Journal Article Temporal Mode-Checking for Runtime Monitoring of Privacy Policies (CMU-CyLab-14-005) 2014 Chowdhury O, Jia L, Garg D, Datta A
Conference 3rd international workshop on rigorous protocol engineering (WRiPE 2013) 2013 • Proceedings - International Conference on Network Protocols, ICNP Jia L, Sobel J
Journal Article Continuous Tamper-proof Logging using TPM2.0 (CMU-CyLab-13-008) 2013 Sinha A, Jia L, England P, Lorch J
Conference Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework 2013 • IEEE Symposium on Security and Privacy: Proceedings • 430-444 Vasudevan A, Chaki S, Jia L, McCune J, Newsome J, Datta A
Journal Article Mobile SCALe: Rules and Analysis for Secure Java and Android Coding 2013 Bauer L, Flynn L, Jia L, Klieber W, Long F, Sutherland DF, Svoboda D
Conference Privacy promises that can be kept: A policy analysis method with application to the HIPAA privacy rule 2013 • Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT • 3-14 Chowdhury O, Gampe A, Niu J, Von Ronne J, Bennatt J, Datta A, Jia L
Conference Run-time enforcement of information-flow properties on Android (extended abstract) 2013 • Lecture Notes in Computer Science • 8134 LNCS:775-792 Jia L, Aljuraidan J, Fragkaki E, Bauer L, Stroucken M, Fukushima K, Kiyomoto S, Miyake Y
Conference An Operational Semantics for Network Datalog 2012 • EPiC series in computing • 7:68-53 Nigam V, Jia L, Wang A, Thau Loo B, Scedrov A
Journal Article Check Points against Privacy Breaches in Android Applications 2012 • International Journal of Computer Science and Network Security • 12(8):1-10 Fukushima K, Bauer L, Jia L, Kiyomoto S, Miyake Y
Journal Article Design, Development and Automated Verification of an Integrity-Protected Hypervisor (CMU-CyLab-12-017) 2012 Chaki S, Vasudevan A, Jia L, McCune JM, Datta A
Journal Article Design, Development, and Automated Verification of an Integrity-Protected Hypervisor 2012 Chaki S, Vasudevan A, Jia L, McCune J, Datta A
Journal Article FSR: Formal Analysis and Implementation Toolkit for Safe Interdomain Routing 2012 • IEEE/ACM Transactions on Networking • 20(6):1814-1827 Wang A, Jia L, Zhou W, Ren Y, Loo BT, Rexford J, Nigam V, Scedrov A, Talcott C
Journal Article Maintaining distributed logic programs incrementally 2012 • Computer Languages, Systems and Structures • 38(2):158-180 Nigam V, Jia L, Loo BT, Scedrov A
Conference Modeling and enhancing Android's permission system 2012 • Lecture Notes in Computer Science • 7459 LNCS:1-18 Fragkaki E, Bauer L, Jia L, Swasey D
Journal Article Modeling and Enhancing Android's Permission System 2012 Fragkaki E, Bauer L, Jia L, Swasey D
Conference Reduction-based Security Analysis of Internet Routing Protocols 2012 • Proceedings - International Conference on Network Protocols, ICNP Chen C, Jia L, Loo BT, Zhou W
Journal Article Run-Time Enforcement of Information-Flow Properties on Android (CMU-CyLab-12-015) 2012 Aljuraidan J, Fragkaki E, Bauer L, Jia L, Miyake Y, Fukushima K, Kiyomoto S
Journal Article A Logical Method for Policy Enforcement over Evolving Audit Logs (CMU-CyLab-11-002) 2011 Garg D, Jia L, Datta A
Conference Analyzing BGP Instances in Maude 2011 • Lecture Notes in Computer Science • 6722:334-348 Wang A, Talcott C, Jia L, Loo BT, Scedrov A
Conference FSR: Formal analysis and implementation toolkit for safe inter-domain routing 2011 • Proceedings of the ACM SIGCOMM 2011 Conference, SIGCOMM'11 • 440-441 Ren Y, Zhou W, Wang A, Jia L, Gurney AJT, Loo BT, Rexfordz J
Journal Article FSR: Formal Analysis and Implementation Toolkit for Safe Inter-domain Routing 2011 • Computer Communication Review • 41(4):440-441 Ren Y, Zhou W, Wang A, Jia L, Gurney AJT, Loo BT, Rexford J
Conference Maintaining Distributed Logic Programs Incrementally 2011 • PPDP 11 - PROCEEDINGS OF THE 2011 SYMPOSIUM ON PRINCIPLES AND PRACTICES OF DECLARATIVE PROGRAMMING • 125-136 Nigam V, Jia L, Loo BT, Scedrov A
Journal Article Modeling and Enhancing Android’s Permission System (CMU-CyLab-11-020) 2011 Fragkaki E, Bauer L, Jia L, Swasey D
Journal Article On Adversary Models and Compositional Security 2011 • IEEE Security and Privacy • 9(3):26-32 Datta A, Franklin J, Garg D, Jia L, Kaynar D
Conference Policy Auditing over Incomplete Logs: Theory, Implementation and Applications 2011 • Proceedings of the ACM Conference on Computer and Communications Security • 151-162 Garg D, Jia L, Datta A