| Formal verification of smart contracts: Short paper K Bhargavan, A Delignat-Lavaud, C Fournet, A Gollamudi, G Gonthier, ... Proceedings of the 2016 ACM workshop on programming languages and analysis …, 2016 | 880 | 2016 |
| Dependent types and multi-monadic effects in F N Swamy, C Hriţcu, C Keller, A Rastogi, A Delignat-Lavaud, S Forest, ... Proceedings of the 43rd annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2016 | 584 | 2016 |
| Defeating script injection attacks with browser-enforced embedded policies T Jim, N Swamy, M Hicks Proceedings of the 16th international conference on World Wide Web, 601-610, 2007 | 490 | 2007 |
| Secure distributed programming with value-dependent types N Swamy, J Chen, C Fournet, PY Strub, K Bhargavan, J Yang ACM SIGPLAN Notices 46 (9), 266-278, 2011 | 298 | 2011 |
| Quantum computing applications of genetic programming L Spector, H Barnum, HJ Bernstein, N Swamy Advances in genetic programming 3, 135-160, 1999 | 201* | 1999 |
| Verified low-level programming embedded in F J Protzenko, JK Zinzindohoué, A Rastogi, T Ramananandro, P Wang, ... Proceedings of the ACM on Programming Languages 1 (ICFP), 1-29, 2017 | 196 | 2017 |
| Safe & efficient gradual typing for TypeScript A Rastogi, N Swamy, C Fournet, G Bierman, P Vekris Proceedings of the 42Nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2015 | 187 | 2015 |
| Verifying higher-order programs with the Dijkstra monad N Swamy, J Weinberger, C Schlesinger, J Chen, B Livshits ACM SIGPLAN Notices 48 (6), 387-398, 2013 | 178 | 2013 |
| Verified security for browser extensions A Guha, M Fredrikson, B Livshits, N Swamy 2011 IEEE symposium on security and privacy, 115-130, 2011 | 177 | 2011 |
| Fable: A language for enforcing user-defined security policies N Swamy, BJ Corcoran, M Hicks 2008 IEEE Symposium on Security and Privacy (sp 2008), 369-383, 2008 | 166 | 2008 |
| Finding a better-than-classical quantum AND/OR algorithm using genetic programming L Spector, H Barnum, HJ Bernstein, N Swamy Proceedings of the 1999 Congress on Evolutionary Computation-CEC99 (Cat. No …, 1999 | 163 | 1999 |
| Evercrypt: A fast, verified, cross-platform cryptographic provider J Protzenko, B Parno, A Fromherz, C Hawblitzel, M Polubelova, ... 2020 IEEE Symposium on Security and Privacy (SP), 983-1002, 2020 | 159 | 2020 |
| Probabilistic relational verification for cryptographic implementations G Barthe, C Fournet, B Grégoire, PY Strub, N Swamy, S Zanella-Béguelin ACM SIGPLAN Notices 49 (1), 193-205, 2014 | 143 | 2014 |
| Fully abstract compilation to JavaScript C Fournet, N Swamy, J Chen, PE Dagand, PY Strub, B Livshits Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2013 | 135 | 2013 |
| Implementing and proving the TLS 1.3 record layer A Delignat-Lavaud, C Fournet, M Kohlweiss, J Protzenko, A Rastogi, ... 2017 IEEE Symposium on Security and Privacy (SP), 463-482, 2017 | 133 | 2017 |
| Everest: Towards a verified, drop-in replacement of HTTPS K Bhargavan, B Bond, A Delignat-Lavaud, C Fournet, C Hawblitzel, ... 2nd Summit on Advances in Programming Languages, 2017 | 109 | 2017 |
| Enforcing Stateful Authorization and Information Flow Policies in Fine N Swamy, J Chen, R Chugh European Symposium on Programming, 529-549, 2010 | 106 | 2010 |
| {EverParse}: Verified secure {Zero-Copy} parsers for authenticated message formats T Ramananandro, A Delignat-Lavaud, C Fournet, N Swamy, T Chajed, ... 28th USENIX Security Symposium (USENIX Security 19), 1465-1482, 2019 | 101 | 2019 |
| Finding and removing performance bottlenecks in large systems G Ammons, JD Choi, M Gupta, N Swamy European Conference on Object-Oriented Programming, 172-196, 2004 | 99 | 2004 |
| Cross-tier, label-based security enforcement for web applications BJ Corcoran, N Swamy, M Hicks Proceedings of the 2009 ACM SIGMOD International Conference on Management of …, 2009 | 97 | 2009 |