default search action
Aseem Rastogi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c31]Kaushik Rajan, Aseem Rastogi, Akash Lal, Sampath Rajendra, Krithika Subramanian, Krut Patel:
Welding Natural Language Queries to Analytics IRs with LLMs. CIDR 2024 - [e1]Sujit Kumar Charkrabarti, Raghavan Komondoor, Raveendra Kumar Medicherla, Aseem Rastogi, Sudipto Ghosh:
Proceedings of the 17th Innovations in Software Engineering Conference, ISEC 2024, Bangalore, India, February 22-24, 2024. ACM 2024 [contents] - [i24]Nausheen Mohammed, Akash Lal, Aseem Rastogi, Subhajit Roy, Rahul Sharma:
Enabling Memory Safety of C Programs using LLMs. CoRR abs/2404.01096 (2024) - 2023
- [c30]Arvind Arasu, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Aymeric Fromherz, Kesha Hietala, Bryan Parno, Ravi Ramamurthy:
FastVer2: A Provably Correct Monitor for Concurrent, Key-Value Stores. CPP 2023: 30-46 - [c29]Saikat Chakraborty, Shuvendu K. Lahiri, Sarah Fakhoury, Akash Lal, Madanlal Musuvathi, Aseem Rastogi, Aditya Senthilnathan, Rahul Sharma, Nikhil Swamy:
Ranking LLM-Generated Loop Invariants for Program Verification. EMNLP (Findings) 2023: 9164-9175 - [c28]Aseem Rastogi:
Proof-oriented programming for high-assurance systems. ISEC 2023: 3:1 - [i23]Pantazis Deligiannis, Akash Lal, Nikita Mehrotra, Aseem Rastogi:
Fixing Rust Compilation Errors using LLMs. CoRR abs/2308.05177 (2023) - [i22]Saikat Chakraborty, Shuvendu K. Lahiri, Sarah Fakhoury, Madanlal Musuvathi, Akash Lal, Aseem Rastogi, Aditya Senthilnathan, Rahul Sharma, Nikhil Swamy:
Ranking LLM-Generated Loop Invariants for Program Verification. CoRR abs/2310.09342 (2023) - [i21]Adharsh Kamath, Aditya Senthilnathan, Saikat Chakraborty, Pantazis Deligiannis, Shuvendu K. Lahiri, Akash Lal, Aseem Rastogi, Subhajit Roy, Rahul Sharma:
Finding Inductive Loop Invariants using Large Language Models. CoRR abs/2311.07948 (2023) - 2022
- [c27]Nikhil Swamy, Tahina Ramananandro, Aseem Rastogi, Irina Spiridonova, Haobin Ni, Dmitry Malloy, Juan Vazquez, Michael Tang, Omar Cardona, Arti Gupta:
Hardening attack surfaces with formally proven binary format parsers. PLDI 2022: 31-45 - [c26]Deevashwer Rathee, Anwesh Bhattacharya, Rahul Sharma, Divya Gupta, Nishanth Chandran, Aseem Rastogi:
SecFloat: Accurate Floating-Point meets Secure 2-Party Computation. SP 2022: 576-595 - [i20]Deevashwer Rathee, Anwesh Bhattacharya, Rahul Sharma, Divya Gupta, Nishanth Chandran, Aseem Rastogi:
SecFloat: Accurate Floating-Point meets Secure 2-Party Computation. IACR Cryptol. ePrint Arch. 2022: 322 (2022) - 2021
- [j5]Aymeric Fromherz, Aseem Rastogi, Nikhil Swamy, Sydney Gibson, Guido Martínez, Denis Merigoux, Tahina Ramananandro:
Steel: proof-oriented programming in a dependently typed concurrent separation logic. Proc. ACM Program. Lang. 5(ICFP): 1-30 (2021) - [c25]Samvid Dharanikota, Suvam Mukherjee, Chandrika Bhardwaj, Aseem Rastogi, Akash Lal:
Celestial: A Smart Contracts Verification Framework. FMCAD 2021: 133-142 - [c24]Arvind Arasu, Badrish Chandramouli, Johannes Gehrke, Esha Ghosh, Donald Kossmann, Jonathan Protzenko, Ravi Ramamurthy, Tahina Ramananandro, Aseem Rastogi, Srinath T. V. Setty, Nikhil Swamy, Alexander van Renen, Min Xu:
FastVer: Making Data Integrity a Commodity. SIGMOD Conference 2021: 89-101 - [c23]Deevashwer Rathee, Mayank Rathee, Rahul Kranti Kiran Goli, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi:
SiRnn: A Math Library for Secure RNN Inference. SP 2021: 1003-1020 - [c22]Zhe Tao, Aseem Rastogi, Naman Gupta, Kapil Vaswani, Aditya V. Thakur:
DICE*: A Formally Verified Implementation of DICE Measured Boot. USENIX Security Symposium 2021: 1091-1107 - [i19]Deevashwer Rathee, Mayank Rathee, Rahul Kranti Kiran Goli, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi:
SIRNN: A Math Library for Secure RNN Inference. CoRR abs/2105.04236 (2021) - [i18]Nikhil Swamy, Aseem Rastogi, Aymeric Fromherz, Denis Merigoux, Danel Ahman, Guido Martínez:
SteelCore: An Extensible Concurrent Separation Logic for Effectful Dependently Typed Programs. CoRR abs/2111.15149 (2021) - [i17]Deevashwer Rathee, Mayank Rathee, G. Rahul Kranti Kiran, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi:
SIRNN: A Math Library for Secure RNN Inference. IACR Cryptol. ePrint Arch. 2021: 459 (2021) - 2020
- [j4]Nikhil Swamy, Aseem Rastogi, Aymeric Fromherz, Denis Merigoux, Danel Ahman, Guido Martínez:
SteelCore: an extensible concurrent separation logic for effectful dependently typed programs. Proc. ACM Program. Lang. 4(ICFP): 121:1-121:30 (2020) - [c21]Deevashwer Rathee, Mayank Rathee, Nishant Kumar, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma:
CrypTFlow2: Practical 2-Party Secure Inference. CCS 2020: 325-342 - [c20]Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma:
CrypTFlow: Secure TensorFlow Inference. SP 2020: 336-353 - [c19]Jonathan Protzenko, Bryan Parno, Aymeric Fromherz, Chris Hawblitzel, Marina Polubelova, Karthikeyan Bhargavan, Benjamin Beurdouche, Joonwon Choi, Antoine Delignat-Lavaud, Cédric Fournet, Natalia Kulatova, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Christoph M. Wintersteiger, Santiago Zanella Béguelin:
EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider. SP 2020: 983-1002 - [i16]Deevashwer Rathee, Mayank Rathee, Nishant Kumar, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma:
CrypTFlow2: Practical 2-Party Secure Inference. CoRR abs/2010.06457 (2020) - [i15]Javier Alvarez-Valle, Pratik Bhatu, Nishanth Chandran, Divya Gupta, Aditya V. Nori, Aseem Rastogi, Mayank Rathee, Rahul Sharma, Shubham Ugare:
Secure Medical Image Analysis with CrypTFlow. CoRR abs/2012.05064 (2020) - [i14]Deevashwer Rathee, Mayank Rathee, Nishant Kumar, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma:
CrypTFlow2: Practical 2-Party Secure Inference. IACR Cryptol. ePrint Arch. 2020: 1002 (2020)
2010 – 2019
- 2019
- [j3]Aymeric Fromherz, Nick Giannarakis, Chris Hawblitzel, Bryan Parno, Aseem Rastogi, Nikhil Swamy:
A verified, efficient embedding of a verifiable assembly language. Proc. ACM Program. Lang. 3(POPL): 63:1-63:30 (2019) - [c18]Suvam Mukherjee, Nitin John Raj, Krishnan Govindraj, Pantazis Deligiannis, Chandramouleswaran Ravichandran, Akash Lal, Aseem Rastogi, Raja Krishnaswamy:
Reliable State Machines: A Framework for Programming Reliable Cloud Services. ECOOP 2019: 18:1-18:29 - [c17]Guido Martínez, Danel Ahman, Victor Dumitrescu, Nick Giannarakis, Chris Hawblitzel, Catalin Hritcu, Monal Narasimhamurthy, Zoe Paraskevopoulou, Clément Pit-Claudel, Jonathan Protzenko, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy:
Meta-F ^\star : Proof Automation with SMT, Tactics, and Metaprograms. ESOP 2019: 30-59 - [c16]Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma, Shardul Tripathi:
EzPC: Programmable and Efficient Secure Two-Party Computation for Machine Learning. EuroS&P 2019: 496-511 - [c15]Ajay Brahmakshatriya, Piyus Kedia, Derrick Paul McKee, Deepak Garg, Akash Lal, Aseem Rastogi, Hamed Nemati, Anmol Panda, Pratik Bhatu:
ConfLLVM: A Compiler for Enforcing Data Confidentiality in Low-Level Code. EuroSys 2019: 4:1-4:15 - [c14]Venkatesh Choppella, Aseem Rastogi:
Tutorials and Technical Briefings at ISEC 2019. ISEC 2019: 33:1-33:2 - [c13]Aseem Rastogi, Nikhil Swamy, Michael Hicks:
Wys*: A DSL for Verified Secure Multi-party Computations. POST 2019: 99-122 - [i13]Suvam Mukherjee, Nitin John Raj, Krishnan Govindraj, Pantazis Deligiannis, Chandramouleswaran Ravichandran, Akash Lal, Aseem Rastogi, Raja Krishnaswamy:
Reliable State Machines: A Framework for Programming Reliable Cloud Services. CoRR abs/1902.09502 (2019) - [i12]Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma:
CrypTFlow: Secure TensorFlow Inference. CoRR abs/1909.07814 (2019) - [i11]Jonathan Protzenko, Bryan Parno, Aymeric Fromherz, Chris Hawblitzel, Marina Polubelova, Karthikeyan Bhargavan, Benjamin Beurdouche, Joonwon Choi, Antoine Delignat-Lavaud, Cédric Fournet, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Christoph M. Wintersteiger, Santiago Zanella Béguelin:
EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider. IACR Cryptol. ePrint Arch. 2019: 757 (2019) - [i10]Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma:
CrypTFlow: Secure TensorFlow Inference. IACR Cryptol. ePrint Arch. 2019: 1049 (2019) - 2018
- [j2]Danel Ahman, Cédric Fournet, Catalin Hritcu, Kenji Maillard, Aseem Rastogi, Nikhil Swamy:
Recalling a witness: foundations and applications of monotonic state. Proc. ACM Program. Lang. 2(POPL): 65:1-65:30 (2018) - [c12]Niklas Grimm, Kenji Maillard, Cédric Fournet, Catalin Hritcu, Matteo Maffei, Jonathan Protzenko, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Santiago Zanella Béguelin:
A monadic framework for relational verification: applied to information security, program equivalence, and optimizations. CPP 2018: 130-145 - [i9]Guido Martínez, Danel Ahman, Victor Dumitrescu, Nick Giannarakis, Chris Hawblitzel, Catalin Hritcu, Monal Narasimhamurthy, Zoe Paraskevopoulou, Clément Pit-Claudel, Jonathan Protzenko, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy:
Meta-F*: Metaprogramming and Tactics in an Effectful Program Verifier. CoRR abs/1803.06547 (2018) - 2017
- [j1]Jonathan Protzenko, Jean Karim Zinzindohoué, Aseem Rastogi, Tahina Ramananandro, Peng Wang, Santiago Zanella Béguelin, Antoine Delignat-Lavaud, Catalin Hritcu, Karthikeyan Bhargavan, Cédric Fournet, Nikhil Swamy:
Verified low-level programming embedded in F. Proc. ACM Program. Lang. 1(ICFP): 17:1-17:29 (2017) - [c11]Danel Ahman, Catalin Hritcu, Kenji Maillard, Guido Martínez, Gordon D. Plotkin, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy:
Dijkstra monads for free. POPL 2017: 515-529 - [c10]Karthikeyan Bhargavan, Barry Bond, Antoine Delignat-Lavaud, Cédric Fournet, Chris Hawblitzel, Catalin Hritcu, Samin Ishtiaq, Markulf Kohlweiss, K. Rustan M. Leino, Jay R. Lorch, Kenji Maillard, Jianyang Pan, Bryan Parno, Jonathan Protzenko, Tahina Ramananandro, Ashay Rane, Aseem Rastogi, Nikhil Swamy, Laure Thompson, Peng Wang, Santiago Zanella Béguelin, Jean Karim Zinzindohoue:
Everest: Towards a Verified, Drop-in Replacement of HTTPS. SNAPL 2017: 1:1-1:12 - [c9]Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella Béguelin, Karthikeyan Bhargavan, Jianyang Pan, Jean Karim Zinzindohoue:
Implementing and Proving the TLS 1.3 Record Layer. IEEE Symposium on Security and Privacy 2017: 463-482 - [i8]Jonathan Protzenko, Jean Karim Zinzindohoué, Aseem Rastogi, Tahina Ramananandro, Peng Wang, Santiago Zanella Béguelin, Antoine Delignat-Lavaud, Catalin Hritcu, Karthikeyan Bhargavan, Cédric Fournet, Nikhil Swamy:
Verified Low-Level Programming Embedded in F*. CoRR abs/1703.00053 (2017) - [i7]Niklas Grimm, Kenji Maillard, Cédric Fournet, Catalin Hritcu, Matteo Maffei, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella Béguelin:
A Monadic Framework for Relational Verification (Functional Pearl). CoRR abs/1703.00055 (2017) - [i6]Danel Ahman, Cédric Fournet, Catalin Hritcu, Kenji Maillard, Aseem Rastogi, Nikhil Swamy:
Recalling a Witness: Foundations and Applications of Monotonic State. CoRR abs/1707.02466 (2017) - [i5]Aseem Rastogi, Nikhil Swamy, Michael Hicks:
WYS*: A Verified Language Extension for Secure Multi-party Computations. CoRR abs/1711.06467 (2017) - [i4]Ajay Brahmakshatriya, Piyus Kedia, Derrick Paul McKee, Pratik Bhatu, Deepak Garg, Akash Lal, Aseem Rastogi:
An Instrumenting Compiler for Enforcing Confidentiality in Low-Level Code. CoRR abs/1711.11396 (2017) - [i3]Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma, Shardul Tripathi:
EzPC: Programmable, Efficient, and Scalable Secure Two-Party Computation. IACR Cryptol. ePrint Arch. 2017: 1109 (2017) - 2016
- [b1]Aseem Rastogi:
Language-based Techniques for Practical and Trustworthy Secure Multi-party Computations. University of Maryland, College Park, MD, USA, 2016 - [c8]Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Anitha Gollamudi, Georges Gonthier, Nadim Kobeissi, Natalia Kulatova, Aseem Rastogi, Thomas Sibut-Pinote, Nikhil Swamy, Santiago Zanella Béguelin:
Formal Verification of Smart Contracts: Short Paper. PLAS@CCS 2016: 91-96 - [c7]Nikhil Swamy, Catalin Hritcu, Chantal Keller, Aseem Rastogi, Antoine Delignat-Lavaud, Simon Forest, Karthikeyan Bhargavan, Cédric Fournet, Pierre-Yves Strub, Markulf Kohlweiss, Jean Karim Zinzindohoue, Santiago Zanella Béguelin:
Dependent types and multi-monadic effects in F. POPL 2016: 256-270 - [i2]Danel Ahman, Catalin Hritcu, Guido Martínez, Gordon D. Plotkin, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy:
Dijkstra Monads for Free. CoRR abs/1608.06499 (2016) - [i1]Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Jianyang Pan, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella Béguelin, Jean Karim Zinzindohoue:
Implementing and Proving the TLS 1.3 Record Layer. IACR Cryptol. ePrint Arch. 2016: 1178 (2016) - 2015
- [c6]Aseem Rastogi, Nikhil Swamy, Cédric Fournet, Gavin M. Bierman, Panagiotis Vekris:
Safe & Efficient Gradual Typing for TypeScript. POPL 2015: 167-180 - 2014
- [c5]Nikhil Swamy, Cédric Fournet, Aseem Rastogi, Karthikeyan Bhargavan, Juan Chen, Pierre-Yves Strub, Gavin M. Bierman:
Gradual typing embedded securely in JavaScript. POPL 2014: 425-438 - [c4]Aseem Rastogi, Matthew A. Hammer, Michael Hicks:
Wysteria: A Programming Language for Generic, Mixed-Mode Multiparty Computations. IEEE Symposium on Security and Privacy 2014: 655-670 - 2013
- [c3]Aseem Rastogi, Piotr Mardziel, Michael Hicks, Matthew A. Hammer:
Knowledge inference for optimizing secure multi-party computation. PLAS 2013: 3-14 - 2012
- [c2]Aseem Rastogi, Avik Chaudhuri, Rob Johnson:
Types and Access Controls for Cross-Domain Security in Flash. APLAS 2012: 82-97 - [c1]Aseem Rastogi, Avik Chaudhuri, Basil Hosmer:
The ins and outs of gradual type inference. POPL 2012: 481-494
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint