Follow
Dave (Jing) Tian
Dave (Jing) Tian
Other namesJing Tian, Dave Tian, Jing (Dave) Tian
Verified email at purdue.edu - Homepage
Title
Cited by
Cited by
Year
Trustworthy whole-system provenance for the linux kernel
A Bates, DJ Tian, KRB Butler, T Moyer
24th {USENIX} Security Symposium ({USENIX} Security 15), 319-334, 2015
2292015
Defending against malicious USB firmware with GoodUSB
DJ Tian, A Bates, K Butler
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
822015
Firmusb: Vetting usb device firmware using domain informed symbolic execution
G Hernandez, F Fowze, D Tian, T Yavuz, KRB Butler
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
702017
More guidelines than rules: CSRF vulnerabilities from noncompliant OAuth 2.0 implementations
E Shernan, H Carter, D Tian, P Traynor, K Butler
Detection of Intrusions and Malware, and Vulnerability Assessment: 12th …, 2015
602015
Securing SSL certificate verification through dynamic linking
A Bates, J Pletcher, T Nichols, B Hollembaek, D Tian, KRB Butler, ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
542014
Sending out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways
B Reaves, N Scaife, D Tian, L Blue, P Traynor, KRB Butler
2016 IEEE Symposium on Security and Privacy (SP), 339-356, 2016
522016
CPAC: securing critical infrastructure with cyber-physical access control
S Etigowni, D Tian, G Hernandez, S Zonouz, K Butler
Proceedings of the 32nd annual conference on computer security applications …, 2016
492016
Making USB great again with USBFILTER
DJ Tian, N Scaife, A Bates, K Butler, P Traynor
USENIX Security Symposium, 2016
432016
SoK: "Plug & Pray" Today — Understanding USB Insecurity in Versions 1 through C
DJ Tian, N Scaife, D Kumar, M Bailey, A Bates, K Butler
39th IEEE Symposium on Security and Privacy (Oakland’18), San Francisco, CA, 2018
422018
Custos: Practical tamper-evident auditing of operating systems using trusted execution
R Paccagnella, P Datta, WU Hassan, A Bates, C Fletcher, A Miller, D Tian
Network and distributed system security symposium, 2020
382020
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy.
J Wu, Y Nan, V Kumar, Dave (Jing) Tian, A Bianchi, M Payer, D Xu
WOOT@ USENIX Security Symposium, 2020
352020
Attention spanned: Comprehensive vulnerability analysis of {AT} commands within the android ecosystem
DJ Tian, G Hernandez, JI Choi, V Frost, C Raules, P Traynor, ...
27th {USENIX} Security Symposium ({USENIX} Security 18), 273-290, 2018
292018
Provusb: Block-level provenance-based data protection for usb storage devices
D Tian, A Bates, KRB Butler, R Rangaswami
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
262016
Detecting SMS spam in the age of legitimate bulk messaging
B Reaves, L Blue, D Tian, P Traynor, KRB Butler
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
232016
Lbm: A security framework for peripherals within the linux kernel
DJ Tian, G Hernandez, JI Choi, V Frost, PC Johnson, KRB Butler
2019 IEEE Symposium on Security and Privacy (SP), 967-984, 2019
182019
Taming the costs of trustworthy provenance through policy reduction
A Bates, D Tian, G Hernandez, T Moyer, KRB Butler, T Jaeger
ACM Transactions on Internet Technology (TOIT) 17 (4), 1-21, 2017
172017
Securing ARP/NDP from the ground up
DJ Tian, KRB Butler, JI Choi, P McDaniel, P Krishnaswamy
IEEE Transactions on Information Forensics and Security 12 (9), 2131-2143, 2017
162017
A hybrid approach to secure function evaluation using SGX
JI Choi, D Tian, G Hernandez, C Patton, B Mood, T Shrimpton, KRB Butler, ...
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
152019
LIGHTBLUE: Automatic profile-aware debloating of bluetooth stacks
J Wu, R Wu, D Antonioli, M Payer, NO Tippenhauer, D Xu, DJ Tian, ...
Proceedings of the USENIX Security Symposium (USENIX Security), 2021
142021
Vessels: Efficient and scalable deep learning prediction on trusted processors
K Kim, CH Kim, JJ Rhee, X Yu, H Chen, D Tian, B Lee
Proceedings of the 11th ACM Symposium on Cloud Computing, 462-476, 2020
142020
The system can't perform the operation now. Try again later.
Articles 1–20