Abhishek Bichhawat

Orcid: 0000-0002-3075-2743

Affiliations:
  • Indian Institute of Technology, Gandhinagar, India
  • Carnegie Mellon University, PA, USA (former)


According to our database1, Abhishek Bichhawat authored at least 24 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Layered Symbolic Security Analysis in DY$^\star$.
IACR Cryptol. ePrint Arch., 2023

Towards Usable Security Analysis Tools for Trigger-Action Programming.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

Layered Symbolic Security Analysis in $\textsf {DY}^\star $.
Proceedings of the Computer Security - ESORICS 2023, 2023

Tainted Secure Multi-Execution to Restrict Attacker Influence.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations (Long Version).
IACR Cryptol. ePrint Arch., 2022

Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Compositional Information Flow Monitoring for Reactive Programs.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

2021
Permissive runtime information flow control in the presence of exceptions.
J. Comput. Secur., 2021

An In-Depth Symbolic Security Analysis of the ACME Standard.
IACR Cryptol. ePrint Arch., 2021

DY*: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Gradual Security Types and Gradual Guarantees.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

Automating Audit with Policy Inference.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

A Tutorial-Style Introduction to DY*.
Proceedings of the Protocols, Strands, and Logic, 2021

2020
First-order Gradual Information Flow Types with Gradual Guarantees.
CoRR, 2020

Contextual and Granular Policy Enforcement in Database-backed Applications.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2018
Practical dynamic information flow control.
PhD thesis, 2018

ESTRELA: Automated Policy Enforcement Across Remote APIs.
CoRR, 2018

2017
WebPol: Fine-Grained Information Flow Policies for Web Browsers.
Proceedings of the Computer Security - ESORICS 2017, 2017

2015
Post-Dominator Analysis for Precisely Handling Implicit Flows.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Information Flow Control for Event Handling and the DOM in Web Browsers.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2014
Information Flow Control in WebKit's JavaScript Bytecode.
Proceedings of the Principles of Security and Trust - Third International Conference, 2014

Exception handling for dynamic information flow control.
Proceedings of the 36th International Conference on Software Engineering, 2014

Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis.
Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security, 2014

2011
Security Architecture for Virtual Machines.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011


  Loading...