Information flow control in WebKit’s JavaScript bytecode A Bichhawat, V Rajani, D Garg, C Hammer Principles of Security and Trust: Third International Conference, POST 2014 …, 2014 | 113 | 2014 |
: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code K Bhargavan, A Bichhawat, QH Do, P Hosseyni, R Küsters, G Schmitz, ... 2021 IEEE European Symposium on Security and Privacy (EuroS&P), 523-542, 2021 | 39 | 2021 |
Information flow control for event handling and the DOM in web browsers V Rajani, A Bichhawat, D Garg, C Hammer 2015 IEEE 28th Computer Security Foundations Symposium, 366-379, 2015 | 39 | 2015 |
Generalizing permissive-upgrade in dynamic information flow analysis A Bichhawat, V Rajani, D Garg, C Hammer Proceedings of the Ninth Workshop on Programming Languages and Analysis for …, 2014 | 36 | 2014 |
Noise: A Library of Verified High-Performance Secure Channel Protocol Implementations S Ho, J Protzenko, A Bichhawat, K Bhargavan 2022 IEEE Symposium on Security and Privacy (SP), 107-124, 2022 | 16 | 2022 |
WebPol: Fine-grained information flow policies for web browsers A Bichhawat, V Rajani, J Jain, D Garg, C Hammer European Symposium on Research in Computer Security, 242-259, 2017 | 13 | 2017 |
An in-depth symbolic security analysis of the ACME standard K Bhargavan, A Bichhawat, QH Do, P Hosseyni, R Küsters, G Schmitz, ... Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021 | 12 | 2021 |
A survey on issues in mobile grid computing A Bichhawat, RC Joshi Int J Recent Trends Eng. Technol 4 (2), 2010 | 10 | 2010 |
A Tutorial-Style Introduction to K Bhargavan, A Bichhawat, QH Do, P Hosseyni, R Küsters, G Schmitz, ... Protocols, Strands, and Logic: Essays Dedicated to Joshua Guttman on the …, 2021 | 5 | 2021 |
Exception handling for dynamic information flow control A Bichhawat Companion Proceedings of the 36th International Conference on Software …, 2014 | 5 | 2014 |
SafeTAP: An efficient incremental analyzer for trigger-action programs, 2021 FHS McKenna McCall, A Bichhawat, C Cobb, L Jia, Y Tian, C Grace, ... CMU Technical Report, 0 | 5 | |
Compositional information flow monitoring for reactive programs MK McCall, A Bichhawat, L Jia 2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 467-486, 2022 | 4 | 2022 |
Gradual security types and gradual guarantees A Bichhawat, MK McCall, L Jia 2021 IEEE 34th Computer Security Foundations Symposium (CSF), 1-16, 2021 | 4 | 2021 |
DY⋆ Code Repository K Bhargavan, A Bichhawat, QH Do, P Hosseyni, R Küsters, G Schmitz, ... URL: https://github. com/reprosec/dolev-yao-star, 2021 | 4 | 2021 |
Contextual and granular policy enforcement in database-backed applications A Bichhawat, M Fredrikson, J Yang, A Trehan Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 4 | 2020 |
Towards Usable Security Analysis Tools for {Trigger-Action} Programming MK McCall, E Zeng, FH Shezan, M Yang, L Bauer, A Bichhawat, C Cobb, ... Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 301-320, 2023 | 3 | 2023 |
SAFETAP: An Efficient Incremental Analyzer for Trigger-Action Programs MK McCall, FH Shezan, A Bichhawat, C Cobb, L Jia, Y Tian, C Grace, ... Carnegie Mellon University, 2021 | 2 | 2021 |
Permissive runtime information flow control in the presence of exceptions A Bichhawat, V Rajani, D Garg, C Hammer Journal of Computer Security 29 (4), 361-401, 2021 | 2 | 2021 |
Security architecture for virtual machines U Tupakula, V Varadharajan, A Bichhawat Algorithms and Architectures for Parallel Processing: 11th International …, 2011 | 2 | 2011 |
Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations (Long Version) S Ho, J Protzenko, A Bichhawat, K Bhargavan Cryptology ePrint Archive, 2022 | 1 | 2022 |