


default search action
Deepak Garg 0001
Person information
- affiliation: Max Planck Institute for Software Systems, Saarbrücken, Germany
- affiliation (former): Carnegie Mellon University, School of Computer Science, Pittsburgh, PA, USA
Other persons with the same name
- Deepak Garg — disambiguation page
- Deepak Garg 0002
— Bennett University, Computer Science Engineering, Greater Noida, India (and 1 more)
- Deepak Garg 0003 — University of Western Australia, School of Computer Science & Software Engineering
- Deepak Garg 0004
— Istituto Nazionale di Geofisica e Vulcanologia, Rome, Italy (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j27]Vineet Rajani
, Gilles Barthe
, Deepak Garg
:
A Modal Type Theory of Expected Cost in Higher-Order Probabilistic Programs. Proc. ACM Program. Lang. 8(OOPSLA2): 389-414 (2024) - [j26]Jiawen Liu
, Weihao Qu
, Marco Gaboardi
, Deepak Garg
, Jonathan R. Ullman
:
Program Analysis for Adaptive Data Analysis. Proc. ACM Program. Lang. 8(PLDI): 914-938 (2024) - [c64]Maurice Bailleu
, Dimitrios Stavrakakis
, Rodrigo Caetano Rocha
, Soham Chakraborty
, Deepak Garg
, Pramod Bhatotia
:
Toast: A Heterogeneous Memory Management System. PACT 2024: 53-65 - [i37]Roberta De Viti, Pierfrancesco Ingo, Isaac Sheff, Peter Druschel, Deepak Garg:
ProLoc: Robust Location Proofs in Hindsight. CoRR abs/2404.04297 (2024) - 2023
- [j25]Marco Vassena
, Alejandro Russo, Deepak Garg, Vineet Rajani, Deian Stefan:
From Fine- to Coarse-Grained Dynamic Information Flow Control and Back. Found. Trends Program. Lang. 8(1): 1-117 (2023) - [j24]Jan Menz
, Andrew K. Hirsch
, Peixuan Li
, Deepak Garg
:
Compositional Security Definitions for Higher-Order Where Declassification. Proc. ACM Program. Lang. 7(OOPSLA1): 406-433 (2023) - [j23]Michael Sammler
, Simon Spies
, Youngju Song
, Emanuele D'Osualdo
, Robbert Krebbers
, Deepak Garg
, Derek Dreyer
:
DimSum: A Decentralized Approach to Multi-language Semantics and Verification. Proc. ACM Program. Lang. 7(POPL): 775-805 (2023) - [c63]Mohamed Alzayat
, Jonathan Mace
, Peter Druschel
, Deepak Garg
:
Groundhog: Efficient Request Isolation in FaaS. EuroSys 2023: 398-415 - [c62]Vaastav Anand
, Deepak Garg
, Antoine Kaufmann
, Jonathan Mace
:
Blueprint: A Toolchain for Highly-Reconfigurable Microservice Applications. SOSP 2023: 482-497 - 2022
- [j22]Fengmin Zhu
, Michael Sammler
, Rodolphe Lepigre
, Derek Dreyer
, Deepak Garg
:
BFF: foundational and automated verification of bitfield-manipulating programs. Proc. ACM Program. Lang. 6(OOPSLA2): 1613-1638 (2022) - [j21]Andrew K. Hirsch
, Deepak Garg
:
Pirouette: higher-order typed functional choreographies. Proc. ACM Program. Lang. 6(POPL): 1-27 (2022) - [j20]Matthew Kolosick, Shravan Narayan
, Evan Johnson, Conrad Watt, Michael LeMay
, Deepak Garg
, Ranjit Jhala, Deian Stefan:
Isolation without taxation: near-zero-cost transitions for WebAssembly and SFI. Proc. ACM Program. Lang. 6(POPL): 1-30 (2022) - [c61]Akram El-Korashy, Roberto Blanco, Jérémy Thibault, Adrien Durier, Deepak Garg, Catalin Hritcu:
SecurePtrs: Proving Secure Compilation with Data-Flow Back-Translation and Turn-Taking Simulation. CSF 2022: 64-79 - [c60]Michael Sammler, Angus Hammond, Rodolphe Lepigre, Brian Campbell, Jean Pichon-Pharabod, Derek Dreyer, Deepak Garg, Peter Sewell:
Islaris: verification of machine code against authoritative ISA semantics. PLDI 2022: 825-840 - [c59]Aastha Mehta, Mohamed Alzayat, Roberta De Viti, Björn B. Brandenburg, Peter Druschel, Deepak Garg:
Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud. USENIX Security Symposium 2022: 2819-2838 - [i36]Mohamed Alzayat, Jonathan Mace, Peter Druschel, Deepak Garg:
Groundhog: Efficient Request Isolation in FaaS. CoRR abs/2205.11458 (2022) - [i35]Roberta De Viti, Isaac Sheff, Noemi Glaeser, Baltasar Dinis, Rodrigo Rodrigues, Jonathan Katz, Bobby Bhattacharjee, Anwar Hithnawi, Deepak Garg, Peter Druschel:
CoVault: A Secure Analytics Platform. CoRR abs/2208.03784 (2022) - [i34]Marco Vassena, Alejandro Russo
, Deepak Garg, Vineet Rajani, Deian Stefan:
From Fine- to Coarse-Grained Dynamic Information Flow Control and Back, a Tutorial on Dynamic Information Flow. CoRR abs/2208.13560 (2022) - 2021
- [j19]Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer
:
Permissive runtime information flow control in the presence of exceptions. J. Comput. Secur. 29(4): 361-401 (2021) - [j18]Weihao Qu
, Marco Gaboardi
, Deepak Garg
:
Relational cost analysis in a functional-imperative setting. J. Funct. Program. 31: e27 (2021) - [j17]Alejandro Aguirre
, Gilles Barthe
, Marco Gaboardi
, Deepak Garg
, Shin-ya Katsumata
, Tetsuya Sato
:
Higher-order probabilistic adversarial computations: categorical semantics and program logics. Proc. ACM Program. Lang. 5(ICFP): 1-30 (2021) - [j16]Vineet Rajani
, Marco Gaboardi
, Deepak Garg
, Jan Hoffmann:
A unifying type-theory for higher-order (amortized) cost analysis. Proc. ACM Program. Lang. 5(POPL): 1-28 (2021) - [j15]Marco Patrignani
, Deepak Garg:
Robustly Safe Compilation, an Efficient Form of Secure Compilation. ACM Trans. Program. Lang. Syst. 43(1): 1:1-1:41 (2021) - [j14]Carmine Abate, Roberto Blanco, Stefan Ciobaca, Adrien Durier, Deepak Garg, Catalin Hritcu, Marco Patrignani
, Éric Tanter, Jérémy Thibault:
An Extended Account of Trace-relating Compiler Correctness and Secure Compilation. ACM Trans. Program. Lang. Syst. 43(4): 14:1-14:48 (2021) - [c58]Akram El-Korashy, Stelios Tsampas
, Marco Patrignani
, Dominique Devriese
, Deepak Garg, Frank Piessens:
CapablePtrs: Securely Compiling Partial Programs Using the Pointers-as-Capabilities Principle. CSF 2021: 1-16 - [c57]Robert Künnemann, Deepak Garg, Michael Backes:
Accountability in the Decentralised-Adversary Setting. CSF 2021: 1-16 - [c56]Michael Sammler, Rodolphe Lepigre, Robbert Krebbers, Kayvan Memarian, Derek Dreyer, Deepak Garg
:
RefinedC: automating the foundational verification of C code with refined ownership types. PLDI 2021: 158-174 - [i33]Matthew Kolosick, Shravan Narayan, Conrad Watt, Michael LeMay
, Deepak Garg, Ranjit Jhala, Deian Stefan:
Isolation Without Taxation: Near Zero Cost Transitions for SFI. CoRR abs/2105.00033 (2021) - [i32]Alejandro Aguirre, Gilles Barthe, Marco Gaboardi, Deepak Garg, Shin-ya Katsumata, Tetsuya Sato:
Higher-order probabilistic adversarial computations: Categorical semantics and program logics. CoRR abs/2107.01155 (2021) - [i31]Akram El-Korashy, Roberto Blanco, Jérémy Thibault, Adrien Durier, Deepak Garg, Catalin Hritcu:
SecurePtrs: Proving Secure Compilation with Data-Flow Back-Translation and Turn-Taking Simulation. CoRR abs/2110.01439 (2021) - [i30]Andrew K. Hirsch, Deepak Garg:
Pirouette: Higher-Order Typed Functional Choreographies. CoRR abs/2111.03484 (2021) - [i29]David Chisnall, Deepak Garg, Catalin Hritcu, Mathias Payer:
Secure Compilation (Dagstuhl Seminar 21481). Dagstuhl Reports 11(10): 173-204 (2021) - 2020
- [j13]Vineet Rajani, Deepak Garg:
On the expressiveness and semantics of information flow types. J. Comput. Secur. 28(1): 129-156 (2020) - [j12]Michael Sammler, Deepak Garg, Derek Dreyer, Tadeusz Litak
:
The high-level benefits of low-level sandboxing. Proc. ACM Program. Lang. 4(POPL): 32:1-32:32 (2020) - [c55]Carmine Abate, Roberto Blanco, Stefan Ciobaca, Adrien Durier, Deepak Garg, Catalin Hritcu, Marco Patrignani
, Éric Tanter, Jérémy Thibault:
Trace-Relating Compiler Correctness and Secure Compilation. ESOP 2020: 1-28 - [c54]Venkat Arun, Aniket Kate, Deepak Garg, Peter Druschel, Bobby Bhattacharjee:
Finding Safety in Numbers with Secure Allegation Escrows. NDSS 2020 - [i28]Akram El-Korashy, Stelios Tsampas, Marco Patrignani, Dominique Devriese, Deepak Garg, Frank Piessens:
CapablePtrs: Securely Compiling Partial Programs using the Pointers-as-Capabilities Principle. CoRR abs/2005.05944 (2020) - [i27]Gilles Barthe, Roberta De Viti, Peter Druschel, Deepak Garg, Manuel Gomez-Rodriguez, Pierfrancesco Ingo, Matthew Lentz, Aastha Mehta, Bernhard Schölkopf:
PanCast: Listening to Bluetooth Beacons for Epidemic Risk Mitigation. CoRR abs/2011.08069 (2020)
2010 – 2019
- 2019
- [j11]Alejandro Aguirre
, Gilles Barthe, Marco Gaboardi
, Deepak Garg, Pierre-Yves Strub:
A relational logic for higher-order programs. J. Funct. Program. 29: e16 (2019) - [j10]Weihao Qu, Marco Gaboardi
, Deepak Garg:
Relational cost analysis for functional-imperative programs. Proc. ACM Program. Lang. 3(ICFP): 92:1-92:29 (2019) - [j9]Tetsuya Sato, Alejandro Aguirre
, Gilles Barthe, Marco Gaboardi
, Deepak Garg, Justin Hsu
:
Formal verification of higher-order probabilistic programs: reasoning about approximation, convergence, Bayesian inference, and optimization. Proc. ACM Program. Lang. 3(POPL): 38:1-38:30 (2019) - [j8]Marco Vassena, Alejandro Russo
, Deepak Garg, Vineet Rajani, Deian Stefan:
From fine- to coarse-grained dynamic information flow control and back. Proc. ACM Program. Lang. 3(POPL): 76:1-76:31 (2019) - [c53]Carmine Abate, Roberto Blanco, Deepak Garg, Catalin Hritcu, Marco Patrignani
, Jérémy Thibault:
Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation. CSF 2019: 256-271 - [c52]Marco Patrignani
, Deepak Garg:
Robustly Safe Compilation. ESOP 2019: 469-498 - [c51]Ajay Brahmakshatriya, Piyus Kedia, Derrick Paul McKee
, Deepak Garg, Akash Lal, Aseem Rastogi, Hamed Nemati
, Anmol Panda, Pratik Bhatu:
ConfLLVM: A Compiler for Enforcing Data Confidentiality in Low-Level Code. EuroSys 2019: 4:1-4:15 - [c50]James Litton, Deepak Garg, Peter Druschel, Bobby Bhattacharjee:
Composing Abstractions using the null-Kernel. HotOS 2019: 1-6 - [c49]Ezgi Çiçek, Weihao Qu, Gilles Barthe, Marco Gaboardi
, Deepak Garg:
Bidirectional type checking for relational properties. PLDI 2019: 533-547 - [c48]Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O. Duarte, Michael Sammler, Peter Druschel, Deepak Garg:
ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK). USENIX Security Symposium 2019: 1221-1238 - [c47]Robert Künnemann, Deepak Garg, Michael Backes:
Causality & Control Flow. CREST@ETAPS 2019: 32-46 - [e2]Deepak Garg
, N. V. Narendra Kumar, Rudrapatna K. Shyamasundar
:
Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings. Lecture Notes in Computer Science 11952, Springer 2019, ISBN 978-3-030-36944-6 [contents] - [i26]Carmine Abate, Roberto Blanco, Stefan Ciobaca, Deepak Garg, Catalin Hritcu, Marco Patrignani, Éric Tanter, Jérémy Thibault:
Trace-Relating Compiler Correctness and Secure Compilation. CoRR abs/1907.05320 (2019) - [i25]Aastha Mehta, Mohamed Alzayat, Roberta De Viti, Björn B. Brandenburg, Peter Druschel, Deepak Garg:
Pacer: Network Side-Channel Mitigation in the Cloud. CoRR abs/1908.11568 (2019) - 2018
- [j7]Ivan Radicek, Gilles Barthe
, Marco Gaboardi
, Deepak Garg, Florian Zuleger
:
Monadic refinements for relational cost analysis. Proc. ACM Program. Lang. 2(POPL): 36:1-36:32 (2018) - [c46]Vineet Rajani, Deepak Garg:
Types for Information Flow Control: Labeling Granularity and Semantic Models. CSF 2018: 233-246 - [c45]Alejandro Aguirre
, Gilles Barthe, Lars Birkedal, Ales Bizjak, Marco Gaboardi, Deepak Garg:
Relational Reasoning for Markov Chains in a Probabilistic Guarded Lambda Calculus. ESOP 2018: 214-241 - [c44]Reinhard Munz, Fabienne Eigner, Matteo Maffei, Paul Francis, Deepak Garg:
UniTraX: Protecting Data Privacy with Discoverable Biases. POST 2018: 278-299 - [i24]Eslam Elnikety, Deepak Garg, Peter Druschel:
Shai: Enforcing Data-Specific Policies with Near-Zero Runtime Overhead. CoRR abs/1801.04565 (2018) - [i23]Anjo Vahldiek-Oberwagner, Eslam Elnikety, Deepak Garg, Peter Druschel:
ERIM: Secure and Efficient In-process Isolation with Memory Protection Keys. CoRR abs/1801.06822 (2018) - [i22]Alejandro Aguirre, Gilles Barthe, Lars Birkedal, Ales Bizjak, Marco Gaboardi, Deepak Garg:
Relational Reasoning for Markov Chains in a Probabilistic Guarded Lambda Calculus. CoRR abs/1802.09787 (2018) - [i21]Marco Patrignani, Deepak Garg:
Robustly Safe Compilation or, Efficient, Provably Secure Compilation. CoRR abs/1804.00489 (2018) - [i20]Vineet Rajani, Deepak Garg:
Types for Information Flow Control: Labeling Granularity and Semantic Models. CoRR abs/1805.00120 (2018) - [i19]Carmine Abate, Roberto Blanco, Deepak Garg, Catalin Hritcu, Marco Patrignani, Jérémy Thibault:
Exploring Robust Property Preservation for Secure Compilation. CoRR abs/1807.04603 (2018) - [i18]Tetsuya Sato, Alejandro Aguirre, Gilles Barthe, Marco Gaboardi, Deepak Garg, Justin Hsu:
Formal verification of higher-order probabilistic programs. CoRR abs/1807.06091 (2018) - [i17]Venkat Arun, Aniket Kate, Deepak Garg, Peter Druschel, Bobby Bhattacharjee:
SATE: Robust and Private Allegation Escrows. CoRR abs/1810.10123 (2018) - [i16]Weihao Qu, Marco Gaboardi, Deepak Garg:
Relational Cost Analysis for Functional-Imperative Programs. CoRR abs/1812.04090 (2018) - [i15]Ezgi Çiçek, Weihao Qu, Gilles Barthe, Marco Gaboardi, Deepak Garg:
Bidirectional Type Checking for Relational Properties. CoRR abs/1812.05067 (2018) - [i14]Amal Ahmed, Deepak Garg, Catalin Hritcu, Frank Piessens:
Secure Compilation (Dagstuhl Seminar 18201). Dagstuhl Reports 8(5): 1-30 (2018) - [i13]Robert Künnemann, Deepak Garg, Michael Backes:
Accountability in Security Protocols. IACR Cryptol. ePrint Arch. 2018: 127 (2018) - 2017
- [j6]Alejandro Aguirre
, Gilles Barthe
, Marco Gaboardi
, Deepak Garg, Pierre-Yves Strub:
A relational logic for higher-order programs. Proc. ACM Program. Lang. 1(ICFP): 21:1-21:29 (2017) - [j5]David Swasey, Deepak Garg, Derek Dreyer:
Robust and compositional verification of object capability patterns. Proc. ACM Program. Lang. 1(OOPSLA): 89:1-89:26 (2017) - [j4]Vineet Rajani, Iulia Bastys
, Willard Rafnsson, Deepak Garg:
Type systems for information flow control: the question of granularity. ACM SIGLOG News 4(1): 6-21 (2017) - [c43]Marco Patrignani
, Deepak Garg:
Secure Compilation and Hyperproperty Preservation. CSF 2017: 392-404 - [c42]Abhishek Bichhawat
, Vineet Rajani
, Jinank Jain, Deepak Garg
, Christian Hammer
:
WebPol: Fine-Grained Information Flow Policies for Web Browsers. ESORICS (1) 2017: 242-259 - [c41]Ezgi Çiçek, Gilles Barthe, Marco Gaboardi
, Deepak Garg, Jan Hoffmann:
Relational cost analysis. POPL 2017: 316-329 - [c40]Aastha Mehta, Eslam Elnikety, Katura Harvey, Deepak Garg, Peter Druschel:
Qapla: Policy compliance for database-backed systems. USENIX Security Symposium 2017: 1463-1479 - [i12]Alejandro Aguirre, Gilles Barthe, Marco Gaboardi, Deepak Garg, Pierre-Yves Strub:
A Relational Logic for Higher-Order Programs. CoRR abs/1703.05042 (2017) - [i11]Abhishek Bichhawat, Vineet Rajani, Jinank Jain, Deepak Garg, Christian Hammer:
WebPol: Fine-grained Information Flow Policies for Web Browsers. CoRR abs/1706.06932 (2017) - [i10]Deepak Garg, Catalin Hritcu, Marco Patrignani, Marco Stronati, David Swasey:
Robust Hyperproperty Preservation for Secure Compilation (Extended Abstract). CoRR abs/1710.07309 (2017) - [i9]Ajay Brahmakshatriya, Piyus Kedia, Derrick Paul McKee, Pratik Bhatu, Deepak Garg, Akash Lal, Aseem Rastogi:
An Instrumenting Compiler for Enforcing Confidentiality in Low-Level Code. CoRR abs/1711.11396 (2017) - [i8]Sanjit Chatterjee, Deepak Garg, Aniket Kate, Tobias Theobald:
Encrypting Messages for Incomplete Chains of Certificates. IACR Cryptol. ePrint Arch. 2017: 777 (2017) - 2016
- [c39]Roly Perera, Deepak Garg, James Cheney
:
Causally Consistent Dynamic Slicing. CONCUR 2016: 18:1-18:15 - [c38]Vineet Rajani, Deepak Garg, Tamara Rezk:
On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks. CSF 2016: 150-163 - [c37]Willard Rafnsson, Deepak Garg, Andrei Sabelfeld:
Progress-Sensitive Security for SPARK. ESSoS 2016: 20-37 - [c36]Ezgi Çiçek, Zoe Paraskevopoulou, Deepak Garg:
A type theory for incremental computational complexity with control flow changes. ICFP 2016: 132-145 - [c35]James Litton, Anjo Vahldiek-Oberwagner, Eslam Elnikety, Deepak Garg, Bobby Bhattacharjee, Peter Druschel:
Light-Weight Contexts: An OS Abstraction for Safety and Performance. OSDI 2016: 49-64 - [c34]Iulia Bolosteanu, Deepak Garg:
Asymmetric Secure Multi-execution with Declassification. POST 2016: 24-45 - [c33]Eslam Elnikety, Aastha Mehta, Anjo Vahldiek-Oberwagner, Deepak Garg, Peter Druschel:
Thoth: Comprehensive Policy Compliance in Data Retrieval Systems. USENIX Security Symposium 2016: 637-654 - [i7]Roly Perera, Deepak Garg, James Cheney:
Causally consistent dynamic slicing. CoRR abs/1610.02327 (2016) - 2015
- [c32]Omar Chowdhury, Deepak Garg, Limin Jia
, Anupam Datta:
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits. CCS 2015: 1130-1143 - [c31]Anupam Datta, Deepak Garg, Dilsun Kirli Kaynar, Divya Sharma, Arunesh Sinha
:
Program Actions as Actual Causes: A Building Block for Accountability. CSF 2015: 261-275 - [c30]Vineet Rajani, Abhishek Bichhawat, Deepak Garg, Christian Hammer
:
Information Flow Control for Event Handling and the DOM in Web Browsers. CSF 2015: 366-379 - [c29]Limin Jia
, Shayak Sen, Deepak Garg, Anupam Datta:
A Logic of Programs with Interface-Confined Code. CSF 2015: 512-525 - [c28]Ezgi Çiçek, Deepak Garg, Umut A. Acar:
Refinement Types for Incremental Computational Complexity. ESOP 2015: 406-431 - [c27]Anjo Vahldiek-Oberwagner
, Eslam Elnikety, Aastha Mehta, Deepak Garg, Peter Druschel, Rodrigo Rodrigues, Johannes Gehrke, Ansley Post:
Guardat: enforcing data policies at the storage layer. EuroSys 2015: 13:1-13:16 - [i6]Limin Jia, Shayak Sen, Deepak Garg, Anupam Datta:
System M: A Program Logic for Code Sandboxing and Identification. CoRR abs/1501.05673 (2015) - [i5]Anupam Datta, Deepak Garg, Dilsun Kirli Kaynar, Divya Sharma, Arunesh Sinha:
Program Actions as Actual Causes: A Building Block for Accountability. CoRR abs/1505.01131 (2015) - [i4]Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer:
Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis. CoRR abs/1506.03950 (2015) - [i3]Omar Chowdhury, Deepak Garg, Limin Jia
, Anupam Datta:
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits. CoRR abs/1508.02448 (2015) - 2014
- [c26]Omar Chowdhury, Limin Jia
, Deepak Garg, Anupam Datta:
Temporal Mode-Checking for Runtime Monitoring of Privacy Policies. CAV 2014: 131-149 - [c25]Se Eun Oh, Ji Young Chun, Limin Jia
, Deepak Garg, Carl A. Gunter, Anupam Datta:
Privacy-preserving audit for broker-based health information exchange. CODASPY 2014: 313-320 - [c24]Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer
:
Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis. PLAS@ECOOP 2014: 15 - [c23]Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer
:
Information Flow Control in WebKit's JavaScript Bytecode. POST 2014: 159-178 - [i2]Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer:
Information Flow Control in WebKit's JavaScript Bytecode. CoRR abs/1401.4339 (2014) - 2013
- [j3]Aleksandar Nanevski, Anindya Banerjee, Deepak Garg:
Dependent Type Theory for Verification of Information Flow and Access Control Policies. ACM Trans. Program. Lang. Syst. 35(2): 6:1-6:41 (2013) - 2012
- [j2]Deepak Garg, Frank Pfenning:
Stateful authorization logic - Proof theory and a case study. J. Comput. Secur. 20(4): 353-391 (2012) - [c22]Valerio Genovese, Deepak Garg, Daniele Rispoli:
Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction. CSF 2012: 139-153 - [c21]Neelakantan R. Krishnaswami, Aaron Turon, Derek Dreyer, Deepak Garg:
Superficially substructural types. ICFP 2012: 41-54 - [c20]Deepak Garg, Valerio Genovese, Sara Negri:
Countermodels from Sequent Calculi in Multi-Modal Logics. LICS 2012: 315-324 - [c19]Valerio Genovese, Deepak Garg, Daniele Rispoli:
Labeled Goal-Directed Search in Access Control Logic. STM 2012: 65-80 - 2011
- [j1]Anupam Datta, Jason Franklin, Deepak Garg, Limin Jia
, Dilsun Kirli Kaynar:
On Adversary Models and Compositional Security. IEEE Secur. Priv. 9(3): 26-32 (2011) - [c18]Deepak Garg, Limin Jia
, Anupam Datta:
Policy auditing over incomplete logs: theory, implementation and applications. CCS 2011: 151-162 - [c17]Anupam Datta, Jeremiah Blocki
, Nicolas Christin
, Henry DeYoung, Deepak Garg, Limin Jia
, Dilsun Kirli Kaynar, Arunesh Sinha
:
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms. ICISS 2011: 1-27 - [c16]Aleksandar Nanevski, Anindya Banerjee, Deepak Garg:
Verification of Information Flow and Access Control Policies with Dependent Types. IEEE Symposium on Security and Privacy 2011: 165-179 - [c15]Jamie Morgenstern, Deepak Garg, Frank Pfenning:
A Proof-Carrying File System with Revocable and Use-Once Certificates. STM 2011: 40-55 - [c14]Valerio Genovese, Deepak Garg:
New Modalities for Access Control Logics: Permission, Control and Ratification. STM 2011: 56-71 - [i1]Deepak Garg, Limin Jia, Anupam Datta:
A Logical Method for Policy Enforcement over Evolving Audit Logs. CoRR abs/1102.2521 (2011) - 2010
- [c13]Deepak Garg, Frank Pfenning:
A Proof-Carrying File System. IEEE Symposium on Security and Privacy 2010: 349-364 - [c12]Deepak Garg, Frank Pfenning:
Stateful Authorization Logic: - Proof Theory and a Case Study. STM 2010: 210-225 - [c11]Henry DeYoung, Deepak Garg, Limin Jia
, Dilsun Kirli Kaynar, Anupam Datta:
Experiences in the logical specification of the HIPAA and GLBA privacy laws. WPES 2010: 73-82 - [c10]Deepak Garg, Jason Franklin, Dilsun Kirli Kaynar, Anupam Datta:
Compositional System Security with Interface-Confined Adversaries. MFPS 2010: 49-71