var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https://dblp.org/pid/61/10308.bib&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https://dblp.org/pid/61/10308.bib&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https://dblp.org/pid/61/10308.bib&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2023\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Tainted Secure Multi-Execution to Restrict Attacker Influence.\n \n \n \n \n\n\n \n McCall, M.; Bichhawat, A.; and Jia, L.\n\n\n \n\n\n\n In Meng, W.; Jensen, C. D.; Cremers, C.; and Kirda, E., editor(s), Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pages 1732–1745, 2023. ACM\n \n\n\n\n
\n\n\n\n \n \n \"TaintedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ccs/McCallB023,\n  author       = {McKenna McCall and\n                  Abhishek Bichhawat and\n                  Limin Jia},\n  editor       = {Weizhi Meng and\n                  Christian Damsgaard Jensen and\n                  Cas Cremers and\n                  Engin Kirda},\n  title        = {Tainted Secure Multi-Execution to Restrict Attacker Influence},\n  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and\n                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November\n                  26-30, 2023},\n  pages        = {1732--1745},\n  publisher    = {{ACM}},\n  year         = {2023},\n  url          = {https://doi.org/10.1145/3576915.3623110},\n  doi          = {10.1145/3576915.3623110},\n  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/ccs/McCallB023.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Layered Symbolic Security Analysis in $}{\\}textsf \\{DY\\}{^}{\\}star {$.\n \n \n \n \n\n\n \n Bhargavan, K.; Bichhawat, A.; Hosseyni, P.; Küsters, R.; Pruiksma, K.; Schmitz, G.; Waldmann, C.; and Würtele, T.\n\n\n \n\n\n\n In Tsudik, G.; Conti, M.; Liang, K.; and Smaragdakis, G., editor(s), Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part III, volume 14346, of Lecture Notes in Computer Science, pages 3–21, 2023. Springer\n \n\n\n\n
\n\n\n\n \n \n \"LayeredPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/esorics/BhargavanBHKPSWW23,\n  author       = {Karthikeyan Bhargavan and\n                  Abhishek Bichhawat and\n                  Pedram Hosseyni and\n                  Ralf K{\\"{u}}sters and\n                  Klaas Pruiksma and\n                  Guido Schmitz and\n                  Clara Waldmann and\n                  Tim W{\\"{u}}rtele},\n  editor       = {Gene Tsudik and\n                  Mauro Conti and\n                  Kaitai Liang and\n                  Georgios Smaragdakis},\n  title        = {Layered Symbolic Security Analysis in {\\textdollar}{\\textbackslash}textsf\n                  \\{DY\\}{\\^{}}{\\textbackslash}star {\\textdollar}},\n  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research\n                  in Computer Security, The Hague, The Netherlands, September 25-29,\n                  2023, Proceedings, Part {III}},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {14346},\n  pages        = {3--21},\n  publisher    = {Springer},\n  year         = {2023},\n  url          = {https://doi.org/10.1007/978-3-031-51479-1\\_1},\n  doi          = {10.1007/978-3-031-51479-1\\_1},\n  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/esorics/BhargavanBHKPSWW23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Towards Usable Security Analysis Tools for Trigger-Action Programming.\n \n \n \n \n\n\n \n McCall, M.; Zeng, E.; Shezan, F. H.; Yang, M.; Bauer, L.; Bichhawat, A.; Cobb, C.; Jia, L.; and Tian, Y.\n\n\n \n\n\n\n In Kelley, P. G.; and Kapadia, A., editor(s), Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023, pages 301–320, 2023. USENIX Association\n \n\n\n\n
\n\n\n\n \n \n \"TowardsPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/soups/McCallZSYBBC0023,\n  author       = {McKenna McCall and\n                  Eric Zeng and\n                  Faysal Hossain Shezan and\n                  Mitchell Yang and\n                  Lujo Bauer and\n                  Abhishek Bichhawat and\n                  Camille Cobb and\n                  Limin Jia and\n                  Yuan Tian},\n  editor       = {Patrick Gage Kelley and\n                  Apu Kapadia},\n  title        = {Towards Usable Security Analysis Tools for Trigger-Action Programming},\n  booktitle    = {Nineteenth Symposium on Usable Privacy and Security, {SOUPS} 2023,\n                  Anaheim, CA, USA, August 5-7, 2023},\n  pages        = {301--320},\n  publisher    = {{USENIX} Association},\n  year         = {2023},\n  url          = {https://www.usenix.org/conference/soups2023/presentation/mccall},\n  timestamp    = {Wed, 09 Aug 2023 15:04:34 +0200},\n  biburl       = {https://dblp.org/rec/conf/soups/McCallZSYBBC0023.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Layered Symbolic Security Analysis in DY$}{^}{\\}star{$.\n \n \n \n \n\n\n \n Bhargavan, K.; Bichhawat, A.; Hosseyni, P.; Küsters, R.; Pruiksma, K.; Schmitz, G.; Waldmann, C.; and Würtele, T.\n\n\n \n\n\n\n IACR Cryptol. ePrint Arch.,1329. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"LayeredPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/iacr/BhargavanBHKPSWW23,\n  author       = {Karthikeyan Bhargavan and\n                  Abhishek Bichhawat and\n                  Pedram Hosseyni and\n                  Ralf K{\\"{u}}sters and\n                  Klaas Pruiksma and\n                  Guido Schmitz and\n                  Clara Waldmann and\n                  Tim W{\\"{u}}rtele},\n  title        = {Layered Symbolic Security Analysis in DY{\\textdollar}{\\^{}}{\\textbackslash}star{\\textdollar}},\n  journal      = {{IACR} Cryptol. ePrint Arch.},\n  pages        = {1329},\n  year         = {2023},\n  url          = {https://eprint.iacr.org/2023/1329},\n  timestamp    = {Mon, 09 Oct 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/iacr/BhargavanBHKPSWW23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Compositional Information Flow Monitoring for Reactive Programs.\n \n \n \n \n\n\n \n McCall, M.; Bichhawat, A.; and Jia, L.\n\n\n \n\n\n\n In 7th IEEE European Symposium on Security and Privacy, EuroS&P 2022, Genoa, Italy, June 6-10, 2022, pages 467–486, 2022. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"CompositionalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/eurosp/McCallBJ22,\n  author       = {McKenna McCall and\n                  Abhishek Bichhawat and\n                  Limin Jia},\n  title        = {Compositional Information Flow Monitoring for Reactive Programs},\n  booktitle    = {7th {IEEE} European Symposium on Security and Privacy, EuroS{\\&}P\n                  2022, Genoa, Italy, June 6-10, 2022},\n  pages        = {467--486},\n  publisher    = {{IEEE}},\n  year         = {2022},\n  url          = {https://doi.org/10.1109/EuroSP53844.2022.00036},\n  doi          = {10.1109/EUROSP53844.2022.00036},\n  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/eurosp/McCallBJ22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations.\n \n \n \n \n\n\n \n Ho, S.; Protzenko, J.; Bichhawat, A.; and Bhargavan, K.\n\n\n \n\n\n\n In 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022, pages 107–124, 2022. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"Noise*:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sp/HoPBB22,\n  author       = {Son Ho and\n                  Jonathan Protzenko and\n                  Abhishek Bichhawat and\n                  Karthikeyan Bhargavan},\n  title        = {Noise*: {A} Library of Verified High-Performance Secure Channel Protocol\n                  Implementations},\n  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,\n                  CA, USA, May 22-26, 2022},\n  pages        = {107--124},\n  publisher    = {{IEEE}},\n  year         = {2022},\n  url          = {https://doi.org/10.1109/SP46214.2022.9833621},\n  doi          = {10.1109/SP46214.2022.9833621},\n  timestamp    = {Thu, 21 Sep 2023 15:57:27 +0200},\n  biburl       = {https://dblp.org/rec/conf/sp/HoPBB22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations (Long Version).\n \n \n \n \n\n\n \n Ho, S.; Protzenko, J.; Bichhawat, A.; and Bhargavan, K.\n\n\n \n\n\n\n IACR Cryptol. ePrint Arch.,607. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"Noise*:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/iacr/HoPBB22,\n  author       = {Son Ho and\n                  Jonathan Protzenko and\n                  Abhishek Bichhawat and\n                  Karthikeyan Bhargavan},\n  title        = {Noise*: {A} Library of Verified High-Performance Secure Channel Protocol\n                  Implementations (Long Version)},\n  journal      = {{IACR} Cryptol. ePrint Arch.},\n  pages        = {607},\n  year         = {2022},\n  url          = {https://eprint.iacr.org/2022/607},\n  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/iacr/HoPBB22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Permissive runtime information flow control in the presence of exceptions.\n \n \n \n \n\n\n \n Bichhawat, A.; Rajani, V.; Garg, D.; and Hammer, C.\n\n\n \n\n\n\n J. Comput. Secur., 29(4): 361–401. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"PermissivePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jcs/BichhawatRGH21,\n  author       = {Abhishek Bichhawat and\n                  Vineet Rajani and\n                  Deepak Garg and\n                  Christian Hammer},\n  title        = {Permissive runtime information flow control in the presence of exceptions},\n  journal      = {J. Comput. Secur.},\n  volume       = {29},\n  number       = {4},\n  pages        = {361--401},\n  year         = {2021},\n  url          = {https://doi.org/10.3233/JCS-211385},\n  doi          = {10.3233/JCS-211385},\n  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/jcs/BichhawatRGH21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Tutorial-Style Introduction to DY*.\n \n \n \n \n\n\n \n Bhargavan, K.; Bichhawat, A.; Do, Q. H.; Hosseyni, P.; Küsters, R.; Schmitz, G.; and Würtele, T.\n\n\n \n\n\n\n In Dougherty, D.; Meseguer, J.; Mödersheim, S. A.; and Rowe, P. D., editor(s), Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, volume 13066, of Lecture Notes in Computer Science, pages 77–97, 2021. Springer\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/birthday/BhargavanB0HKSW21,\n  author       = {Karthikeyan Bhargavan and\n                  Abhishek Bichhawat and\n                  Quoc Huy Do and\n                  Pedram Hosseyni and\n                  Ralf K{\\"{u}}sters and\n                  Guido Schmitz and\n                  Tim W{\\"{u}}rtele},\n  editor       = {Daniel Dougherty and\n                  Jos{\\'{e}} Meseguer and\n                  Sebastian Alexander M{\\"{o}}dersheim and\n                  Paul D. Rowe},\n  title        = {A Tutorial-Style Introduction to DY*},\n  booktitle    = {Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman\n                  on the Occasion of his 66.66th Birthday},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {13066},\n  pages        = {77--97},\n  publisher    = {Springer},\n  year         = {2021},\n  url          = {https://doi.org/10.1007/978-3-030-91631-2\\_4},\n  doi          = {10.1007/978-3-030-91631-2\\_4},\n  timestamp    = {Thu, 21 Sep 2023 09:08:34 +0200},\n  biburl       = {https://dblp.org/rec/conf/birthday/BhargavanB0HKSW21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n An In-Depth Symbolic Security Analysis of the ACME Standard.\n \n \n \n \n\n\n \n Bhargavan, K.; Bichhawat, A.; Do, Q. H.; Hosseyni, P.; Küsters, R.; Schmitz, G.; and Würtele, T.\n\n\n \n\n\n\n In Kim, Y.; Kim, J.; Vigna, G.; and Shi, E., editor(s), CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021, pages 2601–2617, 2021. ACM\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ccs/BhargavanB0HKSW21,\n  author       = {Karthikeyan Bhargavan and\n                  Abhishek Bichhawat and\n                  Quoc Huy Do and\n                  Pedram Hosseyni and\n                  Ralf K{\\"{u}}sters and\n                  Guido Schmitz and\n                  Tim W{\\"{u}}rtele},\n  editor       = {Yongdae Kim and\n                  Jong Kim and\n                  Giovanni Vigna and\n                  Elaine Shi},\n  title        = {An In-Depth Symbolic Security Analysis of the {ACME} Standard},\n  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications\n                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},\n  pages        = {2601--2617},\n  publisher    = {{ACM}},\n  year         = {2021},\n  url          = {https://doi.org/10.1145/3460120.3484588},\n  doi          = {10.1145/3460120.3484588},\n  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/ccs/BhargavanB0HKSW21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Automating Audit with Policy Inference.\n \n \n \n \n\n\n \n Bichhawat, A.; Fredrikson, M.; and Yang, J.\n\n\n \n\n\n\n In 34th IEEE Computer Security Foundations Symposium, CSF 2021, Dubrovnik, Croatia, June 21-25, 2021, pages 1–16, 2021. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"AutomatingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/csfw/BichhawatFY21,\n  author       = {Abhishek Bichhawat and\n                  Matt Fredrikson and\n                  Jean Yang},\n  title        = {Automating Audit with Policy Inference},\n  booktitle    = {34th {IEEE} Computer Security Foundations Symposium, {CSF} 2021, Dubrovnik,\n                  Croatia, June 21-25, 2021},\n  pages        = {1--16},\n  publisher    = {{IEEE}},\n  year         = {2021},\n  url          = {https://doi.org/10.1109/CSF51468.2021.00001},\n  doi          = {10.1109/CSF51468.2021.00001},\n  timestamp    = {Sun, 20 Aug 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/csfw/BichhawatFY21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Gradual Security Types and Gradual Guarantees.\n \n \n \n \n\n\n \n Bichhawat, A.; McCall, M.; and Jia, L.\n\n\n \n\n\n\n In 34th IEEE Computer Security Foundations Symposium, CSF 2021, Dubrovnik, Croatia, June 21-25, 2021, pages 1–16, 2021. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"GradualPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/csfw/BichhawatM021,\n  author       = {Abhishek Bichhawat and\n                  McKenna McCall and\n                  Limin Jia},\n  title        = {Gradual Security Types and Gradual Guarantees},\n  booktitle    = {34th {IEEE} Computer Security Foundations Symposium, {CSF} 2021, Dubrovnik,\n                  Croatia, June 21-25, 2021},\n  pages        = {1--16},\n  publisher    = {{IEEE}},\n  year         = {2021},\n  url          = {https://doi.org/10.1109/CSF51468.2021.00015},\n  doi          = {10.1109/CSF51468.2021.00015},\n  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/csfw/BichhawatM021.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n DY*: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code.\n \n \n \n \n\n\n \n Bhargavan, K.; Bichhawat, A.; Do, Q. H.; Hosseyni, P.; Küsters, R.; Schmitz, G.; and Würtele, T.\n\n\n \n\n\n\n In IEEE European Symposium on Security and Privacy, EuroS&P 2021, Vienna, Austria, September 6-10, 2021, pages 523–542, 2021. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"DY*:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/eurosp/BhargavanBDHKSW21,\n  author       = {Karthikeyan Bhargavan and\n                  Abhishek Bichhawat and\n                  Quoc Huy Do and\n                  Pedram Hosseyni and\n                  Ralf K{\\"{u}}sters and\n                  Guido Schmitz and\n                  Tim W{\\"{u}}rtele},\n  title        = {DY*: {A} Modular Symbolic Verification Framework for Executable Cryptographic\n                  Protocol Code},\n  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\\&}P 2021,\n                  Vienna, Austria, September 6-10, 2021},\n  pages        = {523--542},\n  publisher    = {{IEEE}},\n  year         = {2021},\n  url          = {https://doi.org/10.1109/EuroSP51992.2021.00042},\n  doi          = {10.1109/EUROSP51992.2021.00042},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/eurosp/BhargavanBDHKSW21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n An In-Depth Symbolic Security Analysis of the ACME Standard.\n \n \n \n \n\n\n \n Bhargavan, K.; Bichhawat, A.; Do, Q. H.; Hosseyni, P.; Küsters, R.; Schmitz, G.; and Würtele, T.\n\n\n \n\n\n\n IACR Cryptol. ePrint Arch.,1457. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/iacr/BhargavanBDHKSW21,\n  author       = {Karthikeyan Bhargavan and\n                  Abhishek Bichhawat and\n                  Quoc Huy Do and\n                  Pedram Hosseyni and\n                  Ralf K{\\"{u}}sters and\n                  Guido Schmitz and\n                  Tim W{\\"{u}}rtele},\n  title        = {An In-Depth Symbolic Security Analysis of the {ACME} Standard},\n  journal      = {{IACR} Cryptol. ePrint Arch.},\n  pages        = {1457},\n  year         = {2021},\n  url          = {https://eprint.iacr.org/2021/1457},\n  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/iacr/BhargavanBDHKSW21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Contextual and Granular Policy Enforcement in Database-backed Applications.\n \n \n \n \n\n\n \n Bichhawat, A.; Fredrikson, M.; Yang, J.; and Trehan, A.\n\n\n \n\n\n\n In Sun, H.; Shieh, S.; Gu, G.; and Ateniese, G., editor(s), ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020, pages 432–444, 2020. ACM\n \n\n\n\n
\n\n\n\n \n \n \"ContextualPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 30 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ccs/BichhawatFYT20,\n  author       = {Abhishek Bichhawat and\n                  Matt Fredrikson and\n                  Jean Yang and\n                  Akash Trehan},\n  editor       = {Hung{-}Min Sun and\n                  Shiuh{-}Pyng Shieh and\n                  Guofei Gu and\n                  Giuseppe Ateniese},\n  title        = {Contextual and Granular Policy Enforcement in Database-backed Applications},\n  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications\n                  Security, Taipei, Taiwan, October 5-9, 2020},\n  pages        = {432--444},\n  publisher    = {{ACM}},\n  year         = {2020},\n  url          = {https://doi.org/10.1145/3320269.3384759},\n  doi          = {10.1145/3320269.3384759},\n  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/ccs/BichhawatFYT20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n First-order Gradual Information Flow Types with Gradual Guarantees.\n \n \n \n \n\n\n \n Bichhawat, A.; McCall, M.; and Jia, L.\n\n\n \n\n\n\n CoRR, abs/2003.12819. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"First-orderPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 18 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2003-12819,\n  author       = {Abhishek Bichhawat and\n                  McKenna McCall and\n                  Limin Jia},\n  title        = {First-order Gradual Information Flow Types with Gradual Guarantees},\n  journal      = {CoRR},\n  volume       = {abs/2003.12819},\n  year         = {2020},\n  url          = {https://arxiv.org/abs/2003.12819},\n  eprinttype    = {arXiv},\n  eprint       = {2003.12819},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-12819.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Practical dynamic information flow control.\n \n \n \n \n\n\n \n Bichhawat, A.\n\n\n \n\n\n\n Ph.D. Thesis, Saarland University, Saarbrücken, Germany, 2018.\n \n\n\n\n
\n\n\n\n \n \n \"PracticalPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 12 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@phdthesis{DBLP:phd/dnb/Bichhawat18,\n  author       = {Abhishek Bichhawat},\n  title        = {Practical dynamic information flow control},\n  school       = {Saarland University, Saarbr{\\"{u}}cken, Germany},\n  year         = {2018},\n  url          = {https://publikationen.sulb.uni-saarland.de/handle/20.500.11880/27103},\n  urn          = {urn:nbn:de:bsz:291-scidok-ds-272448},\n  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/phd/dnb/Bichhawat18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n ESTRELA: Automated Policy Enforcement Across Remote APIs.\n \n \n \n \n\n\n \n Bichhawat, A.; Trehan, A.; Yang, J.; and Fredrikson, M.\n\n\n \n\n\n\n CoRR, abs/1811.08234. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"ESTRELA:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 21 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-1811-08234,\n  author       = {Abhishek Bichhawat and\n                  Akash Trehan and\n                  Jean Yang and\n                  Matt Fredrikson},\n  title        = {{ESTRELA:} Automated Policy Enforcement Across Remote APIs},\n  journal      = {CoRR},\n  volume       = {abs/1811.08234},\n  year         = {2018},\n  url          = {http://arxiv.org/abs/1811.08234},\n  eprinttype    = {arXiv},\n  eprint       = {1811.08234},\n  timestamp    = {Thu, 02 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-08234.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n WebPol: Fine-Grained Information Flow Policies for Web Browsers.\n \n \n \n \n\n\n \n Bichhawat, A.; Rajani, V.; Jain, J.; Garg, D.; and Hammer, C.\n\n\n \n\n\n\n In Foley, S. N.; Gollmann, D.; and Snekkenes, E., editor(s), Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I, volume 10492, of Lecture Notes in Computer Science, pages 242–259, 2017. Springer\n \n\n\n\n
\n\n\n\n \n \n \"WebPol:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 30 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/esorics/BichhawatRJGH17,\n  author       = {Abhishek Bichhawat and\n                  Vineet Rajani and\n                  Jinank Jain and\n                  Deepak Garg and\n                  Christian Hammer},\n  editor       = {Simon N. Foley and\n                  Dieter Gollmann and\n                  Einar Snekkenes},\n  title        = {WebPol: Fine-Grained Information Flow Policies for Web Browsers},\n  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research\n                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,\n                  Part {I}},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {10492},\n  pages        = {242--259},\n  publisher    = {Springer},\n  year         = {2017},\n  url          = {https://doi.org/10.1007/978-3-319-66402-6\\_15},\n  doi          = {10.1007/978-3-319-66402-6\\_15},\n  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},\n  biburl       = {https://dblp.org/rec/conf/esorics/BichhawatRJGH17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n WebPol: Fine-grained Information Flow Policies for Web Browsers.\n \n \n \n \n\n\n \n Bichhawat, A.; Rajani, V.; Jain, J.; Garg, D.; and Hammer, C.\n\n\n \n\n\n\n CoRR, abs/1706.06932. 2017.\n \n\n\n\n
\n\n\n\n \n \n \"WebPol:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 30 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/BichhawatRJ0017,\n  author       = {Abhishek Bichhawat and\n                  Vineet Rajani and\n                  Jinank Jain and\n                  Deepak Garg and\n                  Christian Hammer},\n  title        = {WebPol: Fine-grained Information Flow Policies for Web Browsers},\n  journal      = {CoRR},\n  volume       = {abs/1706.06932},\n  year         = {2017},\n  url          = {http://arxiv.org/abs/1706.06932},\n  eprinttype    = {arXiv},\n  eprint       = {1706.06932},\n  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/BichhawatRJ0017.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Information Flow Control for Event Handling and the DOM in Web Browsers.\n \n \n \n \n\n\n \n Rajani, V.; Bichhawat, A.; Garg, D.; and Hammer, C.\n\n\n \n\n\n\n In Fournet, C.; Hicks, M. W.; and Viganò, L., editor(s), IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pages 366–379, 2015. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"InformationPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 31 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/csfw/RajaniB0015,\n  author       = {Vineet Rajani and\n                  Abhishek Bichhawat and\n                  Deepak Garg and\n                  Christian Hammer},\n  editor       = {C{\\'{e}}dric Fournet and\n                  Michael W. Hicks and\n                  Luca Vigan{\\`{o}}},\n  title        = {Information Flow Control for Event Handling and the {DOM} in Web Browsers},\n  booktitle    = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona,\n                  Italy, 13-17 July, 2015},\n  pages        = {366--379},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2015},\n  url          = {https://doi.org/10.1109/CSF.2015.32},\n  doi          = {10.1109/CSF.2015.32},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/csfw/RajaniB0015.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Post-Dominator Analysis for Precisely Handling Implicit Flows.\n \n \n \n \n\n\n \n Bichhawat, A.\n\n\n \n\n\n\n In Bertolino, A.; Canfora, G.; and Elbaum, S. G., editor(s), 37th IEEE/ACM International Conference on Software Engineering, ICSE 2015, Florence, Italy, May 16-24, 2015, Volume 2, pages 787–789, 2015. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"Post-DominatorPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 18 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icse/Bichhawat15,\n  author       = {Abhishek Bichhawat},\n  editor       = {Antonia Bertolino and\n                  Gerardo Canfora and\n                  Sebastian G. Elbaum},\n  title        = {Post-Dominator Analysis for Precisely Handling Implicit Flows},\n  booktitle    = {37th {IEEE/ACM} International Conference on Software Engineering,\n                  {ICSE} 2015, Florence, Italy, May 16-24, 2015, Volume 2},\n  pages        = {787--789},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2015},\n  url          = {https://doi.org/10.1109/ICSE.2015.250},\n  doi          = {10.1109/ICSE.2015.250},\n  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icse/Bichhawat15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis.\n \n \n \n \n\n\n \n Bichhawat, A.; Rajani, V.; Garg, D.; and Hammer, C.\n\n\n \n\n\n\n CoRR, abs/1506.03950. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"GeneralizingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 21 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/BichhawatR0H15,\n  author       = {Abhishek Bichhawat and\n                  Vineet Rajani and\n                  Deepak Garg and\n                  Christian Hammer},\n  title        = {Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis},\n  journal      = {CoRR},\n  volume       = {abs/1506.03950},\n  year         = {2015},\n  url          = {http://arxiv.org/abs/1506.03950},\n  eprinttype    = {arXiv},\n  eprint       = {1506.03950},\n  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/BichhawatR0H15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2014\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis.\n \n \n \n \n\n\n \n Bichhawat, A.; Rajani, V.; Garg, D.; and Hammer, C.\n\n\n \n\n\n\n In Russo, A.; and Tripp, O., editor(s), Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security, PLAS@ECOOP 2014, Uppsala, Sweden, July 29, 2014, pages 15, 2014. ACM\n \n\n\n\n
\n\n\n\n \n \n \"GeneralizingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 30 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ecoop/BichhawatRGH14,\n  author       = {Abhishek Bichhawat and\n                  Vineet Rajani and\n                  Deepak Garg and\n                  Christian Hammer},\n  editor       = {Alejandro Russo and\n                  Omer Tripp},\n  title        = {Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis},\n  booktitle    = {Proceedings of the Ninth Workshop on Programming Languages and Analysis\n                  for Security, PLAS@ECOOP 2014, Uppsala, Sweden, July 29, 2014},\n  pages        = {15},\n  publisher    = {{ACM}},\n  year         = {2014},\n  url          = {https://doi.org/10.1145/2637113.2637116},\n  doi          = {10.1145/2637113.2637116},\n  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/ecoop/BichhawatRGH14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Exception handling for dynamic information flow control.\n \n \n \n \n\n\n \n Bichhawat, A.\n\n\n \n\n\n\n In Jalote, P.; Briand, L. C.; and van der Hoek, A., editor(s), 36th International Conference on Software Engineering, ICSE '14, Companion Proceedings, Hyderabad, India, May 31 - June 07, 2014, pages 718–720, 2014. ACM\n \n\n\n\n
\n\n\n\n \n \n \"ExceptionPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 16 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icse/Bichhawat14,\n  author       = {Abhishek Bichhawat},\n  editor       = {Pankaj Jalote and\n                  Lionel C. Briand and\n                  Andr{\\'{e}} van der Hoek},\n  title        = {Exception handling for dynamic information flow control},\n  booktitle    = {36th International Conference on Software Engineering, {ICSE} '14,\n                  Companion Proceedings, Hyderabad, India, May 31 - June 07, 2014},\n  pages        = {718--720},\n  publisher    = {{ACM}},\n  year         = {2014},\n  url          = {https://doi.org/10.1145/2591062.2591195},\n  doi          = {10.1145/2591062.2591195},\n  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icse/Bichhawat14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Information Flow Control in WebKit's JavaScript Bytecode.\n \n \n \n \n\n\n \n Bichhawat, A.; Rajani, V.; Garg, D.; and Hammer, C.\n\n\n \n\n\n\n In Abadi, M.; and Kremer, S., editor(s), Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings, volume 8414, of Lecture Notes in Computer Science, pages 159–178, 2014. Springer\n \n\n\n\n
\n\n\n\n \n \n \"InformationPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 24 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/post/BichhawatRGH14,\n  author       = {Abhishek Bichhawat and\n                  Vineet Rajani and\n                  Deepak Garg and\n                  Christian Hammer},\n  editor       = {Mart{\\'{\\i}}n Abadi and\n                  Steve Kremer},\n  title        = {Information Flow Control in WebKit's JavaScript Bytecode},\n  booktitle    = {Principles of Security and Trust - Third International Conference,\n                  {POST} 2014, Held as Part of the European Joint Conferences on Theory\n                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,\n                  2014, Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {8414},\n  pages        = {159--178},\n  publisher    = {Springer},\n  year         = {2014},\n  url          = {https://doi.org/10.1007/978-3-642-54792-8\\_9},\n  doi          = {10.1007/978-3-642-54792-8\\_9},\n  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},\n  biburl       = {https://dblp.org/rec/conf/post/BichhawatRGH14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Information Flow Control in WebKit's JavaScript Bytecode.\n \n \n \n \n\n\n \n Bichhawat, A.; Rajani, V.; Garg, D.; and Hammer, C.\n\n\n \n\n\n\n CoRR, abs/1401.4339. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"InformationPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 24 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/BichhawatRGH14,\n  author       = {Abhishek Bichhawat and\n                  Vineet Rajani and\n                  Deepak Garg and\n                  Christian Hammer},\n  title        = {Information Flow Control in WebKit's JavaScript Bytecode},\n  journal      = {CoRR},\n  volume       = {abs/1401.4339},\n  year         = {2014},\n  url          = {http://arxiv.org/abs/1401.4339},\n  eprinttype    = {arXiv},\n  eprint       = {1401.4339},\n  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/BichhawatRGH14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2011\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Security Architecture for Virtual Machines.\n \n \n \n \n\n\n \n Tupakula, U. K.; Varadharajan, V.; and Bichhawat, A.\n\n\n \n\n\n\n In Xiang, Y.; Cuzzocrea, A.; Hobbs, M.; and Zhou, W., editor(s), Algorithms and Architectures for Parallel Processing - 11th International Conference, ICA3PP, Melbourne, Australia, October 24-26, 2011, Proceedings, Part I, volume 7016, of Lecture Notes in Computer Science, pages 218–229, 2011. Springer\n \n\n\n\n
\n\n\n\n \n \n \"SecurityPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 25 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ica3pp/TupakulaVB11,\n  author       = {Udaya Kiran Tupakula and\n                  Vijay Varadharajan and\n                  Abhishek Bichhawat},\n  editor       = {Yang Xiang and\n                  Alfredo Cuzzocrea and\n                  Michael Hobbs and\n                  Wanlei Zhou},\n  title        = {Security Architecture for Virtual Machines},\n  booktitle    = {Algorithms and Architectures for Parallel Processing - 11th International\n                  Conference, ICA3PP, Melbourne, Australia, October 24-26, 2011, Proceedings,\n                  Part {I}},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {7016},\n  pages        = {218--229},\n  publisher    = {Springer},\n  year         = {2011},\n  url          = {https://doi.org/10.1007/978-3-642-24650-0\\_19},\n  doi          = {10.1007/978-3-642-24650-0\\_19},\n  timestamp    = {Fri, 22 Apr 2022 17:07:03 +0200},\n  biburl       = {https://dblp.org/rec/conf/ica3pp/TupakulaVB11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);