default search action
BibTeX records: Deepak Garg 0001
@article{DBLP:journals/pacmpl/LiuQGGU24, author = {Jiawen Liu and Weihao Qu and Marco Gaboardi and Deepak Garg and Jonathan R. Ullman}, title = {Program Analysis for Adaptive Data Analysis}, journal = {Proc. {ACM} Program. Lang.}, volume = {8}, number = {{PLDI}}, pages = {914--938}, year = {2024}, url = {https://doi.org/10.1145/3656414}, doi = {10.1145/3656414}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pacmpl/LiuQGGU24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-04297, author = {Roberta De Viti and Pierfrancesco Ingo and Isaac Sheff and Peter Druschel and Deepak Garg}, title = {ProLoc: Robust Location Proofs in Hindsight}, journal = {CoRR}, volume = {abs/2404.04297}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.04297}, doi = {10.48550/ARXIV.2404.04297}, eprinttype = {arXiv}, eprint = {2404.04297}, timestamp = {Wed, 15 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-04297.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftpl/VassenaRGRS23, author = {Marco Vassena and Alejandro Russo and Deepak Garg and Vineet Rajani and Deian Stefan}, title = {From Fine- to Coarse-Grained Dynamic Information Flow Control and Back}, journal = {Found. Trends Program. Lang.}, volume = {8}, number = {1}, pages = {1--117}, year = {2023}, url = {https://doi.org/10.1561/2500000046}, doi = {10.1561/2500000046}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ftpl/VassenaRGRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/MenzHLG23, author = {Jan Menz and Andrew K. Hirsch and Peixuan Li and Deepak Garg}, title = {Compositional Security Definitions for Higher-Order Where Declassification}, journal = {Proc. {ACM} Program. Lang.}, volume = {7}, number = {{OOPSLA1}}, pages = {406--433}, year = {2023}, url = {https://doi.org/10.1145/3586041}, doi = {10.1145/3586041}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pacmpl/MenzHLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/SammlerSSDKGD23, author = {Michael Sammler and Simon Spies and Youngju Song and Emanuele D'Osualdo and Robbert Krebbers and Deepak Garg and Derek Dreyer}, title = {DimSum: {A} Decentralized Approach to Multi-language Semantics and Verification}, journal = {Proc. {ACM} Program. Lang.}, volume = {7}, number = {{POPL}}, pages = {775--805}, year = {2023}, url = {https://doi.org/10.1145/3571220}, doi = {10.1145/3571220}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmpl/SammlerSSDKGD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/AlzayatMD023, author = {Mohamed Alzayat and Jonathan Mace and Peter Druschel and Deepak Garg}, editor = {Giuseppe Antonio Di Luna and Leonardo Querzoni and Alexandra Fedorova and Dushyanth Narayanan}, title = {Groundhog: Efficient Request Isolation in FaaS}, booktitle = {Proceedings of the Eighteenth European Conference on Computer Systems, EuroSys 2023, Rome, Italy, May 8-12, 2023}, pages = {398--415}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3552326.3567503}, doi = {10.1145/3552326.3567503}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosys/AlzayatMD023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/Anand0KM23, author = {Vaastav Anand and Deepak Garg and Antoine Kaufmann and Jonathan Mace}, editor = {Jason Flinn and Margo I. Seltzer and Peter Druschel and Antoine Kaufmann and Jonathan Mace}, title = {Blueprint: {A} Toolchain for Highly-Reconfigurable Microservice Applications}, booktitle = {Proceedings of the 29th Symposium on Operating Systems Principles, {SOSP} 2023, Koblenz, Germany, October 23-26, 2023}, pages = {482--497}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600006.3613138}, doi = {10.1145/3600006.3613138}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sosp/Anand0KM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/ZhuSLDG22, author = {Fengmin Zhu and Michael Sammler and Rodolphe Lepigre and Derek Dreyer and Deepak Garg}, title = {{BFF:} foundational and automated verification of bitfield-manipulating programs}, journal = {Proc. {ACM} Program. Lang.}, volume = {6}, number = {{OOPSLA2}}, pages = {1613--1638}, year = {2022}, url = {https://doi.org/10.1145/3563345}, doi = {10.1145/3563345}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmpl/ZhuSLDG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/HirschG22, author = {Andrew K. Hirsch and Deepak Garg}, title = {Pirouette: higher-order typed functional choreographies}, journal = {Proc. {ACM} Program. Lang.}, volume = {6}, number = {{POPL}}, pages = {1--27}, year = {2022}, url = {https://doi.org/10.1145/3498684}, doi = {10.1145/3498684}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmpl/HirschG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/KolosickNJWLGJS22, author = {Matthew Kolosick and Shravan Narayan and Evan Johnson and Conrad Watt and Michael LeMay and Deepak Garg and Ranjit Jhala and Deian Stefan}, title = {Isolation without taxation: near-zero-cost transitions for WebAssembly and {SFI}}, journal = {Proc. {ACM} Program. Lang.}, volume = {6}, number = {{POPL}}, pages = {1--30}, year = {2022}, url = {https://doi.org/10.1145/3498688}, doi = {10.1145/3498688}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmpl/KolosickNJWLGJS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/El-KorashyBTDGH22, author = {Akram El{-}Korashy and Roberto Blanco and J{\'{e}}r{\'{e}}my Thibault and Adrien Durier and Deepak Garg and Catalin Hritcu}, title = {SecurePtrs: Proving Secure Compilation with Data-Flow Back-Translation and Turn-Taking Simulation}, booktitle = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa, Israel, August 7-10, 2022}, pages = {64--79}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSF54842.2022.9919680}, doi = {10.1109/CSF54842.2022.9919680}, timestamp = {Fri, 11 Nov 2022 16:53:14 +0100}, biburl = {https://dblp.org/rec/conf/csfw/El-KorashyBTDGH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/SammlerHL0PD0S22, author = {Michael Sammler and Angus Hammond and Rodolphe Lepigre and Brian Campbell and Jean Pichon{-}Pharabod and Derek Dreyer and Deepak Garg and Peter Sewell}, editor = {Ranjit Jhala and Isil Dillig}, title = {Islaris: verification of machine code against authoritative {ISA} semantics}, booktitle = {{PLDI} '22: 43rd {ACM} {SIGPLAN} International Conference on Programming Language Design and Implementation, San Diego, CA, USA, June 13 - 17, 2022}, pages = {825--840}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3519939.3523434}, doi = {10.1145/3519939.3523434}, timestamp = {Fri, 03 Jun 2022 08:25:37 +0200}, biburl = {https://dblp.org/rec/conf/pldi/SammlerHL0PD0S22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MehtaAVBD022, author = {Aastha Mehta and Mohamed Alzayat and Roberta De Viti and Bj{\"{o}}rn B. Brandenburg and Peter Druschel and Deepak Garg}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {2819--2838}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/mehta}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/MehtaAVBD022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-11458, author = {Mohamed Alzayat and Jonathan Mace and Peter Druschel and Deepak Garg}, title = {Groundhog: Efficient Request Isolation in FaaS}, journal = {CoRR}, volume = {abs/2205.11458}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.11458}, doi = {10.48550/ARXIV.2205.11458}, eprinttype = {arXiv}, eprint = {2205.11458}, timestamp = {Mon, 30 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-11458.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-03784, author = {Roberta De Viti and Isaac Sheff and Noemi Glaeser and Baltasar Dinis and Rodrigo Rodrigues and Jonathan Katz and Bobby Bhattacharjee and Anwar Hithnawi and Deepak Garg and Peter Druschel}, title = {CoVault: {A} Secure Analytics Platform}, journal = {CoRR}, volume = {abs/2208.03784}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.03784}, doi = {10.48550/ARXIV.2208.03784}, eprinttype = {arXiv}, eprint = {2208.03784}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-03784.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-13560, author = {Marco Vassena and Alejandro Russo and Deepak Garg and Vineet Rajani and Deian Stefan}, title = {From Fine- to Coarse-Grained Dynamic Information Flow Control and Back, a Tutorial on Dynamic Information Flow}, journal = {CoRR}, volume = {abs/2208.13560}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.13560}, doi = {10.48550/ARXIV.2208.13560}, eprinttype = {arXiv}, eprint = {2208.13560}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-13560.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BichhawatRGH21, author = {Abhishek Bichhawat and Vineet Rajani and Deepak Garg and Christian Hammer}, title = {Permissive runtime information flow control in the presence of exceptions}, journal = {J. Comput. Secur.}, volume = {29}, number = {4}, pages = {361--401}, year = {2021}, url = {https://doi.org/10.3233/JCS-211385}, doi = {10.3233/JCS-211385}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BichhawatRGH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfp/QuGG21, author = {Weihao Qu and Marco Gaboardi and Deepak Garg}, title = {Relational cost analysis in a functional-imperative setting}, journal = {J. Funct. Program.}, volume = {31}, pages = {e27}, year = {2021}, url = {https://doi.org/10.1017/S0956796821000071}, doi = {10.1017/S0956796821000071}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jfp/QuGG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/AguirreBGGKS21, author = {Alejandro Aguirre and Gilles Barthe and Marco Gaboardi and Deepak Garg and Shin{-}ya Katsumata and Tetsuya Sato}, title = {Higher-order probabilistic adversarial computations: categorical semantics and program logics}, journal = {Proc. {ACM} Program. Lang.}, volume = {5}, number = {{ICFP}}, pages = {1--30}, year = {2021}, url = {https://doi.org/10.1145/3473598}, doi = {10.1145/3473598}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmpl/AguirreBGGKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/RajaniG0021, author = {Vineet Rajani and Marco Gaboardi and Deepak Garg and Jan Hoffmann}, title = {A unifying type-theory for higher-order (amortized) cost analysis}, journal = {Proc. {ACM} Program. Lang.}, volume = {5}, number = {{POPL}}, pages = {1--28}, year = {2021}, url = {https://doi.org/10.1145/3434308}, doi = {10.1145/3434308}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmpl/RajaniG0021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/PatrignaniG21, author = {Marco Patrignani and Deepak Garg}, title = {Robustly Safe Compilation, an Efficient Form of Secure Compilation}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {43}, number = {1}, pages = {1:1--1:41}, year = {2021}, url = {https://doi.org/10.1145/3436809}, doi = {10.1145/3436809}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toplas/PatrignaniG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/AbateBCDGHPTT21, author = {Carmine Abate and Roberto Blanco and {\c{S}}tefan Ciob{\^{a}}c{\u{a}} and Adrien Durier and Deepak Garg and Catalin Hritcu and Marco Patrignani and {\'{E}}ric Tanter and J{\'{e}}r{\'{e}}my Thibault}, title = {An Extended Account of Trace-relating Compiler Correctness and Secure Compilation}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {43}, number = {4}, pages = {14:1--14:48}, year = {2021}, url = {https://doi.org/10.1145/3460860}, doi = {10.1145/3460860}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toplas/AbateBCDGHPTT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/El-Korashy0PD0P21, author = {Akram El{-}Korashy and Stelios Tsampas and Marco Patrignani and Dominique Devriese and Deepak Garg and Frank Piessens}, title = {CapablePtrs: Securely Compiling Partial Programs Using the Pointers-as-Capabilities Principle}, booktitle = {34th {IEEE} Computer Security Foundations Symposium, {CSF} 2021, Dubrovnik, Croatia, June 21-25, 2021}, pages = {1--16}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSF51468.2021.00036}, doi = {10.1109/CSF51468.2021.00036}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/El-Korashy0PD0P21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Kunnemann0021, author = {Robert K{\"{u}}nnemann and Deepak Garg and Michael Backes}, title = {Accountability in the Decentralised-Adversary Setting}, booktitle = {34th {IEEE} Computer Security Foundations Symposium, {CSF} 2021, Dubrovnik, Croatia, June 21-25, 2021}, pages = {1--16}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSF51468.2021.00007}, doi = {10.1109/CSF51468.2021.00007}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Kunnemann0021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/SammlerLKMD021, author = {Michael Sammler and Rodolphe Lepigre and Robbert Krebbers and Kayvan Memarian and Derek Dreyer and Deepak Garg}, editor = {Stephen N. Freund and Eran Yahav}, title = {RefinedC: automating the foundational verification of {C} code with refined ownership types}, booktitle = {{PLDI} '21: 42nd {ACM} {SIGPLAN} International Conference on Programming Language Design and Implementation, Virtual Event, Canada, June 20-25, 2021}, pages = {158--174}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3453483.3454036}, doi = {10.1145/3453483.3454036}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/SammlerLKMD021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-00033, author = {Matthew Kolosick and Shravan Narayan and Conrad Watt and Michael LeMay and Deepak Garg and Ranjit Jhala and Deian Stefan}, title = {Isolation Without Taxation: Near Zero Cost Transitions for {SFI}}, journal = {CoRR}, volume = {abs/2105.00033}, year = {2021}, url = {https://arxiv.org/abs/2105.00033}, eprinttype = {arXiv}, eprint = {2105.00033}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-00033.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-01155, author = {Alejandro Aguirre and Gilles Barthe and Marco Gaboardi and Deepak Garg and Shin{-}ya Katsumata and Tetsuya Sato}, title = {Higher-order probabilistic adversarial computations: Categorical semantics and program logics}, journal = {CoRR}, volume = {abs/2107.01155}, year = {2021}, url = {https://arxiv.org/abs/2107.01155}, eprinttype = {arXiv}, eprint = {2107.01155}, timestamp = {Mon, 11 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-01155.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-01439, author = {Akram El{-}Korashy and Roberto Blanco and J{\'{e}}r{\'{e}}my Thibault and Adrien Durier and Deepak Garg and Catalin Hritcu}, title = {SecurePtrs: Proving Secure Compilation with Data-Flow Back-Translation and Turn-Taking Simulation}, journal = {CoRR}, volume = {abs/2110.01439}, year = {2021}, url = {https://arxiv.org/abs/2110.01439}, eprinttype = {arXiv}, eprint = {2110.01439}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-01439.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-03484, author = {Andrew K. Hirsch and Deepak Garg}, title = {Pirouette: Higher-Order Typed Functional Choreographies}, journal = {CoRR}, volume = {abs/2111.03484}, year = {2021}, url = {https://arxiv.org/abs/2111.03484}, eprinttype = {arXiv}, eprint = {2111.03484}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-03484.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/ChisnallGHP21, author = {David Chisnall and Deepak Garg and Catalin Hritcu and Mathias Payer}, title = {Secure Compilation (Dagstuhl Seminar 21481)}, journal = {Dagstuhl Reports}, volume = {11}, number = {10}, pages = {173--204}, year = {2021}, url = {https://doi.org/10.4230/DagRep.11.10.173}, doi = {10.4230/DAGREP.11.10.173}, timestamp = {Wed, 20 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/ChisnallGHP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/RajaniG20, author = {Vineet Rajani and Deepak Garg}, title = {On the expressiveness and semantics of information flow types}, journal = {J. Comput. Secur.}, volume = {28}, number = {1}, pages = {129--156}, year = {2020}, url = {https://doi.org/10.3233/JCS-191382}, doi = {10.3233/JCS-191382}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/RajaniG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/SammlerGDL20, author = {Michael Sammler and Deepak Garg and Derek Dreyer and Tadeusz Litak}, title = {The high-level benefits of low-level sandboxing}, journal = {Proc. {ACM} Program. Lang.}, volume = {4}, number = {{POPL}}, pages = {32:1--32:32}, year = {2020}, url = {https://doi.org/10.1145/3371100}, doi = {10.1145/3371100}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmpl/SammlerGDL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/AbateBCD0HPTT20, author = {Carmine Abate and Roberto Blanco and {\c{S}}tefan Ciob{\^{a}}c{\u{a}} and Adrien Durier and Deepak Garg and Catalin Hritcu and Marco Patrignani and {\'{E}}ric Tanter and J{\'{e}}r{\'{e}}my Thibault}, editor = {Peter M{\"{u}}ller}, title = {Trace-Relating Compiler Correctness and Secure Compilation}, booktitle = {Programming Languages and Systems - 29th European Symposium on Programming, {ESOP} 2020, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2020, Dublin, Ireland, April 25-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12075}, pages = {1--28}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-44914-8\_1}, doi = {10.1007/978-3-030-44914-8\_1}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esop/AbateBCD0HPTT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ArunK0DB20, author = {Venkat Arun and Aniket Kate and Deepak Garg and Peter Druschel and Bobby Bhattacharjee}, title = {Finding Safety in Numbers with Secure Allegation Escrows}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/finding-safety-in-numbers-with-secure-allegation-escrows/}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ArunK0DB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-05944, author = {Akram El{-}Korashy and Stelios Tsampas and Marco Patrignani and Dominique Devriese and Deepak Garg and Frank Piessens}, title = {CapablePtrs: Securely Compiling Partial Programs using the Pointers-as-Capabilities Principle}, journal = {CoRR}, volume = {abs/2005.05944}, year = {2020}, url = {https://arxiv.org/abs/2005.05944}, eprinttype = {arXiv}, eprint = {2005.05944}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-05944.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-08069, author = {Gilles Barthe and Roberta De Viti and Peter Druschel and Deepak Garg and Manuel Gomez{-}Rodriguez and Pierfrancesco Ingo and Matthew Lentz and Aastha Mehta and Bernhard Sch{\"{o}}lkopf}, title = {PanCast: Listening to Bluetooth Beacons for Epidemic Risk Mitigation}, journal = {CoRR}, volume = {abs/2011.08069}, year = {2020}, url = {https://arxiv.org/abs/2011.08069}, eprinttype = {arXiv}, eprint = {2011.08069}, timestamp = {Wed, 18 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-08069.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfp/AguirreBGGS19, author = {Alejandro Aguirre and Gilles Barthe and Marco Gaboardi and Deepak Garg and Pierre{-}Yves Strub}, title = {A relational logic for higher-order programs}, journal = {J. Funct. Program.}, volume = {29}, pages = {e16}, year = {2019}, url = {https://doi.org/10.1017/S0956796819000145}, doi = {10.1017/S0956796819000145}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jfp/AguirreBGGS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/QuG019, author = {Weihao Qu and Marco Gaboardi and Deepak Garg}, title = {Relational cost analysis for functional-imperative programs}, journal = {Proc. {ACM} Program. Lang.}, volume = {3}, number = {{ICFP}}, pages = {92:1--92:29}, year = {2019}, url = {https://doi.org/10.1145/3341696}, doi = {10.1145/3341696}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmpl/QuG019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/SatoABGGH19, author = {Tetsuya Sato and Alejandro Aguirre and Gilles Barthe and Marco Gaboardi and Deepak Garg and Justin Hsu}, title = {Formal verification of higher-order probabilistic programs: reasoning about approximation, convergence, Bayesian inference, and optimization}, journal = {Proc. {ACM} Program. Lang.}, volume = {3}, number = {{POPL}}, pages = {38:1--38:30}, year = {2019}, url = {https://doi.org/10.1145/3290351}, doi = {10.1145/3290351}, timestamp = {Mon, 11 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pacmpl/SatoABGGH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/VassenaRGRS19, author = {Marco Vassena and Alejandro Russo and Deepak Garg and Vineet Rajani and Deian Stefan}, title = {From fine- to coarse-grained dynamic information flow control and back}, journal = {Proc. {ACM} Program. Lang.}, volume = {3}, number = {{POPL}}, pages = {76:1--76:31}, year = {2019}, url = {https://doi.org/10.1145/3290389}, doi = {10.1145/3290389}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pacmpl/VassenaRGRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/AbateB0HPT19, author = {Carmine Abate and Roberto Blanco and Deepak Garg and Catalin Hritcu and Marco Patrignani and J{\'{e}}r{\'{e}}my Thibault}, title = {Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {256--271}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00025}, doi = {10.1109/CSF.2019.00025}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/AbateB0HPT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/PatrignaniG19, author = {Marco Patrignani and Deepak Garg}, editor = {Lu{\'{\i}}s Caires}, title = {Robustly Safe Compilation}, booktitle = {Programming Languages and Systems - 28th European Symposium on Programming, {ESOP} 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11423}, pages = {469--498}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17184-1\_17}, doi = {10.1007/978-3-030-17184-1\_17}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esop/PatrignaniG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/Brahmakshatriya19, author = {Ajay Brahmakshatriya and Piyus Kedia and Derrick Paul McKee and Deepak Garg and Akash Lal and Aseem Rastogi and Hamed Nemati and Anmol Panda and Pratik Bhatu}, editor = {George Candea and Robbert van Renesse and Christof Fetzer}, title = {ConfLLVM: {A} Compiler for Enforcing Data Confidentiality in Low-Level Code}, booktitle = {Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019}, pages = {4:1--4:15}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3302424.3303952}, doi = {10.1145/3302424.3303952}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosys/Brahmakshatriya19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotos/Litton0DB19, author = {James Litton and Deepak Garg and Peter Druschel and Bobby Bhattacharjee}, title = {Composing Abstractions using the null-Kernel}, booktitle = {Proceedings of the Workshop on Hot Topics in Operating Systems, HotOS 2019, Bertinoro, Italy, May 13-15, 2019}, pages = {1--6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317550.3321450}, doi = {10.1145/3317550.3321450}, timestamp = {Wed, 29 May 2019 13:38:37 +0200}, biburl = {https://dblp.org/rec/conf/hotos/Litton0DB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/CicekQBG019, author = {Ezgi {\c{C}}i{\c{c}}ek and Weihao Qu and Gilles Barthe and Marco Gaboardi and Deepak Garg}, editor = {Kathryn S. McKinley and Kathleen Fisher}, title = {Bidirectional type checking for relational properties}, booktitle = {Proceedings of the 40th {ACM} {SIGPLAN} Conference on Programming Language Design and Implementation, {PLDI} 2019, Phoenix, AZ, USA, June 22-26, 2019}, pages = {533--547}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3314221.3314603}, doi = {10.1145/3314221.3314603}, timestamp = {Sun, 09 Jun 2019 18:52:19 +0200}, biburl = {https://dblp.org/rec/conf/pldi/CicekQBG019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Vahldiek-Oberwagner19, author = {Anjo Vahldiek{-}Oberwagner and Eslam Elnikety and Nuno O. Duarte and Michael Sammler and Peter Druschel and Deepak Garg}, editor = {Nadia Heninger and Patrick Traynor}, title = {{ERIM:} Secure, Efficient In-process Isolation with Protection Keys {(MPK)}}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1221--1238}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/vahldiek-oberwagner}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/Vahldiek-Oberwagner19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/abs-1910-14219, author = {Robert K{\"{u}}nnemann and Deepak Garg and Michael Backes}, editor = {Georgiana Caltais and Jean Krivine}, title = {Causality {\&} Control Flow}, booktitle = {Proceedings of the 4th Workshop on Formal Reasoning about Causation, Responsibility, and Explanations in Science and Technology, CREST@ETAPS 2019, Prague, Czech Republic, 7th April 2019}, series = {{EPTCS}}, volume = {308}, pages = {32--46}, year = {2019}, url = {https://doi.org/10.4204/EPTCS.308.3}, doi = {10.4204/EPTCS.308.3}, timestamp = {Thu, 19 Dec 2019 15:19:10 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-14219.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iciss/2019, editor = {Deepak Garg and N. V. Narendra Kumar and Rudrapatna K. Shyamasundar}, title = {Information Systems Security - 15th International Conference, {ICISS} 2019, Hyderabad, India, December 16-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11952}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36945-3}, doi = {10.1007/978-3-030-36945-3}, isbn = {978-3-030-36944-6}, timestamp = {Thu, 12 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-05320, author = {Carmine Abate and Roberto Blanco and {\c{S}}tefan Ciob{\^{a}}c{\u{a}} and Deepak Garg and Catalin Hritcu and Marco Patrignani and {\'{E}}ric Tanter and J{\'{e}}r{\'{e}}my Thibault}, title = {Trace-Relating Compiler Correctness and Secure Compilation}, journal = {CoRR}, volume = {abs/1907.05320}, year = {2019}, url = {http://arxiv.org/abs/1907.05320}, eprinttype = {arXiv}, eprint = {1907.05320}, timestamp = {Wed, 17 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-05320.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-11568, author = {Aastha Mehta and Mohamed Alzayat and Roberta De Viti and Bj{\"{o}}rn B. Brandenburg and Peter Druschel and Deepak Garg}, title = {Pacer: Network Side-Channel Mitigation in the Cloud}, journal = {CoRR}, volume = {abs/1908.11568}, year = {2019}, url = {http://arxiv.org/abs/1908.11568}, eprinttype = {arXiv}, eprint = {1908.11568}, timestamp = {Wed, 04 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-11568.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/RadicekBG0Z18, author = {Ivan Radicek and Gilles Barthe and Marco Gaboardi and Deepak Garg and Florian Zuleger}, title = {Monadic refinements for relational cost analysis}, journal = {Proc. {ACM} Program. Lang.}, volume = {2}, number = {{POPL}}, pages = {36:1--36:32}, year = {2018}, url = {https://doi.org/10.1145/3158124}, doi = {10.1145/3158124}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pacmpl/RadicekBG0Z18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Rajani018, author = {Vineet Rajani and Deepak Garg}, title = {Types for Information Flow Control: Labeling Granularity and Semantic Models}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {233--246}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00024}, doi = {10.1109/CSF.2018.00024}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Rajani018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/0001BBBG018, author = {Alejandro Aguirre and Gilles Barthe and Lars Birkedal and Ales Bizjak and Marco Gaboardi and Deepak Garg}, editor = {Amal Ahmed}, title = {Relational Reasoning for Markov Chains in a Probabilistic Guarded Lambda Calculus}, booktitle = {Programming Languages and Systems - 27th European Symposium on Programming, {ESOP} 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10801}, pages = {214--241}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89884-1\_8}, doi = {10.1007/978-3-319-89884-1\_8}, timestamp = {Tue, 05 Jul 2022 08:30:25 +0200}, biburl = {https://dblp.org/rec/conf/esop/0001BBBG018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/MunzEMFG18, author = {Reinhard Munz and Fabienne Eigner and Matteo Maffei and Paul Francis and Deepak Garg}, editor = {Lujo Bauer and Ralf K{\"{u}}sters}, title = {UniTraX: Protecting Data Privacy with Discoverable Biases}, booktitle = {Principles of Security and Trust - 7th International Conference, {POST} 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10804}, pages = {278--299}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89722-6\_12}, doi = {10.1007/978-3-319-89722-6\_12}, timestamp = {Fri, 31 Jan 2020 21:32:30 +0100}, biburl = {https://dblp.org/rec/conf/post/MunzEMFG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-04565, author = {Eslam Elnikety and Deepak Garg and Peter Druschel}, title = {Shai: Enforcing Data-Specific Policies with Near-Zero Runtime Overhead}, journal = {CoRR}, volume = {abs/1801.04565}, year = {2018}, url = {http://arxiv.org/abs/1801.04565}, eprinttype = {arXiv}, eprint = {1801.04565}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-04565.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-06822, author = {Anjo Vahldiek{-}Oberwagner and Eslam Elnikety and Deepak Garg and Peter Druschel}, title = {{ERIM:} Secure and Efficient In-process Isolation with Memory Protection Keys}, journal = {CoRR}, volume = {abs/1801.06822}, year = {2018}, url = {http://arxiv.org/abs/1801.06822}, eprinttype = {arXiv}, eprint = {1801.06822}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-06822.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-09787, author = {Alejandro Aguirre and Gilles Barthe and Lars Birkedal and Ales Bizjak and Marco Gaboardi and Deepak Garg}, title = {Relational Reasoning for Markov Chains in a Probabilistic Guarded Lambda Calculus}, journal = {CoRR}, volume = {abs/1802.09787}, year = {2018}, url = {http://arxiv.org/abs/1802.09787}, eprinttype = {arXiv}, eprint = {1802.09787}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-09787.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-00489, author = {Marco Patrignani and Deepak Garg}, title = {Robustly Safe Compilation or, Efficient, Provably Secure Compilation}, journal = {CoRR}, volume = {abs/1804.00489}, year = {2018}, url = {http://arxiv.org/abs/1804.00489}, eprinttype = {arXiv}, eprint = {1804.00489}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-00489.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-00120, author = {Vineet Rajani and Deepak Garg}, title = {Types for Information Flow Control: Labeling Granularity and Semantic Models}, journal = {CoRR}, volume = {abs/1805.00120}, year = {2018}, url = {http://arxiv.org/abs/1805.00120}, eprinttype = {arXiv}, eprint = {1805.00120}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-00120.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-04603, author = {Carmine Abate and Roberto Blanco and Deepak Garg and Catalin Hritcu and Marco Patrignani and J{\'{e}}r{\'{e}}my Thibault}, title = {Exploring Robust Property Preservation for Secure Compilation}, journal = {CoRR}, volume = {abs/1807.04603}, year = {2018}, url = {http://arxiv.org/abs/1807.04603}, eprinttype = {arXiv}, eprint = {1807.04603}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-04603.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-06091, author = {Tetsuya Sato and Alejandro Aguirre and Gilles Barthe and Marco Gaboardi and Deepak Garg and Justin Hsu}, title = {Formal verification of higher-order probabilistic programs}, journal = {CoRR}, volume = {abs/1807.06091}, year = {2018}, url = {http://arxiv.org/abs/1807.06091}, eprinttype = {arXiv}, eprint = {1807.06091}, timestamp = {Mon, 11 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-06091.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-10123, author = {Venkat Arun and Aniket Kate and Deepak Garg and Peter Druschel and Bobby Bhattacharjee}, title = {{SATE:} Robust and Private Allegation Escrows}, journal = {CoRR}, volume = {abs/1810.10123}, year = {2018}, url = {http://arxiv.org/abs/1810.10123}, eprinttype = {arXiv}, eprint = {1810.10123}, timestamp = {Wed, 31 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-10123.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-04090, author = {Weihao Qu and Marco Gaboardi and Deepak Garg}, title = {Relational Cost Analysis for Functional-Imperative Programs}, journal = {CoRR}, volume = {abs/1812.04090}, year = {2018}, url = {http://arxiv.org/abs/1812.04090}, eprinttype = {arXiv}, eprint = {1812.04090}, timestamp = {Tue, 01 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-04090.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-05067, author = {Ezgi {\c{C}}i{\c{c}}ek and Weihao Qu and Gilles Barthe and Marco Gaboardi and Deepak Garg}, title = {Bidirectional Type Checking for Relational Properties}, journal = {CoRR}, volume = {abs/1812.05067}, year = {2018}, url = {http://arxiv.org/abs/1812.05067}, eprinttype = {arXiv}, eprint = {1812.05067}, timestamp = {Tue, 01 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-05067.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/Ahmed0HP18, author = {Amal Ahmed and Deepak Garg and Catalin Hritcu and Frank Piessens}, title = {Secure Compilation (Dagstuhl Seminar 18201)}, journal = {Dagstuhl Reports}, volume = {8}, number = {5}, pages = {1--30}, year = {2018}, url = {https://doi.org/10.4230/DagRep.8.5.1}, doi = {10.4230/DAGREP.8.5.1}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/Ahmed0HP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KunnemannG018, author = {Robert K{\"{u}}nnemann and Deepak Garg and Michael Backes}, title = {Accountability in Security Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {127}, year = {2018}, url = {http://eprint.iacr.org/2018/127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KunnemannG018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/AguirreBG0S17, author = {Alejandro Aguirre and Gilles Barthe and Marco Gaboardi and Deepak Garg and Pierre{-}Yves Strub}, title = {A relational logic for higher-order programs}, journal = {Proc. {ACM} Program. Lang.}, volume = {1}, number = {{ICFP}}, pages = {21:1--21:29}, year = {2017}, url = {https://doi.org/10.1145/3110265}, doi = {10.1145/3110265}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmpl/AguirreBG0S17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/Swasey0D17, author = {David Swasey and Deepak Garg and Derek Dreyer}, title = {Robust and compositional verification of object capability patterns}, journal = {Proc. {ACM} Program. Lang.}, volume = {1}, number = {{OOPSLA}}, pages = {89:1--89:26}, year = {2017}, url = {https://doi.org/10.1145/3133913}, doi = {10.1145/3133913}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmpl/Swasey0D17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siglog/RajaniBRG17, author = {Vineet Rajani and Iulia Bastys and Willard Rafnsson and Deepak Garg}, title = {Type systems for information flow control: the question of granularity}, journal = {{ACM} {SIGLOG} News}, volume = {4}, number = {1}, pages = {6--21}, year = {2017}, url = {https://doi.org/10.1145/3051528.3051531}, doi = {10.1145/3051528.3051531}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siglog/RajaniBRG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/PatrignaniG17, author = {Marco Patrignani and Deepak Garg}, title = {Secure Compilation and Hyperproperty Preservation}, booktitle = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa Barbara, CA, USA, August 21-25, 2017}, pages = {392--404}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSF.2017.13}, doi = {10.1109/CSF.2017.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/PatrignaniG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BichhawatRJGH17, author = {Abhishek Bichhawat and Vineet Rajani and Jinank Jain and Deepak Garg and Christian Hammer}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {WebPol: Fine-Grained Information Flow Policies for Web Browsers}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10492}, pages = {242--259}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66402-6\_15}, doi = {10.1007/978-3-319-66402-6\_15}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BichhawatRJGH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/CicekBG0H17, author = {Ezgi {\c{C}}i{\c{c}}ek and Gilles Barthe and Marco Gaboardi and Deepak Garg and Jan Hoffmann}, editor = {Giuseppe Castagna and Andrew D. Gordon}, title = {Relational cost analysis}, booktitle = {Proceedings of the 44th {ACM} {SIGPLAN} Symposium on Principles of Programming Languages, {POPL} 2017, Paris, France, January 18-20, 2017}, pages = {316--329}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3009837.3009858}, doi = {10.1145/3009837.3009858}, timestamp = {Mon, 05 Feb 2024 20:33:37 +0100}, biburl = {https://dblp.org/rec/conf/popl/CicekBG0H17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MehtaEH0D17, author = {Aastha Mehta and Eslam Elnikety and Katura Harvey and Deepak Garg and Peter Druschel}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Qapla: Policy compliance for database-backed systems}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {1463--1479}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/mehta}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/MehtaEH0D17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AguirreBG0S17, author = {Alejandro Aguirre and Gilles Barthe and Marco Gaboardi and Deepak Garg and Pierre{-}Yves Strub}, title = {A Relational Logic for Higher-Order Programs}, journal = {CoRR}, volume = {abs/1703.05042}, year = {2017}, url = {http://arxiv.org/abs/1703.05042}, eprinttype = {arXiv}, eprint = {1703.05042}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AguirreBG0S17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BichhawatRJ0017, author = {Abhishek Bichhawat and Vineet Rajani and Jinank Jain and Deepak Garg and Christian Hammer}, title = {WebPol: Fine-grained Information Flow Policies for Web Browsers}, journal = {CoRR}, volume = {abs/1706.06932}, year = {2017}, url = {http://arxiv.org/abs/1706.06932}, eprinttype = {arXiv}, eprint = {1706.06932}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BichhawatRJ0017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1710-07309, author = {Deepak Garg and Catalin Hritcu and Marco Patrignani and Marco Stronati and David Swasey}, title = {Robust Hyperproperty Preservation for Secure Compilation (Extended Abstract)}, journal = {CoRR}, volume = {abs/1710.07309}, year = {2017}, url = {http://arxiv.org/abs/1710.07309}, eprinttype = {arXiv}, eprint = {1710.07309}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1710-07309.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-11396, author = {Ajay Brahmakshatriya and Piyus Kedia and Derrick Paul McKee and Pratik Bhatu and Deepak Garg and Akash Lal and Aseem Rastogi}, title = {An Instrumenting Compiler for Enforcing Confidentiality in Low-Level Code}, journal = {CoRR}, volume = {abs/1711.11396}, year = {2017}, url = {http://arxiv.org/abs/1711.11396}, eprinttype = {arXiv}, eprint = {1711.11396}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-11396.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeGKT17, author = {Sanjit Chatterjee and Deepak Garg and Aniket Kate and Tobias Theobald}, title = {Encrypting Messages for Incomplete Chains of Certificates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {777}, year = {2017}, url = {http://eprint.iacr.org/2017/777}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeGKT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/PereraGC16, author = {Roly Perera and Deepak Garg and James Cheney}, editor = {Jos{\'{e}}e Desharnais and Radha Jagadeesan}, title = {Causally Consistent Dynamic Slicing}, booktitle = {27th International Conference on Concurrency Theory, {CONCUR} 2016, August 23-26, 2016, Qu{\'{e}}bec City, Canada}, series = {LIPIcs}, volume = {59}, pages = {18:1--18:15}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2016}, url = {https://doi.org/10.4230/LIPIcs.CONCUR.2016.18}, doi = {10.4230/LIPICS.CONCUR.2016.18}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/concur/PereraGC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Rajani0R16, author = {Vineet Rajani and Deepak Garg and Tamara Rezk}, title = {On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks}, booktitle = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon, Portugal, June 27 - July 1, 2016}, pages = {150--163}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CSF.2016.18}, doi = {10.1109/CSF.2016.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Rajani0R16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/Rafnsson0S16, author = {Willard Rafnsson and Deepak Garg and Andrei Sabelfeld}, editor = {Juan Caballero and Eric Bodden and Elias Athanasopoulos}, title = {Progress-Sensitive Security for {SPARK}}, booktitle = {Engineering Secure Software and Systems - 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9639}, pages = {20--37}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-30806-7\_2}, doi = {10.1007/978-3-319-30806-7\_2}, timestamp = {Tue, 01 Jun 2021 15:22:49 +0200}, biburl = {https://dblp.org/rec/conf/essos/Rafnsson0S16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfp/CicekP016, author = {Ezgi {\c{C}}i{\c{c}}ek and Zoe Paraskevopoulou and Deepak Garg}, editor = {Jacques Garrigue and Gabriele Keller and Eijiro Sumii}, title = {A type theory for incremental computational complexity with control flow changes}, booktitle = {Proceedings of the 21st {ACM} {SIGPLAN} International Conference on Functional Programming, {ICFP} 2016, Nara, Japan, September 18-22, 2016}, pages = {132--145}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2951913.2951950}, doi = {10.1145/2951913.2951950}, timestamp = {Wed, 23 Jun 2021 15:34:31 +0200}, biburl = {https://dblp.org/rec/conf/icfp/CicekP016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/osdi/LittonVE0BD16, author = {James Litton and Anjo Vahldiek{-}Oberwagner and Eslam Elnikety and Deepak Garg and Bobby Bhattacharjee and Peter Druschel}, editor = {Kimberly Keeton and Timothy Roscoe}, title = {Light-Weight Contexts: An {OS} Abstraction for Safety and Performance}, booktitle = {12th {USENIX} Symposium on Operating Systems Design and Implementation, {OSDI} 2016, Savannah, GA, USA, November 2-4, 2016}, pages = {49--64}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/osdi16/technical-sessions/presentation/litton}, timestamp = {Tue, 02 Feb 2021 08:06:02 +0100}, biburl = {https://dblp.org/rec/conf/osdi/LittonVE0BD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/Bolosteanu016, author = {Iulia Bolosteanu and Deepak Garg}, editor = {Frank Piessens and Luca Vigan{\`{o}}}, title = {Asymmetric Secure Multi-execution with Declassification}, booktitle = {Principles of Security and Trust - 5th International Conference, {POST} 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9635}, pages = {24--45}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49635-0\_2}, doi = {10.1007/978-3-662-49635-0\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/post/Bolosteanu016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ElniketyMV0D16, author = {Eslam Elnikety and Aastha Mehta and Anjo Vahldiek{-}Oberwagner and Deepak Garg and Peter Druschel}, editor = {Thorsten Holz and Stefan Savage}, title = {Thoth: Comprehensive Policy Compliance in Data Retrieval Systems}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {637--654}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/elnikety}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/ElniketyMV0D16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Perera0C16, author = {Roly Perera and Deepak Garg and James Cheney}, title = {Causally consistent dynamic slicing}, journal = {CoRR}, volume = {abs/1610.02327}, year = {2016}, url = {http://arxiv.org/abs/1610.02327}, eprinttype = {arXiv}, eprint = {1610.02327}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Perera0C16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Chowdhury0JD15, author = {Omar Chowdhury and Deepak Garg and Limin Jia and Anupam Datta}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1130--1143}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813638}, doi = {10.1145/2810103.2813638}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Chowdhury0JD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Datta0KSS15, author = {Anupam Datta and Deepak Garg and Dilsun Kirli Kaynar and Divya Sharma and Arunesh Sinha}, editor = {C{\'{e}}dric Fournet and Michael W. Hicks and Luca Vigan{\`{o}}}, title = {Program Actions as Actual Causes: {A} Building Block for Accountability}, booktitle = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona, Italy, 13-17 July, 2015}, pages = {261--275}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSF.2015.25}, doi = {10.1109/CSF.2015.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Datta0KSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/RajaniB0015, author = {Vineet Rajani and Abhishek Bichhawat and Deepak Garg and Christian Hammer}, editor = {C{\'{e}}dric Fournet and Michael W. Hicks and Luca Vigan{\`{o}}}, title = {Information Flow Control for Event Handling and the {DOM} in Web Browsers}, booktitle = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona, Italy, 13-17 July, 2015}, pages = {366--379}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSF.2015.32}, doi = {10.1109/CSF.2015.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/RajaniB0015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/JiaS0D15, author = {Limin Jia and Shayak Sen and Deepak Garg and Anupam Datta}, editor = {C{\'{e}}dric Fournet and Michael W. Hicks and Luca Vigan{\`{o}}}, title = {A Logic of Programs with Interface-Confined Code}, booktitle = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona, Italy, 13-17 July, 2015}, pages = {512--525}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSF.2015.38}, doi = {10.1109/CSF.2015.38}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/JiaS0D15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/CicekGA15, author = {Ezgi {\c{C}}i{\c{c}}ek and Deepak Garg and Umut A. Acar}, editor = {Jan Vitek}, title = {Refinement Types for Incremental Computational Complexity}, booktitle = {Programming Languages and Systems - 24th European Symposium on Programming, {ESOP} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9032}, pages = {406--431}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46669-8\_17}, doi = {10.1007/978-3-662-46669-8\_17}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esop/CicekGA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/Vahldiek-Oberwagner15, author = {Anjo Vahldiek{-}Oberwagner and Eslam Elnikety and Aastha Mehta and Deepak Garg and Peter Druschel and Rodrigo Rodrigues and Johannes Gehrke and Ansley Post}, editor = {Laurent R{\'{e}}veill{\`{e}}re and Tim Harris and Maurice Herlihy}, title = {Guardat: enforcing data policies at the storage layer}, booktitle = {Proceedings of the Tenth European Conference on Computer Systems, EuroSys 2015, Bordeaux, France, April 21-24, 2015}, pages = {13:1--13:16}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2741948.2741958}, doi = {10.1145/2741948.2741958}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/Vahldiek-Oberwagner15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JiaS0D15, author = {Limin Jia and Shayak Sen and Deepak Garg and Anupam Datta}, title = {System {M:} {A} Program Logic for Code Sandboxing and Identification}, journal = {CoRR}, volume = {abs/1501.05673}, year = {2015}, url = {http://arxiv.org/abs/1501.05673}, eprinttype = {arXiv}, eprint = {1501.05673}, timestamp = {Sun, 16 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JiaS0D15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Datta0KSS15a, author = {Anupam Datta and Deepak Garg and Dilsun Kirli Kaynar and Divya Sharma and Arunesh Sinha}, title = {Program Actions as Actual Causes: {A} Building Block for Accountability}, journal = {CoRR}, volume = {abs/1505.01131}, year = {2015}, url = {http://arxiv.org/abs/1505.01131}, eprinttype = {arXiv}, eprint = {1505.01131}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Datta0KSS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BichhawatR0H15, author = {Abhishek Bichhawat and Vineet Rajani and Deepak Garg and Christian Hammer}, title = {Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis}, journal = {CoRR}, volume = {abs/1506.03950}, year = {2015}, url = {http://arxiv.org/abs/1506.03950}, eprinttype = {arXiv}, eprint = {1506.03950}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BichhawatR0H15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Chowdhury0JD15, author = {Omar Chowdhury and Deepak Garg and Limin Jia and Anupam Datta}, title = {Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits}, journal = {CoRR}, volume = {abs/1508.02448}, year = {2015}, url = {http://arxiv.org/abs/1508.02448}, eprinttype = {arXiv}, eprint = {1508.02448}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Chowdhury0JD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/ChowdhuryJGD14, author = {Omar Chowdhury and Limin Jia and Deepak Garg and Anupam Datta}, editor = {Armin Biere and Roderick Bloem}, title = {Temporal Mode-Checking for Runtime Monitoring of Privacy Policies}, booktitle = {Computer Aided Verification - 26th International Conference, {CAV} 2014, Held as Part of the Vienna Summer of Logic, {VSL} 2014, Vienna, Austria, July 18-22, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8559}, pages = {131--149}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08867-9\_9}, doi = {10.1007/978-3-319-08867-9\_9}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cav/ChowdhuryJGD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/OhCJGGD14, author = {Se Eun Oh and Ji Young Chun and Limin Jia and Deepak Garg and Carl A. Gunter and Anupam Datta}, editor = {Elisa Bertino and Ravi S. Sandhu and Jaehong Park}, title = {Privacy-preserving audit for broker-based health information exchange}, booktitle = {Fourth {ACM} Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014}, pages = {313--320}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2557547.2557576}, doi = {10.1145/2557547.2557576}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/OhCJGGD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/BichhawatRGH14, author = {Abhishek Bichhawat and Vineet Rajani and Deepak Garg and Christian Hammer}, editor = {Alejandro Russo and Omer Tripp}, title = {Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis}, booktitle = {Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security, PLAS@ECOOP 2014, Uppsala, Sweden, July 29, 2014}, pages = {15}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2637113.2637116}, doi = {10.1145/2637113.2637116}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecoop/BichhawatRGH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/BichhawatRGH14, author = {Abhishek Bichhawat and Vineet Rajani and Deepak Garg and Christian Hammer}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Information Flow Control in WebKit's JavaScript Bytecode}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {159--178}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_9}, doi = {10.1007/978-3-642-54792-8\_9}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/post/BichhawatRGH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BichhawatRGH14, author = {Abhishek Bichhawat and Vineet Rajani and Deepak Garg and Christian Hammer}, title = {Information Flow Control in WebKit's JavaScript Bytecode}, journal = {CoRR}, volume = {abs/1401.4339}, year = {2014}, url = {http://arxiv.org/abs/1401.4339}, eprinttype = {arXiv}, eprint = {1401.4339}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BichhawatRGH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/NanevskiBG13, author = {Aleksandar Nanevski and Anindya Banerjee and Deepak Garg}, title = {Dependent Type Theory for Verification of Information Flow and Access Control Policies}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {35}, number = {2}, pages = {6:1--6:41}, year = {2013}, url = {https://doi.org/10.1145/2491522.2491523}, doi = {10.1145/2491522.2491523}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toplas/NanevskiBG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/GargP12, author = {Deepak Garg and Frank Pfenning}, title = {Stateful authorization logic - Proof theory and a case study}, journal = {J. Comput. Secur.}, volume = {20}, number = {4}, pages = {353--391}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0456}, doi = {10.3233/JCS-2012-0456}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/GargP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/GenoveseGR12, author = {Valerio Genovese and Deepak Garg and Daniele Rispoli}, editor = {Stephen Chong}, title = {Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction}, booktitle = {25th {IEEE} Computer Security Foundations Symposium, {CSF} 2012, Cambridge, MA, USA, June 25-27, 2012}, pages = {139--153}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CSF.2012.11}, doi = {10.1109/CSF.2012.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/GenoveseGR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfp/KrishnaswamiTDG12, author = {Neelakantan R. Krishnaswami and Aaron Turon and Derek Dreyer and Deepak Garg}, editor = {Peter Thiemann and Robby Bruce Findler}, title = {Superficially substructural types}, booktitle = {{ACM} {SIGPLAN} International Conference on Functional Programming, ICFP'12, Copenhagen, Denmark, September 9-15, 2012}, pages = {41--54}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2364527.2364536}, doi = {10.1145/2364527.2364536}, timestamp = {Thu, 24 Jun 2021 16:19:30 +0200}, biburl = {https://dblp.org/rec/conf/icfp/KrishnaswamiTDG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/GargGN12, author = {Deepak Garg and Valerio Genovese and Sara Negri}, title = {Countermodels from Sequent Calculi in Multi-Modal Logics}, booktitle = {Proceedings of the 27th Annual {IEEE} Symposium on Logic in Computer Science, {LICS} 2012, Dubrovnik, Croatia, June 25-28, 2012}, pages = {315--324}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/LICS.2012.42}, doi = {10.1109/LICS.2012.42}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/GargGN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/GenoveseGR12, author = {Valerio Genovese and Deepak Garg and Daniele Rispoli}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Labeled Goal-Directed Search in Access Control Logic}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {65--80}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_5}, doi = {10.1007/978-3-642-38004-4\_5}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/stm/GenoveseGR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/DattaFGJK11, author = {Anupam Datta and Jason Franklin and Deepak Garg and Limin Jia and Dilsun Kirli Kaynar}, title = {On Adversary Models and Compositional Security}, journal = {{IEEE} Secur. Priv.}, volume = {9}, number = {3}, pages = {26--32}, year = {2011}, url = {https://doi.org/10.1109/MSP.2010.203}, doi = {10.1109/MSP.2010.203}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/DattaFGJK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GargJD11, author = {Deepak Garg and Limin Jia and Anupam Datta}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Policy auditing over incomplete logs: theory, implementation and applications}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {151--162}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046726}, doi = {10.1145/2046707.2046726}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GargJD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/DattaBCDGJKS11, author = {Anupam Datta and Jeremiah Blocki and Nicolas Christin and Henry DeYoung and Deepak Garg and Limin Jia and Dilsun Kirli Kaynar and Arunesh Sinha}, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms}, booktitle = {Information Systems Security - 7th International Conference, {ICISS} 2011, Kolkata, India, December 15-19, 2011, Procedings}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {1--27}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25560-1\_1}, doi = {10.1007/978-3-642-25560-1\_1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/DattaBCDGJKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/NanevskiBG11, author = {Aleksandar Nanevski and Anindya Banerjee and Deepak Garg}, title = {Verification of Information Flow and Access Control Policies with Dependent Types}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {165--179}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.12}, doi = {10.1109/SP.2011.12}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/NanevskiBG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MorgensternGP11, author = {Jamie Morgenstern and Deepak Garg and Frank Pfenning}, editor = {Catherine Meadows and M. Carmen Fern{\'{a}}ndez Gago}, title = {A Proof-Carrying File System with Revocable and Use-Once Certificates}, booktitle = {Security and Trust Management - 7th International Workshop, {STM} 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7170}, pages = {40--55}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29963-6\_5}, doi = {10.1007/978-3-642-29963-6\_5}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/stm/MorgensternGP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/GenoveseG11, author = {Valerio Genovese and Deepak Garg}, editor = {Catherine Meadows and M. Carmen Fern{\'{a}}ndez Gago}, title = {New Modalities for Access Control Logics: Permission, Control and Ratification}, booktitle = {Security and Trust Management - 7th International Workshop, {STM} 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7170}, pages = {56--71}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29963-6\_6}, doi = {10.1007/978-3-642-29963-6\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/GenoveseG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1102-2521, author = {Deepak Garg and Limin Jia and Anupam Datta}, title = {A Logical Method for Policy Enforcement over Evolving Audit Logs}, journal = {CoRR}, volume = {abs/1102.2521}, year = {2011}, url = {http://arxiv.org/abs/1102.2521}, eprinttype = {arXiv}, eprint = {1102.2521}, timestamp = {Sun, 16 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1102-2521.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GargP10, author = {Deepak Garg and Frank Pfenning}, title = {A Proof-Carrying File System}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {349--364}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.28}, doi = {10.1109/SP.2010.28}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/GargP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/GargP10, author = {Deepak Garg and Frank Pfenning}, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner and Javier L{\'{o}}pez}, title = {Stateful Authorization Logic: - Proof Theory and a Case Study}, booktitle = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, pages = {210--225}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22444-7\_14}, doi = {10.1007/978-3-642-22444-7\_14}, timestamp = {Tue, 07 May 2024 20:13:56 +0200}, biburl = {https://dblp.org/rec/conf/stm/GargP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/DeYoungGJKD10, author = {Henry DeYoung and Deepak Garg and Limin Jia and Dilsun Kirli Kaynar and Anupam Datta}, editor = {Ehab Al{-}Shaer and Keith B. Frikken}, title = {Experiences in the logical specification of the {HIPAA} and {GLBA} privacy laws}, booktitle = {Proceedings of the 2010 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2010, Chicago, Illinois, USA, October 4, 2010}, pages = {73--82}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866919.1866930}, doi = {10.1145/1866919.1866930}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wpes/DeYoungGJKD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/GargFKD10, author = {Deepak Garg and Jason Franklin and Dilsun Kirli Kaynar and Anupam Datta}, editor = {Michael W. Mislove and Peter Selinger}, title = {Compositional System Security with Interface-Confined Adversaries}, booktitle = {Proceedings of the 26th Conference on the Mathematical Foundations of Programming Semantics, {MFPS} 2010, Ottawa, Ontario, Canada, May 6-10, 2010}, series = {Electronic Notes in Theoretical Computer Science}, volume = {265}, pages = {49--71}, publisher = {Elsevier}, year = {2010}, url = {https://doi.org/10.1016/j.entcs.2010.08.005}, doi = {10.1016/J.ENTCS.2010.08.005}, timestamp = {Mon, 08 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/GargFKD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pldi/2010plas, editor = {Anindya Banerjee and Deepak Garg}, title = {Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, {PLAS} 2010, Toronto, ON, Canada, 10 June, 2010}, publisher = {{ACM}}, year = {2010}, url = {http://dl.acm.org/citation.cfm?id=1814217}, isbn = {978-1-60558-827-8}, timestamp = {Thu, 22 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/2010plas.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChaudhuriG09, author = {Avik Chaudhuri and Deepak Garg}, editor = {Michael Backes and Peng Ning}, title = {{PCAL:} Language Support for Proof-Carrying Authorization Systems}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {184--199}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_12}, doi = {10.1007/978-3-642-04444-1\_12}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ChaudhuriG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DattaFGK09, author = {Anupam Datta and Jason Franklin and Deepak Garg and Dilsun Kirli Kaynar}, title = {A Logic of Secure Systems and its Application to Trusted Computing}, booktitle = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May 2009, Oakland, California, {USA}}, pages = {221--236}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SP.2009.16}, doi = {10.1109/SP.2009.16}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/DattaFGK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DeYoungGP08, author = {Henry DeYoung and Deepak Garg and Frank Pfenning}, title = {An Authorization Logic With Explicit Time}, booktitle = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium, {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008}, pages = {133--145}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CSF.2008.15}, doi = {10.1109/CSF.2008.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DeYoungGP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fossacs/GargA08, author = {Deepak Garg and Mart{\'{\i}}n Abadi}, editor = {Roberto M. Amadio}, title = {A Modal Deconstruction of Access Control Logics}, booktitle = {Foundations of Software Science and Computational Structures, 11th International Conference, {FOSSACS} 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2008, Budapest, Hungary, March 29 - April 6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4962}, pages = {216--230}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78499-9\_16}, doi = {10.1007/978-3-540-78499-9\_16}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/fossacs/GargA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BowersBGPR07, author = {Kevin D. Bowers and Lujo Bauer and Deepak Garg and Frank Pfenning and Michael K. Reiter}, title = {Consumable Credentials in Linear-Logic-Based Access-Control Systems}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2007, San Diego, California, USA, 28th February - 2nd March 2007}, publisher = {The Internet Society}, year = {2007}, url = {https://www.ndss-symposium.org/ndss2007/consumable-credentials-linear-logic-based-access-control-systems/}, timestamp = {Mon, 01 Feb 2021 08:42:16 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BowersBGPR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/GargP06, author = {Deepak Garg and Frank Pfenning}, title = {Non-Interference in Constructive Authorization Logic}, booktitle = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006), 5-7 July 2006, Venice, Italy}, pages = {283--296}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/CSFW.2006.18}, doi = {10.1109/CSFW.2006.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/GargP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GargBBPR06, author = {Deepak Garg and Lujo Bauer and Kevin D. Bowers and Frank Pfenning and Michael K. Reiter}, editor = {Dieter Gollmann and Jan Meier and Andrei Sabelfeld}, title = {A Linear Logic of Authorization and Knowledge}, booktitle = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4189}, pages = {297--312}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11863908\_19}, doi = {10.1007/11863908\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GargBBPR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/GargP05, author = {Deepak Garg and Frank Pfenning}, editor = {Mart{\'{\i}}n Abadi and Luca de Alfaro}, title = {Type-Directed Concurrency}, booktitle = {{CONCUR} 2005 - Concurrency Theory, 16th International Conference, {CONCUR} 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3653}, pages = {6--20}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11539452\_5}, doi = {10.1007/11539452\_5}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/concur/GargP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifipTCS/GargLP04, author = {Deepak Garg and Akash Lal and Sanjiva Prasad}, editor = {Jean{-}Jacques L{\'{e}}vy and Ernst W. Mayr and John C. Mitchell}, title = {Effective Chemistry for Synchrony and Asynchrony}, booktitle = {Exploring New Frontiers of Theoretical Informatics, {IFIP} 18th World Computer Congress, {TC1} 3rd International Conference on Theoretical Computer Science (TCS2004), 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {155}, pages = {479--492}, publisher = {Kluwer/Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8141-3\_37}, doi = {10.1007/1-4020-8141-3\_37}, timestamp = {Fri, 27 Sep 2019 10:35:17 +0200}, biburl = {https://dblp.org/rec/conf/ifipTCS/GargLP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.