Deepak Garg, Ph.D.

Affiliations: 
2011- Max Planck Institute for Software Systems 
Area:
Computer Science, Robotics
Website:
https://people.mpi-sws.org/~dg/index.html
Google:
"Deepak Garg"
Cross-listing: Computer Science Tree

Parents

Sign in to add mentor
Frank Pfenning grad student 2009 Carnegie Mellon
 (Proof theory for authorization logic and its application to a practical file system.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Rajani V, Garg D. (2020) On the expressiveness and semantics of information flow types Journal of Computer Security. 28: 129-156
Künnemann R, Garg D, Backes M. (2019) Causality & Control Flow Arxiv: Logic in Computer Science. 308: 32-46
Abate C, Blanco R, Garg D, et al. (2019) Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation Cell Structure and Function. 256-271
Aguirre A, Barthe G, Gaboardi M, et al. (2019) A relational logic for higher-order programs Journal of Functional Programming. 29
Boloşteanu I, Garg D. (2016) Asymmetric secure multi-execution with declassification Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9635: 24-45
Vahldiek-Oberwagner A, Elnikety E, Mehta A, et al. (2015) Guardat: Enforcing data policies at the storage layer Proceedings of the 10th European Conference On Computer Systems, Eurosys 2015
Rajani V, Bichhawat A, Garg D, et al. (2015) Information Flow Control for Event Handling and the DOM in Web Browsers Proceedings of the Computer Security Foundations Workshop. 2015: 366-379
Bichhawat A, Rajani V, Garg D, et al. (2014) Information flow control in WebKit's JavaScript bytecode Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8414: 159-178
Chowdhury O, Jia L, Garg D, et al. (2014) Temporal mode-checking for runtime monitoring of privacy policies Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8559: 131-149
Nanevski A, Banerjee A, Garg D. (2013) Dependent type theory for verification of information flow and access control policies Acm Transactions On Programming Languages and Systems. 35
See more...