Publications
See also Google Scholar and DBLP
Filter by type:
Sort by year:
Tainted Secure Multi-Execution to Restrict Attacker Influence
ACM Conference on Computer and Communications Security (CCS), November, 2023
Conference@inproceedings{ccs-mbj-23, author = {McKenna McCall, Abhishek Bichhawat and Limin Jia}, booktitle = {Proceedings of the 30th ACM Conference on Computer and Communications Security}, month = {November}, title = {Tainted Secure Multi-Execution to Restrict Attacker Influence}, year = {2023} }
Layered Symbolic Security Analysis in DY*
28th European Symposium on Research in Computer Security (ESORICS), September, 2023
Conference@inproceedings{esorics-bbh-23, author = {Karthikeyan Bhargavan, Abhishek Bichhawat, Pedram Hosseyni, Ralf Küsters, Klaas Pruiksma, Guido Schmitz, Clara Waldmann and Tim Würtele}, booktitle = {Proceedings of the 28th European Symposium on Research in Computer Security}, month = {September}, title = {Layered Symbolic Security Analysis in DY*}, year = {2023} }
Towards Usable Security Analysis Tools for Trigger-Action Programming
Nineteenth Symposium on Usable Privacy and Security (SOUPS), August, 2023
Conference@inproceedings{soups-mzs-23, author = {McKenna McCall, Eric Zeng, Faysal Hossain Shezan, Mitchell Yang, Lujo Bauer, Abhishek Bichhawat, Camille Cobb, Limin Jia and Yuan Tian}, booktitle = {Proceedings of the Nineteenth Symposium on Usable Privacy and Security}, month = {August}, title = {Towards Usable Security Analysis Tools for Trigger-Action Programming}, year = {2023} }
Compositional Information Flow Monitoring for Reactive Programs
IEEE European Symposium on Security and Privacy (EuroS&P), June, 2022
Conference@inproceedings{eurosp-mbj-22, author = {McKenna McCall, Abhishek Bichhawat and Limin Jia}, booktitle = {Proceedings of the IEEE European Symposium on Security and Privacy}, month = {June}, title = {Compositional Information Flow Monitoring for Reactive Programs}, year = {2022} }
Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations
IEEE Symposium on Security and Privacy (Oakland), May, 2022
Conference@inproceedings{oakland-hpbb-22, author = {Son Ho, Jonathan Protzenko, Abhishek Bichhawat and Karthikeyan Bhargavan}, booktitle = {Proceedings of the IEEE Symposium on Security and Privacy}, month = {May}, title = {Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations}, year = {2022} }
A Tutorial-Style Introduction to DY*
Protocols, Strands, and Logic. Lecture Notes in Computer Science, vol 13066, Nov, 2021
Conference@inproceedings{festschrift-bbd-21, author = {Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz and Tim Würtele}, booktitle = {Protocols, Strands, and Logic. Lecture Notes in Computer Science, vol 13066}, month = {Nov}, title = {A Tutorial-Style Introduction to DY*}, year = {2021} }
An In-Depth Symbolic Security Analysis of the ACME Standard
Proceedings of the ACM Conference on Computer and Communications Security (CCS), Nov, 2021
Conference@inproceedings{ccs-bbd-21, author = {Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz and Tim Würtele}, booktitle = {Proceedings of the ACM Conference on Computer and Communications Security}, month = {Nov}, title = {An In-Depth Symbolic Security Analysis of the ACME Standard}, year = {2021} }
Permissive Runtime Information Flow Control in the Presence of Exceptions
Journal of Computer Security (JCS), 2021
Journal@article{jcs-brgh-21, author = {Abhishek Bichhawat, Vineet Rajani, Deepak Garg and Christian Hammer}, booktitle = {Journal of Computer Security}, month = {June}, title = {Permissive Runtime Information Flow Control in the Presence of Exceptions}, year = {2021}, volume = {29}, number = {4}, pages = {361 -- 401}, }
DY*: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code
Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P), Sep, 2021
Conference@inproceedings{eurosp-bbd-21, author = {Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz and Tim Würtele}, booktitle = {Proceedings of the IEEE European Symposium on Security and Privacy}, month = {Sep}, title = {{DY}*: {A} Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code}, year = {2021} }
Gradual Security Types and Gradual Guarantees
Proceedings of the 34th IEEE Computer Security Foundations Symposium (CSF), June, 2021
Conference@inproceedings{csf-bmj-21, author = {Abhishek Bichhawat, McKenna McCall and Limin Jia}, booktitle = {Proceedings of the 34th IEEE Computer Security Foundations Symposium (CSF)}, month = {June}, title = {Gradual Security Types and Gradual Guarantees}, year = {2021} }
Automating Audit with Policy Inference
Proceedings of the 34th IEEE Computer Security Foundations Symposium (CSF), June, 2021
Conference@inproceedings{csf-bfy-21, author = {Abhishek Bichhawat, Matt Fredrikson and Jean Yang}, booktitle = {Proceedings of the 34th IEEE Computer Security Foundations Symposium (CSF)}, month = {June}, title = {Automating Audit with Policy Inference}, year = {2021} }
Contextual and Granular Policy Enforcement in Database-backed Applications
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (AsiaCCS), 2020
Conference@inproceedings{asiaccs-bfyt-20, author = {Abhishek Bichhawat, Matt Fredrikson, Jean Yang and Akash Trehan}, booktitle = {Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (AsiaCCS))}, month = {October}, title = {Contextual and Granular Policy Enforcement in Database-backed Applications}, year = {2020} }
Practical Dynamic Information Flow Control
Saarland University, 2018
Thesis@article{thesis-b-18, author = {Abhishek Bichhawat}, month = {June}, title = {{Practical Dynamic Information Flow Control}}, year = {2018} }
WebPol: Fine-grained Information Flow Policies for Web Browsers
Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), 2017
Conference@inproceedings{esorics-brjgh-17, author = {Abhishek Bichhawat, Vineet Rajani, Jinank Jain, Deepak Garg and Christian Hammer}, booktitle = {Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS)}, month = {September}, title = {{WebPol: Fine-grained Information Flow Policies for Web Browsers}}, year = {2017} }
Information Flow Control for Event Handling and the DOM in Web Browsers
Proceedings of the 28th IEEE Computer Security Foundations Symposium, 2015
RS3 Best Paper Award
Conference Award@inproceedings{csf-rbgh-15, author = {Vineet Rajani, Abhishek Bichhawat, Deepak Garg and Christian Hammer}, booktitle = {Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF)}, month = {July}, title = {Information Flow Control for Event Handling and the DOM in Web Browsers}, year = {2015} }
Post-dominator Analysis for Precisely Handling Implicit Flows
Companion Proceedings of the 37th IEEE International Conference on Software Engineering (ICSE), May, 2015
Extended Abstract@inproceedings{icse-comp-15, author = {Abhishek Bichhawat}, booktitle = {Companion Proceedings of the 37th IEEE International Conference on Software Engineering}, month = {May}, title = {{Post-dominator Analysis for Precisely Handling Implicit Flows}}, year = {2015} }
Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis
Proceedings of the ACM 9th Workshop on Programming Languages and Analysis for Security (PLAS), July, 2014
Workshop@inproceedings{plas-brgh-14, author = {Abhishek Bichhawat, Vineet Rajani, Deepak Garg and Christian Hammer}, booktitle = {Proceedings of the ACM 9th Workshop on Programming Languages and Analysis for Security (PLAS)}, month = {July}, title = {Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis}, year = {2014} }
Exception Handling for Dynamic Information Flow Control
Companion Proceedings of the 36th IEEE International Conference on Software Engineering (ICSE), May, 2014
Extended Abstract@inproceedings{icse-comp-14, author = {Abhishek Bichhawat}, booktitle = {Companion Proceedings of the 36th IEEE International Conference on Software Engineering}, month = {May}, title = {{Exception Handling for Dynamic Information Flow Control}}, year = {2014} }
Information Flow Control in WebKit’s JavaScript Bytecode
Proceedings of the 3rd International Conference on Principles of Security and Trust (POST@ETAPS), April, 2014
Conference@inproceedings{post-brgh-14, author = {Abhishek Bichhawat, Vineet Rajani, Deepak Garg and Christian Hammer}, booktitle = {Proceedings of the 3rd International Conference on Principles of Security and Trust (POST)}, month = {April}, title = {{Information Flow Control in WebKit’s JavaScript Bytecode}}, year = {2014} }
Security Architecture for Virtual Machines
Proceedings of the 11th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), Oct, 2011
Conference@inproceedings{ica3pp-tvb-11, author = {Udaya Tupakula, Vijay Varadharajan and Abhishek Bichhawat}, booktitle = {Proceedings of the 3rd International Conference on Principles of Security and Trust (POST)}, month = {Oct}, title = {{Security Architecture for Virtual Machines}}, year = {2011} }