Papers in submission

Cross-tier, Label-based Security Enforcement for Web Applications
Brian J. Corcoran, Nikhil Swamy, and Michael Hicks, March 2008.
Submitted for publication.
[ abstract | .pdf | bib ]


Conference and selected workshop papers

Verified Enforcement of Stateful Information Release Policies
Nikhil Swamy and Michael Hicks, March 2008.
In Proceedings of the ACM SIGPLAN Workshop on Programming Langauges and Analysis for Security , June 2008.
(One of two best papers select to appear additionally in SIGPLAN Notices.)
[ abstract | .pdf | TR.pdf | bib ]

Fable: A Language for Enforcing User-defined Security Policies
Nikhil Swamy, Brian Corcoran, and Michael Hicks
In Proceedings of the IEEE Symposium on Security and Privacy (Oakland), May 2008.
[ abstract | .pdf | TR.pdf | bib ]

Verified Implementations of the Information Card Federated Identity-Management Protocol
Karthikeyan Bhargavan and Cedric Fournet and Andrew D.Gordon and Nikhil Swamy
In Proceedings of the 2008 ACM Symposium on Information, Communication and Comunication Security (ASIACCS), March 2008.
[ abstract | .pdf | bib ]

Verified Enforcement of Security Policies for Cross-Domain Information Flows
Nikhil Swamy, Michael Hicks, and Simon Tsang.
In Proceedings of the 2007 Military Communications Conference (MILCOM), October 2007.
[ abstract | .pdf | bib ]

Defeating Script Injection Attacks with Browser-Enforced Embedded Policies
Trevor Jim, Nikhil Swamy, and Michael Hicks
In Proceedings of the International World Wide Web Conference (WWW), pages 601-610, May 2007.
[ abstract | .pdf | bib ]

Managing Policy Updates in Security-Typed Languages
Nikhil Swamy, Michael Hicks, Stephen Tse, and Steve Zdancewic
In Proceedings of the Computer Security Foundations Workshop (CSFW), pages 202-216, July 2006.
[ abstract | .pdf | bib | TR ]

Finding and Removing Performance Bottlenecks in Large Systems
Glenn Ammons and Jong-Deok Choi and Manish Gupta and Nikhil Swamy
In Proceedings of the European Conference on Object-Oriented Programming (ECOOP), 2004
[ abstract | .pdf | bib ]

Finding a Better-than-classical Quantum AND/OR Algorithm
Lee Spector and Howard Barnum and Herbert J. Bernstein and Nikhil Swamy
In Proceedings of the Congress of Evolutionary Computation (CEC), 1999.
[ abstract | .pdf | bib ]


Thesis, journal articles, book chapters etc.

Language-based Enforcement of User-defined Security Policies
As Applied to Multi-tier Web Programs
Nikhil Swamy
Doctoral Dissertation, University of Maryland at College Park, August 2008
[ abstract | .pdf | bib ]

Safe Manual Memory Management in Cyclone
Nikhil Swamy, Michael Hicks, Greg Morrisett, Dan Grossman, and Trevor Jim.
Science of Computer Programming (SCP), 62(2):122-144, October 2006.
Special issue on memory management.
[ abstract | .pdf | bib ]

Dynamic Inference of Polymorphic Lock Types
James Rose, Nikhil Swamy, and Michael Hicks
Science of Computer Programming (SCP), 58(3):366-383, December 2005.
Special Issue on Concurrency and Synchronization in Java programs. (Supercedes 2004 CSJP paper of the same name.)
[ abstract | .pdf | bib ]

Quantum Computing Applications of Genetic Programming
Lee Spector and Howard Barnum and Herbert J. Bernstein and Nikhil Swamy
Advances in Genetic Programming 3 pp 135-160, MIT Press, 1999
[ abstract | .pdf | bib ]


Workshop papers

Combining Provenance and Security Policies in a Web-based Document Management System
Brian Corcoran, Nikhil Swamy, and Michael Hicks
In On-line Proceedings of the Workshop on Principles of Provenance (PrOPr), November 2007. http://homepages.inf.ed.ac.uk/jcheney/propr/.
[ abstract | .pdf | bib ]

Dynamic Inference of Polymorphic Lock Types
James Rose, Nikhil Swamy, and Michael Hicks
In Proceedings of the ACM Conference on Principles of Distributed Computing (PODC) Workshop on Concurrency and Synchronization in Java Programs (CSJP), pages 18-25, July 2004.
[ abstract | .pdf | bib ]

RGL Study in Hybrid Real-Time Systems
Ken Hennacy, Nikhil Swamy and Don Perlis
In Proceedings of Neural Networks and Computational Intelligence (NCI) May 2003
[ abstract | .pdf | bib ]


Technical reports

A Distributed Algorithm for Constructing a Generalization of de Bruijn Graphs
Nikhil Swamy, Konstantinos Bitsakos and Nikolaos Frangiadakis
Department of Computer Science, University of Maryland, Technical Report CS-TR-4792, August 2006
[ abstract | .pdf | bib ]