Follow
Nikhil Swamy
Nikhil Swamy
Microsoft Research
Verified email at microsoft.com - Homepage
Title
Cited by
Cited by
Year
Formal verification of smart contracts: Short paper
K Bhargavan, A Delignat-Lavaud, C Fournet, A Gollamudi, G Gonthier, ...
Proceedings of the 2016 ACM workshop on programming languages and analysis …, 2016
7422016
Defeating script injection attacks with browser-enforced embedded policies
T Jim, N Swamy, M Hicks
Proceedings of the 16th international conference on World Wide Web, 601-610, 2007
4862007
Dependent types and multi-monadic effects in F
N Swamy, C Hriţcu, C Keller, A Rastogi, A Delignat-Lavaud, S Forest, ...
Proceedings of the 43rd annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2016
4352016
Secure distributed programming with value-dependent types
N Swamy, J Chen, C Fournet, PY Strub, K Bhargavan, J Yang
ACM SIGPLAN Notices 46 (9), 266-278, 2011
2772011
Quantum computing applications of genetic programming
L Spector, H Barnum, HJ Bernstein, N Swamy
187*1999
Verified security for browser extensions
A Guha, M Fredrikson, B Livshits, N Swamy
2011 IEEE symposium on security and privacy, 115-130, 2011
1642011
Fable: A language for enforcing user-defined security policies
N Swamy, BJ Corcoran, M Hicks
2008 IEEE Symposium on Security and Privacy (sp 2008), 369-383, 2008
1602008
Safe & efficient gradual typing for TypeScript
A Rastogi, N Swamy, C Fournet, G Bierman, P Vekris
Proceedings of the 42Nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2015
1552015
Finding a better-than-classical quantum AND/OR algorithm using genetic programming
L Spector, H Barnum, HJ Bernstein, N Swamy
Proceedings of the 1999 Congress on Evolutionary Computation-CEC99 (Cat. No …, 1999
1531999
Verifying higher-order programs with the Dijkstra monad
N Swamy, J Weinberger, C Schlesinger, J Chen, B Livshits
ACM SIGPLAN Notices 48 (6), 387-398, 2013
1492013
Verified low-level programming embedded in F
J Protzenko, JK Zinzindohoué, A Rastogi, T Ramananandro, P Wang, ...
Proceedings of the ACM on Programming Languages 1 (ICFP), 1-29, 2017
1352017
Probabilistic relational verification for cryptographic implementations
G Barthe, C Fournet, B Grégoire, PY Strub, N Swamy, S Zanella-Béguelin
ACM SIGPLAN Notices 49 (1), 193-205, 2014
1332014
Fully abstract compilation to JavaScript
C Fournet, N Swamy, J Chen, PE Dagand, PY Strub, B Livshits
Proceedings of the 40th annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2013
1302013
Quantum computing applications of genetic programming
L Spector, H Barnum, HJ Bernstein, N Swamy
1141999
Enforcing Stateful Authorization and Information Flow Policies in Fine
N Swamy, J Chen, R Chugh
Programming Languages and Systems: 19th European Symposium on Programming …, 2010
1062010
Implementing and proving the TLS 1.3 record layer
A Delignat-Lavaud, C Fournet, M Kohlweiss, J Protzenko, A Rastogi, ...
2017 IEEE Symposium on Security and Privacy (SP), 463-482, 2017
1022017
Evercrypt: A fast, verified, cross-platform cryptographic provider
J Protzenko, B Parno, A Fromherz, C Hawblitzel, M Polubelova, ...
2020 IEEE Symposium on Security and Privacy (SP), 983-1002, 2020
1002020
Finding and removing performance bottlenecks in large systems
G Ammons, JD Choi, M Gupta, N Swamy
ECOOP 2004–Object-Oriented Programming: 18th European Conference, Oslo …, 2004
962004
Everest: Towards a verified, drop-in replacement of HTTPS
K Bhargavan, B Bond, A Delignat-Lavaud, C Fournet, C Hawblitzel, ...
2nd Summit on Advances in Programming Languages, 2017
902017
Gradual typing embedded securely in JavaScript
N Swamy, C Fournet, A Rastogi, K Bhargavan, J Chen, PY Strub, ...
ACM SIGPLAN Notices 49 (1), 425-437, 2014
882014
The system can't perform the operation now. Try again later.
Articles 1–20