default search action
Jing (Dave) Tian
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Jiwon Kim, Hamed Okhravi, Dave (Jing) Tian, Benjamin E. Ujcich:
Security Challenges of Intent-Based Networking. Commun. ACM 67(7): 56-65 (2024) - [c45]Cheng-Yun Yang, Gowri Ramshankar, Nicholas Eliopoulos, Purvish Jajal, Sudarshan Nambiar, Evan Miller, Xun Zhang, Dave (Jing) Tian, Shuo-Han Chen, Chiy-Ferng Perng, Yung-Hsiang Lu:
Securing Deep Neural Networks on Edge from Membership Inference Attacks Using Trusted Execution Environments. ISLPED 2024: 1-6 - [c44]Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave Jing Tian, Antonio Bianchi:
SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth. SP 2024: 2847-228066 - [c43]Jianliang Wu, Patrick Traynor, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi:
Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations. USENIX Security Symposium 2024 - [c42]Muqi Zou, Arslan Khan, Ruoyu Wu, Han Gao, Antonio Bianchi, Dave (Jing) Tian:
D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation. USENIX Security Symposium 2024 - 2023
- [j6]Tuba Yavuz, Farhaan Fowze, Grant Hernandez, Ken Yihang Bai, Kevin R. B. Butler, Dave Jing Tian:
ENCIDER: Detecting Timing and Cache Side Channels in SGX Enclaves and Cryptographic APIs. IEEE Trans. Dependable Secur. Comput. 20(2): 1577-1595 (2023) - [c41]Xiaolong Wu, Dave Jing Tian, Chung Hwan Kim:
Building GPU TEEs using CPU Secure Enclaves with GEVisor. SoCC 2023: 249-264 - [c40]Arslan Khan, Muqi Zou, Kyungtae Kim, Dongyan Xu, Antonio Bianchi, Dave Jing Tian:
Fuzzing SGX Enclaves via Host Program Mutations. EuroS&P 2023: 472-488 - [c39]Arslan Khan, Dongyan Xu, Dave Jing Tian:
EC: Embedded Systems Compartmentalization via Intra-Kernel Isolation. SP 2023: 2990-3007 - [c38]Arslan Khan, Dongyan Xu, Dave Jing Tian:
Low-Cost Privilege Separation with Compile Time Compartmentalization for Embedded Systems. SP 2023: 3008-3025 - [c37]Hui Peng, Zhihao Yao, Ardalan Amiri Sani, Dave Tian, Mathias Payer:
GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation. USENIX Security Symposium 2023: 1883-1899 - [c36]Jiwon Kim, Benjamin E. Ujcich, Dave Tian:
Intender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance. USENIX Security Symposium 2023: 4463-4480 - [c35]Kyungtae Kim, Sungwoo Kim, Kevin R. B. Butler, Antonio Bianchi, Rick Kennell, Dave Tian:
Fuzz The Power: Dual-role State Guided Black-box Fuzzing for USB Power Delivery. USENIX Security Symposium 2023: 5845-5861 - 2022
- [c34]Sungwoo Kim, Gisu Yeo, Taegyu Kim, Junghwan John Rhee, Yuseok Jeon, Antonio Bianchi, Dongyan Xu, Dave (Jing) Tian:
ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs. AsiaCCS 2022: 534-545 - [c33]Taegyu Kim, Aolin Ding, Sriharsha Etigowni, Pengfei Sun, Jizhou Chen, Luis Garcia, Saman A. Zonouz, Dongyan Xu, Dave (Jing) Tian:
Reverse engineering and retrofitting robotic aerial vehicle control firmware using dispatch. MobiSys 2022: 69-83 - [c32]Kyungtae Kim, Taegyu Kim, Ertza Warraich, Byoungyoung Lee, Kevin R. B. Butler, Antonio Bianchi, Dave Jing Tian:
FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks. SP 2022: 2212-2229 - [c31]Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave Jing Tian, Antonio Bianchi:
Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities. SP 2022: 2285-2303 - [c30]Ruoyu Wu, Taegyu Kim, Dave (Jing) Tian, Antonio Bianchi, Dongyan Xu:
DnD: A Cross-Architecture Deep Neural Network Decompiler. USENIX Security Symposium 2022: 2135-2152 - 2021
- [j5]Farhaan Fowze, Dave Tian, Grant Hernandez, Kevin R. B. Butler, Tuba Yavuz:
ProXray: Protocol Model Learning and Guided Firmware Analysis. IEEE Trans. Software Eng. 47(9): 1907-1928 (2021) - [c29]Michael Reeves, Dave Jing Tian, Antonio Bianchi, Z. Berkay Celik:
Towards Improving Container Security by Preventing Runtime Escapes. SecDev 2021: 38-46 - [c28]Arslan Khan, Joseph I. Choi, Dave Jing Tian, Tyler Ward, Kevin R. B. Butler, Patrick Traynor, John M. Shea, Tan F. Wong:
Privacy-Preserving Localization using Enclaves. UEMCON 2021: 269-278 - [c27]Taegyu Kim, Vireshwar Kumar, Junghwan Rhee, Jizhou Chen, Kyungtae Kim, Chung Hwan Kim, Dongyan Xu, Dave (Jing) Tian:
PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications. USENIX Security Symposium 2021: 249-266 - [c26]Arslan Khan, Hyungsub Kim, Byoungyoung Lee, Dongyan Xu, Antonio Bianchi, Dave (Jing) Tian:
M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles. USENIX Security Symposium 2021: 285-302 - [c25]Jianliang Wu, Ruoyu Wu, Daniele Antonioli, Mathias Payer, Nils Ole Tippenhauer, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi:
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks. USENIX Security Symposium 2021: 339-356 - 2020
- [c24]Riccardo Paccagnella, Kevin Liao, Dave Tian, Adam Bates:
Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks. CCS 2020: 1551-1574 - [c23]Kyungtae Kim, Chung Hwan Kim, Junghwan John Rhee, Xiao Yu, Haifeng Chen, Dave (Jing) Tian, Byoungyoung Lee:
Vessels: efficient and scalable deep learning prediction on trusted processors. SoCC 2020: 462-476 - [c22]Riccardo Paccagnella, Pubali Datta, Wajih Ul Hassan, Adam Bates, Christopher W. Fletcher, Andrew Miller, Dave Tian:
Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution. NDSS 2020 - [c21]Grant Hernandez, Dave (Jing) Tian, Anurag Swarnim Yadav, Byron J. Williams, Kevin R. B. Butler:
BigMAC: Fine-Grained Policy Analysis of Android Firmware. USENIX Security Symposium 2020: 271-287 - [c20]Taegyu Kim, Chung Hwan Kim, Altay Ozen, Fan Fei, Zhan Tu, Xiangyu Zhang, Xinyan Deng, Dave (Jing) Tian, Dongyan Xu:
From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY. USENIX Security Symposium 2020: 913-930 - [c19]Jianliang Wu, Yuhong Nan, Vireshwar Kumar, Dave (Jing) Tian, Antonio Bianchi, Mathias Payer, Dongyan Xu:
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy. WOOT @ USENIX Security Symposium 2020
2010 – 2019
- 2019
- [j4]Grant Hernandez, Farhaan Fowze, Dave Jing Tian, Tuba Yavuz, Patrick Traynor, Kevin R. B. Butler:
Toward Automated Firmware Analysis in the IoT Era. IEEE Secur. Priv. 17(5): 38-46 (2019) - [j3]Bradley Reaves, Luis Vargas, Nolen Scaife, Dave Tian, Logan Blue, Patrick Traynor, Kevin R. B. Butler:
Characterizing the Security of the SMS Ecosystem with Public Gateways. ACM Trans. Priv. Secur. 22(1): 2:1-2:31 (2019) - [c18]Joseph I. Choi, Dave (Jing) Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler, Patrick Traynor:
A Hybrid Approach to Secure Function Evaluation using SGX. AsiaCCS 2019: 100-113 - [c17]Vanessa Frost, Dave (Jing) Tian, Christie Ruales, Vijay Prakash, Patrick Traynor, Kevin R. B. Butler:
Examining DES-based Cipher Suite Support within the TLS Ecosystem. AsiaCCS 2019: 539-546 - [c16]Dave (Jing) Tian, Joseph I. Choi, Grant Hernandez, Patrick Traynor, Kevin R. B. Butler:
A Practical Intel SGX Setting for Linux Containers in the Cloud. CODASPY 2019: 255-266 - [c15]Dave Jing Tian, Grant Hernandez, Joseph I. Choi, Vanessa Frost, Peter C. Johnson, Kevin R. B. Butler:
LBM: A Security Framework for Peripherals within the Linux Kernel. IEEE Symposium on Security and Privacy 2019: 967-984 - [c14]Joseph I. Choi, Dave (Jing) Tian, Tyler Ward, Kevin R. B. Butler, Patrick Traynor, John M. Shea, Tan F. Wong:
Enclave-based privacy-preserving localization: poster. WiSec 2019: 312-313 - [i2]Joseph I. Choi, Dave (Jing) Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler, Patrick Traynor:
A Hybrid Approach to Secure Function Evaluation Using SGX. CoRR abs/1905.01233 (2019) - 2018
- [c13]Jing (Dave) Tian, Nolen Scaife, Deepak Kumar, Michael D. Bailey, Adam Bates, Kevin R. B. Butler:
SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 Through C. IEEE Symposium on Security and Privacy 2018: 1032-1047 - [c12]Dave (Jing) Tian, Grant Hernandez, Joseph I. Choi, Vanessa Frost, Christie Ruales, Patrick Traynor, Hayawardh Vijayakumar, Lee Harrison, Amir Rahmati, Michael Grace, Kevin R. B. Butler:
ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem. USENIX Security Symposium 2018: 273-290 - 2017
- [j2]Jing (Dave) Tian, Kevin R. B. Butler, Joseph I. Choi, Patrick D. McDaniel, Padma Krishnaswamy:
Securing ARP/NDP From the Ground Up. IEEE Trans. Inf. Forensics Secur. 12(9): 2131-2143 (2017) - [j1]Adam Bates, Dave (Jing) Tian, Grant Hernandez, Thomas Moyer, Kevin R. B. Butler, Trent Jaeger:
Taming the Costs of Trustworthy Provenance through Policy Reduction. ACM Trans. Internet Techn. 17(4): 34:1-34:21 (2017) - [c11]Grant Hernandez, Farhaan Fowze, Dave (Jing) Tian, Tuba Yavuz, Kevin R. B. Butler:
FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution. CCS 2017: 2245-2262 - [i1]Grant Hernandez, Farhaan Fowze, Dave Tian, Tuba Yavuz, Kevin R. B. Butler:
FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution. CoRR abs/1708.09114 (2017) - 2016
- [c10]Sriharsha Etigowni, Dave (Jing) Tian, Grant Hernandez, Saman A. Zonouz, Kevin R. B. Butler:
CPAC: securing critical infrastructure with cyber-physical access control. ACSAC 2016: 139-152 - [c9]Dave (Jing) Tian, Adam Bates, Kevin R. B. Butler, Raju Rangaswami:
ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices. CCS 2016: 242-253 - [c8]Bradley Reaves, Nolen Scaife, Dave Tian, Logan Blue, Patrick Traynor, Kevin R. B. Butler:
Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways. IEEE Symposium on Security and Privacy 2016: 339-356 - [c7]Dave (Jing) Tian, Nolen Scaife, Adam Bates, Kevin R. B. Butler, Patrick Traynor:
Making USB Great Again with USBFILTER. USENIX Security Symposium 2016: 415-430 - [c6]Bradley Reaves, Logan Blue, Dave Tian, Patrick Traynor, Kevin R. B. Butler:
Detecting SMS Spam in the Age of Legitimate Bulk Messaging. WISEC 2016: 165-170 - 2015
- [c5]Jing (Dave) Tian, Adam Bates, Kevin R. B. Butler:
Defending Against Malicious USB Firmware with GoodUSB. ACSAC 2015: 261-270 - [c4]Jing (Dave) Tian, Kevin R. B. Butler, Patrick D. McDaniel, Padma Krishnaswamy:
Securing ARP From the Ground Up. CODASPY 2015: 305-312 - [c3]Ethan Shernan, Henry Carter, Dave Tian, Patrick Traynor, Kevin R. B. Butler:
More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations. DIMVA 2015: 239-260 - [c2]Adam Bates, Dave Tian, Kevin R. B. Butler, Thomas Moyer:
Trustworthy Whole-System Provenance for the Linux Kernel. USENIX Security Symposium 2015: 319-334 - 2014
- [c1]Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Dave Tian, Kevin R. B. Butler, Abdulrahman Alkhelaifi:
Securing SSL Certificate Verification through Dynamic Linking. CCS 2014: 394-405
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint