What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Limin Jia
Google Scholar
ORCID:
0000-0002-8160-349X
23
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
NodeMedic-FINE: Automatic Detection and Exploit Synthesis for Node.js Vulnerabilities.
Darion Cassel
Nuno Sabino
Min-Chien Hsu
Ruben Martins
Limin Jia
2024
conf/eurosp
ProInspector: Uncovering Logical Bugs in Protocol Implementations.
Zichao Zhang
Limin Jia
Corina S. Pasareanu
2023
conf/ccs
Tainted Secure Multi-Execution to Restrict Attacker Influence.
McKenna McCall
Abhishek Bichhawat
Limin Jia
2023
conf/soups
Towards Usable Security Analysis Tools for Trigger-Action Programming.
McKenna McCall
Eric Zeng
Faysal Hossain Shezan
Mitchell Yang
Lujo Bauer
Abhishek Bichhawat
Camille Cobb
Limin Jia
Yuan Tian
2023
conf/eurosp
NodeMedic: End-to-End Analysis of Node.js Vulnerabilities with Provenance Graphs.
Darion Cassel
Wai Tuck Wong
Limin Jia
2022
journals/popets
OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers.
Darion Cassel
Su-Chin Lin
Alessio Buraggina
William Wang
Andrew Zhang
Lujo Bauer
Hsu-Chun Hsiao
Limin Jia
Timothy Libert
2022
conf/eurosp
Compositional Information Flow Monitoring for Reactive Programs.
McKenna McCall
Abhishek Bichhawat
Limin Jia
2021
conf/sp
An I/O Separation Model for Formal Verification of Kernel Implementations.
Miao Yu
Virgil D. Gligor
Limin Jia
2020
conf/soups
How Risky Are Real Users' IFTTT Applets?
Camille Cobb
Milijana Surbatovich
Anna Kawakami
Mahmood Sharif
Lujo Bauer
Anupam Das
Limin Jia
2019
conf/esorics
Uncovering Information Flow Policy Violations in C Programs (Extended Abstract).
Darion Cassel
Yan Huang
Limin Jia
2018
conf/ccs
FlowNotation: An Annotation System for Statically Enforcing Information Flow Policies in C.
Darion Cassel
Yan Huang
Limin Jia
2018
conf/ndss
Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting.
William Melicher
Anupam Das
Mahmood Sharif
Lujo Bauer
Limin Jia
2017
conf/ccs
A Sequent Calculus for Counterfactual Reasoning.
McKenna McCall
Lay Kuan Loh
Limin Jia
2016
conf/uss
überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor.
Amit Vasudevan
Sagar Chaki
Petros Maniatis
Limin Jia
Anupam Datta
2015
conf/ccs
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits.
Omar Chowdhury
Deepak Garg
Limin Jia
Anupam Datta
2015
conf/ndss
Run-time Monitoring and Formal Analysis of Information Flows in Chromium.
Lujo Bauer
Shaoying Cai
Limin Jia
Timothy Passaro
Michael Stroucken
Yuan Tian
2014
conf/ccs
Mechanized Network Origin and Path Authenticity Proofs.
Fuyuan Zhang
Limin Jia
Cristina Basescu
Tiffany Hyun-Jin Kim
Yih-Chun Hu
Adrian Perrig
2014
conf/cns
Analyzing the dangers posed by Chrome extensions.
Lujo Bauer
Shaoying Cai
Limin Jia
Timothy Passaro
Yuan Tian
2013
conf/sp
Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework.
Amit Vasudevan
Sagar Chaki
Limin Jia
Jonathan M. McCune
James Newsome
Anupam Datta
2013
conf/esorics
Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract).
Limin Jia
Jassim Aljuraidan
Elli Fragkaki
Lujo Bauer
Michael Stroucken
Kazuhide Fukushima
Shinsaku Kiyomoto
Yutaka Miyake
2012
conf/esorics
Modeling and Enhancing Android's Permission System.
Elli Fragkaki
Lujo Bauer
Limin Jia
David Swasey
2011
conf/ccs
Policy auditing over incomplete logs: theory, implementation and applications.
Deepak Garg
Limin Jia
Anupam Datta
2011
conf/iciss
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
Anupam Datta
Jeremiah Blocki
Nicolas Christin
Henry DeYoung
Deepak Garg
Limin Jia
Dilsun Kirli Kaynar
Arunesh Sinha
Coauthors
Abhishek Bichhawat
(3)
Adrian Perrig
(1)
Alessio Buraggina
(1)
Amit Vasudevan
(2)
Andrew Zhang
(1)
Anna Kawakami
(1)
Anupam Das
(2)
Anupam Datta
(5)
Arunesh Sinha
(1)
Camille Cobb
(2)
Corina S. Pasareanu
(1)
Cristina Basescu
(1)
Darion Cassel
(5)
David Swasey
(1)
Deepak Garg
(3)
Dilsun Kirli Kaynar
(1)
Elli Fragkaki
(2)
Eric Zeng
(1)
Faysal Hossain Shezan
(1)
Fuyuan Zhang
(1)
Henry DeYoung
(1)
Hsu-Chun Hsiao
(1)
James Newsome
(1)
Jassim Aljuraidan
(1)
Jeremiah Blocki
(1)
Jonathan M. McCune
(1)
Kazuhide Fukushima
(1)
Lay Kuan Loh
(1)
Limin Jia
(23)
Lujo Bauer
(8)
Mahmood Sharif
(2)
McKenna McCall
(4)
Miao Yu
(1)
Michael Stroucken
(2)
Milijana Surbatovich
(1)
Min-Chien Hsu
(1)
Mitchell Yang
(1)
Nicolas Christin
(1)
Nuno Sabino
(1)
Omar Chowdhury
(1)
Petros Maniatis
(1)
Ruben Martins
(1)
Sagar Chaki
(2)
Shaoying Cai
(2)
Shinsaku Kiyomoto
(1)
Su-Chin Lin
(1)
Tiffany Hyun-Jin Kim
(1)
Timothy Libert
(1)
Timothy Passaro
(2)
Virgil D. Gligor
(1)
Wai Tuck Wong
(1)
William Melicher
(1)
William Wang
(1)
Yan Huang
(2)
Yih-Chun Hu
(1)
Yuan Tian
(3)
Yutaka Miyake
(1)
Zichao Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to