


default search action
Nikhil Swamy
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i13]Sarah Fakhoury, Markus Kuppe, Shuvendu K. Lahiri, Tahina Ramananandro, Nikhil Swamy:
3DGen: AI-Assisted Generation of Provably Correct Binary Format Parsers. CoRR abs/2404.10362 (2024) - [i12]Saikat Chakraborty, Gabriel Ebner, Siddharth Bhat, Sarah Fakhoury, Sakina Fatima, Shuvendu K. Lahiri, Nikhil Swamy:
Towards Neural Synthesis for SMT-Assisted Proof-Oriented Programming. CoRR abs/2405.01787 (2024) - [i11]Nikitha Rao, Elizabeth Gilbert, Tahina Ramananandro, Nikhil Swamy, Claire Le Goues, Sarah Fakhoury:
DiffSpec: Differential Testing with LLMs using Natural Language Specifications and Code Artifacts. CoRR abs/2410.04249 (2024) - 2023
- [c41]Arvind Arasu, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Aymeric Fromherz, Kesha Hietala, Bryan Parno, Ravi Ramamurthy:
FastVer2: A Provably Correct Monitor for Concurrent, Key-Value Stores. CPP 2023: 30-46 - [c40]Haobin Ni, Antoine Delignat-Lavaud, Cédric Fournet, Tahina Ramananandro, Nikhil Swamy:
ASN1*: Provably Correct, Non-malleable Parsing for ASN.1 DER. CPP 2023: 275-289 - [c39]Saikat Chakraborty, Shuvendu K. Lahiri, Sarah Fakhoury, Akash Lal, Madanlal Musuvathi, Aseem Rastogi, Aditya Senthilnathan, Rahul Sharma, Nikhil Swamy:
Ranking LLM-Generated Loop Invariants for Program Verification. EMNLP (Findings) 2023: 9164-9175 - [i10]Saikat Chakraborty, Shuvendu K. Lahiri, Sarah Fakhoury, Madanlal Musuvathi, Akash Lal, Aseem Rastogi, Aditya Senthilnathan, Rahul Sharma, Nikhil Swamy:
Ranking LLM-Generated Loop Invariants for Program Verification. CoRR abs/2310.09342 (2023) - 2022
- [c38]Nikhil Swamy, Tahina Ramananandro, Aseem Rastogi, Irina Spiridonova, Haobin Ni, Dmitry Malloy, Juan Vazquez, Michael Tang, Omar Cardona, Arti Gupta:
Hardening attack surfaces with formally proven binary format parsers. PLDI 2022: 31-45 - 2021
- [j10]Aymeric Fromherz, Aseem Rastogi, Nikhil Swamy, Sydney Gibson, Guido Martínez, Denis Merigoux
, Tahina Ramananandro:
Steel: proof-oriented programming in a dependently typed concurrent separation logic. Proc. ACM Program. Lang. 5(ICFP): 1-30 (2021) - [c37]Arvind Arasu, Badrish Chandramouli, Johannes Gehrke, Esha Ghosh, Donald Kossmann, Jonathan Protzenko, Ravi Ramamurthy, Tahina Ramananandro, Aseem Rastogi, Srinath T. V. Setty, Nikhil Swamy, Alexander van Renen, Min Xu:
FastVer: Making Data Integrity a Commodity. SIGMOD Conference 2021: 89-101 - [i9]Nikhil Swamy, Aseem Rastogi, Aymeric Fromherz, Denis Merigoux, Danel Ahman, Guido Martínez:
SteelCore: An Extensible Concurrent Separation Logic for Effectful Dependently Typed Programs. CoRR abs/2111.15149 (2021) - 2020
- [j9]Nikhil Swamy, Aseem Rastogi, Aymeric Fromherz, Denis Merigoux
, Danel Ahman
, Guido Martínez:
SteelCore: an extensible concurrent separation logic for effectful dependently typed programs. Proc. ACM Program. Lang. 4(ICFP): 121:1-121:30 (2020) - [c36]Jonathan Protzenko, Bryan Parno, Aymeric Fromherz, Chris Hawblitzel, Marina Polubelova, Karthikeyan Bhargavan, Benjamin Beurdouche, Joonwon Choi, Antoine Delignat-Lavaud, Cédric Fournet, Natalia Kulatova, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Christoph M. Wintersteiger
, Santiago Zanella-Béguelin
:
EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider. SP 2020: 983-1002
2010 – 2019
- 2019
- [j8]Aymeric Fromherz, Nick Giannarakis, Chris Hawblitzel, Bryan Parno, Aseem Rastogi, Nikhil Swamy:
A verified, efficient embedding of a verifiable assembly language. Proc. ACM Program. Lang. 3(POPL): 63:1-63:30 (2019) - [c35]Guido Martínez, Danel Ahman, Victor Dumitrescu, Nick Giannarakis, Chris Hawblitzel, Catalin Hritcu, Monal Narasimhamurthy
, Zoe Paraskevopoulou, Clément Pit-Claudel
, Jonathan Protzenko, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy:
Meta-F ^\star : Proof Automation with SMT, Tactics, and Metaprograms. ESOP 2019: 30-59 - [c34]Aseem Rastogi, Nikhil Swamy, Michael Hicks:
Wys*: A DSL for Verified Secure Multi-party Computations. POST 2019: 99-122 - [c33]Tahina Ramananandro, Antoine Delignat-Lavaud, Cédric Fournet, Nikhil Swamy, Tej Chajed, Nadim Kobeissi
, Jonathan Protzenko:
EverParse: Verified Secure Zero-Copy Parsers for Authenticated Message Formats. USENIX Security Symposium 2019: 1465-1482 - [i8]Jonathan Protzenko, Bryan Parno, Aymeric Fromherz, Chris Hawblitzel, Marina Polubelova, Karthikeyan Bhargavan, Benjamin Beurdouche, Joonwon Choi, Antoine Delignat-Lavaud, Cédric Fournet, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Christoph M. Wintersteiger, Santiago Zanella-Béguelin:
EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider. IACR Cryptol. ePrint Arch. 2019: 757 (2019) - 2018
- [j7]Danel Ahman
, Cédric Fournet, Catalin Hritcu, Kenji Maillard
, Aseem Rastogi, Nikhil Swamy:
Recalling a witness: foundations and applications of monotonic state. Proc. ACM Program. Lang. 2(POPL): 65:1-65:30 (2018) - [c32]Niklas Grimm, Kenji Maillard
, Cédric Fournet, Catalin Hritcu, Matteo Maffei, Jonathan Protzenko, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Santiago Zanella-Béguelin
:
A monadic framework for relational verification: applied to information security, program equivalence, and optimizations. CPP 2018: 130-145 - [i7]Guido Martínez, Danel Ahman, Victor Dumitrescu, Nick Giannarakis, Chris Hawblitzel, Catalin Hritcu, Monal Narasimhamurthy, Zoe Paraskevopoulou, Clément Pit-Claudel, Jonathan Protzenko, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy:
Meta-F*: Metaprogramming and Tactics in an Effectful Program Verifier. CoRR abs/1803.06547 (2018) - 2017
- [j6]Jonathan Protzenko, Jean Karim Zinzindohoué, Aseem Rastogi, Tahina Ramananandro, Peng Wang, Santiago Zanella-Béguelin, Antoine Delignat-Lavaud, Catalin Hritcu, Karthikeyan Bhargavan, Cédric Fournet, Nikhil Swamy:
Verified low-level programming embedded in F. Proc. ACM Program. Lang. 1(ICFP): 17:1-17:29 (2017) - [c31]Danel Ahman
, Catalin Hritcu, Kenji Maillard
, Guido Martínez, Gordon D. Plotkin, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy:
Dijkstra monads for free. POPL 2017: 515-529 - [c30]Karthikeyan Bhargavan, Barry Bond, Antoine Delignat-Lavaud, Cédric Fournet, Chris Hawblitzel, Catalin Hritcu, Samin Ishtiaq, Markulf Kohlweiss
, K. Rustan M. Leino, Jay R. Lorch, Kenji Maillard
, Jianyang Pan, Bryan Parno, Jonathan Protzenko, Tahina Ramananandro, Ashay Rane, Aseem Rastogi, Nikhil Swamy, Laure Thompson, Peng Wang, Santiago Zanella-Béguelin
, Jean Karim Zinzindohoue:
Everest: Towards a Verified, Drop-in Replacement of HTTPS. SNAPL 2017: 1:1-1:12 - [c29]Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss
, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella-Béguelin
, Karthikeyan Bhargavan, Jianyang Pan, Jean Karim Zinzindohoue:
Implementing and Proving the TLS 1.3 Record Layer. IEEE Symposium on Security and Privacy 2017: 463-482 - [i6]Jonathan Protzenko, Jean Karim Zinzindohoué, Aseem Rastogi, Tahina Ramananandro, Peng Wang, Santiago Zanella-Béguelin, Antoine Delignat-Lavaud, Catalin Hritcu, Karthikeyan Bhargavan, Cédric Fournet, Nikhil Swamy:
Verified Low-Level Programming Embedded in F*. CoRR abs/1703.00053 (2017) - [i5]Niklas Grimm, Kenji Maillard, Cédric Fournet, Catalin Hritcu, Matteo Maffei, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella-Béguelin:
A Monadic Framework for Relational Verification (Functional Pearl). CoRR abs/1703.00055 (2017) - [i4]Danel Ahman, Cédric Fournet, Catalin Hritcu, Kenji Maillard, Aseem Rastogi, Nikhil Swamy:
Recalling a Witness: Foundations and Applications of Monotonic State. CoRR abs/1707.02466 (2017) - [i3]Aseem Rastogi, Nikhil Swamy, Michael Hicks:
WYS*: A Verified Language Extension for Secure Multi-party Computations. CoRR abs/1711.06467 (2017) - 2016
- [c28]Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Anitha Gollamudi
, Georges Gonthier, Nadim Kobeissi
, Natalia Kulatova, Aseem Rastogi, Thomas Sibut-Pinote, Nikhil Swamy, Santiago Zanella-Béguelin
:
Formal Verification of Smart Contracts: Short Paper. PLAS@CCS 2016: 91-96 - [c27]Nikhil Swamy, Catalin Hritcu, Chantal Keller, Aseem Rastogi, Antoine Delignat-Lavaud, Simon Forest, Karthikeyan Bhargavan, Cédric Fournet, Pierre-Yves Strub, Markulf Kohlweiss
, Jean Karim Zinzindohoue, Santiago Zanella-Béguelin
:
Dependent types and multi-monadic effects in F. POPL 2016: 256-270 - [i2]Danel Ahman, Catalin Hritcu, Guido Martínez, Gordon D. Plotkin, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy:
Dijkstra Monads for Free. CoRR abs/1608.06499 (2016) - [i1]Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Jianyang Pan, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella-Béguelin, Jean Karim Zinzindohoue:
Implementing and Proving the TLS 1.3 Record Layer. IACR Cryptol. ePrint Arch. 2016: 1178 (2016) - 2015
- [c26]Aseem Rastogi, Nikhil Swamy, Cédric Fournet, Gavin M. Bierman, Panagiotis Vekris:
Safe & Efficient Gradual Typing for TypeScript. POPL 2015: 167-180 - 2014
- [j5]Cole Schlesinger, Karthik Pattabiraman, Nikhil Swamy, David Walker
, Benjamin G. Zorn:
Modular protections against non-control data attacks. J. Comput. Secur. 22(5): 699-742 (2014) - [c25]Gilles Barthe
, Cédric Fournet, Benjamin Grégoire, Pierre-Yves Strub, Nikhil Swamy, Santiago Zanella-Béguelin
:
Probabilistic relational verification for cryptographic implementations. POPL 2014: 193-206 - [c24]Nikhil Swamy, Cédric Fournet, Aseem Rastogi, Karthikeyan Bhargavan, Juan Chen, Pierre-Yves Strub, Gavin M. Bierman:
Gradual typing embedded securely in JavaScript. POPL 2014: 425-438 - [c23]Michael Hicks, Gavin M. Bierman, Nataliya Guts, Daan Leijen, Nikhil Swamy:
Polymonadic Programming. MSFP 2014: 79-99 - 2013
- [j4]Nikhil Swamy, Juan Chen, Cédric Fournet, Pierre-Yves Strub, Karthikeyan Bhargavan, Jean Yang:
Secure distributed programming with value-dependent types. J. Funct. Program. 23(4): 402-451 (2013) - [c22]Jean-Baptiste Jeannin, Guido de Caso, Juan Chen, Yuri Gurevich, Prasad Naldurg, Nikhil Swamy:
dkal ⋆ : Constructing Executable Specifications of Authorization Protocols. ESSoS 2013: 139-154 - [c21]Thomas Ball, Peli de Halleux, Nikhil Swamy, Daan Leijen:
Increasing human-tool interaction via the web. PASTE 2013: 49-52 - [c20]Nikhil Swamy, Joel Weinberger, Cole Schlesinger, Juan Chen, Benjamin Livshits:
Verifying higher-order programs with the dijkstra monad. PLDI 2013: 387-398 - [c19]Cédric Fournet, Nikhil Swamy, Juan Chen, Pierre-Évariste Dagand, Pierre-Yves Strub, Benjamin Livshits:
Fully abstract compilation to JavaScript. POPL 2013: 371-384 - [e2]Prasad Naldurg, Nikhil Swamy:
Proceedings of the 2013 ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, PLAS 2013, Seattle, WA, USA, June 20, 2013. ACM 2013, ISBN 978-1-4503-2144-0 [contents] - 2012
- [c18]Pierre-Yves Strub, Nikhil Swamy, Cédric Fournet, Juan Chen:
Self-certification: bootstrapping certified typecheckers in F* with Coq. POPL 2012: 571-584 - [e1]Koen Claessen, Nikhil Swamy:
Proceedings of the sixth workshop on Programming Languages meets Program Verification, PLPV 2012, Philadelphia, PA, USA, January 24, 2012. ACM 2012, ISBN 978-1-4503-1125-0 [contents] - 2011
- [c17]Cole Schlesinger, Karthik Pattabiraman, Nikhil Swamy, David Walker
, Benjamin G. Zorn:
Modular Protections against Non-control Data Attacks. CSF 2011: 131-145 - [c16]Nikhil Swamy, Nataliya Guts, Daan Leijen, Michael Hicks
:
Lightweight monadic programming in ML. ICFP 2011: 15-27 - [c15]Nikhil Swamy, Juan Chen, Cédric Fournet, Pierre-Yves Strub, Karthikeyan Bhargavan, Jean Yang:
Secure distributed programming with value-dependent types. ICFP 2011: 266-278 - [c14]Johannes Borgström, Juan Chen, Nikhil Swamy:
Verifying stateful programs with substructural state and hoare types. PLPV 2011: 15-26 - [c13]Arjun Guha, Matthew Fredrikson
, Benjamin Livshits, Nikhil Swamy:
Verified Security for Browser Extensions. IEEE Symposium on Security and Privacy 2011: 115-130 - 2010
- [c12]Nikhil Swamy, Juan Chen, Ravi Chugh:
Enforcing Stateful Authorization and Information Flow Policies in Fine. ESOP 2010: 529-549 - [c11]Juan Chen, Ravi Chugh, Nikhil Swamy:
Type-preserving compilation of end-to-end verification of security enforcement. PLDI 2010: 412-423
2000 – 2009
- 2009
- [c10]Nikhil Swamy, Michael W. Hicks, Gavin M. Bierman:
A theory of typed coercions and its applications. ICFP 2009: 329-340 - [c9]Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
:
Cross-tier, label-based security enforcement for web applications. SIGMOD Conference 2009: 269-282 - 2008
- [b1]Nikhil Swamy:
Language-based Enforcement of User-defined Security Policies (As Applied to Multi-tier Web Programs). University of Maryland, College Park, MD, USA, 2008 - [j3]Nikhil Swamy, Michael Hicks:
Verified enforcement of stateful information release policies. ACM SIGPLAN Notices 43(12): 21-31 (2008) - [c8]Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Nikhil Swamy:
Verified implementations of the information card federated identity-management protocol. AsiaCCS 2008: 123-135 - [c7]Nikhil Swamy, Michael Hicks
:
Verified enforcement of stateful information release policies. PLAS 2008: 21-32 - [c6]Nikhil Swamy, Brian J. Corcoran, Michael Hicks
:
Fable: A Language for Enforcing User-defined Security Policies. SP 2008: 369-383 - 2007
- [c5]Trevor Jim, Nikhil Swamy, Michael Hicks:
Defeating script injection attacks with browser-enforced embedded policies. WWW 2007: 601-610 - 2006
- [j2]Nikhil Swamy, Michael W. Hicks, Greg Morrisett, Dan Grossman, Trevor Jim:
Safe manual memory management in Cyclone. Sci. Comput. Program. 62(2): 122-144 (2006) - [c4]Nikhil Swamy, Michael Hicks, Stephen Tse, Steve Zdancewic:
Managing Policy Updates in Security-Typed Languages. CSFW 2006: 202-216 - 2005
- [j1]James Rose, Nikhil Swamy, Michael Hicks:
Dynamic inference of polymorphic lock types. Sci. Comput. Program. 58(3): 366-383 (2005) - 2004
- [c3]Glenn Ammons, Jong-Deok Choi, Manish Gupta, Nikhil Swamy:
Finding and Removing Performance Bottlenecks in Large Systems. ECOOP 2004: 170-194 - 2003
- [c2]Ken Hennacy, Nikhil Swamy, Don Perlis:
RGL Study in a Hybrid Real-time System. Neural Networks and Computational Intelligence 2003: 203-208
1990 – 1999
- 1999
- [c1]Lee Spector
, Howard Barnum
, Herbert J. Bernstein, Nikhil Swamy:
Finding a better-than-classical quantum AND/OR algorithm using genetic programming. CEC 1999: 2239-2246
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-12 23:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint