Ph.D. Candidate Department of Computer Science University of Maryland College Park, MD |
Web Application Security (Dissertation work in progress) | |
Fable : A Language for Enforcing User-defined Security Policies N. Swamy, B. Corcoran, and M. Hicks IEEE Symposium on Security and Privacy, May 2008 (To appear) |
|
Verified Enforcement of Security Policies for Cross-Domain Information Flows N. Swamy, M. Hicks and S. Tsang MILCOM 2007 |
|
Combining Provenance and Security Policies in a Web-based Document Management System B. Corcoran, N. Swamy, M. Hicks Principles of Provenance Workshop, 2007 (Extended Abstract) |
|
Web Browser Security | |
Defeating Script Injection Attacks with Browser Enforced Embedded Policies
T. Jim, N. Swamy and M. Hicks WWW 2007 |
|
Verification of cryptographic protocols | |
Verified Implementations of the Information Card Federated Identity Management Protocol
K. Bhargavan, C. Fournet, A. Gordon and N. Swamy ACM Symposium on Information, Computer and Communication Security 2008 (ASIACCS) (To Appear) |
|
Information Flow Security | |
Managing Policy Updates in Security-Typed Languages N. Swamy, M. Hicks, S. Tse and S. Zdancewic In Proc. IEEE Computer Security Foundations, 2006 |
|
Managing Policy Updates in Security-Typed Languages (Extended Version) N. Swamy, M. Hicks, S. Tse and S. Zdancewic Department of Computer Science, University of Maryland; Technical Report CS-TR-4793 |
|
Memory Management | |
Safe Manual Memory Management in Cyclone N. Swamy, M. Hicks, G. Morrisett, D. Grossman and T. Jim Science of Computer Programming, Special Issue on Memory Management Elsevier Press, 2005 |
|
Initial Experience Porting Linux Device Drivers to Cyclone N. Swamy and M. Hicks Unpublished Manuscript, 2005 |
|
Race Detection | |
Dynamic Inference of Polymorphic Lock Types J. Rose, N. Swamy and M. Hicks Science of Computer Programming, Special Issue on Concurrency and Synchronization in Java programs Elsevier Press, 2005 |
|
Dynamic Inference of Polymorphic Lock Types J.Rose, N. Swamy and M. Hicks In Proceeding of Principles of Distributed Computing 2004, Workship on Concurrency and Synchronization in Java programs |
|
Performance Analysis | |
Finding and Removing Performance Bottlenecks in Large Systems G. Ammons, J. Choi, M. Gupta and N. Swamy In Proceedings of European Conference on Object Oriented Programming (ECOOP) 2004 |
|
Network Algorithms | |
A Distributed Algorithm for Constructing a Generalization of de Bruijn Graphs N. Swamy and K. Bitsakos and N. Frangiadakis Department of Computer Science, University of Maryland, CS-TR-4792 |
|
Artificial Intelligence | |
RGL Study in Hybrid Real-Time Systems K. Hennacy, N. Swamy and D. Perlis Neural Networks and Computational Intelligence, 2004 |
|
Finding a Better-than-Classical Quantum AND/OR Algorithm L. Spector, H. Barnum, H.J. Bernstein and N. Swamy Congress of Evolutionary Computation, 1999 |
|
Quantum
computing applications of genetic programming L. Spector, H. Barnum, H.J. Bernstein and N. Swamy Advances in Genetic Programming, MIT Press, 2000 |
|
Quantum
Computing and AI An overview of this project from L.Spector's invited talk at AAAI '99 |
|
Resolution-based Automated Theorem Proving | |
Automated Reasoning about Abstract Algebra : Control Strategies for Supported Deductions N. Swamy Hampshire College, Undergraduate Thesis |