Tao Wei
Tao Wei
Vice President, Ant Financial
Email verificata su antfin.com - Home page
TitoloCitata daAnno
SoK: Eternal War In Memory
L Szekeres, M Payer, T Wei, D Song
The 34th IEEE Symposium on Security & Privacy (Oakland), 2013
4372013
Practical Control Flow Integrity & Randomization for Binary Executables
C Zhang, T Wei, Z Chen, L Duan, S McCamant, L Szekeres, D Song, ...
The 34th IEEE Symposium on Security & Privacy (Oakland), 2013
4122013
TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection
T Wang, T Wei, G Gu, W Zou
2010 IEEE Symposium on Security and Privacy, 497-512, 2010
2742010
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
T Wang, T Wei, Z Lin, W Zou
NDSS, 2009
1852009
Taintart: A practical multi-level information-flow tracking system for android runtime
M Sun, T Wei, J Lui
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communicationsá…, 2016
822016
Towards discovering and understanding task hijacking in android
C Ren, Y Zhang, H Xue, T Wei, P Liu
24th {USENIX} Security Symposium ({USENIX} Security 15), 945-959, 2015
812015
A new algorithm for identifying loops in decompilation
T Wei, J Mao, W Zou, Y Chen
International Static Analysis Symposium, 170-183, 2007
602007
IntPatch: Automatically fix integer-overflow-to-buffer-overflow vulnerability at compile-time
C Zhang, T Wang, T Wei, Y Chen, W Zou
European Symposium on Research in Computer Security, 71-86, 2010
452010
Heap taichi: exploiting memory allocation granularity in heap-spraying attacks
Y Ding, T Wei, TL Wang, Z Liang, W Zou
Proceedings of the 26th Annual Computer Security Applications Conferenceá…, 2010
432010
Checksum-aware fuzzing combined with dynamic taint analysis and symbolic execution
T Wang, T Wei, G Gu, W Zou
ACM Transactions on Information and System Security (TISSEC) 14 (2), 15, 2011
422011
BaitAlarm: detecting phishing sites using similarity in fundamental visual features
J Mao, P Li, K Li, T Wei, Z Liang
2013 5th International Conference on Intelligent Networking andá…, 2013
382013
Adaptive Android Kernel Live Patching
Y Chen, Y Zhang, Z Wang, L Xia, C Bao, T Wei
Usenix Security, 2017
372017
Drawbridge: Software-defined ddos-resistant traffic engineering
J Li, S Berg, M Zhang, P Reiher, T Wei
ACM SIGCOMM Computer Communication Review 44 (4), 591-592, 2014
362014
Fingerprints on mobile devices: Abusing and leaking
Y Zhang, Z Chen, H Xue, T Wei
Black Hat Conference, 2015
312015
Secure dynamic code generation against spraying
T Wei, T Wang, L Duan, J Luo
Proceedings of the 17th ACM conference on Computer and communicationsá…, 2010
282010
INSeRT: Protect dynamic code generation against spraying
T Wei, T Wang, L Duan, J Luo
International Conference on Information Science and Technology, 323-328, 2011
262011
Downgrade attack on trustzone
Y Chen, Y Zhang, Z Wang, T Wei
arXiv preprint arXiv:1707.05082, 2017
232017
Behavior-based malware detection on mobile phone
S Dai, Y Liu, T Wang, T Wei, W Zou
2010 6th international conference on wireless communications networking andá…, 2010
232010
Phishing-alarm: robust and efficient phishing detection via page component similarity
J Mao, W Tian, P Li, T Wei, Z Liang
IEEE Access 5, 17020-17030, 2017
182017
Structuring 2-way branches in binary executables
T Wei, J Mao, W Zou, Y Chen
31st Annual International Computer Software and Applications Conferenceá…, 2007
162007
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20