Nikhil Swamy

According to our database1, Nikhil Swamy authored at least 55 papers between 1999 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Ranking LLM-Generated Loop Invariants for Program Verification.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

ASN1*: Provably Correct, Non-malleable Parsing for ASN.1 DER.
Proceedings of the 12th ACM SIGPLAN International Conference on Certified Programs and Proofs, 2023

FastVer2: A Provably Correct Monitor for Concurrent, Key-Value Stores.
Proceedings of the 12th ACM SIGPLAN International Conference on Certified Programs and Proofs, 2023

2022
Hardening attack surfaces with formally proven binary format parsers.
Proceedings of the PLDI '22: 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation, San Diego, CA, USA, June 13, 2022

2021
Steel: proof-oriented programming in a dependently typed concurrent separation logic.
Proc. ACM Program. Lang., 2021

FastVer: Making Data Integrity a Commodity.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

2020
SteelCore: an extensible concurrent separation logic for effectful dependently typed programs.
Proc. ACM Program. Lang., 2020


2019
A verified, efficient embedding of a verifiable assembly language.
Proc. ACM Program. Lang., 2019

EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider.
IACR Cryptol. ePrint Arch., 2019

EverParse: Verified Secure Zero-Copy Parsers for Authenticated Message Formats.
Proceedings of the 28th USENIX Security Symposium, 2019

Wys*: A DSL for Verified Secure Multi-party Computations.
Proceedings of the Principles of Security and Trust - 8th International Conference, 2019

Meta-F ^\star : Proof Automation with SMT, Tactics, and Metaprograms.
Proceedings of the Programming Languages and Systems, 2019

2018
Recalling a witness: foundations and applications of monotonic state.
Proc. ACM Program. Lang., 2018

Meta-F*: Metaprogramming and Tactics in an Effectful Program Verifier.
CoRR, 2018

A monadic framework for relational verification: applied to information security, program equivalence, and optimizations.
Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs, 2018

2017
Verified low-level programming embedded in F.
Proc. ACM Program. Lang., 2017

WYS*: A Verified Language Extension for Secure Multi-party Computations.
CoRR, 2017

A Monadic Framework for Relational Verification (Functional Pearl).
CoRR, 2017

Verified Low-Level Programming Embedded in F<sup>*</sup>.
CoRR, 2017


Dijkstra monads for free.
Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, 2017

2016
Implementing and Proving the TLS 1.3 Record Layer.
IACR Cryptol. ePrint Arch., 2016

Dijkstra Monads for Free.
CoRR, 2016

Dependent types and multi-monadic effects in F.
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016

Formal Verification of Smart Contracts: Short Paper.
Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, 2016

2015
Safe & Efficient Gradual Typing for TypeScript.
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015

2014
Modular protections against non-control data attacks.
J. Comput. Secur., 2014

Polymonadic Programming.
Proceedings of the Proceedings 5th Workshop on Mathematically Structured Functional Programming, 2014

Gradual typing embedded securely in JavaScript.
Proceedings of the 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2014

Probabilistic relational verification for cryptographic implementations.
Proceedings of the 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2014

2013
Secure distributed programming with value-dependent types.
J. Funct. Program., 2013

Fully abstract compilation to JavaScript.
Proceedings of the 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2013

Verifying higher-order programs with the dijkstra monad.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2013

Increasing human-tool interaction via the web.
Proceedings of the ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering, 2013

dkal ⋆ : Constructing Executable Specifications of Authorization Protocols.
Proceedings of the Engineering Secure Software and Systems - 5th International Symposium, 2013

2012
Self-certification: bootstrapping certified typecheckers in F* with Coq.
Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2012

2011
Verified Security for Browser Extensions.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Verifying stateful programs with substructural state and hoare types.
Proceedings of the 5th ACM Workshop Programming Languages meets Program Verification, 2011

Lightweight monadic programming in ML.
Proceedings of the Proceeding of the 16th ACM SIGPLAN international conference on Functional Programming, 2011

2010
Type-preserving compilation of end-to-end verification of security enforcement.
Proceedings of the 2010 ACM SIGPLAN Conference on Programming Language Design and Implementation, 2010

Enforcing Stateful Authorization and Information Flow Policies in Fine.
Proceedings of the Programming Languages and Systems, 2010

2009
Cross-tier, label-based security enforcement for web applications.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2009

A theory of typed coercions and its applications.
Proceedings of the Proceeding of the 14th ACM SIGPLAN international conference on Functional programming, 2009

2008
Language-based Enforcement of User-defined Security Policies (As Applied to Multi-tier Web Programs).
PhD thesis, 2008

Verified enforcement of stateful information release policies.
ACM SIGPLAN Notices, 2008

Fable: A Language for Enforcing User-defined Security Policies.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

Verified implementations of the information card federated identity-management protocol.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Defeating script injection attacks with browser-enforced embedded policies.
Proceedings of the 16th International Conference on World Wide Web, 2007

2006
Safe manual memory management in Cyclone.
Sci. Comput. Program., 2006

Managing Policy Updates in Security-Typed Languages.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

2005
Dynamic inference of polymorphic lock types.
Sci. Comput. Program., 2005

2004
Finding and Removing Performance Bottlenecks in Large Systems.
Proceedings of the ECOOP 2004, 2004

2003
RGL Study in a Hybrid Real-time System.
Proceedings of the IASTED International Conference on Neural Networks and Computational Intelligence, 2003

1999
Finding a better-than-classical quantum AND/OR algorithm using genetic programming.
Proceedings of the 1999 Congress on Evolutionary Computation, 1999


  Loading...