Filter by type:

Sort by year:

Tainted Secure Multi-Execution to Restrict Attacker Influence

McKenna McCall, Abhishek Bichhawat and Limin Jia
ACM Conference on Computer and Communications Security (CCS), November, 2023
Conference
@inproceedings{ccs-mbj-23,
  author    = {McKenna McCall, Abhishek Bichhawat and Limin Jia},
  booktitle = {Proceedings of the 30th ACM Conference on Computer and Communications Security},
  month     = {November},
  title     = {Tainted Secure Multi-Execution to Restrict Attacker Influence},
  year      = {2023}
}

Layered Symbolic Security Analysis in DY*

Karthikeyan Bhargavan, Abhishek Bichhawat, Pedram Hosseyni, Ralf Küsters, Klaas Pruiksma, Guido Schmitz, Clara Waldmann and Tim Würtele
28th European Symposium on Research in Computer Security (ESORICS), September, 2023
Conference
@inproceedings{esorics-bbh-23,
  author    = {Karthikeyan Bhargavan, Abhishek Bichhawat, Pedram Hosseyni, Ralf Küsters, Klaas Pruiksma, Guido Schmitz, Clara Waldmann and Tim Würtele},
  booktitle = {Proceedings of the 28th European Symposium on Research in Computer Security},
  month     = {September},
  title     = {Layered Symbolic Security Analysis in DY*},
  year      = {2023}
}

Towards Usable Security Analysis Tools for Trigger-Action Programming

McKenna McCall, Eric Zeng, Faysal Hossain Shezan, Mitchell Yang, Lujo Bauer, Abhishek Bichhawat, Camille Cobb, Limin Jia and Yuan Tian
Nineteenth Symposium on Usable Privacy and Security (SOUPS), August, 2023
Conference
@inproceedings{soups-mzs-23,
  author    = {McKenna McCall, Eric Zeng, Faysal Hossain Shezan, Mitchell Yang, Lujo Bauer, Abhishek Bichhawat, Camille Cobb, Limin Jia and Yuan Tian},
  booktitle = {Proceedings of the Nineteenth Symposium on Usable Privacy and Security},
  month     = {August},
  title     = {Towards Usable Security Analysis Tools for Trigger-Action Programming},
  year      = {2023}
}

Compositional Information Flow Monitoring for Reactive Programs

McKenna McCall, Abhishek Bichhawat and Limin Jia
IEEE European Symposium on Security and Privacy (EuroS&P), June, 2022
Conference
@inproceedings{eurosp-mbj-22,
  author    = {McKenna McCall, Abhishek Bichhawat and Limin Jia},
  booktitle = {Proceedings of the IEEE European Symposium on Security and Privacy},
  month     = {June},
  title     = {Compositional Information Flow Monitoring for Reactive Programs},
  year      = {2022}
}

Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations

Son Ho, Jonathan Protzenko, Abhishek Bichhawat and Karthikeyan Bhargavan
IEEE Symposium on Security and Privacy (Oakland), May, 2022
Conference
@inproceedings{oakland-hpbb-22,
  author    = {Son Ho, Jonathan Protzenko, Abhishek Bichhawat and Karthikeyan Bhargavan},
  booktitle = {Proceedings of the IEEE Symposium on Security and Privacy},
  month     = {May},
  title     = {Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations},
  year      = {2022}
}

A Tutorial-Style Introduction to DY*

Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz and Tim Würtele
Protocols, Strands, and Logic. Lecture Notes in Computer Science, vol 13066, Nov, 2021
Conference
@inproceedings{festschrift-bbd-21,
  author    = {Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz and Tim Würtele},
  booktitle = {Protocols, Strands, and Logic. Lecture Notes in Computer Science, vol 13066},
  month     = {Nov},
  title     = {A Tutorial-Style Introduction to DY*},
  year      = {2021}
}

An In-Depth Symbolic Security Analysis of the ACME Standard

Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz and Tim Würtele
Proceedings of the ACM Conference on Computer and Communications Security (CCS), Nov, 2021
Conference
@inproceedings{ccs-bbd-21,
  author    = {Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz and Tim Würtele},
  booktitle = {Proceedings of the ACM Conference on Computer and Communications Security},
  month     = {Nov},
  title     = {An In-Depth Symbolic Security Analysis of the ACME Standard},
  year      = {2021}
}

Permissive Runtime Information Flow Control in the Presence of Exceptions

Abhishek Bichhawat, Vineet Rajani, Deepak Garg and Christian Hammer
Journal of Computer Security (JCS), 2021
Journal
@article{jcs-brgh-21,
  author    = {Abhishek Bichhawat, Vineet Rajani, Deepak Garg and Christian Hammer},
  booktitle = {Journal of Computer Security},
  month     = {June},
  title     = {Permissive Runtime Information Flow Control in the Presence of Exceptions},
  year      = {2021},
  volume    = {29},
  number    = {4},
  pages     = {361 -- 401},
}

DY*: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code

Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz and Tim Würtele
Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P), Sep, 2021
Conference
@inproceedings{eurosp-bbd-21,
  author    = {Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz and Tim Würtele},
  booktitle = {Proceedings of the IEEE European Symposium on Security and Privacy},
  month     = {Sep},
  title     = {{DY}*: {A} Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code},
  year      = {2021}
}

Gradual Security Types and Gradual Guarantees

Abhishek Bichhawat, McKenna McCall and Limin Jia
Proceedings of the 34th IEEE Computer Security Foundations Symposium (CSF), June, 2021
Conference
@inproceedings{csf-bmj-21,
  author    = {Abhishek Bichhawat, McKenna McCall and Limin Jia},
  booktitle = {Proceedings of the 34th IEEE Computer Security Foundations Symposium (CSF)},
  month     = {June},
  title     = {Gradual Security Types and Gradual Guarantees},
  year      = {2021}
}

Automating Audit with Policy Inference

Abhishek Bichhawat, Matt Fredrikson and Jean Yang
Proceedings of the 34th IEEE Computer Security Foundations Symposium (CSF), June, 2021
Conference
@inproceedings{csf-bfy-21,
  author    = {Abhishek Bichhawat, Matt Fredrikson and Jean Yang},
  booktitle = {Proceedings of the 34th IEEE Computer Security Foundations Symposium (CSF)},
  month     = {June},
  title     = {Automating Audit with Policy Inference},
  year      = {2021}
}

Contextual and Granular Policy Enforcement in Database-backed Applications

Abhishek Bichhawat, Matt Fredrikson, Jean Yang and Akash Trehan
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (AsiaCCS), 2020
Conference
@inproceedings{asiaccs-bfyt-20,
  author    = {Abhishek Bichhawat, Matt Fredrikson, Jean Yang and Akash Trehan},
  booktitle = {Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (AsiaCCS))},
  month     = {October},
  title     = {Contextual and Granular Policy Enforcement in Database-backed Applications},
  year      = {2020}
}

Practical Dynamic Information Flow Control

Abhishek Bichhawat
Saarland University, 2018
Thesis
@article{thesis-b-18,
  author    = {Abhishek Bichhawat},
  month     = {June},
  title     = {{Practical Dynamic Information Flow Control}},
  year      = {2018}
}

WebPol: Fine-grained Information Flow Policies for Web Browsers

Abhishek Bichhawat, Vineet Rajani, Jinank Jain, Deepak Garg and Christian Hammer
Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), 2017
Conference
@inproceedings{esorics-brjgh-17,
  author    = {Abhishek Bichhawat, Vineet Rajani, Jinank Jain, Deepak Garg and Christian Hammer},
  booktitle = {Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS)},
  month     = {September},
  title     = {{WebPol: Fine-grained Information Flow Policies for Web Browsers}},
  year      = {2017}
}

Information Flow Control for Event Handling and the DOM in Web Browsers

Vineet Rajani, Abhishek Bichhawat, Deepak Garg and Christian Hammer
Proceedings of the 28th IEEE Computer Security Foundations Symposium, 2015
RS3 Best Paper Award
Conference Award
@inproceedings{csf-rbgh-15,
  author    = {Vineet Rajani, Abhishek Bichhawat, Deepak Garg and Christian Hammer},
  booktitle = {Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF)},
  month     = {July},
  title     = {Information Flow Control for Event Handling and the DOM in Web Browsers},
  year      = {2015}
}

Post-dominator Analysis for Precisely Handling Implicit Flows

Abhishek Bichhawat
Companion Proceedings of the 37th IEEE International Conference on Software Engineering (ICSE), May, 2015
Extended Abstract
@inproceedings{icse-comp-15,
  author    = {Abhishek Bichhawat},
  booktitle = {Companion Proceedings of the 37th IEEE International Conference on Software Engineering},
  month     = {May},
  title     = {{Post-dominator Analysis for Precisely Handling Implicit Flows}},
  year      = {2015}
}

Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis

Abhishek Bichhawat, Vineet Rajani, Deepak Garg and Christian Hammer
Proceedings of the ACM 9th Workshop on Programming Languages and Analysis for Security (PLAS), July, 2014
Workshop
@inproceedings{plas-brgh-14,
  author    = {Abhishek Bichhawat, Vineet Rajani, Deepak Garg and Christian Hammer},
  booktitle = {Proceedings of the ACM 9th Workshop on Programming Languages and Analysis for Security (PLAS)},
  month     = {July},
  title     = {Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis},
  year      = {2014}
}

Exception Handling for Dynamic Information Flow Control

Abhishek Bichhawat
Companion Proceedings of the 36th IEEE International Conference on Software Engineering (ICSE), May, 2014
Extended Abstract
@inproceedings{icse-comp-14,
  author    = {Abhishek Bichhawat},
  booktitle = {Companion Proceedings of the 36th IEEE International Conference on Software Engineering},
  month     = {May},
  title     = {{Exception Handling for Dynamic Information Flow Control}},
  year      = {2014}
}

Information Flow Control in WebKit’s JavaScript Bytecode

Abhishek Bichhawat, Vineet Rajani, Deepak Garg and Christian Hammer
Proceedings of the 3rd International Conference on Principles of Security and Trust (POST@ETAPS), April, 2014
Conference
@inproceedings{post-brgh-14,
  author    = {Abhishek Bichhawat, Vineet Rajani, Deepak Garg and Christian Hammer},
  booktitle = {Proceedings of the 3rd International Conference on Principles of Security and Trust (POST)},
  month     = {April},
  title     = {{Information Flow Control in WebKit’s JavaScript Bytecode}},
  year      = {2014}
}

Security Architecture for Virtual Machines

Udaya Tupakula, Vijay Varadharajan and Abhishek Bichhawat
Proceedings of the 11th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), Oct, 2011
Conference
@inproceedings{ica3pp-tvb-11,
  author    = {Udaya Tupakula, Vijay Varadharajan and Abhishek Bichhawat},
  booktitle = {Proceedings of the 3rd International Conference on Principles of Security and Trust (POST)},
  month     = {Oct},
  title     = {{Security Architecture for Virtual Machines}},
  year      = {2011}
}