Journal Article Monitors and blame assignment for higher-order session types 2016 • ACM Sigplan Notices • 51(1):582-594 Jia L, Gommerstadt H, Pfenning F
Conference UBERSPARK: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor 2016 • PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM • 87-104 Vasudevan A, Chaki S, Maniatis P, Jia L, Datta A
Conference A Logic of Programs with Interface-confined Code 2015 • Proceedings of the Computer Security Foundations Workshop • 512-525 Jia L, Sen S, Garg D, Datta A
Preprint A Program Logic for Verifying Secure Routing Protocols 2015 Chen C, Jia L, Xu H, Luo C, Zhou W, Loo BT
Journal Article A PROGRAM LOGIC FOR VERIFYING SECURE ROUTING PROTOCOLS 2015 • Logical Methods in Computer Science • 11(4): Chen C, Jia L, Xu H, Luo C, Zhou W, Loo BT
Conference Automated Verification of Safety Properties of Declarative Networking Programs 2015 • PROCEEDINGS OF THE 17TH INTERNATIONAL SYMPOSIUM ON PRINCIPLES AND PRACTICE OF DECLARATIVE PROGRAMMING (PPDP 2015) • 79-90 Chen C, Loh LK, Jia L, Zhou W, Loo BT
Conference Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits 2015 • Proceedings of the ACM Conference on Computer and Communications Security • 1130-1143 Chowdhury O, Garg D, Jia L, Datta A
Preprint Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits 2015 Chowdhury O, Garg D, Jia L, Datta A
Journal Article Logic of Programs with Interface-confined Code (CMU-CyLab-13-001) 2015 Jia L, Sen S, Garg D, Datta A
Journal Article Monitors and Blame Assignment for Higher-Order Session Types (CMU-CyLab-15-004) 2015 Jia L, Gommerstadt H, Pfenning F
Conference Preface 2015 • Proceedings of the 10th ACM Workshop on Programming Languages and Analysis for Security, PLAS 2015 Clarkson M, Jia L
Conference Preface 2015 • Proceedings of the 10th ACM Workshop on Programming Languages and Analysis for Security, PLAS 2015 Clarkson M, Jia L
Conference Run-time Monitoring and Formal Analysis of Information Flows in Chromium 2015 • 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015) Bauer L, Cai S, Jia L, Passaro T, Stroucken M, Tian Y
Conference A Program Logic for Verifying Secure Routing Protocols 2014 • Lecture Notes in Computer Science • 8461:117-132 Chen C, Jia L, Xu H, Luo C, Zhou W, Loo BT
Conference Analyzing the Dangers Posed by Chrome Extensions 2014 • 2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS) • 184-192 Bauer L, Cai S, Jia L, Passaro T, Tian Y
Conference Android taint flow analysis for app sets 2014 • Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI) • 2014-June(June): Klieber W, Flynn L, Bhosale A, Jia L, Bauer L
Conference Continuous tamper-proof logging using TPM 2.0 2014 • Lecture Notes in Computer Science • 8564 LNCS:19-36 Sinha A, Jia L, England P, Lorch JR
Journal Article Continuous Tamper-proof Logging using TPM2.0 2014 Sinha A, Jia L, England P, Lorch JR
Conference Lightweight Source Authentication and Path Validation 2014 • Computer Communication Review • 271-282 Kim TH-J, Basescu C, Jia L, Lee SB, Hu Y-C, Perrig A
Conference Lightweight source authentication and path validation 2014 • Proceedings of the 2014 ACM conference on SIGCOMM Kim TH-J, Basescu C, Jia L, Lee SB, Hu Y-C, Perrig A
Conference Mechanized Network Origin and Path Authenticity Proofs 2014 • Proceedings of the ACM Conference on Computer and Communications Security • 346-357 Zhang F, Jia L, Basescu C, Kim TH-J, Hu Y-C, Perrig A
Conference Privacy-preserving audit for broker-based health information exchange 2014 • CODASPY 2014 - Proceedings of the 4th ACM Conference on Data and Application Security and Privacy • 313-320 Oh SE, Chun JY, Jia L, Garg D, Gunter CA, Datta A
Conference Proof-based Verification of Software Defined Networks<sup>∗</sup> 2014 • Open Networking Summit 2014 - Research Track, ONS 2014 Chen C, Jia L, Zhou W, Loo BT
Journal Article Temporal Mode-Checking for Runtime Monitoring of Privacy Policies 2014 Chowdhury O, Jia L, Garg D, Datta A
Conference Temporal Mode-Checking for Runtime Monitoring of Privacy Policies 2014 • Lecture Notes in Computer Science • 8559:131-149 Chowdhury O, Jia L, Garg D, Datta A