Jing (Dave) Tian

Orcid: 0000-0002-7506-9593

According to our database1, Jing (Dave) Tian authored at least 47 papers between 2014 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
ENCIDER: Detecting Timing and Cache Side Channels in SGX Enclaves and Cryptographic APIs.
IEEE Trans. Dependable Secur. Comput., 2023

GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation.
Proceedings of the 32nd USENIX Security Symposium, 2023

Intender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance.
Proceedings of the 32nd USENIX Security Symposium, 2023

Fuzz The Power: Dual-role State Guided Black-box Fuzzing for USB Power Delivery.
Proceedings of the 32nd USENIX Security Symposium, 2023

Low-Cost Privilege Separation with Compile Time Compartmentalization for Embedded Systems.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

EC: Embedded Systems Compartmentalization via Intra-Kernel Isolation.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Fuzzing SGX Enclaves via Host Program Mutations.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Building GPU TEEs using CPU Secure Enclaves with GEVisor.
Proceedings of the 2023 ACM Symposium on Cloud Computing, SoCC 2023, 2023

2022
DnD: A Cross-Architecture Deep Neural Network Decompiler.
Proceedings of the 31st USENIX Security Symposium, 2022

Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Reverse engineering and retrofitting robotic aerial vehicle control firmware using dispatch.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
ProXray: Protocol Model Learning and Guided Firmware Analysis.
IEEE Trans. Software Eng., 2021

LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks.
Proceedings of the 30th USENIX Security Symposium, 2021

PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications.
Proceedings of the 30th USENIX Security Symposium, 2021

M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles.
Proceedings of the 30th USENIX Security Symposium, 2021

Privacy-Preserving Localization using Enclaves.
Proceedings of the 12th IEEE Annual Ubiquitous Computing, 2021

Towards Improving Container Security by Preventing Runtime Escapes.
Proceedings of the IEEE Secure Development Conference, 2021

2020
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY.
Proceedings of the 29th USENIX Security Symposium, 2020

BigMAC: Fine-Grained Policy Analysis of Android Firmware.
Proceedings of the 29th USENIX Security Symposium, 2020

Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Vessels: efficient and scalable deep learning prediction on trusted processors.
Proceedings of the SoCC '20: ACM Symposium on Cloud Computing, 2020

Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Characterizing the Security of the SMS Ecosystem with Public Gateways.
ACM Trans. Priv. Secur., 2019

Toward Automated Firmware Analysis in the IoT Era.
IEEE Secur. Priv., 2019

Enclave-based privacy-preserving localization: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

LBM: A Security Framework for Peripherals within the Linux Kernel.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

A Practical Intel SGX Setting for Linux Containers in the Cloud.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Examining DES-based Cipher Suite Support within the TLS Ecosystem.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

A Hybrid Approach to Secure Function Evaluation using SGX.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.
Proceedings of the 27th USENIX Security Symposium, 2018

SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 Through C.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2017
Taming the Costs of Trustworthy Provenance through Policy Reduction.
ACM Trans. Internet Techn., 2017

Securing ARP/NDP From the Ground Up.
IEEE Trans. Inf. Forensics Secur., 2017

FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Detecting SMS Spam in the Age of Legitimate Bulk Messaging.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Making USB Great Again with USBFILTER.
Proceedings of the 25th USENIX Security Symposium, 2016

Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

CPAC: securing critical infrastructure with cyber-physical access control.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Trustworthy Whole-System Provenance for the Linux Kernel.
Proceedings of the 24th USENIX Security Symposium, 2015

More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

Securing ARP From the Ground Up.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Defending Against Malicious USB Firmware with GoodUSB.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Securing SSL Certificate Verification through Dynamic Linking.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014


  Loading...