default search action
Deepak Garg 0001
Person information
- affiliation: Max Planck Institute for Software Systems, Saarbrücken, Germany
- affiliation (former): Carnegie Mellon University, School of Computer Science, Pittsburgh, PA, USA
Other persons with the same name
- Deepak Garg — disambiguation page
- Deepak Garg 0002 — Bennett University, Computer Science Engineering, Greater Noida, India (and 1 more)
- Deepak Garg 0003 — University of Western Australia, School of Computer Science & Software Engineering
- Deepak Garg 0004 — Istituto Nazionale di Geofisica e Vulcanologia, Rome, Italy (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Vineet Rajani, Gilles Barthe, Deepak Garg:
A Modal Type Theory of Expected Cost in Higher-Order Probabilistic Programs. Proc. ACM Program. Lang. 8(OOPSLA2): 389-414 (2024) - [j26]Jiawen Liu, Weihao Qu, Marco Gaboardi, Deepak Garg, Jonathan R. Ullman:
Program Analysis for Adaptive Data Analysis. Proc. ACM Program. Lang. 8(PLDI): 914-938 (2024) - [c64]Maurice Bailleu, Dimitrios Stavrakakis, Rodrigo Caetano Rocha, Soham Chakraborty, Deepak Garg, Pramod Bhatotia:
Toast: A Heterogeneous Memory Management System. PACT 2024: 53-65 - [i37]Roberta De Viti, Pierfrancesco Ingo, Isaac Sheff, Peter Druschel, Deepak Garg:
ProLoc: Robust Location Proofs in Hindsight. CoRR abs/2404.04297 (2024) - 2023
- [j25]Marco Vassena, Alejandro Russo, Deepak Garg, Vineet Rajani, Deian Stefan:
From Fine- to Coarse-Grained Dynamic Information Flow Control and Back. Found. Trends Program. Lang. 8(1): 1-117 (2023) - [j24]Jan Menz, Andrew K. Hirsch, Peixuan Li, Deepak Garg:
Compositional Security Definitions for Higher-Order Where Declassification. Proc. ACM Program. Lang. 7(OOPSLA1): 406-433 (2023) - [j23]Michael Sammler, Simon Spies, Youngju Song, Emanuele D'Osualdo, Robbert Krebbers, Deepak Garg, Derek Dreyer:
DimSum: A Decentralized Approach to Multi-language Semantics and Verification. Proc. ACM Program. Lang. 7(POPL): 775-805 (2023) - [c63]Mohamed Alzayat, Jonathan Mace, Peter Druschel, Deepak Garg:
Groundhog: Efficient Request Isolation in FaaS. EuroSys 2023: 398-415 - [c62]Vaastav Anand, Deepak Garg, Antoine Kaufmann, Jonathan Mace:
Blueprint: A Toolchain for Highly-Reconfigurable Microservice Applications. SOSP 2023: 482-497 - 2022
- [j22]Fengmin Zhu, Michael Sammler, Rodolphe Lepigre, Derek Dreyer, Deepak Garg:
BFF: foundational and automated verification of bitfield-manipulating programs. Proc. ACM Program. Lang. 6(OOPSLA2): 1613-1638 (2022) - [j21]Andrew K. Hirsch, Deepak Garg:
Pirouette: higher-order typed functional choreographies. Proc. ACM Program. Lang. 6(POPL): 1-27 (2022) - [j20]Matthew Kolosick, Shravan Narayan, Evan Johnson, Conrad Watt, Michael LeMay, Deepak Garg, Ranjit Jhala, Deian Stefan:
Isolation without taxation: near-zero-cost transitions for WebAssembly and SFI. Proc. ACM Program. Lang. 6(POPL): 1-30 (2022) - [c61]Akram El-Korashy, Roberto Blanco, Jérémy Thibault, Adrien Durier, Deepak Garg, Catalin Hritcu:
SecurePtrs: Proving Secure Compilation with Data-Flow Back-Translation and Turn-Taking Simulation. CSF 2022: 64-79 - [c60]Michael Sammler, Angus Hammond, Rodolphe Lepigre, Brian Campbell, Jean Pichon-Pharabod, Derek Dreyer, Deepak Garg, Peter Sewell:
Islaris: verification of machine code against authoritative ISA semantics. PLDI 2022: 825-840 - [c59]Aastha Mehta, Mohamed Alzayat, Roberta De Viti, Björn B. Brandenburg, Peter Druschel, Deepak Garg:
Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud. USENIX Security Symposium 2022: 2819-2838 - [i36]Mohamed Alzayat, Jonathan Mace, Peter Druschel, Deepak Garg:
Groundhog: Efficient Request Isolation in FaaS. CoRR abs/2205.11458 (2022) - [i35]Roberta De Viti, Isaac Sheff, Noemi Glaeser, Baltasar Dinis, Rodrigo Rodrigues, Jonathan Katz, Bobby Bhattacharjee, Anwar Hithnawi, Deepak Garg, Peter Druschel:
CoVault: A Secure Analytics Platform. CoRR abs/2208.03784 (2022) - [i34]Marco Vassena, Alejandro Russo, Deepak Garg, Vineet Rajani, Deian Stefan:
From Fine- to Coarse-Grained Dynamic Information Flow Control and Back, a Tutorial on Dynamic Information Flow. CoRR abs/2208.13560 (2022) - 2021
- [j19]Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer:
Permissive runtime information flow control in the presence of exceptions. J. Comput. Secur. 29(4): 361-401 (2021) - [j18]Weihao Qu, Marco Gaboardi, Deepak Garg:
Relational cost analysis in a functional-imperative setting. J. Funct. Program. 31: e27 (2021) - [j17]Alejandro Aguirre, Gilles Barthe, Marco Gaboardi, Deepak Garg, Shin-ya Katsumata, Tetsuya Sato:
Higher-order probabilistic adversarial computations: categorical semantics and program logics. Proc. ACM Program. Lang. 5(ICFP): 1-30 (2021) - [j16]Vineet Rajani, Marco Gaboardi, Deepak Garg, Jan Hoffmann:
A unifying type-theory for higher-order (amortized) cost analysis. Proc. ACM Program. Lang. 5(POPL): 1-28 (2021) - [j15]Marco Patrignani, Deepak Garg:
Robustly Safe Compilation, an Efficient Form of Secure Compilation. ACM Trans. Program. Lang. Syst. 43(1): 1:1-1:41 (2021) - [j14]Carmine Abate, Roberto Blanco, Stefan Ciobaca, Adrien Durier, Deepak Garg, Catalin Hritcu, Marco Patrignani, Éric Tanter, Jérémy Thibault:
An Extended Account of Trace-relating Compiler Correctness and Secure Compilation. ACM Trans. Program. Lang. Syst. 43(4): 14:1-14:48 (2021) - [c58]Akram El-Korashy, Stelios Tsampas, Marco Patrignani, Dominique Devriese, Deepak Garg, Frank Piessens:
CapablePtrs: Securely Compiling Partial Programs Using the Pointers-as-Capabilities Principle. CSF 2021: 1-16 - [c57]Robert Künnemann, Deepak Garg, Michael Backes:
Accountability in the Decentralised-Adversary Setting. CSF 2021: 1-16 - [c56]Michael Sammler, Rodolphe Lepigre, Robbert Krebbers, Kayvan Memarian, Derek Dreyer, Deepak Garg:
RefinedC: automating the foundational verification of C code with refined ownership types. PLDI 2021: 158-174 - [i33]Matthew Kolosick, Shravan Narayan, Conrad Watt, Michael LeMay, Deepak Garg, Ranjit Jhala, Deian Stefan:
Isolation Without Taxation: Near Zero Cost Transitions for SFI. CoRR abs/2105.00033 (2021) - [i32]Alejandro Aguirre, Gilles Barthe, Marco Gaboardi, Deepak Garg, Shin-ya Katsumata, Tetsuya Sato:
Higher-order probabilistic adversarial computations: Categorical semantics and program logics. CoRR abs/2107.01155 (2021) - [i31]Akram El-Korashy, Roberto Blanco, Jérémy Thibault, Adrien Durier, Deepak Garg, Catalin Hritcu:
SecurePtrs: Proving Secure Compilation with Data-Flow Back-Translation and Turn-Taking Simulation. CoRR abs/2110.01439 (2021) - [i30]Andrew K. Hirsch, Deepak Garg:
Pirouette: Higher-Order Typed Functional Choreographies. CoRR abs/2111.03484 (2021) - [i29]David Chisnall, Deepak Garg, Catalin Hritcu, Mathias Payer:
Secure Compilation (Dagstuhl Seminar 21481). Dagstuhl Reports 11(10): 173-204 (2021) - 2020
- [j13]Vineet Rajani, Deepak Garg:
On the expressiveness and semantics of information flow types. J. Comput. Secur. 28(1): 129-156 (2020) - [j12]Michael Sammler, Deepak Garg, Derek Dreyer, Tadeusz Litak:
The high-level benefits of low-level sandboxing. Proc. ACM Program. Lang. 4(POPL): 32:1-32:32 (2020) - [c55]Carmine Abate, Roberto Blanco, Stefan Ciobaca, Adrien Durier, Deepak Garg, Catalin Hritcu, Marco Patrignani, Éric Tanter, Jérémy Thibault:
Trace-Relating Compiler Correctness and Secure Compilation. ESOP 2020: 1-28 - [c54]Venkat Arun, Aniket Kate, Deepak Garg, Peter Druschel, Bobby Bhattacharjee:
Finding Safety in Numbers with Secure Allegation Escrows. NDSS 2020 - [i28]Akram El-Korashy, Stelios Tsampas, Marco Patrignani, Dominique Devriese, Deepak Garg, Frank Piessens:
CapablePtrs: Securely Compiling Partial Programs using the Pointers-as-Capabilities Principle. CoRR abs/2005.05944 (2020) - [i27]Gilles Barthe, Roberta De Viti, Peter Druschel, Deepak Garg, Manuel Gomez-Rodriguez, Pierfrancesco Ingo, Matthew Lentz, Aastha Mehta, Bernhard Schölkopf:
PanCast: Listening to Bluetooth Beacons for Epidemic Risk Mitigation. CoRR abs/2011.08069 (2020)
2010 – 2019
- 2019
- [j11]Alejandro Aguirre, Gilles Barthe, Marco Gaboardi, Deepak Garg, Pierre-Yves Strub:
A relational logic for higher-order programs. J. Funct. Program. 29: e16 (2019) - [j10]Weihao Qu, Marco Gaboardi, Deepak Garg:
Relational cost analysis for functional-imperative programs. Proc. ACM Program. Lang. 3(ICFP): 92:1-92:29 (2019) - [j9]Tetsuya Sato, Alejandro Aguirre, Gilles Barthe, Marco Gaboardi, Deepak Garg, Justin Hsu:
Formal verification of higher-order probabilistic programs: reasoning about approximation, convergence, Bayesian inference, and optimization. Proc. ACM Program. Lang. 3(POPL): 38:1-38:30 (2019) - [j8]Marco Vassena, Alejandro Russo, Deepak Garg, Vineet Rajani, Deian Stefan:
From fine- to coarse-grained dynamic information flow control and back. Proc. ACM Program. Lang. 3(POPL): 76:1-76:31 (2019) - [c53]Carmine Abate, Roberto Blanco, Deepak Garg, Catalin Hritcu, Marco Patrignani, Jérémy Thibault:
Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation. CSF 2019: 256-271 - [c52]Marco Patrignani, Deepak Garg:
Robustly Safe Compilation. ESOP 2019: 469-498 - [c51]Ajay Brahmakshatriya, Piyus Kedia, Derrick Paul McKee, Deepak Garg, Akash Lal, Aseem Rastogi, Hamed Nemati, Anmol Panda, Pratik Bhatu:
ConfLLVM: A Compiler for Enforcing Data Confidentiality in Low-Level Code. EuroSys 2019: 4:1-4:15 - [c50]James Litton, Deepak Garg, Peter Druschel, Bobby Bhattacharjee:
Composing Abstractions using the null-Kernel. HotOS 2019: 1-6 - [c49]Ezgi Çiçek, Weihao Qu, Gilles Barthe, Marco Gaboardi, Deepak Garg:
Bidirectional type checking for relational properties. PLDI 2019: 533-547 - [c48]Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O. Duarte, Michael Sammler, Peter Druschel, Deepak Garg:
ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK). USENIX Security Symposium 2019: 1221-1238 - [c47]Robert Künnemann, Deepak Garg, Michael Backes:
Causality & Control Flow. CREST@ETAPS 2019: 32-46 - [e2]Deepak Garg, N. V. Narendra Kumar, Rudrapatna K. Shyamasundar:
Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings. Lecture Notes in Computer Science 11952, Springer 2019, ISBN 978-3-030-36944-6 [contents] - [i26]Carmine Abate, Roberto Blanco, Stefan Ciobaca, Deepak Garg, Catalin Hritcu, Marco Patrignani, Éric Tanter, Jérémy Thibault:
Trace-Relating Compiler Correctness and Secure Compilation. CoRR abs/1907.05320 (2019) - [i25]Aastha Mehta, Mohamed Alzayat, Roberta De Viti, Björn B. Brandenburg, Peter Druschel, Deepak Garg:
Pacer: Network Side-Channel Mitigation in the Cloud. CoRR abs/1908.11568 (2019) - 2018
- [j7]Ivan Radicek, Gilles Barthe, Marco Gaboardi, Deepak Garg, Florian Zuleger:
Monadic refinements for relational cost analysis. Proc. ACM Program. Lang. 2(POPL): 36:1-36:32 (2018) - [c46]Vineet Rajani, Deepak Garg:
Types for Information Flow Control: Labeling Granularity and Semantic Models. CSF 2018: 233-246 - [c45]Alejandro Aguirre, Gilles Barthe, Lars Birkedal, Ales Bizjak, Marco Gaboardi, Deepak Garg:
Relational Reasoning for Markov Chains in a Probabilistic Guarded Lambda Calculus. ESOP 2018: 214-241 - [c44]Reinhard Munz, Fabienne Eigner, Matteo Maffei, Paul Francis, Deepak Garg:
UniTraX: Protecting Data Privacy with Discoverable Biases. POST 2018: 278-299 - [i24]Eslam Elnikety, Deepak Garg, Peter Druschel:
Shai: Enforcing Data-Specific Policies with Near-Zero Runtime Overhead. CoRR abs/1801.04565 (2018) - [i23]Anjo Vahldiek-Oberwagner, Eslam Elnikety, Deepak Garg, Peter Druschel:
ERIM: Secure and Efficient In-process Isolation with Memory Protection Keys. CoRR abs/1801.06822 (2018) - [i22]Alejandro Aguirre, Gilles Barthe, Lars Birkedal, Ales Bizjak, Marco Gaboardi, Deepak Garg:
Relational Reasoning for Markov Chains in a Probabilistic Guarded Lambda Calculus. CoRR abs/1802.09787 (2018) - [i21]Marco Patrignani, Deepak Garg:
Robustly Safe Compilation or, Efficient, Provably Secure Compilation. CoRR abs/1804.00489 (2018) - [i20]Vineet Rajani, Deepak Garg:
Types for Information Flow Control: Labeling Granularity and Semantic Models. CoRR abs/1805.00120 (2018) - [i19]Carmine Abate, Roberto Blanco, Deepak Garg, Catalin Hritcu, Marco Patrignani, Jérémy Thibault:
Exploring Robust Property Preservation for Secure Compilation. CoRR abs/1807.04603 (2018) - [i18]Tetsuya Sato, Alejandro Aguirre, Gilles Barthe, Marco Gaboardi, Deepak Garg, Justin Hsu:
Formal verification of higher-order probabilistic programs. CoRR abs/1807.06091 (2018) - [i17]Venkat Arun, Aniket Kate, Deepak Garg, Peter Druschel, Bobby Bhattacharjee:
SATE: Robust and Private Allegation Escrows. CoRR abs/1810.10123 (2018) - [i16]Weihao Qu, Marco Gaboardi, Deepak Garg:
Relational Cost Analysis for Functional-Imperative Programs. CoRR abs/1812.04090 (2018) - [i15]Ezgi Çiçek, Weihao Qu, Gilles Barthe, Marco Gaboardi, Deepak Garg:
Bidirectional Type Checking for Relational Properties. CoRR abs/1812.05067 (2018) - [i14]Amal Ahmed, Deepak Garg, Catalin Hritcu, Frank Piessens:
Secure Compilation (Dagstuhl Seminar 18201). Dagstuhl Reports 8(5): 1-30 (2018) - [i13]Robert Künnemann, Deepak Garg, Michael Backes:
Accountability in Security Protocols. IACR Cryptol. ePrint Arch. 2018: 127 (2018) - 2017
- [j6]Alejandro Aguirre, Gilles Barthe, Marco Gaboardi, Deepak Garg, Pierre-Yves Strub:
A relational logic for higher-order programs. Proc. ACM Program. Lang. 1(ICFP): 21:1-21:29 (2017) - [j5]David Swasey, Deepak Garg, Derek Dreyer:
Robust and compositional verification of object capability patterns. Proc. ACM Program. Lang. 1(OOPSLA): 89:1-89:26 (2017) - [j4]Vineet Rajani, Iulia Bastys, Willard Rafnsson, Deepak Garg:
Type systems for information flow control: the question of granularity. ACM SIGLOG News 4(1): 6-21 (2017) - [c43]Marco Patrignani, Deepak Garg:
Secure Compilation and Hyperproperty Preservation. CSF 2017: 392-404 - [c42]Abhishek Bichhawat, Vineet Rajani, Jinank Jain, Deepak Garg, Christian Hammer:
WebPol: Fine-Grained Information Flow Policies for Web Browsers. ESORICS (1) 2017: 242-259 - [c41]Ezgi Çiçek, Gilles Barthe, Marco Gaboardi, Deepak Garg, Jan Hoffmann:
Relational cost analysis. POPL 2017: 316-329 - [c40]Aastha Mehta, Eslam Elnikety, Katura Harvey, Deepak Garg, Peter Druschel:
Qapla: Policy compliance for database-backed systems. USENIX Security Symposium 2017: 1463-1479 - [i12]Alejandro Aguirre, Gilles Barthe, Marco Gaboardi, Deepak Garg, Pierre-Yves Strub:
A Relational Logic for Higher-Order Programs. CoRR abs/1703.05042 (2017) - [i11]Abhishek Bichhawat, Vineet Rajani, Jinank Jain, Deepak Garg, Christian Hammer:
WebPol: Fine-grained Information Flow Policies for Web Browsers. CoRR abs/1706.06932 (2017) - [i10]Deepak Garg, Catalin Hritcu, Marco Patrignani, Marco Stronati, David Swasey:
Robust Hyperproperty Preservation for Secure Compilation (Extended Abstract). CoRR abs/1710.07309 (2017) - [i9]Ajay Brahmakshatriya, Piyus Kedia, Derrick Paul McKee, Pratik Bhatu, Deepak Garg, Akash Lal, Aseem Rastogi:
An Instrumenting Compiler for Enforcing Confidentiality in Low-Level Code. CoRR abs/1711.11396 (2017) - [i8]Sanjit Chatterjee, Deepak Garg, Aniket Kate, Tobias Theobald:
Encrypting Messages for Incomplete Chains of Certificates. IACR Cryptol. ePrint Arch. 2017: 777 (2017) - 2016
- [c39]Roly Perera, Deepak Garg, James Cheney:
Causally Consistent Dynamic Slicing. CONCUR 2016: 18:1-18:15 - [c38]Vineet Rajani, Deepak Garg, Tamara Rezk:
On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks. CSF 2016: 150-163 - [c37]Willard Rafnsson, Deepak Garg, Andrei Sabelfeld:
Progress-Sensitive Security for SPARK. ESSoS 2016: 20-37 - [c36]Ezgi Çiçek, Zoe Paraskevopoulou, Deepak Garg:
A type theory for incremental computational complexity with control flow changes. ICFP 2016: 132-145 - [c35]James Litton, Anjo Vahldiek-Oberwagner, Eslam Elnikety, Deepak Garg, Bobby Bhattacharjee, Peter Druschel:
Light-Weight Contexts: An OS Abstraction for Safety and Performance. OSDI 2016: 49-64 - [c34]Iulia Bolosteanu, Deepak Garg:
Asymmetric Secure Multi-execution with Declassification. POST 2016: 24-45 - [c33]Eslam Elnikety, Aastha Mehta, Anjo Vahldiek-Oberwagner, Deepak Garg, Peter Druschel:
Thoth: Comprehensive Policy Compliance in Data Retrieval Systems. USENIX Security Symposium 2016: 637-654 - [i7]Roly Perera, Deepak Garg, James Cheney:
Causally consistent dynamic slicing. CoRR abs/1610.02327 (2016) - 2015
- [c32]Omar Chowdhury, Deepak Garg, Limin Jia, Anupam Datta:
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits. CCS 2015: 1130-1143 - [c31]Anupam Datta, Deepak Garg, Dilsun Kirli Kaynar, Divya Sharma, Arunesh Sinha:
Program Actions as Actual Causes: A Building Block for Accountability. CSF 2015: 261-275 - [c30]Vineet Rajani, Abhishek Bichhawat, Deepak Garg, Christian Hammer:
Information Flow Control for Event Handling and the DOM in Web Browsers. CSF 2015: 366-379 - [c29]Limin Jia, Shayak Sen, Deepak Garg, Anupam Datta:
A Logic of Programs with Interface-Confined Code. CSF 2015: 512-525 - [c28]Ezgi Çiçek, Deepak Garg, Umut A. Acar:
Refinement Types for Incremental Computational Complexity. ESOP 2015: 406-431 - [c27]Anjo Vahldiek-Oberwagner, Eslam Elnikety, Aastha Mehta, Deepak Garg, Peter Druschel, Rodrigo Rodrigues, Johannes Gehrke, Ansley Post:
Guardat: enforcing data policies at the storage layer. EuroSys 2015: 13:1-13:16 - [i6]Limin Jia, Shayak Sen, Deepak Garg, Anupam Datta:
System M: A Program Logic for Code Sandboxing and Identification. CoRR abs/1501.05673 (2015) - [i5]Anupam Datta, Deepak Garg, Dilsun Kirli Kaynar, Divya Sharma, Arunesh Sinha:
Program Actions as Actual Causes: A Building Block for Accountability. CoRR abs/1505.01131 (2015) - [i4]Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer:
Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis. CoRR abs/1506.03950 (2015) - [i3]Omar Chowdhury, Deepak Garg, Limin Jia, Anupam Datta:
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits. CoRR abs/1508.02448 (2015) - 2014
- [c26]Omar Chowdhury, Limin Jia, Deepak Garg, Anupam Datta:
Temporal Mode-Checking for Runtime Monitoring of Privacy Policies. CAV 2014: 131-149 - [c25]Se Eun Oh, Ji Young Chun, Limin Jia, Deepak Garg, Carl A. Gunter, Anupam Datta:
Privacy-preserving audit for broker-based health information exchange. CODASPY 2014: 313-320 - [c24]Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer:
Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis. PLAS@ECOOP 2014: 15 - [c23]Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer:
Information Flow Control in WebKit's JavaScript Bytecode. POST 2014: 159-178 - [i2]Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer:
Information Flow Control in WebKit's JavaScript Bytecode. CoRR abs/1401.4339 (2014) - 2013
- [j3]Aleksandar Nanevski, Anindya Banerjee, Deepak Garg:
Dependent Type Theory for Verification of Information Flow and Access Control Policies. ACM Trans. Program. Lang. Syst. 35(2): 6:1-6:41 (2013) - 2012
- [j2]Deepak Garg, Frank Pfenning:
Stateful authorization logic - Proof theory and a case study. J. Comput. Secur. 20(4): 353-391 (2012) - [c22]Valerio Genovese, Deepak Garg, Daniele Rispoli:
Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction. CSF 2012: 139-153 - [c21]Neelakantan R. Krishnaswami, Aaron Turon, Derek Dreyer, Deepak Garg:
Superficially substructural types. ICFP 2012: 41-54 - [c20]Deepak Garg, Valerio Genovese, Sara Negri:
Countermodels from Sequent Calculi in Multi-Modal Logics. LICS 2012: 315-324 - [c19]Valerio Genovese, Deepak Garg, Daniele Rispoli:
Labeled Goal-Directed Search in Access Control Logic. STM 2012: 65-80 - 2011
- [j1]Anupam Datta, Jason Franklin, Deepak Garg, Limin Jia, Dilsun Kirli Kaynar:
On Adversary Models and Compositional Security. IEEE Secur. Priv. 9(3): 26-32 (2011) - [c18]Deepak Garg, Limin Jia, Anupam Datta:
Policy auditing over incomplete logs: theory, implementation and applications. CCS 2011: 151-162 - [c17]Anupam Datta, Jeremiah Blocki, Nicolas Christin, Henry DeYoung, Deepak Garg, Limin Jia, Dilsun Kirli Kaynar, Arunesh Sinha:
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms. ICISS 2011: 1-27 - [c16]Aleksandar Nanevski, Anindya Banerjee, Deepak Garg:
Verification of Information Flow and Access Control Policies with Dependent Types. IEEE Symposium on Security and Privacy 2011: 165-179 - [c15]Jamie Morgenstern, Deepak Garg, Frank Pfenning:
A Proof-Carrying File System with Revocable and Use-Once Certificates. STM 2011: 40-55 - [c14]Valerio Genovese, Deepak Garg:
New Modalities for Access Control Logics: Permission, Control and Ratification. STM 2011: 56-71 - [i1]Deepak Garg, Limin Jia, Anupam Datta:
A Logical Method for Policy Enforcement over Evolving Audit Logs. CoRR abs/1102.2521 (2011) - 2010
- [c13]Deepak Garg, Frank Pfenning:
A Proof-Carrying File System. IEEE Symposium on Security and Privacy 2010: 349-364 - [c12]Deepak Garg, Frank Pfenning:
Stateful Authorization Logic: - Proof Theory and a Case Study. STM 2010: 210-225 - [c11]Henry DeYoung, Deepak Garg, Limin Jia, Dilsun Kirli Kaynar, Anupam Datta:
Experiences in the logical specification of the HIPAA and GLBA privacy laws. WPES 2010: 73-82 - [c10]Deepak Garg, Jason Franklin, Dilsun Kirli Kaynar, Anupam Datta:
Compositional System Security with Interface-Confined Adversaries. MFPS 2010: 49-71 - [e1]Anindya Banerjee, Deepak Garg:
Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, PLAS 2010, Toronto, ON, Canada, 10 June, 2010. ACM 2010, ISBN 978-1-60558-827-8 [contents]
2000 – 2009
- 2009
- [c9]Avik Chaudhuri, Deepak Garg:
PCAL: Language Support for Proof-Carrying Authorization Systems. ESORICS 2009: 184-199 - [c8]Anupam Datta, Jason Franklin, Deepak Garg, Dilsun Kirli Kaynar:
A Logic of Secure Systems and its Application to Trusted Computing. SP 2009: 221-236 - 2008
- [c7]Henry DeYoung, Deepak Garg, Frank Pfenning:
An Authorization Logic With Explicit Time. CSF 2008: 133-145 - [c6]Deepak Garg, Martín Abadi:
A Modal Deconstruction of Access Control Logics. FoSSaCS 2008: 216-230 - 2007
- [c5]Kevin D. Bowers, Lujo Bauer, Deepak Garg, Frank Pfenning, Michael K. Reiter:
Consumable Credentials in Linear-Logic-Based Access-Control Systems. NDSS 2007 - 2006
- [c4]Deepak Garg, Frank Pfenning:
Non-Interference in Constructive Authorization Logic. CSFW 2006: 283-296 - [c3]Deepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, Michael K. Reiter:
A Linear Logic of Authorization and Knowledge. ESORICS 2006: 297-312 - 2005
- [c2]Deepak Garg, Frank Pfenning:
Type-Directed Concurrency. CONCUR 2005: 6-20 - 2004
- [c1]Deepak Garg, Akash Lal, Sanjiva Prasad:
Effective Chemistry for Synchrony and Asynchrony. IFIP TCS 2004: 479-492
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint