Folgen
Sandip Ghosal
Sandip Ghosal
Postdoctoral Researcher, Uppsala University
Bestätigte E-Mail-Adresse bei it.uu.se - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Static Security Certification of Programs via Dynamic Labelling
S Ghosal, N Shyamasundar, R. and Kumar
15th International Joint Conference on e-Business and Telecommunications …, 2018
62018
Compile-Time Security Certification of Imperative Programming Languages
S Ghosal, RK Shyamasundar, NVN Kumar
International Conference on E-Business and Telecommunications 1118, 159--182, 2018
32018
Preventing Privacy-Violating Information Flows in JavaScript Applications Using Dynamic Labelling
S Ghosal, RK Shyamasundar
International Conference on Information Systems Security, 202-219, 2022
12022
Secure transmission of gate level description
S Ghosal, D Mitra
2012 1st International Conference on Recent Advances in Information …, 2012
12012
An Active Learning Approach to Synthesizing Program Contracts
S Ghosal, B Jonsson, P Rümmer
International Conference on Software Engineering and Formal Methods, 126-144, 2023
2023
An Axiomatic Approach to Detect Information Leaks in Concurrent Programs
S Ghosal, RK Shyamasundar
arXiv preprint arXiv:2103.02171, 2021
2021
An Axiomatic Approach to Detect Information Leaks in Concurrent Programs
S Ghosal, RK Shyamasundar
2021 IEEE/ACM 43rd International Conference on Software Engineering: New …, 2021
2021
A Generalized Notion of Non-interference for Flow Security of Sequential and Concurrent Programs
S Ghosal, RK Shyamasundar
2020 27th Asia-Pacific Software Engineering Conference (APSEC), 51-60, 2020
2020
Information Flow Security Certification for SPARK Programs
S Ghosal, RK Shyamasundar
IFIP Annual Conference on Data and Applications Security and Privacy, 137--150, 2020
2020
A Solution to “Confused Deputy” Problem Using RWFM Labels
S Ghosal, RK Shyamasundar
Security and Privacy: Second ISEA International Conference, ISEA-ISAP 2018 …, 2019
2019
Certificate–based encoding of gate level description for secure transmission
S Ghosal, D Mitra, S Bhattacharjee
International Journal of Electronic Security and Digital Forensics 7 (1), 54-75, 2015
2015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–11