Publications

  1. Farhaan Fowze, Dave (Jing) Tian, Grant Hernandez, Kevin Butler, and Tuba Yavuz. ProXray: Protocol Model Learning and Guided Firmware Analysis. IEEE Transactions on Software Engineering (TSE’19), 2019.
    (acceptance rate=journal)
  2. Vanessa Frost, Dave (Jing) Tian, Christie Ruales, Vijay Prakash, Kevin Butler, and Patrick Traynor. Examining DES-based Cipher Suite Support within the TLS Ecosystem. 14th ACM ASIA Conference on Computer and Communications Security (ASIACCS’19), Auckland, New Zeland, July 2019.
    (acceptance rate=17%)
  3. Joseph Choi, Dave (Jing) Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin Butler, and Patrick Traynor. A Hybrid Approach to Secure Function Evaluation using SGX. 14th ACM ASIA Conference on Computer and Communications Security (ASIACCS’19), Auckland, New Zeland, July 2019.
    (acceptance rate=22% short paper)
  4. Grant Hernandez, Dave (Jing) Tian, Farhaan Fowze, Tuba Yavuz, Patrick Traynor, and Kevin Butler. Towards Automated Firmware Analysis in the IoT Era. IEEE Security and Privacy Magazine, 2019.
    (acceptance rate=invited)
  5. Dave (Jing) Tian, Joseph Choi, Grant Hernandez, Patrick Traynor, and Kevin Butler. A Practical Intel SGX Setting for Linux Containers in the Cloud. 9th ACM Conference on Data and Application Security and Privacy (CODASPY 2019), Dallas, TX, USA, March 2019.
    (acceptance rate=23.5%)
  6. Dave (Jing) Tian, Grant Hernandez, Joseph Choi, Vanessa Frost, Peter Johnson, and Kevin Butler. LBM: A Security Framework for Peripherals within the Linux Kernel. 40th IEEE Symposium on Security and Privacy (Oakland’19), San Francisco, CA, May 2019.
    (acceptance rate=12.5%)
  7. Bradly Reaves, Luis Vargas, Nolen Scaife, Dave (Jing) Tian, Logan Blue, Patrick Traynor, and Kevin Butler. Characterizing the Security of the SMS Ecosystem with Public GatewaysACM Transactions on Privacy and Security (TOPS), Volume 22 Issue 1, December 2018.
    (acceptance rate=journal)
  8. Dave (Jing) Tian, Grant Hernandez, Joesph Choi, Vanessa Frost, Christie Ruales, Patrick Traynor, Hayawardh Vijaykumar, Lee Harrison, Amir Rahmati, Mike Grace, and Kevin Butler. ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem27th USENIX Security Symposium (USENIX Security ’18), Baltimore, MD, August 2018.
    (acceptance rate=19.1%)
  9. Dave (Jing) Tian, Nolen Scaife, Deepak Kumar, Michael Bailey, Adam Bates, and Kevin Butler. SoK: ”Plug & Pray” Today — Understanding USB Insecurity in Versions 1 through C39th IEEE Symposium on Security and Privacy (Oakland’18), San Francisco, CA, May 2018.
    (acceptance rate=11.5%)
  10. Grant Hernandez, Farhaan Fowze, Dave (Jing) Tian, Tuba Yavuz, and Kevin Butler. FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution. 24th ACM Conference on Computer and Communications Security (CCS’17), Dallas, TX, USA October 2017.
    (acceptance rate=18.1%)
  11. Dave (Jing) Tian, Kevin R. B. Butler, Joseph I. Choi, Patrick D. McDaniel, and Padma Krishnaswamy. Securing ARP/NDP From the Ground UpIEEE Transactions on Information Forensics and Security (TIFS), Volume 12 Issue 9, September 2017.
    (acceptance rate=journal)
  12. Adam Bates, Dave (Jing) Tian, Grant Hernandez, Thomas Moyer, Kevin R. B. Butler, and Trent Jaeger. Taming the Costs of Trustworthy Provenance through Policy ReductionACM Transactions on Internet Technology (TOIT), Volume 17 Issue 4, September 2017.
    (acceptance rate=journal)
  13. Sriharsha Etigowni, Dave Tian, Grant Hernandez, Kevin Butler, and Saman Zonouz. CPAC: Securing Critical Infrastructure with Cyber-Physical Access Control32nd Annual Computer Security Applications Conference (ACSAC 2016), Los Angeles, CA, USA, December 2016.
    (acceptance rate=22.8%)
  14. Dave (Jing) Tian, Adam Bates, Kevin Butler, and Raju Rangaswami. ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices23rd ACM Conference on Computer and Communications Security (CCS’16), Hofburg Palace, Vienna, Austria, October 2016.
    (acceptance rate=16.5%)
  15. Dave (Jing) Tian, Nolen Scaife, Adam Bates, Kevin Butler, and Patrick Traynor. Making USB Great Again with USBFILTER25th USENIX Security Symposium (Security’16), Austin, TX, USA, August 2016.
    (acceptance rate=15.5%)
  16. Bradley Reaves, Logan Blue, Dave Tian, Patrick Traynor, and Kevin Butler. Detecting SMS Spam in the Age of Legitimate Bulk Messaging. 9th ACM Security Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’16), Darmstadt, Germany, July 2016.
    (acceptance rate=35.0%)
  17. Bradley Reaves, Nolen Scaife, Dave Tian, Logan Blue, Patrick Traynor, and Kevin Butler. Sending out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways. 2016 IEEE Symposium on Security and Privacy (Oakland’16), San Jose, CA, USA, May 2016.
    (acceptance rate=13.3%)
  18. Dave (Jing) Tian, Adam Bates, and Kevin Butler. Defending Against Malicious USB Firmware with GoodUSB. 31st Annual Computer Security Applications Conference (ACSAC 2015), Los Angeles, CA, USA, December 2015.
    (acceptance rate=24.3%)
  19. Adam Bates, Dave Tian, Kevin Butler, and Thomas Moyer. Trustworthy Whole-System Provenance for the Linux Kernel. 24th USENIX Security Symposium (Security’15), Washington, DC, USA, August 2015.
    (acceptance rate=15.7%)
  20. Ethan Shernan, Henry Carter, Dave Tian, Patrick Traynor, and Kevin Butler. More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations. Proceedings of the International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), Milan, Italy, July 2015.
    (acceptance rate=22.7%)
  21. Jing (Dave) Tian, Kevin Butler, Patrick McDaniel, and Padma Krishnaswamy. Securing ARP from the Ground Up. 5th ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, USA, March 2015.
    (acceptance rate=33.3%)
  22. Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Dave Tian, Abdulrahman Alkhelaifi, and Kevin Butler. Securing SSL Certificate Verification through Dynamic Linking. 21st ACM Conference on Computer and Communications Security (CCS’14), Scottsdale, AZ, USA, November 2014.
    (acceptance rate=19.5%)

 

1 Response to Publications

  1. Great! It is quite an impressive archive of versatile erudite research publications in multidisciplinary Computing. It would be a great privilege doing research in your Laboratory. The collections spur my interest as a PhD applicant to study in your Department; I strongly believe such a privilege will help me to hone my skills in scientific research. More grace. Thank you.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s