Conference Mechanized Network Origin and Path Authenticity Proofs 2014 • Proceedings of the ACM Conference on Computer and Communications Security • 346-357 Zhang F, Jia L, Basescu C, Kim TH-J, Hu Y-C, Perrig A
Conference Privacy-preserving audit for broker-based health information exchange 2014 313-320 Oh E, Chun JY, Jia L, Garg D, Gunter CA, Datta A
Conference Proof-based Verification of Software Defined Networks<sup>∗</sup> 2014 • Open Networking Summit 2014 - Research Track, ONS 2014 Chen C, Jia L, Zhou W, Loo BT
Journal Article Temporal Mode-Checking for Runtime Monitoring of Privacy Policies 2014 Chowdhury O, Jia L, Garg D, Datta A
Conference Temporal Mode-Checking for Runtime Monitoring of Privacy Policies 2014 • Lecture Notes in Computer Science • 8559:131-149 Chowdhury O, Jia L, Garg D, Datta A
Journal Article Temporal Mode-Checking for Runtime Monitoring of Privacy Policies (CMU-CyLab-14-005) 2014 Chowdhury O, Jia L, Garg D, Datta A
Conference 3rd International Workshop on Rigorous Protocol Engineering (WRiPE 2013) Message from the WRiPE Chairs 2013 • Proceedings - International Conference on Network Protocols, ICNP • 1 Jia L, Sobel J
Journal Article Continuous Tamper-proof Logging using TPM2.0 (CMU-CyLab-13-008) 2013 Sinha A, Jia L, England P, Lorch J
Conference Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework 2013 • IEEE Symposium on Security and Privacy: Proceedings • 430-444 Vasudevan A, Chaki S, Jia L, McCune J, Newsome J, Datta A
Journal Article Mobile SCALe: Rules and Analysis for Secure Java and Android Coding 2013 Bauer L, Flynn L, Jia L, Klieber W, Long F, Sutherland DF, Svoboda D
Conference Privacy promises that can be kept 2013 3-14 Chowdhury O, Gampe A, Niu J, von Ronne J, Bennatt J, Datta A, Jia L, Winsborough WH
Conference Run-Time Enforcement of Information-Flow Properties on Android 2013 • Lecture Notes in Computer Science • 8134:775-792 Jia L, Aljuraidan J, Fragkaki E, Bauer L, Stroucken M, Fukushima K, Kiyomoto S, Miyake Y
Conference An Operational Semantics for Network Datalog 2012 • EPiC series in computing • 7:68-53 Nigam V, Jia L, Wang A, Thau Loo B, Scedrov A
Journal Article Check Points against Privacy Breaches in Android Applications 2012 • International Journal of Computer Science and Network Security • 12(8):1-10 Fukushima K, Bauer L, Jia L, Kiyomoto S, Miyake Y
Journal Article Design, Development and Automated Verification of an Integrity-Protected Hypervisor (CMU-CyLab-12-017) 2012 Chaki S, Vasudevan A, Jia L, McCune JM, Datta A
Journal Article Design, Development, and Automated Verification of an Integrity-Protected Hypervisor 2012 Chaki S, Vasudevan A, Jia L, McCune J, Datta A
Journal Article FSR: Formal Analysis and Implementation Toolkit for Safe Interdomain Routing 2012 • IEEE/ACM Transactions on Networking • 20(6):1814-1827 Wang A, Jia L, Zhou W, Ren Y, Loo BT, Rexford J, Nigam V, Scedrov A, Talcott C
Journal Article Maintaining distributed logic programs incrementally 2012 • Computer Languages, Systems and Structures • 38(2):158-180 Nigam V, Jia L, Loo BT, Scedrov A
Journal Article Modeling and Enhancing Android's Permission System 2012 Fragkaki E, Bauer L, Jia L, Swasey D
Conference Modeling and Enhancing Android’s Permission System 2012 • Lecture Notes in Computer Science • 7459:1-18 Fragkaki E, Bauer L, Jia L, Swasey D
Conference Reduction-based Security Analysis of Internet Routing Protocols 2012 • Proceedings - International Conference on Network Protocols, ICNP Chen C, Jia L, Loo BT, Zhou W
Journal Article Run-Time Enforcement of Information-Flow Properties on Android (CMU-CyLab-12-015) 2012 Aljuraidan J, Fragkaki E, Bauer L, Jia L, Miyake Y, Fukushima K, Kiyomoto S
Journal Article A Logical Method for Policy Enforcement over Evolving Audit Logs (CMU-CyLab-11-002) 2011 Garg D, Jia L, Datta A
Conference Analyzing BGP Instances in Maude 2011 • Lecture Notes in Computer Science • 6722:334-348 Wang A, Talcott C, Jia L, Loo BT, Scedrov A