{ERIM}: Secure, Efficient In-process Isolation with Protection Keys ({{{{{MPK}}}}}) A Vahldiek-Oberwagner, E Elnikety, NO Duarte, M Sammler, P Druschel, ... 28th USENIX Security Symposium (USENIX Security 19), 1221-1238, 2019 | 287 | 2019 |
Verification of information flow and access control policies with dependent types A Nanevski, A Banerjee, D Garg 2011 IEEE Symposium on Security and Privacy, 165-179, 2011 | 186* | 2011 |
Light-Weight Contexts: An OS Abstraction for Safety and Performance J Litton, A Vahldiek-Oberwagner, E Elnikety, D Garg, B Bhattacharjee, ... 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2016 | 152 | 2016 |
Experiences in the logical specification of the HIPAA and GLBA privacy laws H DeYoung, D Garg, L Jia, D Kaynar, A Datta Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010 | 141* | 2010 |
Policy auditing over incomplete logs: Theory, implementation and applications D Garg, L Jia, A Datta Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 140 | 2011 |
A logic of secure systems and its application to trusted computing A Datta, J Franklin, D Garg, D Kaynar Security and Privacy, 2009 30th IEEE Symposium on, 221-236, 2009 | 134 | 2009 |
Non-interference in constructive authorization logic D Garg, F Pfenning Computer Security Foundations Workshop, 2006. 19th IEEE, 11 pp.-296, 2006 | 120 | 2006 |
Information flow control in WebKit’s JavaScript bytecode A Bichhawat, V Rajani, D Garg, C Hammer Principles of Security and Trust: Third International Conference, POST 2014 …, 2014 | 114 | 2014 |
RefinedC: automating the foundational verification of C code with refined ownership types M Sammler, R Lepigre, R Krebbers, K Memarian, D Dreyer, D Garg Proceedings of the 42nd ACM SIGPLAN International Conference on Programming …, 2021 | 98 | 2021 |
Relational cost analysis. E Çiçek, G Barthe, M Gaboardi, D Garg, J Hoffmann POPL 17, 316-329, 2017 | 96 | 2017 |
Journey beyond full abstraction: Exploring robust property preservation for secure compilation C Abate, R Blanco, D Garg, C Hritcu, M Patrignani, J Thibault 2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 256-25615, 2019 | 90 | 2019 |
A modal deconstruction of access control logics D Garg, M Abadi International Conference on Foundations of Software Science and …, 2008 | 90 | 2008 |
A linear logic of authorization and knowledge D Garg, L Bauer, K Bowers, F Pfenning, M Reiter Computer Security–ESORICS 2006, 297-312, 2006 | 88 | 2006 |
A relational logic for higher-order programs A Aguirre, G Barthe, M Gaboardi, D Garg, PY Strub Journal of Functional Programming 29, 2019 | 70 | 2019 |
Robust and compositional verification of object capability patterns D Swasey, D Garg, D Dreyer Proceedings of the ACM on Programming Languages 1 (OOPSLA), 1-26, 2017 | 67* | 2017 |
A proof-carrying file system D Garg, F Pfenning Security and Privacy (SP), 2010 IEEE Symposium on, 349-364, 2010 | 60 | 2010 |
Qapla: Policy compliance for database-backed systems A Mehta, E Elnikety, K Harvey, D Garg, P Druschel 26th USENIX Security Symposium (USENIX Security 17), 1463-1479, 2017 | 55 | 2017 |
Secure compilation and hyperproperty preservation M Patrignani, D Garg 2017 IEEE 30th Computer Security Foundations Symposium (CSF), 392-404, 2017 | 53 | 2017 |
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms⋆ A Datta, J Blocki, N Christin, H DeYoung, D Garg, L Jia, D Kaynar, ... | 51 | 2011 |
Robustly safe compilation, an efficient form of secure compilation M Patrignani, D Garg ACM Transactions on Programming Languages and Systems (TOPLAS) 43 (1), 1-41, 2021 | 50* | 2021 |