I am looking forward to working with motivated PhD students.
Spring 2019: Browser
Fall 2018: Introduction to Information Security (18-631/14-741)
Fall 2017: Introduction to Information Security (18-631/14-741)
Spring 2017: Browser Security (14-828)
Fall 2016: Introduction to Information Security (18-631/14-741)
Spring 2016: Special Topics in Security: Formal Foundations of Secure Software Security (15-811/18-739M)
Fall 2015: Introduction to Information Security (18-631/14-741)
Fall 2015: Information Security & Privacy (15-421 / 08-731 / 08-761 / 45-885 / 45-985)
Summer 2015: Elements of Browser Security (14-847)
Fall 2014: Introduction to Information Security (18-631/14-741)
Spring 2014: Network Security and Management (18-739/14-817)
I am interested in applying formal techniques to make software systems more secure, either through using language-based techniques to build provably secure software systems, or using formal logic to verify the security properties of (distributed) software systems, or developing formalisms to reason about security and privacy guarantees of software systems in the presence of adversaries.
Knowledge-based Security of Dynamic Secrets for Reactive Programs.
McKenna McCall, Hengruo Zhang, and Limin Jia.
In Proceedings of 31st IEEE Computer Security Foundations Symposium (CSF), to appear 2018.
Long version appeared as Carnegie Mellon University Technical Report CMU-CyLab-18-001, 2018. [PDF]
Session-Typed Concurrent Contracts.
Hannah Gommerstadt, Limin Jia, and Frank Pfenning.
In Proceedings of the 27th European Symposium on Programming (ESOP), April 2018. [PDF]
Efficient and Correct Test Scheduling for Ensembles of Stateful Network Policies.
Yifei Yuan, Sanjay Chandrasekaran, Limin Jia, and Vyas Sekar.
In Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI), April 2018. [PDF]
Riding out DOMsday: Toward detecting and preventing DOM cross-site scripting.
William Melicher, Anupam Das, Mahmood Sharif, Lujo Bauer, and Limin Jia.
In Proceedings of the 25th Network and Distributed System Security Symposium (NDSS), February 2018. [PDF]
Data Center Diagnostics with Network Provenance.
Ang Chen, Chen Chen, Lay Kuan Loh, Yang Wu, Andreas Haeberlen, Limin Jia, Boon Thau Loo, and Wenchao Zhou.
In IEEE Data Eng. Bull. 41(1): 74-85 2018. [PDF]
A Sequent Calculus for Counterfactual Reasoning.
McKenna McCall, LayKuan Loh, and Limin Jia.
In Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security (PLAS), October 2017. [PDF] Long version appeared as Carnegie Mellon University Technical Report CMU-CyLab-17-003, 2017. [PDF]
Distributed Provenance Compression.
Chen Chen, Harshal Tushar Lehri, Lay Kuan Loh, Limin Jia, Boon Loo, and Wenchao Zhou.
In Proceedings of ACM SIGMOD/PODS, May 2017. [PDF] Long version appeared as Carnegie Mellon University Technical Report CMU-CyLab-17-001, 2017. [PDF]
Timing-Sensitive Noninterference through Composition.
Willard Rafnsson, Limin Jia and Lujo Bauer.
In Proceedings of 6th International Conference on Principles of Security and Trust (POST), April 2017. [PDF]
Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the
Security and Privacy Risks of IFTTT Recipes.
Milijana Surbatovich, Jassim Aljuraidan, Lujo Bauer, Anupam Das and Limin Jia.
In Proceedings of 26th International World Wide Web Conference (WWW), April 2017. [PDF]
überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor.
Amit Vasudevan and Sagar Chaki and Petros Maniatis and Limin Jia and Anupam Datta.
In Proceedings of 25th USENIX Security Symposium (USENIX Security 16), Aug. 2016. [PDF]
Monitors and Blame Assignment for Higher-Order Session Types.
Limin Jia, Hannah Gommerstadt, and Frank Pfenning.
In Proceedings of 43rd ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages (POPL) , Jan. 2016. [PDF]
Long version appeared as Carnegie Mellon University Technical Report CMU-CyLab-15-004, 2015. [PDF]