default search action
Abhishek Bichhawat
Person information
- affiliation: Indian Institute of Technology, Gandhinagar, India
- affiliation (former): Carnegie Mellon University, PA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c18]McKenna McCall, Abhishek Bichhawat, Limin Jia:
Tainted Secure Multi-Execution to Restrict Attacker Influence. CCS 2023: 1732-1745 - [c17]Karthikeyan Bhargavan, Abhishek Bichhawat, Pedram Hosseyni, Ralf Küsters, Klaas Pruiksma, Guido Schmitz, Clara Waldmann, Tim Würtele:
Layered Symbolic Security Analysis in $\textsf {DY}^\star $. ESORICS (3) 2023: 3-21 - [c16]McKenna McCall, Eric Zeng, Faysal Hossain Shezan, Mitchell Yang, Lujo Bauer, Abhishek Bichhawat, Camille Cobb, Limin Jia, Yuan Tian:
Towards Usable Security Analysis Tools for Trigger-Action Programming. SOUPS 2023: 301-320 - [i8]Karthikeyan Bhargavan, Abhishek Bichhawat, Pedram Hosseyni, Ralf Küsters, Klaas Pruiksma, Guido Schmitz, Clara Waldmann, Tim Würtele:
Layered Symbolic Security Analysis in DY$^\star$. IACR Cryptol. ePrint Arch. 2023: 1329 (2023) - 2022
- [c15]McKenna McCall, Abhishek Bichhawat, Limin Jia:
Compositional Information Flow Monitoring for Reactive Programs. EuroS&P 2022: 467-486 - [c14]Son Ho, Jonathan Protzenko, Abhishek Bichhawat, Karthikeyan Bhargavan:
Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations. SP 2022: 107-124 - [i7]Son Ho, Jonathan Protzenko, Abhishek Bichhawat, Karthikeyan Bhargavan:
Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations (Long Version). IACR Cryptol. ePrint Arch. 2022: 607 (2022) - 2021
- [j1]Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer:
Permissive runtime information flow control in the presence of exceptions. J. Comput. Secur. 29(4): 361-401 (2021) - [c13]Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Tim Würtele:
A Tutorial-Style Introduction to DY*. Protocols, Strands, and Logic 2021: 77-97 - [c12]Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Tim Würtele:
An In-Depth Symbolic Security Analysis of the ACME Standard. CCS 2021: 2601-2617 - [c11]Abhishek Bichhawat, Matt Fredrikson, Jean Yang:
Automating Audit with Policy Inference. CSF 2021: 1-16 - [c10]Abhishek Bichhawat, McKenna McCall, Limin Jia:
Gradual Security Types and Gradual Guarantees. CSF 2021: 1-16 - [c9]Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Tim Würtele:
DY*: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code. EuroS&P 2021: 523-542 - [i6]Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Tim Würtele:
An In-Depth Symbolic Security Analysis of the ACME Standard. IACR Cryptol. ePrint Arch. 2021: 1457 (2021) - 2020
- [c8]Abhishek Bichhawat, Matt Fredrikson, Jean Yang, Akash Trehan:
Contextual and Granular Policy Enforcement in Database-backed Applications. AsiaCCS 2020: 432-444 - [i5]Abhishek Bichhawat, McKenna McCall, Limin Jia:
First-order Gradual Information Flow Types with Gradual Guarantees. CoRR abs/2003.12819 (2020)
2010 – 2019
- 2018
- [b1]Abhishek Bichhawat:
Practical dynamic information flow control. Saarland University, Saarbrücken, Germany, 2018 - [i4]Abhishek Bichhawat, Akash Trehan, Jean Yang, Matt Fredrikson:
ESTRELA: Automated Policy Enforcement Across Remote APIs. CoRR abs/1811.08234 (2018) - 2017
- [c7]Abhishek Bichhawat, Vineet Rajani, Jinank Jain, Deepak Garg, Christian Hammer:
WebPol: Fine-Grained Information Flow Policies for Web Browsers. ESORICS (1) 2017: 242-259 - [i3]Abhishek Bichhawat, Vineet Rajani, Jinank Jain, Deepak Garg, Christian Hammer:
WebPol: Fine-grained Information Flow Policies for Web Browsers. CoRR abs/1706.06932 (2017) - 2015
- [c6]Vineet Rajani, Abhishek Bichhawat, Deepak Garg, Christian Hammer:
Information Flow Control for Event Handling and the DOM in Web Browsers. CSF 2015: 366-379 - [c5]Abhishek Bichhawat:
Post-Dominator Analysis for Precisely Handling Implicit Flows. ICSE (2) 2015: 787-789 - [i2]Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer:
Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis. CoRR abs/1506.03950 (2015) - 2014
- [c4]Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer:
Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis. PLAS@ECOOP 2014: 15 - [c3]Abhishek Bichhawat:
Exception handling for dynamic information flow control. ICSE Companion 2014: 718-720 - [c2]Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer:
Information Flow Control in WebKit's JavaScript Bytecode. POST 2014: 159-178 - [i1]Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer:
Information Flow Control in WebKit's JavaScript Bytecode. CoRR abs/1401.4339 (2014) - 2011
- [c1]Udaya Kiran Tupakula, Vijay Varadharajan, Abhishek Bichhawat:
Security Architecture for Virtual Machines. ICA3PP (1) 2011: 218-229
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint