Follow
Limin Jia
Title
Cited by
Cited by
Year
Android taint flow analysis for app sets
W Klieber, L Flynn, A Bhosale, L Jia, L Bauer
Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of …, 2014
3022014
Some recipes can do more than spoil your appetite: Analyzing the security and privacy risks of IFTTT recipes
M Surbatovich, J Aljuraidan, L Bauer, A Das, L Jia
Proceedings of the 26th International Conference on World Wide Web, 1501-1510, 2017
1962017
Lightweight source authentication and path validation
THJ Kim, C Basescu, L Jia, SB Lee, YC Hu, A Perrig
Proceedings of the 2014 ACM Conference on SIGCOMM, 271-282, 2014
1862014
Design, implementation and verification of an extensible and modular hypervisor framework
A Vasudevan, S Chaki, L Jia, J McCune, J Newsome, A Datta
2013 IEEE Symposium on Security and Privacy, 430-444, 2013
1802013
Modeling and enhancing android’s permission system
E Fragkaki, L Bauer, L Jia, D Swasey
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
1442012
Aura: A programming language for authorization and audit
L Jia, JA Vaughan, K Mazurak, J Zhao, L Zarko, J Schorr, S Zdancewic
ACM Sigplan Notices 43 (9), 27-38, 2008
1342008
Policy auditing over incomplete logs: theory, implementation and applications
D Garg, L Jia, A Datta
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1322011
Experiences in the logical specification of the HIPAA and GLBA privacy laws
H DeYoung, D Garg, L Jia, D Kaynar, A Datta
Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic …, 2010
1312010
Run-time enforcement of information-flow properties on Android
L Jia, J Aljuraidan, E Fragkaki, L Bauer, M Stroucken, K Fukushima, ...
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
992013
Riding out domsday: Towards detecting and preventing dom cross-site scripting
W Melicher, A Das, M Sharif, L Bauer, L Jia
2018 Network and Distributed System Security Symposium (NDSS), 2018
962018
Evidence-based audit
JA Vaughan, L Jia, K Mazurak, S Zdancewic
2008 21st IEEE Computer Security Foundations Symposium, 177-191, 2008
942008
Modal proofs as distributed programs
L Jia, D Walker
European Symposium on Programming, 219-233, 2004
832004
Run-time Monitoring and Formal Analysis of Information Flows in Chromium.
L Bauer, S Cai, L Jia, T Passaro, M Stroucken, Y Tian
NDSS, 2015
822015
Monitors and blame assignment for higher-order session types
L Jia, H Gommerstadt, F Pfenning
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2016
622016
Containing malicious package updates in npm with a lightweight permission system
G Ferreira, L Jia, J Sunshine, C Kästner
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
572021
How Risky Are Real Users'{IFTTT} Applets?
C Cobb, M Surbatovich, A Kawakami, M Sharif, L Bauer, A Das, L Jia
Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 505-529, 2020
552020
FSR: Formal analysis and implementation toolkit for safe interdomain routing
A Wang, L Jia, W Zhou, Y Ren, BT Loo, J Rexford, V Nigam, A Scedrov, ...
IEEE/ACM Transactions on Networking 20 (6), 1814-1827, 2012
542012
Maintaining distributed logic programs incrementally
V Nigam, L Jia, B Thau Loo, A Scedrov
Proceedings of the 13th international ACM SIGPLAN symposium on Principles …, 2011
532011
Detecting suspicious package updates
K Garrett, G Ferreira, L Jia, J Sunshine, C Kästner
2019 IEEE/ACM 41st International Conference on Software Engineering: New …, 2019
512019
Understanding and protecting privacy: Formal semantics and principled audit mechanisms
A Datta, J Blocki, N Christin, H DeYoung, D Garg, L Jia, D Kaynar, ...
International Conference on Information Systems Security, 1-27, 2011
512011
The system can't perform the operation now. Try again later.
Articles 1–20