Quicklinks
Decorative photo of one of the top-corners of the CISPA building
Portrait of Person: Deepak Garg

Deepak Garg (Professor)
 
 Campus E1 5 | 66123 Saarbrücken | 412

Publications:

Title Date Date Meta
Robust Hyperproperty Preservation for Secure Compilation (Extended Abstract) 2017  2017   Deepak Garg, Cătălin Hriţcu, Marco Patrignani, Marco Stronati, David Swasey  1st Workshop on Principles of Secure Compilation
Relational cost analysis 2017  2017   Ezgi Çiçek, Gilles Barthe, Marco Gaboardi, Deepak Garg, Jan Hoffmann  Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL'17)
Qapla: Policy compliance for database-backed systems 2017  2017   Aastha Mehta, Eslam Elnikety, Katura Harvey, Deepak Garg, Peter Druschel  26th USENIX Security Symposium (USENIX Security 17)
Robust and compositional verification of object capability patterns 2017  2017   David Swasey, Deepak Garg, Derek Dreyer
Light-Weight Contexts: An OS Abstraction for Safety and Performance 2016  2016   Anjo Vahldiek-Oberwanger, Bobby Bhattacharjee, Deepak Garg, Eslam Elnikety, Peter Druschel, James Litton  Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI '16)
Causally Consistent Dynamic Slicing 2016  2016   Deepak Garg, James Cheney, Roly Perera  Proceedings of the 27th International Conference on Concurrency Theory (CONCUR '16)
T3: Comprehensive policy compliance in data retrieval systems 2016  2016   Eslam Elnikety, Aastha Mehta, Anjo Vahldiek-Oberwanger, Deepak Garg, Peter Druschel  Proceedings of the 25th USENIX Security Symposium (USENIX Security '16)
Thoth: Comprehensive Policy Compliance in Data Retrieval Systems 2016  2016   Eslam Elnikety, Aastha Mehta, Anjo Vahldiek-Oberwanger, Deepak Garg, Peter Druschel  Proceedings of the 25th USENIX Security Symposium (USENIX Security '16)
On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks. 2016  2016   Deepak Garg, Tamara Rezk, Vineet Rajani  Proceedings of the 29th Computer Security Foundations Symposium 2016 (CSF '16)
Progress-Sensitive Security for SPARK 2016  2016   Deepak Garg, Willard Rafnsson, Andrei Sabelfeld  Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS '16)
Asymmetric Secure Multi-execution with Declassification 2016  2016   Deepak Garg, Iulia Bolosteanu  Proceedings of Principles of Security and Trust - 5th International Conference (POST '16)
A type theory for incremental computational complexity with control flow changes 2016  2016   Deepak Garg, Ezgi Çiçek, Zoe Paraskevopoulou  Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming (ICFP '16)
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits 2015  2015   Omar Chowdhury, Deepak Garg, Limin Jia, Anupam Datta  Proceedings of the 22nd ACM conference on Computer and communications security (ACM CCS 2015)
Information Flow Control for Event Handling and the DOM in Web Browsers 2015  2015   Abhishek Bichhawat, Christian Hammer, Deepak Garg, Vineet Rajani  Proceedings of the 28th Computer Security Foundations Symposium (CSF '15)
A Logic of Programs with Interface-Confined Code 2015  2015   Anupam Datta, Deepak Garg, Limin Jia, Shayak Sen  Proceedings of the 28th Computer Security Foundations Symposium (CSF '15)
Program Actions as Actual Causes: A Building Block for Accountability 2015  2015   Anupam Datta, Deepak Garg, Dilsun Kirli Kaynar, Divya Sharma, Arunesh Sinha  Proceedings of the 28th Computer Security Foundations Symposium (CSF '15)
Guardat: enforcing data policies at the storage layer 2015  2015   Aastha Mehta, Anjo Vahldiek-Oberwanger, Ansley Post, Deepak Garg, Eslam Elnikety, Johannes Gehrke, Peter Druschel, Rodrigo Rodrigues  Proceedings of the 10th European Conference on Computer Systems (EuroSys '15)
Refinement Types for Incremental Computational Complexity 2015  2015   Deepak Garg, Ezgi Çiçek, Umut A. Acar  Proceedings of the 24th European Symposium on Programming (ESOP '15)
System M: A Program Logic for Code Sandboxing and Identification 2015  2015   Anupam Datta, Deepak Garg, Limin Jia, Shayak Sen
Temporal Mode-Checking for Runtime Monitoring of Privacy Policies 2014  2014   Anupam Datta, Deepak Garg, Limin Jia, Omar Chowdhury  Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF '14)
Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis 2014  2014   Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer  Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security
Information Flow Control in WebKit's JavaScript Bytecode 2014  2014   Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer
Temporal Mode-Checking for Runtime Monitoring of Privacy Policies 2014  2014   Omar Chowdhury, Limin Jia, Deepak Garg, Anupam Datta  Proc. 26th International Conference on Computer Aided Verification (CAV 2014)
Privacy-preserving audit for broker-based health information exchange 2014  2014   Se Eun Oh, Ji Young Chun, Limin Jia, Deepak Garg, Carl A. Gunter, Anupam Datta  Proceedings of the 4th ACM conference on Data and application security and privacy (CODASPY'14)
Dependent Type Theory for Verification of Information Flow and Access Control Policies 2013  2013   Aleksandar Nanevski, Anindya Banerjee, Deepak Garg
Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction 2012  2012   Valerio Genovese, Deepak Garg, Daniele Rispoli  Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF '12)
Countermodels from Sequent Calculi in Multi-Modal Logics 2012  2012   Deepak Garg, Valerio Genovese, Sara Negri  Proc. of the 27th Annual IEEE Symposium on Logic in Computer Science (LICS 2012)
Stateful authorization logic - Proof theory and a case study 2012  2012   Deepak Garg, Frank Pfenning
Labeled Goal-Directed Search in Access Control Logic 2012  2012   Valerio Genovese, Deepak Garg, Daniele Rispoli  Proc. of the 8th International Workshop on Security and Trust Management (STM 2012)
Superficially substructural types 2012  2012   Neelakantan R. Krishnaswami, Aaron Turon, Derek Dreyer, Deepak Garg  ACM SIGPLAN International Conference on Functional Programming (ICFP 2012)
Trusted Storage 2012  2012   Anjo Vahldiek, Eslam Elnikety, Ansley Post, Peter Druschel, Deepak Garg, Johannes Gehrke, Rodrigo Rodrigues  Presented at USENIX FAST'12 WiP
Policy auditing over incomplete logs: theory, implementation and applications 2011  2011   Anupam Datta, Deepak Garg, Limin Jia  Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11)
Verification of Information Flow and Access Control Policies with Dependent Types 2011  2011   Aleksandar Nanevski, Anindya Banerjee, Deepak Garg  Proceedings of the 32nd IEEE Symposium on Security and Privacy (S&P '11)
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms 2011  2011   Anupam Datta, Jeremiah Blocki, Nicolas Christin, Henry DeYoung, Deepak Garg, Limin Jia, Dilsun Kirli Kaynar, Arunesh Sinha  Proc. of the 7th International Conference Information Systems Security (ICISS 2011)
On Adversary Models and Compositional Security 2011  2011   Anupam Datta, Deepak Garg, Dilsun Kirli Kaynar, Limin Jia, Jason Franklin