Deepak Garg
Deepak Garg
Max Planck Institute for Software Systems (MPI-SWS), Saarland Informatics Campus (SIC)
Verified email at mpi-sws.org - Homepage
Title
Cited by
Cited by
Year
Verification of information flow and access control policies with dependent types
A Nanevski, A Banerjee, D Garg
2011 IEEE Symposium on Security and Privacy, 165-179, 2011
146*2011
A logic of secure systems and its application to trusted computing
A Datta, J Franklin, D Garg, D Kaynar
Security and Privacy, 2009 30th IEEE Symposium on, 221-236, 2009
1342009
Policy auditing over incomplete logs: Theory, implementation and applications
D Garg, L Jia, A Datta
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1272011
Experiences in the logical specification of the HIPAA and GLBA privacy laws
H DeYoung, D Garg, L Jia, D Kaynar, A Datta
Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010
117*2010
Non-interference in constructive authorization logic
D Garg, F Pfenning
Computer Security Foundations Workshop, 2006. 19th IEEE, 11 pp.-296, 2006
1132006
Information flow control in WebKit’s JavaScript bytecode
A Bichhawat, V Rajani, D Garg, C Hammer
International Conference on Principles of Security and Trust, 159-178, 2014
872014
A modal deconstruction of access control logics
D Garg, M Abadi
International Conference on Foundations of Software Science and …, 2008
862008
A linear logic of authorization and knowledge
D Garg, L Bauer, K Bowers, F Pfenning, M Reiter
Computer Security–ESORICS 2006, 297-312, 2006
852006
Light-Weight Contexts: An {OS} Abstraction for Safety and Performance
J Litton, A Vahldiek-Oberwagner, E Elnikety, D Garg, B Bhattacharjee, ...
12th {USENIX} Symposium on Operating Systems Design and Implementation …, 2016
562016
Relational cost analysis.
E Çiçek, G Barthe, M Gaboardi, D Garg, J Hoffmann
POPL 17, 316-329, 2017
512017
A proof-carrying file system
D Garg, F Pfenning
Security and Privacy (SP), 2010 IEEE Symposium on, 349-364, 2010
512010
Consumable credentials in logic-based access-control systems
KD Bowers, L Bauer, D Garg, F Pfenning, MK Reiter
Proceedings of the 14th Annual Network and Distributed System Security …, 2007
472007
An authorization logic with explicit time
H DeYoung, D Garg, F Pfenning
Computer Security Foundations Symposium, 2008. CSF'08. IEEE 21st, 133-145, 2008
462008
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms⋆
A Datta, J Blocki, N Christin, H DeYoung, D Garg, L Jia, D Kaynar, ...
452011
Robust and compositional verification of object capability patterns.
D Swasey, D Garg, D Dreyer
Proc. ACM Program. Lang. 1 (OOPSLA), 89:1-89:26, 2017
38*2017
Compositional system security with interface-confined adversaries
D Garg, J Franklin, D Kaynar, A Datta
Electronic Notes in Theoretical Computer Science 265, 49-71, 2010
372010
A relational logic for higher-order programs
A Aguirre, G Barthe, M Gaboardi, D Garg, PY Strub
Proceedings of the ACM on Programming Languages 1 (ICFP), 21, 2017
342017
Secure compilation and hyperproperty preservation
M Patrignani, D Garg
2017 IEEE 30th Computer Security Foundations Symposium (CSF), 392-404, 2017
302017
Generalizing permissive-upgrade in dynamic information flow analysis
A Bichhawat, V Rajani, D Garg, C Hammer
Proceedings of the Ninth Workshop on Programming Languages and Analysis for …, 2014
302014
Journey beyond full abstraction: Exploring robust property preservation for secure compilation
C Abate, R Blanco, D Garg, C Hritcu, M Patrignani, J Thibault
2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 256-25615, 2019
292019
The system can't perform the operation now. Try again later.
Articles 1–20