Deepak Garg
Deepak Garg
Max Planck Institute for Software Systems (MPI-SWS), Saarland Informatics Campus (SIC)
Verified email at - Homepage
Cited by
Cited by
{ERIM}: Secure, Efficient In-process Isolation with Protection Keys ({{{{{MPK}}}}})
A Vahldiek-Oberwagner, E Elnikety, NO Duarte, M Sammler, P Druschel, ...
28th USENIX Security Symposium (USENIX Security 19), 1221-1238, 2019
Verification of information flow and access control policies with dependent types
A Nanevski, A Banerjee, D Garg
2011 IEEE Symposium on Security and Privacy, 165-179, 2011
Light-Weight Contexts: An OS Abstraction for Safety and Performance
J Litton, A Vahldiek-Oberwagner, E Elnikety, D Garg, B Bhattacharjee, ...
12th USENIX Symposium on Operating Systems Design and Implementation (OSDI†…, 2016
Policy auditing over incomplete logs: Theory, implementation and applications
D Garg, L Jia, A Datta
Proceedings of the 18th ACM conference on Computer and communications†…, 2011
Experiences in the logical specification of the HIPAA and GLBA privacy laws
H DeYoung, D Garg, L Jia, D Kaynar, A Datta
Proceedings of the 9th annual ACM workshop on Privacy in the electronic†…, 2010
A logic of secure systems and its application to trusted computing
A Datta, J Franklin, D Garg, D Kaynar
Security and Privacy, 2009 30th IEEE Symposium on, 221-236, 2009
Non-interference in constructive authorization logic
D Garg, F Pfenning
Computer Security Foundations Workshop, 2006. 19th IEEE, 11 pp.-296, 2006
Information flow control in WebKitĘs JavaScript bytecode
A Bichhawat, V Rajani, D Garg, C Hammer
Principles of Security and Trust: Third International Conference, POST 2014†…, 2014
Relational cost analysis.
E Çiçek, G Barthe, M Gaboardi, D Garg, J Hoffmann
POPL 17, 316-329, 2017
A modal deconstruction of access control logics
D Garg, M Abadi
International Conference on Foundations of Software Science and†…, 2008
A linear logic of authorization and knowledge
D Garg, L Bauer, K Bowers, F Pfenning, M Reiter
Computer Security–ESORICS 2006, 297-312, 2006
RefinedC: automating the foundational verification of C code with refined ownership types
M Sammler, R Lepigre, R Krebbers, K Memarian, D Dreyer, D Garg
Proceedings of the 42nd ACM SIGPLAN International Conference on Programming†…, 2021
Journey beyond full abstraction: Exploring robust property preservation for secure compilation
C Abate, R Blanco, D Garg, C Hritcu, M Patrignani, J Thibault
2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 256-25615, 2019
A relational logic for higher-order programs
A Aguirre, G Barthe, M Gaboardi, D Garg, PY Strub
Journal of Functional Programming 29, 2019
Robust and compositional verification of object capability patterns
D Swasey, D Garg, D Dreyer
Proceedings of the ACM on Programming Languages 1 (OOPSLA), 1-26, 2017
A proof-carrying file system
D Garg, F Pfenning
Security and Privacy (SP), 2010 IEEE Symposium on, 349-364, 2010
Secure compilation and hyperproperty preservation
M Patrignani, D Garg
2017 IEEE 30th Computer Security Foundations Symposium (CSF), 392-404, 2017
Qapla: Policy compliance for database-backed systems
A Mehta, E Elnikety, K Harvey, D Garg, P Druschel
26th USENIX Security Symposium (USENIX Security 17), 1463-1479, 2017
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms⋆
A Datta, J Blocki, N Christin, H DeYoung, D Garg, L Jia, D Kaynar, ...
An authorization logic with explicit time
H DeYoung, D Garg, F Pfenning
Computer Security Foundations Symposium, 2008. CSF'08. IEEE 21st, 133-145, 2008
The system can't perform the operation now. Try again later.
Articles 1–20