Limin Jia

Assistant Research Professor, ECE & INI
Carnegie Mellon University
Adjunct Assistant Professor, CIS
University of Pennsylvania

4720 Forbes Ave.
Carnegie Mellon University
Pittsburgh, PA 15213

Office: 2216 CIC Building
Email: liminjia AT cmu.edu

 

Research Interests
Programming languages, language-based security, type systems, logic, program verification.

Teaching

Fall 2014: Introduction to Information Security

Spring 2014: Network Security and Management

Fall 2011: Rigorous Internet Protocol Engineering

Publications

Mechanized Network Origin and Path Authenticity Proofs.
Fuyuan Zhang, Limin Jia, Cristina Basescu, Tiffany Hyun­Jin Kim, Yih­Chun Hu, and Adrian Perrig .
In 21st ACM Conference on Computer and Communications Security (CCS), to appear, 2014.

Lightweight Source Authentication and Path Validation.
Tiffany Hyun-Jin Kim, Limin Jia, Cristina Basescu, Soo Bum Lee, Yih-Chun Hu, and Adrian Perrig.
In ACM SIGCOMM, August 2014. [PDF]

Temporal Mode-Checking for Runtime Monitoring of Privacy Policies.
Omar Chowdhury, Limin Jia, Deepak Garg, and Anupam Datta.
In 26th International Conference on Computer Aided Verification (CAV), July 2014. [PDF]
Long version appeared as Carnegie Mellon University Technical Report CMU-CyLab-14-005, May 2014. [PDF]

Continuous Tamper-proof Logging Using TPM 2.0.
Arunesh Sinha, Limin Jia, Paul England, and Jacob R. Lorch
In 7th International Conference on Trust & Trustworthy Computing (TRUST), June 2014. [PDF]
Long version appeared as Carnegie Mellon University Technical Report CMU-CyLab-13-008, July 2013. [PDF]

A Program Logic for Verifying Secure Routing Protocols.
Chen Chen, Limin Jia, Hao Xu, Cheng Luo, Wenchao Zhou, and Boon Thau Loo.
In IFIP International Conference on Formal Techniques for Distributed Objects, Components and Systems (FORTE), June 2014. [PDF]
Long version appeared as University of Pennsylvania Technical Report, Feb. 2014. [PDF]

Privacy-Preserving Audit for Broker-Based Health Information Exchange.
Se Eun Oh, Ji Young Chun, Limin Jia, Deepak Garg, Carl A. Gunter, and Anupam Datta.
In ACM Conference on Data and Application Security and Privacy (CODASPY), Feb. 2014. [PDF]

Run-time enforcement of information-flow properties on Android (extended abstract).
Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto, and Yutaka Miyake.
In Computer Security -- ESORICS 2013: 18th European Symposium on Research in Computer Security, Sept. 2013. [PDF]
Technical Report [PDF]

A Formal Framework for Secure Routing Protocols.
Chen Chen, Limin Jia, Hao Xu, Cheng Luo, Wenchao Zhou, and Boon Thau Loo
In Workshop on Foundations of Computer Security, June 2013. [PDF]

Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework.
Amit Vasudevan, Sagar Chaki, Limin Jia, Jonathan McCune, James Newsome, and Anupam Datta.
In IEEE Symposium on Security & Privacy, May 2013. [PDF]

Modeling and enhancing Android's permission system.
Elli Fragkaki, Lujo Bauer, Limin Jia, and David Swasey.
In Computer Security -- ESORICS 2012: 17th European Symposium on Research in Computer Security, Sept. 2012. [PDF]
Technical Report [PDF]

Maintaining Distributed Logic Programs Incrementally.
Vivek Nigam, Limin Jia, Boon Thau Loo and Andre Scedrov.
In Computer Languages, Systems & Structures (COMLAN), Elsevier Publishing, 2012. [PDF]

FSR: Formal Analysis and Implementation Toolkit for Safe Inter-domain Routing.
Anduo Wang, Limin Jia, Wenchao Zhou, Yiqing Ren, Boon Thau Loo, Jennifer Rexford, Vivek Nigam, Andre Scedrov and Carolyn L. Talcott.
In IEEE/ACM Transactions on Networking (ToN), 2012. [PDF]

Policy Auditing over Incomplete Logs: Theory, Implementation and Applications.
Deepak Garg, Limin Jia and Anupam Datta
In ACM Conference on Computer and Communications Security (CCS 2011), Oct 2011. [PDF]

On Adversary Models and Compositional Security.
Anupam Datta, Jason Franklin, Deepak Garg, Limin Jia and Dilsun Kaynar.
IEEE Security and Privacy Magazine, special issue on the Science of Security, 2011. [PDF]

FSR: Formal Analysis and Implementation Toolkit for Safe Inter-domain Routing.
Yiqing Ren, Wenchao Zhou, Anduo Wang, Limin Jia, Alexander J.T. Gurney, Boon Thau Loo and Jennifer Rexford.
ACM SIGCOMM Conference on Data Communication (demonstration), Aug 2011.

Maintaining Distributed Logic Programs Incrementally.
Vivek Nigam, Limin Jia, Boon Thau Loo and Andre Scedrov.
In 13th International ACM SIGPLAN Symposium on Principles and Practice of Declarative Programming (PPDP), July 2011. [PDF]

Analyzing BGP Instances in Maude.
Anduo Wang, Carolyn L. Talcott, Limin Jia, Boon Thau Loo and Andre Scedrov.
In International Conference on Formal Techniques for Networked and Distributed Systems (FMOODS/FORTE), June 2011. [PDF]
Technical Report [PDF]

Experiences in the Logical Specification of the HIPAA and GLBA Privacy Laws.
Henry DeYoung, Deepak Garg, Limin Jia, Dilsun Kaynar and Anupam Datta.
In WPES 2010: Workshop on Privacy in the Electronic Society, October 2010. [PDF]

Constraining Credential Usage in Logic-based Access Control.
Lujo Bauer, Limin Jia and Divya Sharma.
In Proceedings of the 23rd IEEE Computer Security Foundations Symposium (CSF), July 2010. [PDF]

An operational semantics for Network Datalog.
Vivek Nigam, Limin Jia, Anduo Wang, Boon T. Loo and Andre Scedrov.
In 3rd International Workshop on Logics, Agents, and Mobility (LAM '10), July 2010. [PDF]
Long version: [PDF]

Dependent Types and Program Equivalence.
Limin Jia, Jianzhou Zhao, Vilhelm Sjoberg and Stephanie Weirich.
In Proceedings of 37th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages (POPL), January 2010. [PDF]

Formally Verifiable Networking.
Anduo Wang, Limin Jia, Changbin Liu, Boon Thau Loo, Oleg Sokolsky and Prithwish Basu.
In 8th Workshop on Hot Topics in Networks (ACM SIGCOMM HotNets-VIII), October 2009. [PDF]

Language Support for Processing Distributed Ad Hoc Data.
Kenny Q. Zhu, Daniel S. Dantas, Kathleen Fisher, Limin Jia, Yitzhak Mandelbaum, Vivek Pai and David Walker.
In Proceedings of ACM SIGPLAN International Conference on Principles and Practice of Declarative Programming (PPDP), September 2009. [PDF]
Long version appeared as Princeton Univ. Technical Report TR-826-08, July 2008. [PDF]

Encoding Information Flow in AURA.
Limin Jia and Steve Zdancewic.
In Proceedings of ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security (PLAS 2009), June 2009. [PDF]
Long version appeared as Univ. of Pennsylvania Technical Report MS-CIS-09-08, July 2008. [PDF]

xDomain: Cross-border proofs of access.
Lujo Bauer, Limin Jia, Michael K. Reiter, and David Swasey.
In Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, June 2009. [PDF]
Long version appeared as Carnegie Mellon University Technical Report CMU-CyLab-09-005. [PDF]

AURA: A programming language for authorization and audit.
Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianzhou Zhao, Luke Zarko, Joseph Schorr and Steve Zdancewic.
In Proceedings of the 2008 SIGPLAN International Conference on Functional Programming (ICFP), September 2008. [PDF]
Long version appeared as Univ. of Pennsylvania Technical Report MS-CIS-08-10, July 2008. [PDF]

Evidence-based Audit.
Jeffrey A. Vaughan, Limin Jia, Karl Mazurak and Steve Zdancewic.
In Proceedings of 21st IEEE Computer Security Foundations Symposium (CSF), June 2008. [PDF]
Long version appeared as Univ. of Pennsylvania Technical Report MS-CIS-08-09, April 2008. [PDF]

Linear Logic, Heap-shape Patterns and Imperative Programming.
Limin Jia and David Walker. [PDF]
Long version appeared as Princeton University Technical Report TR-762-06, July 2006. [PDF]

Expressing Heap-shape Contracts in Linear Logic.
Frances Perry, Limin Jia and David Walker.
In Proceedings of the 5th International Conference on Generative Programming and Component Engineering (GPCE), October 2006. [PDF]
An earlier version appeared in the Workshop on Semantics, Program Analysis and Computing Environments for Memory Management (SPACE), January 2006. [PDF]

ILC: A Foundation for Automated Reasoning About Pointer Programs.
Limin Jia and David Walker.
In Programming Languages and Systems: 15th European Symposium on Programming, ESOP 2006, Lecture Notes in Computer Science 3924, March 2006. [PDF]
Super short version appeared in 20th IEEE Symposium on Logic in Computer Science (LICS), short paper, June 2005. [PDF]
Long version appeared as Princeton University Technical Report TR-738-05, October 2005. [PDF]

Certifying Compilation for a Language with Stack Allocation.
Limin Jia, Frances Spalding, David Walker and Neal Glew.
In Proceedings of the 20th IEEE Symposium on Logic in Computer Science (LICS), June 2005. [PDF]
Long version appeared as Princeton University Technical Report TR-724-05, March 2005. [PDF]

Modal Proofs as Distributed Programs (extended abstract).
Limin Jia and David Walker.
In Programming Languages and Systems: 13th European Symposium on Programming, ESOP 2004, Lecture Notes in Computer Science 2986, April 2004. [PDF]
Long version appeared as Princeton University Technical Report TR-671-03, August 2003. [PDF]

Reasoning About Hierarchical Storage.
Amal Ahmed, Limin Jia and David Walker.
In Proceedings of the 18th IEEE Symposium on Logic in Computer Science (LICS), June 2003. [PDF]

Thesis

Linear Logic and Imperative Programming.
Limin Jia.
Computer Science Department, Princeton University, January 2008. [PDF]