NIKHIL SWAMY

Ph.D. Candidate
Department of Computer Science
University of Maryland
College Park, MD
nik


Research statement I am a member of the programming languages group and am advised by Dr. Michael Hicks. My research is focused primarily on provably securing software systems by utilizing formal methods in the design, implementation or analysis of programming languages.



I expect to graduate this summer and am looking for employment. You can find my application materials here.



Projects and Publications


Web Application Security (Dissertation work in progress)
    Fable : A Language for Enforcing User-defined Security Policies
N. Swamy, B. Corcoran, and M. Hicks
IEEE Symposium on Security and Privacy, May 2008 (To appear)
    Verified Enforcement of Security Policies for Cross-Domain Information Flows
N. Swamy, M. Hicks and S. Tsang
MILCOM 2007
    Combining Provenance and Security Policies in a Web-based Document Management System
B. Corcoran, N. Swamy, M. Hicks
Principles of Provenance Workshop, 2007 (Extended Abstract)
Web Browser Security
    Defeating Script Injection Attacks with Browser Enforced Embedded Policies
T. Jim, N. Swamy and M. Hicks
WWW 2007
Verification of cryptographic protocols
    Verified Implementations of the Information Card Federated Identity Management Protocol
K. Bhargavan, C. Fournet, A. Gordon and N. Swamy
ACM Symposium on Information, Computer and Communication Security 2008 (ASIACCS) (To Appear)
Information Flow Security
    Managing Policy Updates in Security-Typed Languages
N. Swamy, M. Hicks, S. Tse and S. Zdancewic
In Proc. IEEE Computer Security Foundations, 2006
    Managing Policy Updates in Security-Typed Languages (Extended Version)
N. Swamy, M. Hicks, S. Tse and S. Zdancewic
Department of Computer Science, University of Maryland; Technical Report CS-TR-4793
Memory Management
    Safe Manual Memory Management in Cyclone
N. Swamy, M. Hicks, G. Morrisett, D. Grossman and T. Jim
Science of Computer Programming, Special Issue on Memory Management
Elsevier Press, 2005
    Initial Experience Porting Linux Device Drivers to Cyclone
N. Swamy and M. Hicks
Unpublished Manuscript, 2005
Race Detection
    Dynamic Inference of Polymorphic Lock Types
J. Rose, N. Swamy and M. Hicks
Science of Computer Programming, Special Issue on Concurrency and Synchronization in Java programs
Elsevier Press, 2005
    Dynamic Inference of Polymorphic Lock Types
J.Rose, N. Swamy and M. Hicks
In Proceeding of Principles of Distributed Computing 2004, Workship on Concurrency and Synchronization in Java programs
Performance Analysis
    Finding and Removing Performance Bottlenecks in Large Systems
G. Ammons, J. Choi, M. Gupta and N. Swamy
In Proceedings of European Conference on Object Oriented Programming (ECOOP) 2004
Network Algorithms
    A Distributed Algorithm for Constructing a Generalization of de Bruijn Graphs
N. Swamy and K. Bitsakos and N. Frangiadakis
Department of Computer Science, University of Maryland, CS-TR-4792
Artificial Intelligence
    RGL Study in Hybrid Real-Time Systems
K. Hennacy, N. Swamy and D. Perlis
Neural Networks and Computational Intelligence, 2004
    Finding a Better-than-Classical Quantum AND/OR Algorithm
L. Spector, H. Barnum, H.J. Bernstein and N. Swamy
Congress of Evolutionary Computation, 1999
    Quantum computing applications of genetic programming
L. Spector, H. Barnum, H.J. Bernstein and N. Swamy
Advances in Genetic Programming, MIT Press, 2000
    Quantum Computing and AI
An overview of this project from L.Spector's invited talk at AAAI '99
Resolution-based Automated Theorem Proving
    Automated Reasoning about Abstract Algebra : Control Strategies for Supported Deductions
N. Swamy
Hampshire College, Undergraduate Thesis


Miscellany


My Erdös number is no greater than 3 : Howard Barnum -> Michael Saks -> Pal Erdös


Email:
   id AT cs DOT umd DOT edu where id = nswamy