default search action
Limin Jia 0001
Person information
- affiliation: Carnegie Mellon University, PA, USA
- unicode name: 贾丽敏
Other persons with the same name
- Limin Jia — disambiguation page
- Limin Jia 0002 — Beijing Jiaotong University, State Key Laboratory of Rail Traffic Control and Safety, China
- Limin Jia 0003 — Hebei Institute of Regional Geological Survey, Langfang, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Yoshiki Takashima, Chanhee Cho, Ruben Martins, Limin Jia, Corina S. Pasareanu:
Crabtree: Rust API Test Synthesis Guided by Coverage and Type. Proc. ACM Program. Lang. 8(OOPSLA2): 618-647 (2024) - [j11]Mafalda Ferreira, Miguel Monteiro, Tiago Brito, Miguel E. Coimbra, Nuno Santos, Limin Jia, José Fragoso Santos:
Efficient Static Vulnerability Analysis for JavaScript with Multiversion Dependency Graphs. Proc. ACM Program. Lang. 8(PLDI): 417-441 (2024) - [c74]Zichao Zhang, Limin Jia, Corina S. Pasareanu:
ProInspector: Uncovering Logical Bugs in Protocol Implementations. EuroS&P 2024: 617-632 - [c73]Twain Byrnes, Yoshiki Takashima, Limin Jia:
Automatically Enforcing Rust Trait Properties. VMCAI (2) 2024: 210-223 - 2023
- [j10]Milijana Surbatovich, Naomi Spargo, Limin Jia, Brandon Lucia:
A Type System for Safe Intermittent Computing. Proc. ACM Program. Lang. 7(PLDI): 736-760 (2023) - [c72]Eduard Pinconschi, Sofia Reis, Chi Zhang, Rui Abreu, Hakan Erdogmus, Corina S. Pasareanu, Limin Jia:
Tenet: A Flexible Framework for Machine-Learning-based Vulnerability Detection. CAIN 2023: 102-103 - [c71]McKenna McCall, Abhishek Bichhawat, Limin Jia:
Tainted Secure Multi-Execution to Restrict Attacker Influence. CCS 2023: 1732-1745 - [c70]Farzaneh Derakhshan, Zichao Zhang, Amit Vasudevan, Limin Jia:
Towards End-to-End Verified TEEs via Verified Interface Conformance and Certified Compilers. CSF 2023: 324-339 - [c69]Farzaneh Derakhshan, Myra Dotzel, Milijana Surbatovich, Limin Jia:
Modal Crash Types for Intermittent Computing. ESOP 2023: 168-196 - [c68]Darion Cassel, Wai Tuck Wong, Limin Jia:
NodeMedic: End-to-End Analysis of Node.js Vulnerabilities with Provenance Graphs. EuroS&P 2023: 1101-1127 - [c67]McKenna McCall, Eric Zeng, Faysal Hossain Shezan, Mitchell Yang, Lujo Bauer, Abhishek Bichhawat, Camille Cobb, Limin Jia, Yuan Tian:
Towards Usable Security Analysis Tools for Trigger-Action Programming. SOUPS 2023: 301-320 - [i10]Chi Zhang, Zifan Wang, Ravi Mangal, Matt Fredrikson, Limin Jia, Corina S. Pasareanu:
Transfer Attacks and Defenses for Large Language Models on Coding Tasks. CoRR abs/2311.13445 (2023) - 2022
- [j9]Hannah Gommerstadt, Limin Jia, Frank Pfenning:
Session-typed concurrent contracts. J. Log. Algebraic Methods Program. 124: 100731 (2022) - [j8]Darion Cassel, Su-Chin Lin, Alessio Buraggina, William Wang, Andrew Zhang, Lujo Bauer, Hsu-Chun Hsiao, Limin Jia, Timothy Libert:
OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers. Proc. Priv. Enhancing Technol. 2022(1): 227-252 (2022) - [c66]McKenna McCall, Abhishek Bichhawat, Limin Jia:
Compositional Information Flow Monitoring for Reactive Programs. EuroS&P 2022: 467-486 - [c65]Su-Chin Lin, Kai-Hsiang Chou, Yen Chen, Hsu-Chun Hsiao, Darion Cassel, Lujo Bauer, Limin Jia:
Investigating Advertisers' Domain-changing Behaviors and Their Impacts on Ad-blocker Filter Lists. WWW 2022: 576-587 - 2021
- [c64]Abhishek Bichhawat, McKenna McCall, Limin Jia:
Gradual Security Types and Gradual Guarantees. CSF 2021: 1-16 - [c63]Zichao Zhang, Arthur Azevedo de Amorim, Limin Jia, Corina S. Pasareanu:
Learning Assumptions for Verifying Cryptographic Protocols Compositionally. FACS 2021: 3-23 - [c62]Gabriel Ferreira, Limin Jia, Joshua Sunshine, Christian Kästner:
Containing Malicious Package Updates in npm with a Lightweight Permission System. ICSE 2021: 1334-1346 - [c61]Farzaneh Derakhshan, Stephanie Balzer, Limin Jia:
Session Logical Relations for Noninterference. LICS 2021: 1-14 - [c60]Milijana Surbatovich, Limin Jia, Brandon Lucia:
Automatically enforcing fresh and consistent inputs in intermittent systems. PLDI 2021: 851-866 - [c59]Yoshiki Takashima, Ruben Martins, Limin Jia, Corina S. Pasareanu:
SyRust: automatic testing of Rust libraries with semantic-aware program synthesis. PLDI 2021: 899-913 - [c58]Miao Yu, Virgil D. Gligor, Limin Jia:
An I/O Separation Model for Formal Verification of Kernel Implementations. SP 2021: 572-589 - [c57]Han Zhang, Chi Zhang, Arthur Azevedo de Amorim, Yuvraj Agarwal, Matt Fredrikson, Limin Jia:
Netter: Probabilistic, Stateful Network Models. VMCAI 2021: 486-508 - [c56]William Melicher, Clement Fung, Lujo Bauer, Limin Jia:
Towards a Lightweight, Hybrid Approach for Detecting DOM XSS Vulnerabilities with Machine Learning. WWW 2021: 2684-2695 - [i9]Gabriel Ferreira, Limin Jia, Joshua Sunshine, Christian Kästner:
Containing Malicious Package Updates in npm with a Lightweight Permission System. CoRR abs/2103.05769 (2021) - [i8]Milijana Surbatovich, Limin Jia, Brandon Lucia:
Automatically Enforcing Fresh and Consistent Inputs in Intermittent Systems. CoRR abs/2104.04616 (2021) - [i7]Farzaneh Derakhshan, Stephanie Balzer, Limin Jia:
Session Logical Relations for Noninterference. CoRR abs/2104.14094 (2021) - 2020
- [j7]Milijana Surbatovich, Brandon Lucia, Limin Jia:
Towards a formal foundation of intermittent computing. Proc. ACM Program. Lang. 4(OOPSLA): 163:1-163:31 (2020) - [c55]Zichao Zhang, Arthur Azevedo de Amorim, Limin Jia, Corina S. Pasareanu:
Automating Compositional Analysis of Authentication Protocols. FMCAD 2020: 113-118 - [c54]Arthur Azevedo de Amorim, Matt Fredrikson, Limin Jia:
Reconciling noninterference and gradual typing. LICS 2020: 116-129 - [c53]Yifei Yuan, Soo-Jin Moon, Sahil Uppal, Limin Jia, Vyas Sekar:
NetSMC: A Custom Symbolic Model Checker for Stateful Network Verification. NSDI 2020: 181-200 - [c52]Camille Cobb, Milijana Surbatovich, Anna Kawakami, Mahmood Sharif, Lujo Bauer, Anupam Das, Limin Jia:
How Risky Are Real Users' IFTTT Applets? SOUPS @ USENIX Security Symposium 2020: 505-529 - [i6]Abhishek Bichhawat, McKenna McCall, Limin Jia:
First-order Gradual Information Flow Types with Gradual Guarantees. CoRR abs/2003.12819 (2020) - [i5]Milijana Surbatovich, Limin Jia, Brandon Lucia:
Towards a Formal Foundation of Intermittent Computing. CoRR abs/2007.15126 (2020)
2010 – 2019
- 2019
- [j6]Milijana Surbatovich, Limin Jia, Brandon Lucia:
I/O dependent idempotence bugs in intermittent systems. Proc. ACM Program. Lang. 3(OOPSLA): 183:1-183:31 (2019) - [c51]Darion Cassel, Yan Huang, Limin Jia:
Uncovering Information Flow Policy Violations in C Programs (Extended Abstract). ESORICS (2) 2019: 26-46 - [c50]Kalil Anderson Garrett, Gabriel Ferreira, Limin Jia, Joshua Sunshine, Christian Kästner:
Detecting suspicious package updates. ICSE (NIER) 2019: 13-16 - [i4]Darion Cassel, Yan Huang, Limin Jia:
Uncovering Information Flow Policy Violations in C Programs. CoRR abs/1907.01727 (2019) - 2018
- [j5]Ang Chen, Chen Chen, Lay Kuan Loh, Yang Wu, Andreas Haeberlen, Limin Jia, Boon Thau Loo, Wenchao Zhou:
Data Center Diagnostics with Network Provenance. IEEE Data Eng. Bull. 41(1): 74-85 (2018) - [c49]Darion Cassel, Yan Huang, Limin Jia:
FlowNotation: An Annotation System for Statically Enforcing Information Flow Policies in C. CCS 2018: 2207-2209 - [c48]McKenna McCall, Hengrun Zhang, Limin Jia:
Knowledge-Based Security of Dynamic Secrets for Reactive Programs. CSF 2018: 175-188 - [c47]Hannah Gommerstadt, Limin Jia, Frank Pfenning:
Session-Typed Concurrent Contracts. ESOP 2018: 771-798 - [c46]William Melicher, Anupam Das, Mahmood Sharif, Lujo Bauer, Limin Jia:
Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting. NDSS 2018 - [c45]Yifei Yuan, Sanjay Chandrasekaran, Limin Jia, Vyas Sekar:
Efficient and Correct Test Scheduling for Ensembles of Network Policies. NSDI 2018: 437-452 - 2017
- [c44]McKenna McCall, Lay Kuan Loh, Limin Jia:
A Sequent Calculus for Counterfactual Reasoning. PLAS@CCS 2017: 91-106 - [c43]Willard Rafnsson, Limin Jia, Lujo Bauer:
Timing-Sensitive Noninterference through Composition. POST 2017: 3-25 - [c42]Chen Chen, Harshal Tushar Lehri, Lay Kuan Loh, Anupam Alur, Limin Jia, Boon Thau Loo, Wenchao Zhou:
Distributed Provenance Compression. SIGMOD Conference 2017: 203-218 - [c41]Milijana Surbatovich, Jassim Aljuraidan, Lujo Bauer, Anupam Das, Limin Jia:
Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes. WWW 2017: 1501-1510 - 2016
- [c40]Limin Jia, Hannah Gommerstadt, Frank Pfenning:
Monitors and blame assignment for higher-order session types. POPL 2016: 582-594 - [c39]Amit Vasudevan, Sagar Chaki, Petros Maniatis, Limin Jia, Anupam Datta:
überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor. USENIX Security Symposium 2016: 87-104 - 2015
- [j4]Chen Chen, Limin Jia, Hao Xu, Cheng Luo, Wenchao Zhou, Boon Thau Loo:
A Program Logic for Verifying Secure Routing Protocols. Log. Methods Comput. Sci. 11(4) (2015) - [c38]Omar Chowdhury, Deepak Garg, Limin Jia, Anupam Datta:
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits. CCS 2015: 1130-1143 - [c37]Limin Jia, Shayak Sen, Deepak Garg, Anupam Datta:
A Logic of Programs with Interface-Confined Code. CSF 2015: 512-525 - [c36]Lujo Bauer, Shaoying Cai, Limin Jia, Timothy Passaro, Michael Stroucken, Yuan Tian:
Run-time Monitoring and Formal Analysis of Information Flows in Chromium. NDSS 2015 - [c35]Chen Chen, Lay Kuan Loh, Limin Jia, Wenchao Zhou, Boon Thau Loo:
Automated verification of safety properties of declarative networking programs. PPDP 2015: 79-90 - [e1]Michael Clarkson, Limin Jia:
Proceedings of the 10th ACM Workshop on Programming Languages and Analysis for Security, PLAS@ECOOP 2015, Prague, Czech Republic, July 4-10, 2015. ACM 2015, ISBN 978-1-4503-3661-1 [contents] - [i3]Limin Jia, Shayak Sen, Deepak Garg, Anupam Datta:
System M: A Program Logic for Code Sandboxing and Identification. CoRR abs/1501.05673 (2015) - [i2]Omar Chowdhury, Deepak Garg, Limin Jia, Anupam Datta:
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits. CoRR abs/1508.02448 (2015) - 2014
- [c34]Omar Chowdhury, Limin Jia, Deepak Garg, Anupam Datta:
Temporal Mode-Checking for Runtime Monitoring of Privacy Policies. CAV 2014: 131-149 - [c33]Fuyuan Zhang, Limin Jia, Cristina Basescu, Tiffany Hyun-Jin Kim, Yih-Chun Hu, Adrian Perrig:
Mechanized Network Origin and Path Authenticity Proofs. CCS 2014: 346-357 - [c32]Lujo Bauer, Shaoying Cai, Limin Jia, Timothy Passaro, Yuan Tian:
Analyzing the dangers posed by Chrome extensions. CNS 2014: 184-192 - [c31]Se Eun Oh, Ji Young Chun, Limin Jia, Deepak Garg, Carl A. Gunter, Anupam Datta:
Privacy-preserving audit for broker-based health information exchange. CODASPY 2014: 313-320 - [c30]Chen Chen, Limin Jia, Hao Xu, Cheng Luo, Wenchao Zhou, Boon Thau Loo:
A Program Logic for Verifying Secure Routing Protocols. FORTE 2014: 117-132 - [c29]Chen Chen, Limin Jia, Wenchao Zhou, Boon Thau Loo:
Proof-based Verification of Software Defined Networks. ONS 2014 - [c28]William Klieber, Lori Flynn, Amar Bhosale, Limin Jia, Lujo Bauer:
Android taint flow analysis for app sets. SOAP@PLDI 2014: 5:1-5:6 - [c27]Tiffany Hyun-Jin Kim, Cristina Basescu, Limin Jia, Soo Bum Lee, Yih-Chun Hu, Adrian Perrig:
Lightweight source authentication and path validation. SIGCOMM 2014: 271-282 - [c26]Arunesh Sinha, Limin Jia, Paul England, Jacob R. Lorch:
Continuous Tamper-Proof Logging Using TPM 2.0. TRUST 2014: 19-36 - 2013
- [c25]Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake:
Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract). ESORICS 2013: 775-792 - [c24]Omar Chowdhury, Andreas Gampe, Jianwei Niu, Jeffery von Ronne, Jared Bennatt, Anupam Datta, Limin Jia, William H. Winsborough:
Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule. SACMAT 2013: 3-14 - [c23]Amit Vasudevan, Sagar Chaki, Limin Jia, Jonathan M. McCune, James Newsome, Anupam Datta:
Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework. IEEE Symposium on Security and Privacy 2013: 430-444 - 2012
- [j3]Vivek Nigam, Limin Jia, Boon Thau Loo, Andre Scedrov:
Maintaining distributed logic programs incrementally. Comput. Lang. Syst. Struct. 38(2): 158-180 (2012) - [j2]Anduo Wang, Limin Jia, Wenchao Zhou, Yiqing Ren, Boon Thau Loo, Jennifer Rexford, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott:
FSR: formal analysis and implementation toolkit for safe interdomain routing. IEEE/ACM Trans. Netw. 20(6): 1814-1827 (2012) - [c22]Elli Fragkaki, Lujo Bauer, Limin Jia, David Swasey:
Modeling and Enhancing Android's Permission System. ESORICS 2012: 1-18 - [c21]Chen Chen, Limin Jia, Boon Thau Loo, Wenchao Zhou:
Reduction-based security analysis of Internet routing protocols. ICNP 2012: 1-6 - 2011
- [j1]Anupam Datta, Jason Franklin, Deepak Garg, Limin Jia, Dilsun Kirli Kaynar:
On Adversary Models and Compositional Security. IEEE Secur. Priv. 9(3): 26-32 (2011) - [c20]Deepak Garg, Limin Jia, Anupam Datta:
Policy auditing over incomplete logs: theory, implementation and applications. CCS 2011: 151-162 - [c19]Anduo Wang, Carolyn L. Talcott, Limin Jia, Boon Thau Loo, Andre Scedrov:
Analyzing BGP Instances in Maude. FMOODS/FORTE 2011: 334-348 - [c18]Anupam Datta, Jeremiah Blocki, Nicolas Christin, Henry DeYoung, Deepak Garg, Limin Jia, Dilsun Kirli Kaynar, Arunesh Sinha:
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms. ICISS 2011: 1-27 - [c17]Vivek Nigam, Limin Jia, Boon Thau Loo, Andre Scedrov:
Maintaining distributed logic programs incrementally. PPDP 2011: 125-136 - [c16]Yiqing Ren, Wenchao Zhou, Anduo Wang, Limin Jia, Alexander J. T. Gurney, Boon Thau Loo, Jennifer Rexford:
FSR: formal analysis and implementation toolkit for safe inter-domain routing. SIGCOMM 2011: 440-441 - [i1]Deepak Garg, Limin Jia, Anupam Datta:
A Logical Method for Policy Enforcement over Evolving Audit Logs. CoRR abs/1102.2521 (2011) - 2010
- [c15]Lujo Bauer, Limin Jia, Divya Sharma:
Constraining Credential Usage in Logic-Based Access Control. CSF 2010: 154-168 - [c14]Vivek Nigam, Limin Jia, Anduo Wang, Boon Thau Loo, Andre Scedrov:
An Operational Semantics for Network Datalog. LAM@LICS 2010: 68-81 - [c13]Limin Jia, Jianzhou Zhao, Vilhelm Sjöberg, Stephanie Weirich:
Dependent types and program equivalence. POPL 2010: 275-286 - [c12]Henry DeYoung, Deepak Garg, Limin Jia, Dilsun Kirli Kaynar, Anupam Datta:
Experiences in the logical specification of the HIPAA and GLBA privacy laws. WPES 2010: 73-82
2000 – 2009
- 2009
- [c11]Anduo Wang, Limin Jia, Changbin Liu, Boon Thau Loo, Oleg Sokolsky, Prithwish Basu:
Formally Verifiable Networking. HotNets 2009 - [c10]Limin Jia, Steve Zdancewic:
Encoding information flow in Aura. PLAS 2009: 17-29 - [c9]Kenny Qili Zhu, Daniel S. Dantas, Kathleen Fisher, Limin Jia, Yitzhak Mandelbaum, Vivek S. Pai, David Walker:
Language support for processing distributed ad hoc data. PPDP 2009: 243-254 - [c8]Lujo Bauer, Limin Jia, Michael K. Reiter, David Swasey:
xDomain: cross-border proofs of access. SACMAT 2009: 43-52 - 2008
- [c7]Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, Steve Zdancewic:
Evidence-Based Audit. CSF 2008: 177-191 - [c6]Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianzhou Zhao, Luke Zarko, Joseph Schorr, Steve Zdancewic:
AURA: a programming language for authorization and audit. ICFP 2008: 27-38 - 2006
- [c5]Limin Jia, David Walker:
ILC: A Foundation for Automated Reasoning About Pointer Programs. ESOP 2006: 131-145 - [c4]Frances Perry, Limin Jia, David Walker:
Expressing heap-shape contracts in linear logic. GPCE 2006: 101-110 - 2005
- [c3]Limin Jia, Frances Spalding, David Walker, Neal Glew:
Certifying Compilation for a Language with Stack Allocation. LICS 2005: 407-416 - 2004
- [c2]Limin Jia, David Walker:
Modal Proofs as Distributed Programs (Extended Abstract). ESOP 2004: 219-233 - 2003
- [c1]Amal J. Ahmed, Limin Jia, David Walker:
Reasoning about Hierarchical Storage. LICS 2003: 33-44
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint