Jing (Dave) Tian
Orcid: 0000-0002-7506-9593
According to our database1,
Jing (Dave) Tian
authored at least 53 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations.
Proceedings of the 33rd USENIX Security Symposium, 2024
SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Securing Deep Neural Networks on Edge from Membership Inference Attacks Using Trusted Execution Environments.
Proceedings of the 29th ACM/IEEE International Symposium on Low Power Electronics and Design, 2024
Exploiting Temporal Vulnerabilities for Unauthorized Access in Intent-based Networking.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
ENCIDER: Detecting Timing and Cache Side Channels in SGX Enclaves and Cryptographic APIs.
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Low-Cost Privilege Separation with Compile Time Compartmentalization for Embedded Systems.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Proceedings of the 2023 ACM Symposium on Cloud Computing, SoCC 2023, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Reverse engineering and retrofitting robotic aerial vehicle control firmware using dispatch.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IEEE Trans. Software Eng., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 12th IEEE Annual Ubiquitous Computing, 2021
Proceedings of the IEEE Secure Development Conference, 2021
2020
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020
From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the SoCC '20: ACM Symposium on Cloud Computing, 2020
Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
ACM Trans. Priv. Secur., 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
2017
ACM Trans. Internet Techn., 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014