Skip to main content

Limin Jia

Associate Research Professor, CyLab

[Email]

Limin Jia

Research Areas

Mobility, Privacy Protection, Trustworthy Computing Platforms and Devices

Cross Cutting Thrusts

Formal Methods, Software Security

Biography

Limin Jia is an Associate Research Professor at CyLab at Carnegie Mellon University. Her research interests include programming languages, language-based security, type systems, logic, and program verification.

Research Projects

Compositional Security

Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Formal Methods | Software Security
Researchers: Anupam Datta, Limin Jia, Amit Vasudevan, Sagar Chaki

Mobile Platform Security

Research Area: Mobility
Cross Cutting Thrusts: Software Security | Formal Methods
Researchers: Lujo Bauer, Limin Jia

Privacy, Audit and Accountability

Research Area: Privacy Protection
Researchers: Anupam Datta, Limin Jia

Trustworthy Computing Platforms and Devices

Research Area: Trustworthy Computing Platforms and Devices
Researchers: Virgil Gligor, Anupam Datta, Adrian Perrig, Amit Vasudevan, Limin Jia

Techniques for Compositional Security: Foundations, Mechanized Reasoning and Applications

Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Formal Methods | Software Security
Researchers: Anupam Datta, Limin Jia, Deepak-Garg

Formalizing and Enforcing Privacy

Research Area: Privacy Protection
Cross Cutting Thrusts: Formal Methods
Researchers: Anupam Datta, Limin Jia, Jeremiah Blocki, Zeliha Dilsun Kaynar, Divya Sharma, Arunesh Sinha, Michael Tschantz

Principled Approach to Web Security

Cross Cutting Thrusts: Software Security | Formal Methods
Researchers: Anupam Datta, Limin Jia, Deepak Garg

Publications

"Lightweight Source Authentication and Path Validation". Tiffany Hyun-Jin Kim, Limin Jia, Cristina Basescu, Soo Bum Lee, Yih-Chun Hu, and Adrian Perrig. In ACM SIGCOMM, August 2014. 

"Temporal Mode-Checking for Runtime Monitoring of Privacy Policies". Omar Chowdhury, Limin Jia, Deepak Garg, and Anupam Datta. In 26th International Conference on Computer Aided Verification (CAV), July 2014. 

"Continuous Tamper-proof Logging Using TPM 2.0". Arunesh Sinha, Limin Jia, Paul England, and Jacob R. Lorch. In 7th International Conference on Trust & Trustworthy Computing (TRUST), June 2014. 

"A Program Logic for Verifying Secure Routing Protocols". Chen Chen, Limin Jia, Hao Xu, Cheng Luo, Wenchao Zhou, and Boon Thau Loo. In IFIP International Conference on Formal Techniques for Distributed Objects, Components and Systems (FORTE), June 2014. 

"Privacy-Preserving Audit for Broker-Based Health Information Exchange". Se Eun Oh, Ji Young Chun, Limin Jia, Deepak Garg, Carl A. Gunter, and Anupam Datta. In ACM Conference on Data and Application Security and Privacy (CODASPY), Feb. 2014. 

"Design, Implementation and Verification of an Extensible and Modular Hypervisor". Datta, A., Vasudevan, A., Chaki, S., Jia, L., McCune, J., & Newsome, J. (2013). IEEE Symposium on Security and Privacy.

"Privacy Promises That Can Be Kept: A Policy Analysis Method with Application to the HIPAA Privacy Rule". Datta, A., Chowdhury, O., Gampe, A., Niu, J., von Ronne, J., Bennatt, J., Jia, L., & Winsborough, W. H. (2013). ACM Symposium on Access Control Models and Technologies.

"Run-time enforcement of information-flow properties on Android (extended abstract)". Jia, L., Aljuraidan, J., Fragkaki, E., Bauer, L., Stroucken, M., Fukushima, K., Kiyomoto, S., & Miyake, Y. (2013). European Symposium on Research in Computer Security (ESORICS).