Follow
Dave (Jing) Tian
Dave (Jing) Tian
Other namesJing Tian, Dave Tian, Jing (Dave) Tian
Verified email at purdue.edu - Homepage
Title
Cited by
Cited by
Year
Trustworthy whole-system provenance for the linux kernel
A Bates, DJ Tian, KRB Butler, T Moyer
24th {USENIX} Security Symposium ({USENIX} Security 15), 319-334, 2015
2362015
Defending against malicious USB firmware with GoodUSB
DJ Tian, A Bates, K Butler
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
882015
Firmusb: Vetting usb device firmware using domain informed symbolic execution
G Hernandez, F Fowze, D Tian, T Yavuz, KRB Butler
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
732017
More guidelines than rules: CSRF vulnerabilities from noncompliant OAuth 2.0 implementations
E Shernan, H Carter, D Tian, P Traynor, K Butler
Detection of Intrusions and Malware, and Vulnerability Assessment: 12th …, 2015
642015
Sending out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways
B Reaves, N Scaife, D Tian, L Blue, P Traynor, KRB Butler
2016 IEEE Symposium on Security and Privacy (SP), 339-356, 2016
582016
Securing SSL certificate verification through dynamic linking
A Bates, J Pletcher, T Nichols, B Hollembaek, D Tian, KRB Butler, ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
562014
CPAC: securing critical infrastructure with cyber-physical access control
S Etigowni, D Tian, G Hernandez, S Zonouz, K Butler
Proceedings of the 32nd annual conference on computer security applications …, 2016
512016
SoK: "Plug & Pray" Today — Understanding USB Insecurity in Versions 1 through C
DJ Tian, N Scaife, D Kumar, M Bailey, A Bates, K Butler
39th IEEE Symposium on Security and Privacy (Oakland’18), San Francisco, CA, 2018
442018
Making USB great again with USBFILTER
DJ Tian, N Scaife, A Bates, K Butler, P Traynor
USENIX Security Symposium, 2016
442016
Custos: Practical tamper-evident auditing of operating systems using trusted execution
R Paccagnella, P Datta, WU Hassan, A Bates, C Fletcher, A Miller, D Tian
Network and distributed system security symposium, 2020
412020
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy.
J Wu, Y Nan, V Kumar, Dave (Jing) Tian, A Bianchi, M Payer, D Xu
WOOT@ USENIX Security Symposium, 2020
402020
Replex: A scalable, highly available multi-index data store
A Tai, M Wei, MJ Freedman, I Abraham, D Malkhi
2016 {USENIX} Annual Technical Conference ({USENIX}{ATC} 16), 337-350, 2016
332016
Attention spanned: Comprehensive vulnerability analysis of {AT} commands within the android ecosystem
DJ Tian, G Hernandez, JI Choi, V Frost, C Raules, P Traynor, ...
27th {USENIX} Security Symposium ({USENIX} Security 18), 273-290, 2018
312018
Detecting SMS spam in the age of legitimate bulk messaging
B Reaves, L Blue, D Tian, P Traynor, KRB Butler
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
272016
Provusb: Block-level provenance-based data protection for usb storage devices
D Tian, A Bates, KRB Butler, R Rangaswami
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
262016
Lbm: A security framework for peripherals within the linux kernel
DJ Tian, G Hernandez, JI Choi, V Frost, PC Johnson, KRB Butler
2019 IEEE Symposium on Security and Privacy (SP), 967-984, 2019
202019
LIGHTBLUE: Automatic profile-aware debloating of bluetooth stacks
J Wu, R Wu, D Antonioli, M Payer, NO Tippenhauer, D Xu, DJ Tian, ...
Proceedings of the USENIX Security Symposium (USENIX Security), 2021
182021
A hybrid approach to secure function evaluation using SGX
JI Choi, D Tian, G Hernandez, C Patton, B Mood, T Shrimpton, KRB Butler, ...
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
172019
A practical intel SGX setting for linux containers in the cloud
D Tian, JI Choi, G Hernandez, P Traynor, KRB Butler
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
172019
Taming the costs of trustworthy provenance through policy reduction
A Bates, D Tian, G Hernandez, T Moyer, KRB Butler, T Jaeger
ACM Transactions on Internet Technology (TOIT) 17 (4), 1-21, 2017
172017
The system can't perform the operation now. Try again later.
Articles 1–20