSLA1}},
  pages        = {406--433},
  year         = {2023},
  url          = {https://doi.org/10.1145/3586041},
  doi          = {10.1145/3586041},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pacmpl/MenzHLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/SammlerSSDKGD23,
  author       = {Michael Sammler and
                  Simon Spies and
                  Youngju Song and
                  Emanuele D'Osualdo and
                  Robbert Krebbers and
                  Deepak Garg and
                  Derek Dreyer},
  title        = {DimSum: {A} Decentralized Approach to Multi-language Semantics and
                  Verification},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {7},
  number       = {{POPL}},
  pages        = {775--805},
  year         = {2023},
  url          = {https://doi.org/10.1145/3571220},
  doi          = {10.1145/3571220},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmpl/SammlerSSDKGD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/AlzayatMD023,
  author       = {Mohamed Alzayat and
                  Jonathan Mace and
                  Peter Druschel and
                  Deepak Garg},
  editor       = {Giuseppe Antonio Di Luna and
                  Leonardo Querzoni and
                  Alexandra Fedorova and
                  Dushyanth Narayanan},
  title        = {Groundhog: Efficient Request Isolation in FaaS},
  booktitle    = {Proceedings of the Eighteenth European Conference on Computer Systems,
                  EuroSys 2023, Rome, Italy, May 8-12, 2023},
  pages        = {398--415},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3552326.3567503},
  doi          = {10.1145/3552326.3567503},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosys/AlzayatMD023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/Anand0KM23,
  author       = {Vaastav Anand and
                  Deepak Garg and
                  Antoine Kaufmann and
                  Jonathan Mace},
  editor       = {Jason Flinn and
                  Margo I. Seltzer and
                  Peter Druschel and
                  Antoine Kaufmann and
                  Jonathan Mace},
  title        = {Blueprint: {A} Toolchain for Highly-Reconfigurable Microservice Applications},
  booktitle    = {Proceedings of the 29th Symposium on Operating Systems Principles,
                  {SOSP} 2023, Koblenz, Germany, October 23-26, 2023},
  pages        = {482--497},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600006.3613138},
  doi          = {10.1145/3600006.3613138},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sosp/Anand0KM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/ZhuSLDG22,
  author       = {Fengmin Zhu and
                  Michael Sammler and
                  Rodolphe Lepigre and
                  Derek Dreyer and
                  Deepak Garg},
  title        = {{BFF:} foundational and automated verification of bitfield-manipulating
                  programs},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {6},
  number       = {{OOPSLA2}},
  pages        = {1613--1638},
  year         = {2022},
  url          = {https://doi.org/10.1145/3563345},
  doi          = {10.1145/3563345},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmpl/ZhuSLDG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/HirschG22,
  author       = {Andrew K. Hirsch and
                  Deepak Garg},
  title        = {Pirouette: higher-order typed functional choreographies},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {6},
  number       = {{POPL}},
  pages        = {1--27},
  year         = {2022},
  url          = {https://doi.org/10.1145/3498684},
  doi          = {10.1145/3498684},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmpl/HirschG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/KolosickNJWLGJS22,
  author       = {Matthew Kolosick and
                  Shravan Narayan and
                  Evan Johnson and
                  Conrad Watt and
                  Michael LeMay and
                  Deepak Garg and
                  Ranjit Jhala and
                  Deian Stefan},
  title        = {Isolation without taxation: near-zero-cost transitions for WebAssembly
                  and {SFI}},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {6},
  number       = {{POPL}},
  pages        = {1--30},
  year         = {2022},
  url          = {https://doi.org/10.1145/3498688},
  doi          = {10.1145/3498688},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmpl/KolosickNJWLGJS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/El-KorashyBTDGH22,
  author       = {Akram El{-}Korashy and
                  Roberto Blanco and
                  J{\'{e}}r{\'{e}}my Thibault and
                  Adrien Durier and
                  Deepak Garg and
                  Catalin Hritcu},
  title        = {SecurePtrs: Proving Secure Compilation with Data-Flow Back-Translation
                  and Turn-Taking Simulation},
  booktitle    = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa,
                  Israel, August 7-10, 2022},
  pages        = {64--79},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSF54842.2022.9919680},
  doi          = {10.1109/CSF54842.2022.9919680},
  timestamp    = {Fri, 11 Nov 2022 16:53:14 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/El-KorashyBTDGH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/SammlerHL0PD0S22,
  author       = {Michael Sammler and
                  Angus Hammond and
                  Rodolphe Lepigre and
                  Brian Campbell and
                  Jean Pichon{-}Pharabod and
                  Derek Dreyer and
                  Deepak Garg and
                  Peter Sewell},
  editor       = {Ranjit Jhala and
                  Isil Dillig},
  title        = {Islaris: verification of machine code against authoritative {ISA}
                  semantics},
  booktitle    = {{PLDI} '22: 43rd {ACM} {SIGPLAN} International Conference on Programming
                  Language Design and Implementation, San Diego, CA, USA, June 13 -
                  17, 2022},
  pages        = {825--840},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3519939.3523434},
  doi          = {10.1145/3519939.3523434},
  timestamp    = {Fri, 03 Jun 2022 08:25:37 +0200},
  biburl       = {https://dblp.org/rec/conf/pldi/SammlerHL0PD0S22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MehtaAVBD022,
  author       = {Aastha Mehta and
                  Mohamed Alzayat and
                  Roberta De Viti and
                  Bj{\"{o}}rn B. Brandenburg and
                  Peter Druschel and
                  Deepak Garg},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {2819--2838},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/mehta},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/MehtaAVBD022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-11458,
  author       = {Mohamed Alzayat and
                  Jonathan Mace and
                  Peter Druschel and
                  Deepak Garg},
  title        = {Groundhog: Efficient Request Isolation in FaaS},
  journal      = {CoRR},
  volume       = {abs/2205.11458},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.11458},
  doi          = {10.48550/ARXIV.2205.11458},
  eprinttype    = {arXiv},
  eprint       = {2205.11458},
  timestamp    = {Mon, 30 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-11458.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-03784,
  author       = {Roberta De Viti and
                  Isaac Sheff and
                  Noemi Glaeser and
                  Baltasar Dinis and
                  Rodrigo Rodrigues and
                  Jonathan Katz and
                  Bobby Bhattacharjee and
                  Anwar Hithnawi and
                  Deepak Garg and
                  Peter Druschel},
  title        = {CoVault: {A} Secure Analytics Platform},
  journal      = {CoRR},
  volume       = {abs/2208.03784},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.03784},
  doi          = {10.48550/ARXIV.2208.03784},
  eprinttype    = {arXiv},
  eprint       = {2208.03784},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-03784.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-13560,
  author       = {Marco Vassena and
                  Alejandro Russo and
                  Deepak Garg and
                  Vineet Rajani and
                  Deian Stefan},
  title        = {From Fine- to Coarse-Grained Dynamic Information Flow Control and
                  Back, a Tutorial on Dynamic Information Flow},
  journal      = {CoRR},
  volume       = {abs/2208.13560},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.13560},
  doi          = {10.48550/ARXIV.2208.13560},
  eprinttype    = {arXiv},
  eprint       = {2208.13560},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-13560.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BichhawatRGH21,
  author       = {Abhishek Bichhawat and
                  Vineet Rajani and
                  Deepak Garg and
                  Christian Hammer},
  title        = {Permissive runtime information flow control in the presence of exceptions},
  journal      = {J. Comput. Secur.},
  volume       = {29},
  number       = {4},
  pages        = {361--401},
  year         = {2021},
  url          = {https://doi.org/10.3233/JCS-211385},
  doi          = {10.3233/JCS-211385},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BichhawatRGH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfp/QuGG21,
  author       = {Weihao Qu and
                  Marco Gaboardi and
                  Deepak Garg},
  title        = {Relational cost analysis in a functional-imperative setting},
  journal      = {J. Funct. Program.},
  volume       = {31},
  pages        = {e27},
  year         = {2021},
  url          = {https://doi.org/10.1017/S0956796821000071},
  doi          = {10.1017/S0956796821000071},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jfp/QuGG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/AguirreBGGKS21,
  author       = {Alejandro Aguirre and
                  Gilles Barthe and
                  Marco Gaboardi and
                  Deepak Garg and
                  Shin{-}ya Katsumata and
                  Tetsuya Sato},
  title        = {Higher-order probabilistic adversarial computations: categorical semantics
                  and program logics},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {5},
  number       = {{ICFP}},
  pages        = {1--30},
  year         = {2021},
  url          = {https://doi.org/10.1145/3473598},
  doi          = {10.1145/3473598},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmpl/AguirreBGGKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/RajaniG0021,
  author       = {Vineet Rajani and
                  Marco Gaboardi and
                  Deepak Garg and
                  Jan Hoffmann},
  title        = {A unifying type-theory for higher-order (amortized) cost analysis},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {5},
  number       = {{POPL}},
  pages        = {1--28},
  year         = {2021},
  url          = {https://doi.org/10.1145/3434308},
  doi          = {10.1145/3434308},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmpl/RajaniG0021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/PatrignaniG21,
  author       = {Marco Patrignani and
                  Deepak Garg},
  title        = {Robustly Safe Compilation, an Efficient Form of Secure Compilation},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {43},
  number       = {1},
  pages        = {1:1--1:41},
  year         = {2021},
  url          = {https://doi.org/10.1145/3436809},
  doi          = {10.1145/3436809},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toplas/PatrignaniG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/AbateBCDGHPTT21,
  author       = {Carmine Abate and
                  Roberto Blanco and
                  {\c{S}}tefan Ciob{\^{a}}c{\u{a}} and
                  Adrien Durier and
                  Deepak Garg and
                  Catalin Hritcu and
                  Marco Patrignani and
                  {\'{E}}ric Tanter and
                  J{\'{e}}r{\'{e}}my Thibault},
  title        = {An Extended Account of Trace-relating Compiler Correctness and Secure
                  Compilation},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {43},
  number       = {4},
  pages        = {14:1--14:48},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460860},
  doi          = {10.1145/3460860},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toplas/AbateBCDGHPTT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/El-Korashy0PD0P21,
  author       = {Akram El{-}Korashy and
                  Stelios Tsampas and
                  Marco Patrignani and
                  Dominique Devriese and
                  Deepak Garg and
                  Frank Piessens},
  title        = {CapablePtrs: Securely Compiling Partial Programs Using the Pointers-as-Capabilities
                  Principle},
  booktitle    = {34th {IEEE} Computer Security Foundations Symposium, {CSF} 2021, Dubrovnik,
                  Croatia, June 21-25, 2021},
  pages        = {1--16},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSF51468.2021.00036},
  doi          = {10.1109/CSF51468.2021.00036},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/El-Korashy0PD0P21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Kunnemann0021,
  author       = {Robert K{\"{u}}nnemann and
                  Deepak Garg and
                  Michael Backes},
  title        = {Accountability in the Decentralised-Adversary Setting},
  booktitle    = {34th {IEEE} Computer Security Foundations Symposium, {CSF} 2021, Dubrovnik,
                  Croatia, June 21-25, 2021},
  pages        = {1--16},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSF51468.2021.00007},
  doi          = {10.1109/CSF51468.2021.00007},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Kunnemann0021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/SammlerLKMD021,
  author       = {Michael Sammler and
                  Rodolphe Lepigre and
                  Robbert Krebbers and
                  Kayvan Memarian and
                  Derek Dreyer and
                  Deepak Garg},
  editor       = {Stephen N. Freund and
                  Eran Yahav},
  title        = {RefinedC: automating the foundational verification of {C} code with
                  refined ownership types},
  booktitle    = {{PLDI} '21: 42nd {ACM} {SIGPLAN} International Conference on Programming
                  Language Design and Implementation, Virtual Event, Canada, June 20-25,
                  2021},
  pages        = {158--174},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3453483.3454036},
  doi          = {10.1145/3453483.3454036},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/SammlerLKMD021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-00033,
  author       = {Matthew Kolosick and
                  Shravan Narayan and
                  Conrad Watt and
                  Michael LeMay and
                  Deepak Garg and
                  Ranjit Jhala and
                  Deian Stefan},
  title        = {Isolation Without Taxation: Near Zero Cost Transitions for {SFI}},
  journal      = {CoRR},
  volume       = {abs/2105.00033},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.00033},
  eprinttype    = {arXiv},
  eprint       = {2105.00033},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-00033.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-01155,
  author       = {Alejandro Aguirre and
                  Gilles Barthe and
                  Marco Gaboardi and
                  Deepak Garg and
                  Shin{-}ya Katsumata and
                  Tetsuya Sato},
  title        = {Higher-order probabilistic adversarial computations: Categorical semantics
                  and program logics},
  journal      = {CoRR},
  volume       = {abs/2107.01155},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.01155},
  eprinttype    = {arXiv},
  eprint       = {2107.01155},
  timestamp    = {Mon, 11 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-01155.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-01439,
  author       = {Akram El{-}Korashy and
                  Roberto Blanco and
                  J{\'{e}}r{\'{e}}my Thibault and
                  Adrien Durier and
                  Deepak Garg and
                  Catalin Hritcu},
  title        = {SecurePtrs: Proving Secure Compilation with Data-Flow Back-Translation
                  and Turn-Taking Simulation},
  journal      = {CoRR},
  volume       = {abs/2110.01439},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.01439},
  eprinttype    = {arXiv},
  eprint       = {2110.01439},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-01439.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-03484,
  author       = {Andrew K. Hirsch and
                  Deepak Garg},
  title        = {Pirouette: Higher-Order Typed Functional Choreographies},
  journal      = {CoRR},
  volume       = {abs/2111.03484},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.03484},
  eprinttype    = {arXiv},
  eprint       = {2111.03484},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-03484.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/ChisnallGHP21,
  author       = {David Chisnall and
                  Deepak Garg and
                  Catalin Hritcu and
                  Mathias Payer},
  title        = {Secure Compilation (Dagstuhl Seminar 21481)},
  journal      = {Dagstuhl Reports},
  volume       = {11},
  number       = {10},
  pages        = {173--204},
  year         = {2021},
  url          = {https://doi.org/10.4230/DagRep.11.10.173},
  doi          = {10.4230/DAGREP.11.10.173},
  timestamp    = {Wed, 20 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/ChisnallGHP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/RajaniG20,
  author       = {Vineet Rajani and
                  Deepak Garg},
  title        = {On the expressiveness and semantics of information flow types},
  journal      = {J. Comput. Secur.},
  volume       = {28},
  number       = {1},
  pages        = {129--156},
  year         = {2020},
  url          = {https://doi.org/10.3233/JCS-191382},
  doi          = {10.3233/JCS-191382},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/RajaniG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/SammlerGDL20,
  author       = {Michael Sammler and
                  Deepak Garg and
                  Derek Dreyer and
                  Tadeusz Litak},
  title        = {The high-level benefits of low-level sandboxing},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {4},
  number       = {{POPL}},
  pages        = {32:1--32:32},
  year         = {2020},
  url          = {https://doi.org/10.1145/3371100},
  doi          = {10.1145/3371100},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmpl/SammlerGDL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esop/AbateBCD0HPTT20,
  author       = {Carmine Abate and
                  Roberto Blanco and
                  {\c{S}}tefan Ciob{\^{a}}c{\u{a}} and
                  Adrien Durier and
                  Deepak Garg and
                  Catalin Hritcu and
                  Marco Patrignani and
                  {\'{E}}ric Tanter and
                  J{\'{e}}r{\'{e}}my Thibault},
  editor       = {Peter M{\"{u}}ller},
  title        = {Trace-Relating Compiler Correctness and Secure Compilation},
  booktitle    = {Programming Languages and Systems - 29th European Symposium on Programming,
                  {ESOP} 2020, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2020, Dublin, Ireland, April 25-30,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12075},
  pages        = {1--28},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-44914-8\_1},
  doi          = {10.1007/978-3-030-44914-8\_1},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esop/AbateBCD0HPTT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ArunK0DB20,
  author       = {Venkat Arun and
                  Aniket Kate and
                  Deepak Garg and
                  Peter Druschel and
                  Bobby Bhattacharjee},
  title        = {Finding Safety in Numbers with Secure Allegation Escrows},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/finding-safety-in-numbers-with-secure-allegation-escrows/},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ArunK0DB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-05944,
  author       = {Akram El{-}Korashy and
                  Stelios Tsampas and
                  Marco Patrignani and
                  Dominique Devriese and
                  Deepak Garg and
                  Frank Piessens},
  title        = {CapablePtrs: Securely Compiling Partial Programs using the Pointers-as-Capabilities
                  Principle},
  journal      = {CoRR},
  volume       = {abs/2005.05944},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.05944},
  eprinttype    = {arXiv},
  eprint       = {2005.05944},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-05944.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-08069,
  author       = {Gilles Barthe and
                  Roberta De Viti and
                  Peter Druschel and
                  Deepak Garg and
                  Manuel Gomez{-}Rodriguez and
                  Pierfrancesco Ingo and
                  Matthew Lentz and
                  Aastha Mehta and
                  Bernhard Sch{\"{o}}lkopf},
  title        = {PanCast: Listening to Bluetooth Beacons for Epidemic Risk Mitigation},
  journal      = {CoRR},
  volume       = {abs/2011.08069},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.08069},
  eprinttype    = {arXiv},
  eprint       = {2011.08069},
  timestamp    = {Wed, 18 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-08069.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfp/AguirreBGGS19,
  author       = {Alejandro Aguirre and
                  Gilles Barthe and
                  Marco Gaboardi and
                  Deepak Garg and
                  Pierre{-}Yves Strub},
  title        = {A relational logic for higher-order programs},
  journal      = {J. Funct. Program.},
  volume       = {29},
  pages        = {e16},
  year         = {2019},
  url          = {https://doi.org/10.1017/S0956796819000145},
  doi          = {10.1017/S0956796819000145},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfp/AguirreBGGS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/QuG019,
  author       = {Weihao Qu and
                  Marco Gaboardi and
                  Deepak Garg},
  title        = {Relational cost analysis for functional-imperative programs},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {3},
  number       = {{ICFP}},
  pages        = {92:1--92:29},
  year         = {2019},
  url          = {https://doi.org/10.1145/3341696},
  doi          = {10.1145/3341696},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmpl/QuG019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/SatoABGGH19,
  author       = {Tetsuya Sato and
                  Alejandro Aguirre and
                  Gilles Barthe and
                  Marco Gaboardi and
                  Deepak Garg and
                  Justin Hsu},
  title        = {Formal verification of higher-order probabilistic programs: reasoning
                  about approximation, convergence, Bayesian inference, and optimization},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {3},
  number       = {{POPL}},
  pages        = {38:1--38:30},
  year         = {2019},
  url          = {https://doi.org/10.1145/3290351},
  doi          = {10.1145/3290351},
  timestamp    = {Mon, 11 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pacmpl/SatoABGGH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/VassenaRGRS19,
  author       = {Marco Vassena and
                  Alejandro Russo and
                  Deepak Garg and
                  Vineet Rajani and
                  Deian Stefan},
  title        = {From fine- to coarse-grained dynamic information flow control and
                  back},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {3},
  number       = {{POPL}},
  pages        = {76:1--76:31},
  year         = {2019},
  url          = {https://doi.org/10.1145/3290389},
  doi          = {10.1145/3290389},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pacmpl/VassenaRGRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/AbateB0HPT19,
  author       = {Carmine Abate and
                  Roberto Blanco and
                  Deepak Garg and
                  Catalin Hritcu and
                  Marco Patrignani and
                  J{\'{e}}r{\'{e}}my Thibault},
  title        = {Journey Beyond Full Abstraction: Exploring Robust Property Preservation
                  for Secure Compilation},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {256--271},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00025},
  doi          = {10.1109/CSF.2019.00025},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/AbateB0HPT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esop/PatrignaniG19,
  author       = {Marco Patrignani and
                  Deepak Garg},
  editor       = {Lu{\'{\i}}s Caires},
  title        = {Robustly Safe Compilation},
  booktitle    = {Programming Languages and Systems - 28th European Symposium on Programming,
                  {ESOP} 2019, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2019, Prague, Czech Republic, April
                  6-11, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11423},
  pages        = {469--498},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17184-1\_17},
  doi          = {10.1007/978-3-030-17184-1\_17},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esop/PatrignaniG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/Brahmakshatriya19,
  author       = {Ajay Brahmakshatriya and
                  Piyus Kedia and
                  Derrick Paul McKee and
                  Deepak Garg and
                  Akash Lal and
                  Aseem Rastogi and
                  Hamed Nemati and
                  Anmol Panda and
                  Pratik Bhatu},
  editor       = {George Candea and
                  Robbert van Renesse and
                  Christof Fetzer},
  title        = {ConfLLVM: {A} Compiler for Enforcing Data Confidentiality in Low-Level
                  Code},
  booktitle    = {Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany,
                  March 25-28, 2019},
  pages        = {4:1--4:15},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3302424.3303952},
  doi          = {10.1145/3302424.3303952},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosys/Brahmakshatriya19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotos/Litton0DB19,
  author       = {James Litton and
                  Deepak Garg and
                  Peter Druschel and
                  Bobby Bhattacharjee},
  title        = {Composing Abstractions using the null-Kernel},
  booktitle    = {Proceedings of the Workshop on Hot Topics in Operating Systems, HotOS
                  2019, Bertinoro, Italy, May 13-15, 2019},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317550.3321450},
  doi          = {10.1145/3317550.3321450},
  timestamp    = {Wed, 29 May 2019 13:38:37 +0200},
  biburl       = {https://dblp.org/rec/conf/hotos/Litton0DB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/CicekQBG019,
  author       = {Ezgi {\c{C}}i{\c{c}}ek and
                  Weihao Qu and
                  Gilles Barthe and
                  Marco Gaboardi and
                  Deepak Garg},
  editor       = {Kathryn S. McKinley and
                  Kathleen Fisher},
  title        = {Bidirectional type checking for relational properties},
  booktitle    = {Proceedings of the 40th {ACM} {SIGPLAN} Conference on Programming
                  Language Design and Implementation, {PLDI} 2019, Phoenix, AZ, USA,
                  June 22-26, 2019},
  pages        = {533--547},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3314221.3314603},
  doi          = {10.1145/3314221.3314603},
  timestamp    = {Sun, 09 Jun 2019 18:52:19 +0200},
  biburl       = {https://dblp.org/rec/conf/pldi/CicekQBG019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Vahldiek-Oberwagner19,
  author       = {Anjo Vahldiek{-}Oberwagner and
                  Eslam Elnikety and
                  Nuno O. Duarte and
                  Michael Sammler and
                  Peter Druschel and
                  Deepak Garg},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {{ERIM:} Secure, Efficient In-process Isolation with Protection Keys
                  {(MPK)}},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1221--1238},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/vahldiek-oberwagner},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Vahldiek-Oberwagner19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/abs-1910-14219,
  author       = {Robert K{\"{u}}nnemann and
                  Deepak Garg and
                  Michael Backes},
  editor       = {Georgiana Caltais and
                  Jean Krivine},
  title        = {Causality {\&} Control Flow},
  booktitle    = {Proceedings of the 4th Workshop on Formal Reasoning about Causation,
                  Responsibility, and Explanations in Science and Technology, CREST@ETAPS
                  2019, Prague, Czech Republic, 7th April 2019},
  series       = {{EPTCS}},
  volume       = {308},
  pages        = {32--46},
  year         = {2019},
  url          = {https://doi.org/10.4204/EPTCS.308.3},
  doi          = {10.4204/EPTCS.308.3},
  timestamp    = {Thu, 19 Dec 2019 15:19:10 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-14219.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2019,
  editor       = {Deepak Garg and
                  N. V. Narendra Kumar and
                  Rudrapatna K. Shyamasundar},
  title        = {Information Systems Security - 15th International Conference, {ICISS}
                  2019, Hyderabad, India, December 16-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11952},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36945-3},
  doi          = {10.1007/978-3-030-36945-3},
  isbn         = {978-3-030-36944-6},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-05320,
  author       = {Carmine Abate and
                  Roberto Blanco and
                  {\c{S}}tefan Ciob{\^{a}}c{\u{a}} and
                  Deepak Garg and
                  Catalin Hritcu and
                  Marco Patrignani and
                  {\'{E}}ric Tanter and
                  J{\'{e}}r{\'{e}}my Thibault},
  title        = {Trace-Relating Compiler Correctness and Secure Compilation},
  journal      = {CoRR},
  volume       = {abs/1907.05320},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.05320},
  eprinttype    = {arXiv},
  eprint       = {1907.05320},
  timestamp    = {Wed, 17 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-05320.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-11568,
  author       = {Aastha Mehta and
                  Mohamed Alzayat and
                  Roberta De Viti and
                  Bj{\"{o}}rn B. Brandenburg and
                  Peter Druschel and
                  Deepak Garg},
  title        = {Pacer: Network Side-Channel Mitigation in the Cloud},
  journal      = {CoRR},
  volume       = {abs/1908.11568},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.11568},
  eprinttype    = {arXiv},
  eprint       = {1908.11568},
  timestamp    = {Wed, 04 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-11568.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/RadicekBG0Z18,
  author       = {Ivan Radicek and
                  Gilles Barthe and
                  Marco Gaboardi and
                  Deepak Garg and
                  Florian Zuleger},
  title        = {Monadic refinements for relational cost analysis},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {2},
  number       = {{POPL}},
  pages        = {36:1--36:32},
  year         = {2018},
  url          = {https://doi.org/10.1145/3158124},
  doi          = {10.1145/3158124},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pacmpl/RadicekBG0Z18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Rajani018,
  author       = {Vineet Rajani and
                  Deepak Garg},
  title        = {Types for Information Flow Control: Labeling Granularity and Semantic
                  Models},
  booktitle    = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford,
                  United Kingdom, July 9-12, 2018},
  pages        = {233--246},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CSF.2018.00024},
  doi          = {10.1109/CSF.2018.00024},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Rajani018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esop/0001BBBG018,
  author       = {Alejandro Aguirre and
                  Gilles Barthe and
                  Lars Birkedal and
                  Ales Bizjak and
                  Marco Gaboardi and
                  Deepak Garg},
  editor       = {Amal Ahmed},
  title        = {Relational Reasoning for Markov Chains in a Probabilistic Guarded
                  Lambda Calculus},
  booktitle    = {Programming Languages and Systems - 27th European Symposium on Programming,
                  {ESOP} 2018, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2018, Thessaloniki, Greece, April
                  14-20, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10801},
  pages        = {214--241},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-89884-1\_8},
  doi          = {10.1007/978-3-319-89884-1\_8},
  timestamp    = {Tue, 05 Jul 2022 08:30:25 +0200},
  biburl       = {https://dblp.org/rec/conf/esop/0001BBBG018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/MunzEMFG18,
  author       = {Reinhard Munz and
                  Fabienne Eigner and
                  Matteo Maffei and
                  Paul Francis and
                  Deepak Garg},
  editor       = {Lujo Bauer and
                  Ralf K{\"{u}}sters},
  title        = {UniTraX: Protecting Data Privacy with Discoverable Biases},
  booktitle    = {Principles of Security and Trust - 7th International Conference, {POST}
                  2018, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2018, Thessaloniki, Greece, April 14-20,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10804},
  pages        = {278--299},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-89722-6\_12},
  doi          = {10.1007/978-3-319-89722-6\_12},
  timestamp    = {Fri, 31 Jan 2020 21:32:30 +0100},
  biburl       = {https://dblp.org/rec/conf/post/MunzEMFG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-04565,
  author       = {Eslam Elnikety and
                  Deepak Garg and
                  Peter Druschel},
  title        = {Shai: Enforcing Data-Specific Policies with Near-Zero Runtime Overhead},
  journal      = {CoRR},
  volume       = {abs/1801.04565},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.04565},
  eprinttype    = {arXiv},
  eprint       = {1801.04565},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-04565.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-06822,
  author       = {Anjo Vahldiek{-}Oberwagner and
                  Eslam Elnikety and
                  Deepak Garg and
                  Peter Druschel},
  title        = {{ERIM:} Secure and Efficient In-process Isolation with Memory Protection
                  Keys},
  journal      = {CoRR},
  volume       = {abs/1801.06822},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.06822},
  eprinttype    = {arXiv},
  eprint       = {1801.06822},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-06822.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-09787,
  author       = {Alejandro Aguirre and
                  Gilles Barthe and
                  Lars Birkedal and
                  Ales Bizjak and
                  Marco Gaboardi and
                  Deepak Garg},
  title        = {Relational Reasoning for Markov Chains in a Probabilistic Guarded
                  Lambda Calculus},
  journal      = {CoRR},
  volume       = {abs/1802.09787},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.09787},
  eprinttype    = {arXiv},
  eprint       = {1802.09787},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-09787.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-00489,
  author       = {Marco Patrignani and
                  Deepak Garg},
  title        = {Robustly Safe Compilation or, Efficient, Provably Secure Compilation},
  journal      = {CoRR},
  volume       = {abs/1804.00489},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.00489},
  eprinttype    = {arXiv},
  eprint       = {1804.00489},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-00489.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-00120,
  author       = {Vineet Rajani and
                  Deepak Garg},
  title        = {Types for Information Flow Control: Labeling Granularity and Semantic
                  Models},
  journal      = {CoRR},
  volume       = {abs/1805.00120},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.00120},
  eprinttype    = {arXiv},
  eprint       = {1805.00120},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-00120.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-04603,
  author       = {Carmine Abate and
                  Roberto Blanco and
                  Deepak Garg and
                  Catalin Hritcu and
                  Marco Patrignani and
                  J{\'{e}}r{\'{e}}my Thibault},
  title        = {Exploring Robust Property Preservation for Secure Compilation},
  journal      = {CoRR},
  volume       = {abs/1807.04603},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.04603},
  eprinttype    = {arXiv},
  eprint       = {1807.04603},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-04603.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-06091,
  author       = {Tetsuya Sato and
                  Alejandro Aguirre and
                  Gilles Barthe and
                  Marco Gaboardi and
                  Deepak Garg and
                  Justin Hsu},
  title        = {Formal verification of higher-order probabilistic programs},
  journal      = {CoRR},
  volume       = {abs/1807.06091},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.06091},
  eprinttype    = {arXiv},
  eprint       = {1807.06091},
  timestamp    = {Mon, 11 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-06091.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-10123,
  author       = {Venkat Arun and
                  Aniket Kate and
                  Deepak Garg and
                  Peter Druschel and
                  Bobby Bhattacharjee},
  title        = {{SATE:} Robust and Private Allegation Escrows},
  journal      = {CoRR},
  volume       = {abs/1810.10123},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.10123},
  eprinttype    = {arXiv},
  eprint       = {1810.10123},
  timestamp    = {Wed, 31 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-10123.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-04090,
  author       = {Weihao Qu and
                  Marco Gaboardi and
                  Deepak Garg},
  title        = {Relational Cost Analysis for Functional-Imperative Programs},
  journal      = {CoRR},
  volume       = {abs/1812.04090},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.04090},
  eprinttype    = {arXiv},
  eprint       = {1812.04090},
  timestamp    = {Tue, 01 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-04090.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-05067,
  author       = {Ezgi {\c{C}}i{\c{c}}ek and
                  Weihao Qu and
                  Gilles Barthe and
                  Marco Gaboardi and
                  Deepak Garg},
  title        = {Bidirectional Type Checking for Relational Properties},
  journal      = {CoRR},
  volume       = {abs/1812.05067},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.05067},
  eprinttype    = {arXiv},
  eprint       = {1812.05067},
  timestamp    = {Tue, 01 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-05067.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/Ahmed0HP18,
  author       = {Amal Ahmed and
                  Deepak Garg and
                  Catalin Hritcu and
                  Frank Piessens},
  title        = {Secure Compilation (Dagstuhl Seminar 18201)},
  journal      = {Dagstuhl Reports},
  volume       = {8},
  number       = {5},
  pages        = {1--30},
  year         = {2018},
  url          = {https://doi.org/10.4230/DagRep.8.5.1},
  doi          = {10.4230/DAGREP.8.5.1},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/Ahmed0HP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KunnemannG018,
  author       = {Robert K{\"{u}}nnemann and
                  Deepak Garg and
                  Michael Backes},
  title        = {Accountability in Security Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {127},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KunnemannG018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/AguirreBG0S17,
  author       = {Alejandro Aguirre and
                  Gilles Barthe and
                  Marco Gaboardi and
                  Deepak Garg and
                  Pierre{-}Yves Strub},
  title        = {A relational logic for higher-order programs},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {1},
  number       = {{ICFP}},
  pages        = {21:1--21:29},
  year         = {2017},
  url          = {https://doi.org/10.1145/3110265},
  doi          = {10.1145/3110265},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmpl/AguirreBG0S17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/Swasey0D17,
  author       = {David Swasey and
                  Deepak Garg and
                  Derek Dreyer},
  title        = {Robust and compositional verification of object capability patterns},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {1},
  number       = {{OOPSLA}},
  pages        = {89:1--89:26},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133913},
  doi          = {10.1145/3133913},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmpl/Swasey0D17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siglog/RajaniBRG17,
  author       = {Vineet Rajani and
                  Iulia Bastys and
                  Willard Rafnsson and
                  Deepak Garg},
  title        = {Type systems for information flow control: the question of granularity},
  journal      = {{ACM} {SIGLOG} News},
  volume       = {4},
  number       = {1},
  pages        = {6--21},
  year         = {2017},
  url          = {https://doi.org/10.1145/3051528.3051531},
  doi          = {10.1145/3051528.3051531},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siglog/RajaniBRG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/PatrignaniG17,
  author       = {Marco Patrignani and
                  Deepak Garg},
  title        = {Secure Compilation and Hyperproperty Preservation},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {392--404},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.13},
  doi          = {10.1109/CSF.2017.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/PatrignaniG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BichhawatRJGH17,
  author       = {Abhishek Bichhawat and
                  Vineet Rajani and
                  Jinank Jain and
                  Deepak Garg and
                  Christian Hammer},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {WebPol: Fine-Grained Information Flow Policies for Web Browsers},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10492},
  pages        = {242--259},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66402-6\_15},
  doi          = {10.1007/978-3-319-66402-6\_15},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BichhawatRJGH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/CicekBG0H17,
  author       = {Ezgi {\c{C}}i{\c{c}}ek and
                  Gilles Barthe and
                  Marco Gaboardi and
                  Deepak Garg and
                  Jan Hoffmann},
  editor       = {Giuseppe Castagna and
                  Andrew D. Gordon},
  title        = {Relational cost analysis},
  booktitle    = {Proceedings of the 44th {ACM} {SIGPLAN} Symposium on Principles of
                  Programming Languages, {POPL} 2017, Paris, France, January 18-20,
                  2017},
  pages        = {316--329},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3009837.3009858},
  doi          = {10.1145/3009837.3009858},
  timestamp    = {Mon, 05 Feb 2024 20:33:37 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/CicekBG0H17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MehtaEH0D17,
  author       = {Aastha Mehta and
                  Eslam Elnikety and
                  Katura Harvey and
                  Deepak Garg and
                  Peter Druschel},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Qapla: Policy compliance for database-backed systems},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {1463--1479},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/mehta},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MehtaEH0D17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AguirreBG0S17,
  author       = {Alejandro Aguirre and
                  Gilles Barthe and
                  Marco Gaboardi and
                  Deepak Garg and
                  Pierre{-}Yves Strub},
  title        = {A Relational Logic for Higher-Order Programs},
  journal      = {CoRR},
  volume       = {abs/1703.05042},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.05042},
  eprinttype    = {arXiv},
  eprint       = {1703.05042},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AguirreBG0S17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BichhawatRJ0017,
  author       = {Abhishek Bichhawat and
                  Vineet Rajani and
                  Jinank Jain and
                  Deepak Garg and
                  Christian Hammer},
  title        = {WebPol: Fine-grained Information Flow Policies for Web Browsers},
  journal      = {CoRR},
  volume       = {abs/1706.06932},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.06932},
  eprinttype    = {arXiv},
  eprint       = {1706.06932},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BichhawatRJ0017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-07309,
  author       = {Deepak Garg and
                  Catalin Hritcu and
                  Marco Patrignani and
                  Marco Stronati and
                  David Swasey},
  title        = {Robust Hyperproperty Preservation for Secure Compilation (Extended
                  Abstract)},
  journal      = {CoRR},
  volume       = {abs/1710.07309},
  year         = {2017},
  url          = {http://arxiv.org/abs/1710.07309},
  eprinttype    = {arXiv},
  eprint       = {1710.07309},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1710-07309.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-11396,
  author       = {Ajay Brahmakshatriya and
                  Piyus Kedia and
                  Derrick Paul McKee and
                  Pratik Bhatu and
                  Deepak Garg and
                  Akash Lal and
                  Aseem Rastogi},
  title        = {An Instrumenting Compiler for Enforcing Confidentiality in Low-Level
                  Code},
  journal      = {CoRR},
  volume       = {abs/1711.11396},
  year         = {2017},
  url          = {http://arxiv.org/abs/1711.11396},
  eprinttype    = {arXiv},
  eprint       = {1711.11396},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1711-11396.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeGKT17,
  author       = {Sanjit Chatterjee and
                  Deepak Garg and
                  Aniket Kate and
                  Tobias Theobald},
  title        = {Encrypting Messages for Incomplete Chains of Certificates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {777},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/777},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeGKT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/PereraGC16,
  author       = {Roly Perera and
                  Deepak Garg and
                  James Cheney},
  editor       = {Jos{\'{e}}e Desharnais and
                  Radha Jagadeesan},
  title        = {Causally Consistent Dynamic Slicing},
  booktitle    = {27th International Conference on Concurrency Theory, {CONCUR} 2016,
                  August 23-26, 2016, Qu{\'{e}}bec City, Canada},
  series       = {LIPIcs},
  volume       = {59},
  pages        = {18:1--18:15},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2016},
  url          = {https://doi.org/10.4230/LIPIcs.CONCUR.2016.18},
  doi          = {10.4230/LIPICS.CONCUR.2016.18},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/concur/PereraGC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Rajani0R16,
  author       = {Vineet Rajani and
                  Deepak Garg and
                  Tamara Rezk},
  title        = {On Access Control, Capabilities, Their Equivalence, and Confused Deputy
                  Attacks},
  booktitle    = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon,
                  Portugal, June 27 - July 1, 2016},
  pages        = {150--163},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CSF.2016.18},
  doi          = {10.1109/CSF.2016.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Rajani0R16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/Rafnsson0S16,
  author       = {Willard Rafnsson and
                  Deepak Garg and
                  Andrei Sabelfeld},
  editor       = {Juan Caballero and
                  Eric Bodden and
                  Elias Athanasopoulos},
  title        = {Progress-Sensitive Security for {SPARK}},
  booktitle    = {Engineering Secure Software and Systems - 8th International Symposium,
                  ESSoS 2016, London, UK, April 6-8, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9639},
  pages        = {20--37},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-30806-7\_2},
  doi          = {10.1007/978-3-319-30806-7\_2},
  timestamp    = {Tue, 01 Jun 2021 15:22:49 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/Rafnsson0S16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfp/CicekP016,
  author       = {Ezgi {\c{C}}i{\c{c}}ek and
                  Zoe Paraskevopoulou and
                  Deepak Garg},
  editor       = {Jacques Garrigue and
                  Gabriele Keller and
                  Eijiro Sumii},
  title        = {A type theory for incremental computational complexity with control
                  flow changes},
  booktitle    = {Proceedings of the 21st {ACM} {SIGPLAN} International Conference on
                  Functional Programming, {ICFP} 2016, Nara, Japan, September 18-22,
                  2016},
  pages        = {132--145},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2951913.2951950},
  doi          = {10.1145/2951913.2951950},
  timestamp    = {Wed, 23 Jun 2021 15:34:31 +0200},
  biburl       = {https://dblp.org/rec/conf/icfp/CicekP016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/osdi/LittonVE0BD16,
  author       = {James Litton and
                  Anjo Vahldiek{-}Oberwagner and
                  Eslam Elnikety and
                  Deepak Garg and
                  Bobby Bhattacharjee and
                  Peter Druschel},
  editor       = {Kimberly Keeton and
                  Timothy Roscoe},
  title        = {Light-Weight Contexts: An {OS} Abstraction for Safety and Performance},
  booktitle    = {12th {USENIX} Symposium on Operating Systems Design and Implementation,
                  {OSDI} 2016, Savannah, GA, USA, November 2-4, 2016},
  pages        = {49--64},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/osdi16/technical-sessions/presentation/litton},
  timestamp    = {Tue, 02 Feb 2021 08:06:02 +0100},
  biburl       = {https://dblp.org/rec/conf/osdi/LittonVE0BD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/Bolosteanu016,
  author       = {Iulia Bolosteanu and
                  Deepak Garg},
  editor       = {Frank Piessens and
                  Luca Vigan{\`{o}}},
  title        = {Asymmetric Secure Multi-execution with Declassification},
  booktitle    = {Principles of Security and Trust - 5th International Conference, {POST}
                  2016, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2016, Eindhoven, The Netherlands, April
                  2-8, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9635},
  pages        = {24--45},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49635-0\_2},
  doi          = {10.1007/978-3-662-49635-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/post/Bolosteanu016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ElniketyMV0D16,
  author       = {Eslam Elnikety and
                  Aastha Mehta and
                  Anjo Vahldiek{-}Oberwagner and
                  Deepak Garg and
                  Peter Druschel},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Thoth: Comprehensive Policy Compliance in Data Retrieval Systems},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {637--654},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/elnikety},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ElniketyMV0D16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Perera0C16,
  author       = {Roly Perera and
                  Deepak Garg and
                  James Cheney},
  title        = {Causally consistent dynamic slicing},
  journal      = {CoRR},
  volume       = {abs/1610.02327},
  year         = {2016},
  url          = {http://arxiv.org/abs/1610.02327},
  eprinttype    = {arXiv},
  eprint       = {1610.02327},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Perera0C16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Chowdhury0JD15,
  author       = {Omar Chowdhury and
                  Deepak Garg and
                  Limin Jia and
                  Anupam Datta},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Equivalence-based Security for Querying Encrypted Databases: Theory
                  and Application to Privacy Policy Audits},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1130--1143},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813638},
  doi          = {10.1145/2810103.2813638},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Chowdhury0JD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Datta0KSS15,
  author       = {Anupam Datta and
                  Deepak Garg and
                  Dilsun Kirli Kaynar and
                  Divya Sharma and
                  Arunesh Sinha},
  editor       = {C{\'{e}}dric Fournet and
                  Michael W. Hicks and
                  Luca Vigan{\`{o}}},
  title        = {Program Actions as Actual Causes: {A} Building Block for Accountability},
  booktitle    = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona,
                  Italy, 13-17 July, 2015},
  pages        = {261--275},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSF.2015.25},
  doi          = {10.1109/CSF.2015.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Datta0KSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/RajaniB0015,
  author       = {Vineet Rajani and
                  Abhishek Bichhawat and
                  Deepak Garg and
                  Christian Hammer},
  editor       = {C{\'{e}}dric Fournet and
                  Michael W. Hicks and
                  Luca Vigan{\`{o}}},
  title        = {Information Flow Control for Event Handling and the {DOM} in Web Browsers},
  booktitle    = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona,
                  Italy, 13-17 July, 2015},
  pages        = {366--379},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSF.2015.32},
  doi          = {10.1109/CSF.2015.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/RajaniB0015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/JiaS0D15,
  author       = {Limin Jia and
                  Shayak Sen and
                  Deepak Garg and
                  Anupam Datta},
  editor       = {C{\'{e}}dric Fournet and
                  Michael W. Hicks and
                  Luca Vigan{\`{o}}},
  title        = {A Logic of Programs with Interface-Confined Code},
  booktitle    = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona,
                  Italy, 13-17 July, 2015},
  pages        = {512--525},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSF.2015.38},
  doi          = {10.1109/CSF.2015.38},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/JiaS0D15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esop/CicekGA15,
  author       = {Ezgi {\c{C}}i{\c{c}}ek and
                  Deepak Garg and
                  Umut A. Acar},
  editor       = {Jan Vitek},
  title        = {Refinement Types for Incremental Computational Complexity},
  booktitle    = {Programming Languages and Systems - 24th European Symposium on Programming,
                  {ESOP} 2015, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9032},
  pages        = {406--431},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46669-8\_17},
  doi          = {10.1007/978-3-662-46669-8\_17},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esop/CicekGA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/Vahldiek-Oberwagner15,
  author       = {Anjo Vahldiek{-}Oberwagner and
                  Eslam Elnikety and
                  Aastha Mehta and
                  Deepak Garg and
                  Peter Druschel and
                  Rodrigo Rodrigues and
                  Johannes Gehrke and
                  Ansley Post},
  editor       = {Laurent R{\'{e}}veill{\`{e}}re and
                  Tim Harris and
                  Maurice Herlihy},
  title        = {Guardat: enforcing data policies at the storage layer},
  booktitle    = {Proceedings of the Tenth European Conference on Computer Systems,
                  EuroSys 2015, Bordeaux, France, April 21-24, 2015},
  pages        = {13:1--13:16},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2741948.2741958},
  doi          = {10.1145/2741948.2741958},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosys/Vahldiek-Oberwagner15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JiaS0D15,
  author       = {Limin Jia and
                  Shayak Sen and
                  Deepak Garg and
                  Anupam Datta},
  title        = {System {M:} {A} Program Logic for Code Sandboxing and Identification},
  journal      = {CoRR},
  volume       = {abs/1501.05673},
  year         = {2015},
  url          = {http://arxiv.org/abs/1501.05673},
  eprinttype    = {arXiv},
  eprint       = {1501.05673},
  timestamp    = {Sun, 16 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JiaS0D15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Datta0KSS15a,
  author       = {Anupam Datta and
                  Deepak Garg and
                  Dilsun Kirli Kaynar and
                  Divya Sharma and
                  Arunesh Sinha},
  title        = {Program Actions as Actual Causes: {A} Building Block for Accountability},
  journal      = {CoRR},
  volume       = {abs/1505.01131},
  year         = {2015},
  url          = {http://arxiv.org/abs/1505.01131},
  eprinttype    = {arXiv},
  eprint       = {1505.01131},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Datta0KSS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BichhawatR0H15,
  author       = {Abhishek Bichhawat and
                  Vineet Rajani and
                  Deepak Garg and
                  Christian Hammer},
  title        = {Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis},
  journal      = {CoRR},
  volume       = {abs/1506.03950},
  year         = {2015},
  url          = {http://arxiv.org/abs/1506.03950},
  eprinttype    = {arXiv},
  eprint       = {1506.03950},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BichhawatR0H15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Chowdhury0JD15,
  author       = {Omar Chowdhury and
                  Deepak Garg and
                  Limin Jia and
                  Anupam Datta},
  title        = {Equivalence-based Security for Querying Encrypted Databases: Theory
                  and Application to Privacy Policy Audits},
  journal      = {CoRR},
  volume       = {abs/1508.02448},
  year         = {2015},
  url          = {http://arxiv.org/abs/1508.02448},
  eprinttype    = {arXiv},
  eprint       = {1508.02448},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Chowdhury0JD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/ChowdhuryJGD14,
  author       = {Omar Chowdhury and
                  Limin Jia and
                  Deepak Garg and
                  Anupam Datta},
  editor       = {Armin Biere and
                  Roderick Bloem},
  title        = {Temporal Mode-Checking for Runtime Monitoring of Privacy Policies},
  booktitle    = {Computer Aided Verification - 26th International Conference, {CAV}
                  2014, Held as Part of the Vienna Summer of Logic, {VSL} 2014, Vienna,
                  Austria, July 18-22, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8559},
  pages        = {131--149},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08867-9\_9},
  doi          = {10.1007/978-3-319-08867-9\_9},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/ChowdhuryJGD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/OhCJGGD14,
  author       = {Se Eun Oh and
                  Ji Young Chun and
                  Limin Jia and
                  Deepak Garg and
                  Carl A. Gunter and
                  Anupam Datta},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Jaehong Park},
  title        = {Privacy-preserving audit for broker-based health information exchange},
  booktitle    = {Fourth {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014},
  pages        = {313--320},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2557547.2557576},
  doi          = {10.1145/2557547.2557576},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/OhCJGGD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecoop/BichhawatRGH14,
  author       = {Abhishek Bichhawat and
                  Vineet Rajani and
                  Deepak Garg and
                  Christian Hammer},
  editor       = {Alejandro Russo and
                  Omer Tripp},
  title        = {Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis},
  booktitle    = {Proceedings of the Ninth Workshop on Programming Languages and Analysis
                  for Security, PLAS@ECOOP 2014, Uppsala, Sweden, July 29, 2014},
  pages        = {15},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2637113.2637116},
  doi          = {10.1145/2637113.2637116},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecoop/BichhawatRGH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/BichhawatRGH14,
  author       = {Abhishek Bichhawat and
                  Vineet Rajani and
                  Deepak Garg and
                  Christian Hammer},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Information Flow Control in WebKit's JavaScript Bytecode},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {159--178},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_9},
  doi          = {10.1007/978-3-642-54792-8\_9},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/post/BichhawatRGH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BichhawatRGH14,
  author       = {Abhishek Bichhawat and
                  Vineet Rajani and
                  Deepak Garg and
                  Christian Hammer},
  title        = {Information Flow Control in WebKit's JavaScript Bytecode},
  journal      = {CoRR},
  volume       = {abs/1401.4339},
  year         = {2014},
  url          = {http://arxiv.org/abs/1401.4339},
  eprinttype    = {arXiv},
  eprint       = {1401.4339},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BichhawatRGH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/NanevskiBG13,
  author       = {Aleksandar Nanevski and
                  Anindya Banerjee and
                  Deepak Garg},
  title        = {Dependent Type Theory for Verification of Information Flow and Access
                  Control Policies},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {35},
  number       = {2},
  pages        = {6:1--6:41},
  year         = {2013},
  url          = {https://doi.org/10.1145/2491522.2491523},
  doi          = {10.1145/2491522.2491523},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toplas/NanevskiBG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/GargP12,
  author       = {Deepak Garg and
                  Frank Pfenning},
  title        = {Stateful authorization logic - Proof theory and a case study},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {353--391},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0456},
  doi          = {10.3233/JCS-2012-0456},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/GargP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GenoveseGR12,
  author       = {Valerio Genovese and
                  Deepak Garg and
                  Daniele Rispoli},
  editor       = {Stephen Chong},
  title        = {Labeled Sequent Calculi for Access Control Logics: Countermodels,
                  Saturation and Abduction},
  booktitle    = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge,
                  MA, USA, June 25-27, 2012},
  pages        = {139--153},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CSF.2012.11},
  doi          = {10.1109/CSF.2012.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/GenoveseGR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfp/KrishnaswamiTDG12,
  author       = {Neelakantan R. Krishnaswami and
                  Aaron Turon and
                  Derek Dreyer and
                  Deepak Garg},
  editor       = {Peter Thiemann and
                  Robby Bruce Findler},
  title        = {Superficially substructural types},
  booktitle    = {{ACM} {SIGPLAN} International Conference on Functional Programming,
                  ICFP'12, Copenhagen, Denmark, September 9-15, 2012},
  pages        = {41--54},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2364527.2364536},
  doi          = {10.1145/2364527.2364536},
  timestamp    = {Thu, 24 Jun 2021 16:19:30 +0200},
  biburl       = {https://dblp.org/rec/conf/icfp/KrishnaswamiTDG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/GargGN12,
  author       = {Deepak Garg and
                  Valerio Genovese and
                  Sara Negri},
  title        = {Countermodels from Sequent Calculi in Multi-Modal Logics},
  booktitle    = {Proceedings of the 27th Annual {IEEE} Symposium on Logic in Computer
                  Science, {LICS} 2012, Dubrovnik, Croatia, June 25-28, 2012},
  pages        = {315--324},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/LICS.2012.42},
  doi          = {10.1109/LICS.2012.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/GargGN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/GenoveseGR12,
  author       = {Valerio Genovese and
                  Deepak Garg and
                  Daniele Rispoli},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Labeled Goal-Directed Search in Access Control Logic},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {65--80},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_5},
  doi          = {10.1007/978-3-642-38004-4\_5},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/GenoveseGR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/DattaFGJK11,
  author       = {Anupam Datta and
                  Jason Franklin and
                  Deepak Garg and
                  Limin Jia and
                  Dilsun Kirli Kaynar},
  title        = {On Adversary Models and Compositional Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {9},
  number       = {3},
  pages        = {26--32},
  year         = {2011},
  url          = {https://doi.org/10.1109/MSP.2010.203},
  doi          = {10.1109/MSP.2010.203},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/DattaFGJK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GargJD11,
  author       = {Deepak Garg and
                  Limin Jia and
                  Anupam Datta},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Policy auditing over incomplete logs: theory, implementation and applications},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {151--162},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046726},
  doi          = {10.1145/2046707.2046726},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GargJD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DattaBCDGJKS11,
  author       = {Anupam Datta and
                  Jeremiah Blocki and
                  Nicolas Christin and
                  Henry DeYoung and
                  Deepak Garg and
                  Limin Jia and
                  Dilsun Kirli Kaynar and
                  Arunesh Sinha},
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {Understanding and Protecting Privacy: Formal Semantics and Principled
                  Audit Mechanisms},
  booktitle    = {Information Systems Security - 7th International Conference, {ICISS}
                  2011, Kolkata, India, December 15-19, 2011, Procedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {1--27},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25560-1\_1},
  doi          = {10.1007/978-3-642-25560-1\_1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/DattaBCDGJKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/NanevskiBG11,
  author       = {Aleksandar Nanevski and
                  Anindya Banerjee and
                  Deepak Garg},
  title        = {Verification of Information Flow and Access Control Policies with
                  Dependent Types},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {165--179},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.12},
  doi          = {10.1109/SP.2011.12},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/NanevskiBG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/MorgensternGP11,
  author       = {Jamie Morgenstern and
                  Deepak Garg and
                  Frank Pfenning},
  editor       = {Catherine Meadows and
                  M. Carmen Fern{\'{a}}ndez Gago},
  title        = {A Proof-Carrying File System with Revocable and Use-Once Certificates},
  booktitle    = {Security and Trust Management - 7th International Workshop, {STM}
                  2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7170},
  pages        = {40--55},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29963-6\_5},
  doi          = {10.1007/978-3-642-29963-6\_5},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/MorgensternGP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/GenoveseG11,
  author       = {Valerio Genovese and
                  Deepak Garg},
  editor       = {Catherine Meadows and
                  M. Carmen Fern{\'{a}}ndez Gago},
  title        = {New Modalities for Access Control Logics: Permission, Control and
                  Ratification},
  booktitle    = {Security and Trust Management - 7th International Workshop, {STM}
                  2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7170},
  pages        = {56--71},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29963-6\_6},
  doi          = {10.1007/978-3-642-29963-6\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/GenoveseG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1102-2521,
  author       = {Deepak Garg and
                  Limin Jia and
                  Anupam Datta},
  title        = {A Logical Method for Policy Enforcement over Evolving Audit Logs},
  journal      = {CoRR},
  volume       = {abs/1102.2521},
  year         = {2011},
  url          = {http://arxiv.org/abs/1102.2521},
  eprinttype    = {arXiv},
  eprint       = {1102.2521},
  timestamp    = {Sun, 16 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1102-2521.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GargP10,
  author       = {Deepak Garg and
                  Frank Pfenning},
  title        = {A Proof-Carrying File System},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {349--364},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.28},
  doi          = {10.1109/SP.2010.28},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GargP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/GargP10,
  author       = {Deepak Garg and
                  Frank Pfenning},
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner and
                  Javier L{\'{o}}pez},
  title        = {Stateful Authorization Logic: - Proof Theory and a Case Study},
  booktitle    = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  pages        = {210--225},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22444-7\_14},
  doi          = {10.1007/978-3-642-22444-7\_14},
  timestamp    = {Tue, 07 May 2024 20:13:56 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/GargP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/DeYoungGJKD10,
  author       = {Henry DeYoung and
                  Deepak Garg and
                  Limin Jia and
                  Dilsun Kirli Kaynar and
                  Anupam Datta},
  editor       = {Ehab Al{-}Shaer and
                  Keith B. Frikken},
  title        = {Experiences in the logical specification of the {HIPAA} and {GLBA}
                  privacy laws},
  booktitle    = {Proceedings of the 2010 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2010, Chicago, Illinois, USA, October 4, 2010},
  pages        = {73--82},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866919.1866930},
  doi          = {10.1145/1866919.1866930},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/DeYoungGJKD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/GargFKD10,
  author       = {Deepak Garg and
                  Jason Franklin and
                  Dilsun Kirli Kaynar and
                  Anupam Datta},
  editor       = {Michael W. Mislove and
                  Peter Selinger},
  title        = {Compositional System Security with Interface-Confined Adversaries},
  booktitle    = {Proceedings of the 26th Conference on the Mathematical Foundations
                  of Programming Semantics, {MFPS} 2010, Ottawa, Ontario, Canada, May
                  6-10, 2010},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {265},
  pages        = {49--71},
  publisher    = {Elsevier},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.entcs.2010.08.005},
  doi          = {10.1016/J.ENTCS.2010.08.005},
  timestamp    = {Mon, 08 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/GargFKD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pldi/2010plas,
  editor       = {Anindya Banerjee and
                  Deepak Garg},
  title        = {Proceedings of the 2010 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2010, Toronto, ON, Canada, 10 June, 2010},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {http://dl.acm.org/citation.cfm?id=1814217},
  isbn         = {978-1-60558-827-8},
  timestamp    = {Thu, 22 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/2010plas.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChaudhuriG09,
  author       = {Avik Chaudhuri and
                  Deepak Garg},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {{PCAL:} Language Support for Proof-Carrying Authorization Systems},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {184--199},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_12},
  doi          = {10.1007/978-3-642-04444-1\_12},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ChaudhuriG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DattaFGK09,
  author       = {Anupam Datta and
                  Jason Franklin and
                  Deepak Garg and
                  Dilsun Kirli Kaynar},
  title        = {A Logic of Secure Systems and its Application to Trusted Computing},
  booktitle    = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May
                  2009, Oakland, California, {USA}},
  pages        = {221--236},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SP.2009.16},
  doi          = {10.1109/SP.2009.16},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/DattaFGK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DeYoungGP08,
  author       = {Henry DeYoung and
                  Deepak Garg and
                  Frank Pfenning},
  title        = {An Authorization Logic With Explicit Time},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {133--145},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.15},
  doi          = {10.1109/CSF.2008.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DeYoungGP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fossacs/GargA08,
  author       = {Deepak Garg and
                  Mart{\'{\i}}n Abadi},
  editor       = {Roberto M. Amadio},
  title        = {A Modal Deconstruction of Access Control Logics},
  booktitle    = {Foundations of Software Science and Computational Structures, 11th
                  International Conference, {FOSSACS} 2008, Held as Part of the Joint
                  European Conferences on Theory and Practice of Software, {ETAPS} 2008,
                  Budapest, Hungary, March 29 - April 6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4962},
  pages        = {216--230},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78499-9\_16},
  doi          = {10.1007/978-3-540-78499-9\_16},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/fossacs/GargA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BowersBGPR07,
  author       = {Kevin D. Bowers and
                  Lujo Bauer and
                  Deepak Garg and
                  Frank Pfenning and
                  Michael K. Reiter},
  title        = {Consumable Credentials in Linear-Logic-Based Access-Control Systems},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2007, San Diego, California, USA, 28th February - 2nd March
                  2007},
  publisher    = {The Internet Society},
  year         = {2007},
  url          = {https://www.ndss-symposium.org/ndss2007/consumable-credentials-linear-logic-based-access-control-systems/},
  timestamp    = {Mon, 01 Feb 2021 08:42:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BowersBGPR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GargP06,
  author       = {Deepak Garg and
                  Frank Pfenning},
  title        = {Non-Interference in Constructive Authorization Logic},
  booktitle    = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006),
                  5-7 July 2006, Venice, Italy},
  pages        = {283--296},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/CSFW.2006.18},
  doi          = {10.1109/CSFW.2006.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/GargP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GargBBPR06,
  author       = {Deepak Garg and
                  Lujo Bauer and
                  Kevin D. Bowers and
                  Frank Pfenning and
                  Michael K. Reiter},
  editor       = {Dieter Gollmann and
                  Jan Meier and
                  Andrei Sabelfeld},
  title        = {A Linear Logic of Authorization and Knowledge},
  booktitle    = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
                  in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4189},
  pages        = {297--312},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11863908\_19},
  doi          = {10.1007/11863908\_19},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GargBBPR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/GargP05,
  author       = {Deepak Garg and
                  Frank Pfenning},
  editor       = {Mart{\'{\i}}n Abadi and
                  Luca de Alfaro},
  title        = {Type-Directed Concurrency},
  booktitle    = {{CONCUR} 2005 - Concurrency Theory, 16th International Conference,
                  {CONCUR} 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3653},
  pages        = {6--20},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11539452\_5},
  doi          = {10.1007/11539452\_5},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/concur/GargP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifipTCS/GargLP04,
  author       = {Deepak Garg and
                  Akash Lal and
                  Sanjiva Prasad},
  editor       = {Jean{-}Jacques L{\'{e}}vy and
                  Ernst W. Mayr and
                  John C. Mitchell},
  title        = {Effective Chemistry for Synchrony and Asynchrony},
  booktitle    = {Exploring New Frontiers of Theoretical Informatics, {IFIP} 18th World
                  Computer Congress, {TC1} 3rd International Conference on Theoretical
                  Computer Science (TCS2004), 22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {155},
  pages        = {479--492},
  publisher    = {Kluwer/Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8141-3\_37},
  doi          = {10.1007/1-4020-8141-3\_37},
  timestamp    = {Fri, 27 Sep 2019 10:35:17 +0200},
  biburl       = {https://dblp.org/rec/conf/ifipTCS/GargLP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}