Tielei Wang
Tielei Wang
Email verificata su gatech.edu
Titolo
Citata da
Citata da
Anno
TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection
T Wang, T Wei, G Gu, W Zou
2010 IEEE Symposium on Security and Privacy, 497-512, 2010
2932010
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
T Wang, T Wei, Z Lin, W Zou
NDSS, 2009
1922009
Jekyll on ios: When benign apps become evil
T Wang, K Lu, L Lu, S Chung, W Lee
Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security …, 2013
1492013
Preventing Use-after-free with Dangling Pointers Nullification.
B Lee, C Song, Y Jang, T Wang, T Kim, L Lu, W Lee
NDSS, 2015
982015
From zygote to morula: Fortifying weakened aslr on android
B Lee, L Lu, T Wang, T Kim, W Lee
2014 IEEE Symposium on Security and Privacy, 424-439, 2014
562014
A11y Attacks: Exploiting Accessibility in Operating Systems
Y Jang, C Song, SP Chung, T Wang, W Lee
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
532014
Exploiting and Protecting Dynamic Code Generation.
C Song, C Zhang, T Wang, W Lee, D Melski
NDSS, 2015
502015
IntPatch: Automatically fix integer-overflow-to-buffer-overflow vulnerability at compile-time
C Zhang, T Wang, T Wei, Y Chen, W Zou
European Symposium on Research in Computer Security, 71-86, 2010
502010
Heap taichi: exploiting memory allocation granularity in heap-spraying attacks
Y Ding, T Wei, TL Wang, Z Liang, W Zou
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
462010
Mactans: Injecting malware into iOS devices via malicious chargers
B Lau, Y Jang, C Song, T Wang, PH Chung, P Royal
Black Hat USA 92, 2013
432013
Checksum-aware fuzzing combined with dynamic taint analysis and symbolic execution
T Wang, T Wei, G Gu, W Zou
ACM Transactions on Information and System Security (TISSEC) 14 (2), 1-28, 2011
422011
Secure dynamic code generation against spraying
T Wei, T Wang, L Duan, J Luo
Proceedings of the 17th ACM conference on Computer and communications …, 2010
282010
INSeRT: Protect dynamic code generation against spraying
T Wei, T Wang, L Duan, J Luo
International Conference on Information Science and Technology, 323-328, 2011
262011
Behavior-based malware detection on mobile phone
S Dai, Y Liu, T Wang, T Wei, W Zou
2010 6th international conference on wireless communications networking and …, 2010
242010
On the feasibility of large-scale infections of ios devices
T Wang, Y Jang, Y Chen, S Chung, B Lau, W Lee
23rd {USENIX} Security Symposium ({USENIX} Security 14), 79-93, 2014
182014
Diagnosis and emergency patch generation for integer overflow exploits
T Wang, C Song, W Lee
International Conference on Detection of Intrusions and Malware, and …, 2014
142014
A framework to eliminate backdoors from response-computable authentication
S Dai, T Wei, C Zhang, T Wang, Y Ding, Z Liang, W Zou
2012 IEEE Symposium on Security and Privacy, 3-17, 2012
142012
Using type analysis in compiler to mitigate integer-overflow-to-buffer-overflow threat
C Zhang, W Zou, T Wang, Y Chen, T Wei
Journal of Computer Security 19 (6), 1083-1107, 2011
92011
Pangu 9 internals
T Wang, H Xu, X Chen
Black Hat USA, 2016
42016
Exploitations of Uninitialized Uses on macOS Sierra
Z Xu, G Liu, T Wang, H Xu
11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17), 2017
32017
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20