Android taint flow analysis for app sets W Klieber, L Flynn, A Bhosale, L Jia, L Bauer Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of …, 2014 | 278 | 2014 |
Design, implementation and verification of an extensible and modular hypervisor framework A Vasudevan, S Chaki, L Jia, J McCune, J Newsome, A Datta 2013 IEEE Symposium on Security and Privacy, 430-444, 2013 | 163 | 2013 |
Lightweight source authentication and path validation THJ Kim, C Basescu, L Jia, SB Lee, YC Hu, A Perrig Proceedings of the 2014 ACM Conference on SIGCOMM, 271-282, 2014 | 153 | 2014 |
Modeling and enhancing android’s permission system E Fragkaki, L Bauer, L Jia, D Swasey Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 141 | 2012 |
Some recipes can do more than spoil your appetite: Analyzing the security and privacy risks of IFTTT recipes M Surbatovich, J Aljuraidan, L Bauer, A Das, L Jia Proceedings of the 26th International Conference on World Wide Web, 1501-1510, 2017 | 136 | 2017 |
Policy auditing over incomplete logs: theory, implementation and applications D Garg, L Jia, A Datta Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 130 | 2011 |
Aura: A programming language for authorization and audit L Jia, JA Vaughan, K Mazurak, J Zhao, L Zarko, J Schorr, S Zdancewic ACM Sigplan Notices 43 (9), 27-38, 2008 | 127 | 2008 |
Experiences in the logical specification of the HIPAA and GLBA privacy laws H DeYoung, D Garg, L Jia, D Kaynar, A Datta Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic …, 2010 | 119 | 2010 |
Evidence-based audit JA Vaughan, L Jia, K Mazurak, S Zdancewic 2008 21st IEEE Computer Security Foundations Symposium, 177-191, 2008 | 91 | 2008 |
Run-time enforcement of information-flow properties on Android L Jia, J Aljuraidan, E Fragkaki, L Bauer, M Stroucken, K Fukushima, ... Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 90 | 2013 |
Modal proofs as distributed programs L Jia, D Walker Programming Languages and Systems: 13th European Symposium on Programming …, 2004 | 80 | 2004 |
Run-time Monitoring and Formal Analysis of Information Flows in Chromium. L Bauer, S Cai, L Jia, T Passaro, M Stroucken, Y Tian NDSS, 2015 | 72 | 2015 |
Riding out domsday: Towards detecting and preventing dom cross-site scripting W Melicher, A Das, M Sharif, L Bauer, L Jia 2018 Network and Distributed System Security Symposium (NDSS), 2018 | 65 | 2018 |
Monitors and blame assignment for higher-order session types L Jia, H Gommerstadt, F Pfenning Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2016 | 52 | 2016 |
FSR: Formal analysis and implementation toolkit for safe interdomain routing A Wang, L Jia, W Zhou, Y Ren, BT Loo, J Rexford, V Nigam, A Scedrov, ... IEEE/ACM Transactions on Networking 20 (6), 1814-1827, 2012 | 50 | 2012 |
Maintaining distributed logic programs incrementally V Nigam, L Jia, B Thau Loo, A Scedrov Proceedings of the 13th international ACM SIGPLAN symposium on Principles …, 2011 | 50 | 2011 |
Understanding and protecting privacy: Formal semantics and principled audit mechanisms A Datta, J Blocki, N Christin, H DeYoung, D Garg, L Jia, D Kaynar, ... Springer 7093, 1, 2011 | 50 | 2011 |
Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule O Chowdhury, A Gampe, J Niu, J von Ronne, J Bennatt, A Datta, L Jia, ... Proceedings of the 18th ACM symposium on Access control models and …, 2013 | 45 | 2013 |
Reasoning about hierarchical storage A Ahmed, L Jia, D Walker 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings …, 2003 | 45 | 2003 |
überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor. A Vasudevan, S Chaki, P Maniatis, L Jia, A Datta USENIX Security Symposium, 87-104, 2016 | 41 | 2016 |