Nikhil Swamy
Nikhil Swamy
Microsoft Research
Verified email at microsoft.com - Homepage
TitleCited byYear
Defeating script injection attacks with browser-enforced embedded policies
T Jim, N Swamy, M Hicks
Proceedings of the 16th international conference on World Wide Web, 601-610, 2007
4322007
Formal verification of smart contracts: Short paper
K Bhargavan, A Delignat-Lavaud, C Fournet, A Gollamudi, G Gonthier, ...
Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis …, 2016
2572016
Secure distributed programming with value-dependent types
N Swamy, J Chen, C Fournet, PY Strub, K Bhargavan, J Yang
ACM SIGPLAN Notices 46 (9), 266-278, 2011
2112011
Dependent types and multi-monadic effects in F
N Swamy, C Hriţcu, C Keller, A Rastogi, A Delignat-Lavaud, S Forest, ...
ACM SIGPLAN Notices 51 (1), 256-270, 2016
1762016
Quantum computing applications of genetic programming
L Spector, H Barnum, HJ Bernstein, N Swamy
Advances in genetic programming 3, 135-160, 1999
147*1999
Fable: A language for enforcing user-defined security policies
N Swamy, BJ Corcoran, M Hicks
2008 IEEE Symposium on Security and Privacy (sp 2008), 369-383, 2008
1382008
Finding a better-than-classical quantum AND/OR algorithm using genetic programming
L Spector, H Barnum, HJ Bernstein, N Swamy
Proceedings of the 1999 Congress on Evolutionary Computation-CEC99 (Cat. No …, 1999
1321999
Verified security for browser extensions
A Guha, M Fredrikson, B Livshits, N Swamy
2011 IEEE symposium on security and privacy, 115-130, 2011
1252011
Fully abstract compilation to JavaScript
C Fournet, N Swamy, J Chen, PE Dagand, PY Strub, B Livshits
ACM SIGPLAN Notices 48 (1), 371-384, 2013
1072013
Quantum computing applications of genetic programming
L Spector, H Barnum, HJ Bernstein, N Swamy
Advances in genetic programming 3, 135-160, 1999
911999
Safe & efficient gradual typing for TypeScript
A Rastogi, N Swamy, C Fournet, G Bierman, P Vekris
ACM SIGPLAN Notices 50 (1), 167-180, 2015
902015
Probabilistic relational verification for cryptographic implementations
G Barthe, C Fournet, B Grégoire, PY Strub, N Swamy, S Zanella-Béguelin
ACM SIGPLAN Notices 49 (1), 193-205, 2014
872014
Enforcing Stateful Authorization and Information Flow Policies in Fine
N Swamy, J Chen, R Chugh
European Symposium on Programming, 529-549, 2010
862010
Finding and removing performance bottlenecks in large systems
G Ammons, JD Choi, M Gupta, N Swamy
European Conference on Object-Oriented Programming, 172-196, 2004
792004
Cross-tier, label-based security enforcement for web applications
BJ Corcoran, N Swamy, M Hicks
Proceedings of the 2009 ACM SIGMOD International Conference on Management of …, 2009
672009
Verifying higher-order programs with the Dijkstra monad
N Swamy, J Weinberger, C Schlesinger, J Chen, B Livshits
ACM SIGPLAN Notices 48 (6), 387-398, 2013
652013
Genetic programming for quantum computers
L Spector, H Barnum, HJ Bernstein, N Swamy
Genetic Programming, 365-373, 1998
631998
Verified low-level programming embedded in F
J Protzenko, JK Zinzindohoué, A Rastogi, T Ramananandro, P Wang, ...
Proceedings of the ACM on Programming Languages 1 (ICFP), 17, 2017
602017
Managing policy updates in security-typed languages
N Swamy, M Hicks, S Tse, S Zdancewic
19th IEEE Computer Security Foundations Workshop (CSFW'06), 13 pp.-216, 2006
592006
Safe manual memory management in Cyclone
N Swamy, M Hicks, G Morrisett, D Grossman, T Jim
Science of Computer Programming 62 (2), 122-144, 2006
582006
The system can't perform the operation now. Try again later.
Articles 1–20