Limin Jia
Orcid: 0000-0002-8160-349XAffiliations:
- Carnegie Mellon University, PA, USA
According to our database1,
Limin Jia
authored at least 88 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proc. ACM Program. Lang., 2024
Efficient Static Vulnerability Analysis for JavaScript with Multiversion Dependency Graphs.
Proc. ACM Program. Lang., 2024
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
2023
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Proceedings of the Programming Languages and Systems, 2023
Towards End-to-End Verified TEEs via Verified Interface Conformance and Certified Compilers.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2nd IEEE/ACM International Conference on AI Engineering, 2023
2022
OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers.
Proc. Priv. Enhancing Technol., 2022
Investigating Advertisers' Domain-changing Behaviors and Their Impacts on Ad-blocker Filter Lists.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
2021
Towards a Lightweight, Hybrid Approach for Detecting DOM XSS Vulnerabilities with Machine Learning.
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the PLDI '21: 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2021
Proceedings of the PLDI '21: 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2021
Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science, 2021
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
Proceedings of the Formal Aspects of Component Software - 17th International Conference, 2021
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021
2020
Proc. ACM Program. Lang., 2020
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020
Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, 2020
Proceedings of the LICS '20: 35th Annual ACM/IEEE Symposium on Logic in Computer Science, 2020
Proceedings of the 2020 Formal Methods in Computer Aided Design, 2020
2019
Proc. ACM Program. Lang., 2019
Proceedings of the 41st International Conference on Software Engineering: New Ideas and Emerging Results, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
2018
Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
FlowNotation: An Annotation System for Statically Enforcing Information Flow Policies in C.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes.
Proceedings of the 26th International Conference on World Wide Web, 2017
Proceedings of the 2017 ACM International Conference on Management of Data, 2017
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017
Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, 2017
2016
überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor.
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016
2015
Log. Methods Comput. Sci., 2015
Proceedings of the 17th International Symposium on Principles and Practice of Declarative Programming, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
Proceedings of the ACM SIGCOMM 2014 Conference, 2014
Proceedings of the 3rd ACM SIGPLAN International Workshop on the State Of the Art in Java Program analysis, 2014
Proceedings of the Open Networking Summit 2014 - Research Track, 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the Computer Aided Verification - 26th International Conference, 2014
2013
Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2013, 2013
2012
IEEE/ACM Trans. Netw., 2012
Comput. Lang. Syst. Struct., 2012
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
Proceedings of the Information Systems Security - 7th International Conference, 2011
Proceedings of the Formal Techniques for Distributed Systems, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010
Proceedings of the 37th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2010
Proceedings of the 3rd International Workshop on Logics, Agents, and Mobility, 2010
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010
2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the 11th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2009
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, 2009
Proceedings of the Eight ACM Workshop on Hot Topics in Networks (HotNets-VIII), 2009
2008
Proceedings of the Proceeding of the 13th ACM SIGPLAN international conference on Functional programming, 2008
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008
2006
Proceedings of the Generative Programming and Component Engineering, 2006
Proceedings of the Programming Languages and Systems, 2006
2005
Proceedings of the 20th IEEE Symposium on Logic in Computer Science (LICS 2005), 2005
2004
Proceedings of the Programming Languages and Systems, 2004
2003
Proceedings of the 18th IEEE Symposium on Logic in Computer Science (LICS 2003), 2003