Deepak Garg
Deepak Garg
Max Planck Institute for Software Systems (MPI-SWS), Saarland Informatics Campus (SIC)
Verified email at - Homepage
Cited by
Cited by
Verification of information flow and access control policies with dependent types
A Nanevski, A Banerjee, D Garg
2011 IEEE Symposium on Security and Privacy, 165-179, 2011
A logic of secure systems and its application to trusted computing
A Datta, J Franklin, D Garg, D Kaynar
Security and Privacy, 2009 30th IEEE Symposium on, 221-236, 2009
Policy auditing over incomplete logs: Theory, implementation and applications
D Garg, L Jia, A Datta
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Experiences in the logical specification of the HIPAA and GLBA privacy laws
H DeYoung, D Garg, L Jia, D Kaynar, A Datta
Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010
Non-interference in constructive authorization logic
D Garg, F Pfenning
Computer Security Foundations Workshop, 2006. 19th IEEE, 11 pp.-296, 2006
Information flow control in WebKit¢s JavaScript bytecode
A Bichhawat, V Rajani, D Garg, C Hammer
International Conference on Principles of Security and Trust, 159-178, 2014
Light-Weight Contexts: An OS Abstraction for Safety and Performance
J Litton, A Vahldiek-Oberwagner, E Elnikety, D Garg, B Bhattacharjee, ...
12th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2016
A linear logic of authorization and knowledge
D Garg, L Bauer, K Bowers, F Pfenning, M Reiter
Computer Security–ESORICS 2006, 297-312, 2006
A modal deconstruction of access control logics
D Garg, M Abadi
International Conference on Foundations of Software Science and …, 2008
ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK)
A Vahldiek-Oberwagner, E Elnikety, NO Duarte, M Sammler, P Druschel, ...
28th USENIX Security Symposium (USENIX Security 19), 1221-1238, 2019
Relational cost analysis.
E Çiçek, G Barthe, M Gaboardi, D Garg, J Hoffmann
POPL 17, 316-329, 2017
A proof-carrying file system
D Garg, F Pfenning
Security and Privacy (SP), 2010 IEEE Symposium on, 349-364, 2010
Robust and compositional verification of object capability patterns.
D Swasey, D Garg, D Dreyer
Proc. ACM Program. Lang. 1 (OOPSLA), 89:1-89:26, 2017
Journey beyond full abstraction: Exploring robust property preservation for secure compilation
C Abate, R Blanco, D Garg, C Hritcu, M Patrignani, J Thibault
2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 256-25615, 2019
Consumable credentials in logic-based access-control systems
KD Bowers, L Bauer, D Garg, F Pfenning, MK Reiter
Proceedings of the 14th Annual Network and Distributed System Security …, 2007
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms⋆
A Datta, J Blocki, N Christin, H DeYoung, D Garg, L Jia, D Kaynar, ...
An authorization logic with explicit time
H DeYoung, D Garg, F Pfenning
Computer Security Foundations Symposium, 2008. CSF'08. IEEE 21st, 133-145, 2008
A relational logic for higher-order programs
A Aguirre, G Barthe, M Gaboardi, D Garg, PY Strub
Journal of Functional Programming 29, 2019
Secure compilation and hyperproperty preservation
M Patrignani, D Garg
2017 IEEE 30th Computer Security Foundations Symposium (CSF), 392-404, 2017
Compositional system security with interface-confined adversaries
D Garg, J Franklin, D Kaynar, A Datta
Electronic Notes in Theoretical Computer Science 265, 49-71, 2010
The system can't perform the operation now. Try again later.
Articles 1–20