Journal Article Automating Compositional Analysis of Authentication Protocols 2020 • Proceedings of the 20th Conference on Formal Methods in Computer-Aided Design, FMCAD 2020 • 113-118 Zhang Z, De Amorim AA, Jia L, Pasareanu CS
Preprint First-order Gradual Information Flow Types with Gradual Guarantees 2020 Bichhawat A, McCall M, Jia L
Journal Article First-order Gradual Information Flow Types with Gradual Guarantees 2020 Bichhawat A, McCall M, Jia L
Conference How Risky Are Real Users' IFTTT Applets? 2020 • PROCEEDINGS OF THE SIXTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY (SOUPS 2020) • 505-529 Cobb C, Surbatovich M, Kawakami A, Sharif M, Bauer L, Das A, Jia L
Conference Message from the Program Chairs 2020 • Proceedings - 2020 IEEE Secure Development, SecDev 2020 • 96-107 Kim T, Jia L
Conference NetSMC: A Custom Symbolic Model Checker for Stateful Network Verification 2020 • PROCEEDINGS OF THE 17TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION • 181-200 Yuan Y, Moon S-J, Uppal S, Jia L, Sekar V
Conference On the Generation of Disassembly Ground Truth and the Evaluation of Disassemblers 2020 • FEAST 2020 - Proceedings of the 2020 ACM Workshop on Forming an Ecosystem Around Software Transformation • 9-14 Li K, Woo M, Jia L
Conference Reconciling noninterference and gradual typing 2020 • Proceedings - Symposium on Logic in Computer Science • 116-129 de Amorim AA, Fredrikson M, Jia L
Journal Article Towards a Forma Foundation of Intermittent Computing 2020 • Proceedings of the ACM on Programming Languages • 4: Surbatovich M, Lucia B, Jia L
Conference Detecting Suspicious Package Updates 2019 • 2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: NEW IDEAS AND EMERGING RESULTS (ICSE-NIER 2019) • 13-16 Garrett K, Ferreira G, Jia L, Sunshine J, Kastner C
Journal Article I/O Dependent Idempotence Bugs in Intermittent Systems 2019 • Proceedings of the ACM on Programming Languages • 3: Surbatovich M, Jia L, Lucia B
Conference Uncovering Information Flow Policy Violations in C Programs (Extended Abstract) 2019 • Lecture Notes in Computer Science • 11736:26-46 Cassel D, Huang Y, Jia L
Conference Efficient and Correct Test Scheduling for Ensembles of Network Policies 2018 • PROCEEDINGS OF THE 15TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION (NSDI'18) • 437-452 Yuan Y, Chandrasekaran S, Jia L, Sekar V
Conference Knowledge-based Security of Dynamic Secrets for Reactive Programs 2018 • Proceedings - IEEE Computer Security Foundations Symposium • 175-188 McCall M, Zhang H, Jia L
Conference POSTER: FlowNotation: An Annotation System for Statically Enforcing Information Flow Policies in C 2018 • PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) • 2207-2209 Cassel D, Huang Y, Jia L
Conference Riding out DOMsday: Toward Detecting and Preventing DOM Cross-Site Scripting 2018 • 25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018) Melicher W, Das A, Sharif M, Bauer L, Jia L
Conference Session-typed concurrent contracts 2018 • Lecture Notes in Computer Science • 10801 LNCS:771-798 Gommerstadt H, Jia L, Pfenning F
Conference A Sequent Calculus for Counterfactual Reasoning 2017 • PROCEEDINGS OF THE 2017 WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY (PLAS' 17) • 91-106 McCall M, Loh LK, Jia L
Journal Article A Sequent Calculus for Counterfactual Reasoning (CMU-CyLab-17-003) 2017 McCall M, Loh LK, Jia L
Conference Distributed Provenance Compression 2017 • Proceedings / ACM-SIGMOD International Conference on Management of Data. ACM-Sigmod International Conference on Management of Data • 203-218 Chen C, Lehri HT, Loh LK, Alur A, Jia L, Loo BT, Zhou W
Conference Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes 2017 • PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'17) • 1501-1510 Surbatovich M, Aljuraidan J, Bauer L, Das A, Jia L
Conference Timing-Sensitive Noninterference through Composition 2017 • Lecture Notes in Computer Science • 10204:3-25 Rafnsson W, Jia L, Bauer L
Journal Article Monitors and Blame Assignment for Higher-Order Session Types 2016 • ACM Sigplan Notices • 51(1):582-594 Jia L, Gommerstadt H, Pfenning F