Tielei Wang
Tielei Wang
Email verificata su gatech.edu
TitoloCitata daAnno
TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection
T Wang, T Wei, G Gu, W Zou
Security and Privacy (SP), 2010 IEEE Symposium on, 497-512, 2010
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
T Wang, T Wei, Z Lin, W Zou
NDSS, 2009
Jekyll on iOS: When Benign Apps Become Evil.
T Wang, K Lu, L Lu, SP Chung, W Lee
USENIX Security Symposium 78, 2013
Preventing Use-after-free with Dangling Pointers Nullification.
B Lee, C Song, Y Jang, T Wang, T Kim, L Lu, W Lee
NDSS, 2015
From zygote to morula: Fortifying weakened aslr on android
B Lee, L Lu, T Wang, T Kim, W Lee
Security and Privacy (SP), 2014 IEEE Symposium on, 424-439, 2014
Exploiting and Protecting Dynamic Code Generation.
C Song, C Zhang, T Wang, W Lee, D Melski
NDSS, 2015
IntPatch: Automatically fix integer-overflow-to-buffer-overflow vulnerability at compile-time
C Zhang, T Wang, T Wei, Y Chen, W Zou
European Symposium on Research in Computer Security, 71-86, 2010
A11y Attacks: Exploiting Accessibility in Operating Systems
Y Jang, C Song, SP Chung, T Wang, W Lee
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communicationsá…, 2014
Heap taichi: exploiting memory allocation granularity in heap-spraying attacks
Y Ding, T Wei, TL Wang, Z Liang, W Zou
Proceedings of the 26th Annual Computer Security Applications Conferenceá…, 2010
Checksum-aware fuzzing combined with dynamic taint analysis and symbolic execution
T Wang, T Wei, G Gu, W Zou
ACM Transactions on Information and System Security (TISSEC) 14 (2), 15, 2011
Mactans: Injecting malware into iOS devices via malicious chargers
B Lau, Y Jang, C Song, T Wang, PH Chung, P Royal
Black Hat USA, 2013
Secure dynamic code generation against spraying
T Wei, T Wang, L Duan, J Luo
Proceedings of the 17th ACM conference on Computer and communicationsá…, 2010
INSeRT: Protect dynamic code generation against spraying
T Wei, T Wang, L Duan, J Luo
Information Science and Technology (ICIST), 2011 International Conference oná…, 2011
Behavior-based malware detection on mobile phone
S Dai, Y Liu, T Wang, T Wei, W Zou
Wireless Communications Networking and Mobile Computing (WiCOM), 2010 6thá…, 2010
On the Feasibility of Large-Scale Infections of iOS Devices.
T Wang, Y Jang, Y Chen, SP Chung, B Lau, W Lee
USENIX Security Symposium, 79-93, 2014
Diagnosis and emergency patch generation for integer overflow exploits
T Wang, C Song, W Lee
International Conference on Detection of Intrusions and Malware, andá…, 2014
A framework to eliminate backdoors from response-computable authentication
S Dai, T Wei, C Zhang, T Wang, Y Ding, Z Liang, W Zou
Security and Privacy (SP), 2012 IEEE Symposium on, 3-17, 2012
Using type analysis in compiler to mitigate integer-overflow-to-buffer-overflow threat
C Zhang, W Zou, T Wang, Y Chen, T Wei
Journal of Computer Security 19 (6), 1083-1107, 2011
Pangu 9 internals
T Wang, H Xu, X Chen
Black Hat USA, 2016
Exploiting unpatched ios vulnerabilities for fun and profit
Y Jang, T Wang, B Lee, B Lau
Black Hat USA, 2014
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20