Limin Jia

Orcid: 0000-0002-8160-349X

Affiliations:
  • Carnegie Mellon University, PA, USA


According to our database1, Limin Jia authored at least 85 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Automatically Enforcing Rust Trait Properties.
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2024

2023
A Type System for Safe Intermittent Computing.
Proc. ACM Program. Lang., 2023

Transfer Attacks and Defenses for Large Language Models on Coding Tasks.
CoRR, 2023

Towards Usable Security Analysis Tools for Trigger-Action Programming.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

NodeMedic: End-to-End Analysis of Node.js Vulnerabilities with Provenance Graphs.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Modal Crash Types for Intermittent Computing.
Proceedings of the Programming Languages and Systems, 2023

Towards End-to-End Verified TEEs via Verified Interface Conformance and Certified Compilers.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

Tainted Secure Multi-Execution to Restrict Attacker Influence.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Tenet: A Flexible Framework for Machine-Learning-based Vulnerability Detection.
Proceedings of the 2nd IEEE/ACM International Conference on AI Engineering, 2023

2022
OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers.
Proc. Priv. Enhancing Technol., 2022

Session-typed concurrent contracts.
J. Log. Algebraic Methods Program., 2022

Investigating Advertisers' Domain-changing Behaviors and Their Impacts on Ad-blocker Filter Lists.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Compositional Information Flow Monitoring for Reactive Programs.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

2021
Towards a Lightweight, Hybrid Approach for Detecting DOM XSS Vulnerabilities with Machine Learning.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Netter: Probabilistic, Stateful Network Models.
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2021

An I/O Separation Model for Formal Verification of Kernel Implementations.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

SyRust: automatic testing of Rust libraries with semantic-aware program synthesis.
Proceedings of the PLDI '21: 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2021

Automatically enforcing fresh and consistent inputs in intermittent systems.
Proceedings of the PLDI '21: 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2021

Session Logical Relations for Noninterference.
Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science, 2021

Containing Malicious Package Updates in npm with a Lightweight Permission System.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

Learning Assumptions for Verifying Cryptographic Protocols Compositionally.
Proceedings of the Formal Aspects of Component Software - 17th International Conference, 2021

Gradual Security Types and Gradual Guarantees.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

2020
Towards a formal foundation of intermittent computing.
Proc. ACM Program. Lang., 2020

First-order Gradual Information Flow Types with Gradual Guarantees.
CoRR, 2020

How Risky Are Real Users' IFTTT Applets?
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

NetSMC: A Custom Symbolic Model Checker for Stateful Network Verification.
Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, 2020

Reconciling noninterference and gradual typing.
Proceedings of the LICS '20: 35th Annual ACM/IEEE Symposium on Logic in Computer Science, 2020

Automating Compositional Analysis of Authentication Protocols.
Proceedings of the 2020 Formal Methods in Computer Aided Design, 2020

2019
I/O dependent idempotence bugs in intermittent systems.
Proc. ACM Program. Lang., 2019

Uncovering Information Flow Policy Violations in C Programs.
CoRR, 2019

Detecting suspicious package updates.
Proceedings of the 41st International Conference on Software Engineering: New Ideas and Emerging Results, 2019

Uncovering Information Flow Policy Violations in C Programs (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Data Center Diagnostics with Network Provenance.
IEEE Data Eng. Bull., 2018

Efficient and Correct Test Scheduling for Ensembles of Network Policies.
Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation, 2018

Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Knowledge-Based Security of Dynamic Secrets for Reactive Programs.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

FlowNotation: An Annotation System for Statically Enforcing Information Flow Policies in C.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes.
Proceedings of the 26th International Conference on World Wide Web, 2017

Distributed Provenance Compression.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

Timing-Sensitive Noninterference through Composition.
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017

A Sequent Calculus for Counterfactual Reasoning.
Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, 2017

2016
überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor.
Proceedings of the 25th USENIX Security Symposium, 2016

Monitors and blame assignment for higher-order session types.
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016

2015
System M: A Program Logic for Code Sandboxing and Identification.
CoRR, 2015

A Program Logic for Verifying Secure Routing Protocols.
Log. Methods Comput. Sci., 2015

Automated verification of safety properties of declarative networking programs.
Proceedings of the 17th International Symposium on Principles and Practice of Declarative Programming, 2015

Run-time Monitoring and Formal Analysis of Information Flows in Chromium.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

A Logic of Programs with Interface-Confined Code.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Continuous Tamper-Proof Logging Using TPM 2.0.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Lightweight source authentication and path validation.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Android taint flow analysis for app sets.
Proceedings of the 3rd ACM SIGPLAN International Workshop on the State Of the Art in Java Program analysis, 2014

Proof-based Verification of Software Defined Networks.
Proceedings of the Open Networking Summit 2014 - Research Track, 2014

Privacy-preserving audit for broker-based health information exchange.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Analyzing the dangers posed by Chrome extensions.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Mechanized Network Origin and Path Authenticity Proofs.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Temporal Mode-Checking for Runtime Monitoring of Privacy Policies.
Proceedings of the Computer Aided Verification - 26th International Conference, 2014

2013
Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
FSR: formal analysis and implementation toolkit for safe interdomain routing.
IEEE/ACM Trans. Netw., 2012

Maintaining distributed logic programs incrementally.
Comput. Lang. Syst. Struct., 2012

Reduction-based security analysis of Internet routing protocols.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

Modeling and Enhancing Android's Permission System.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
On Adversary Models and Compositional Security.
IEEE Secur. Priv., 2011

A Logical Method for Policy Enforcement over Evolving Audit Logs
CoRR, 2011

FSR: formal analysis and implementation toolkit for safe inter-domain routing.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Analyzing BGP Instances in Maude.
Proceedings of the Formal Techniques for Distributed Systems, 2011

Policy auditing over incomplete logs: theory, implementation and applications.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Experiences in the logical specification of the HIPAA and GLBA privacy laws.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Dependent types and program equivalence.
Proceedings of the 37th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2010

An Operational Semantics for Network Datalog.
Proceedings of the 3rd International Workshop on Logics, Agents, and Mobility, 2010

Constraining Credential Usage in Logic-Based Access Control.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

2009
xDomain: cross-border proofs of access.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Language support for processing distributed ad hoc data.
Proceedings of the 11th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2009

Encoding information flow in Aura.
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, 2009

Formally Verifiable Networking.
Proceedings of the Eight ACM Workshop on Hot Topics in Networks (HotNets-VIII), 2009

2008
AURA: a programming language for authorization and audit.
Proceedings of the Proceeding of the 13th ACM SIGPLAN international conference on Functional programming, 2008

Evidence-Based Audit.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008

2006
Expressing heap-shape contracts in linear logic.
Proceedings of the Generative Programming and Component Engineering, 2006

ILC: A Foundation for Automated Reasoning About Pointer Programs.
Proceedings of the Programming Languages and Systems, 2006

2005
Certifying Compilation for a Language with Stack Allocation.
Proceedings of the 20th IEEE Symposium on Logic in Computer Science (LICS 2005), 2005

2004
Modal Proofs as Distributed Programs (Extended Abstract).
Proceedings of the Programming Languages and Systems, 2004

2003
Reasoning about Hierarchical Storage.
Proceedings of the 18th IEEE Symposium on Logic in Computer Science (LICS 2003), 2003


  Loading...