Tielei Wang
Tielei Wang
Verifierad e-postadress på gatech.edu
Citeras av
Citeras av
TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection
T Wang, T Wei, G Gu, W Zou
Security and Privacy (SP), 2010 IEEE Symposium on, 497-512, 2010
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
T Wang, T Wei, Z Lin, W Zou
NDSS, 2009
Jekyll on iOS: When Benign Apps Become Evil.
T Wang, K Lu, L Lu, SP Chung, W Lee
USENIX Security Symposium 78, 2013
Preventing Use-after-free with Dangling Pointers Nullification.
B Lee, C Song, Y Jang, T Wang, T Kim, L Lu, W Lee
NDSS, 2015
From zygote to morula: Fortifying weakened aslr on android
B Lee, L Lu, T Wang, T Kim, W Lee
Security and Privacy (SP), 2014 IEEE Symposium on, 424-439, 2014
Exploiting and Protecting Dynamic Code Generation.
C Song, C Zhang, T Wang, W Lee, D Melski
NDSS, 2015
A11y Attacks: Exploiting Accessibility in Operating Systems
Y Jang, C Song, SP Chung, T Wang, W Lee
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
IntPatch: Automatically fix integer-overflow-to-buffer-overflow vulnerability at compile-time
C Zhang, T Wang, T Wei, Y Chen, W Zou
European Symposium on Research in Computer Security, 71-86, 2010
Heap taichi: exploiting memory allocation granularity in heap-spraying attacks
Y Ding, T Wei, TL Wang, Z Liang, W Zou
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
Mactans: Injecting malware into iOS devices via malicious chargers
B Lau, Y Jang, C Song, T Wang, PH Chung, P Royal
Black Hat USA, 2013
Checksum-aware fuzzing combined with dynamic taint analysis and symbolic execution
T Wang, T Wei, G Gu, W Zou
ACM Transactions on Information and System Security (TISSEC) 14 (2), 15, 2011
Secure dynamic code generation against spraying
T Wei, T Wang, L Duan, J Luo
Proceedings of the 17th ACM conference on Computer and communications …, 2010
INSeRT: Protect dynamic code generation against spraying
T Wei, T Wang, L Duan, J Luo
Information Science and Technology (ICIST), 2011 International Conference on …, 2011
Behavior-based malware detection on mobile phone
S Dai, Y Liu, T Wang, T Wei, W Zou
Wireless Communications Networking and Mobile Computing (WiCOM), 2010 6th …, 2010
On the Feasibility of Large-Scale Infections of iOS Devices.
T Wang, Y Jang, Y Chen, SP Chung, B Lau, W Lee
USENIX Security Symposium, 79-93, 2014
Diagnosis and emergency patch generation for integer overflow exploits
T Wang, C Song, W Lee
International Conference on Detection of Intrusions and Malware, and …, 2014
A framework to eliminate backdoors from response-computable authentication
S Dai, T Wei, C Zhang, T Wang, Y Ding, Z Liang, W Zou
Security and Privacy (SP), 2012 IEEE Symposium on, 3-17, 2012
Using type analysis in compiler to mitigate integer-overflow-to-buffer-overflow threat
C Zhang, W Zou, T Wang, Y Chen, T Wei
Journal of Computer Security 19 (6), 1083-1107, 2011
Pangu 9 internals
T Wang, H Xu, X Chen
Black Hat USA, 2016
Exploitations of Uninitialized Uses on macOS Sierra
Z Xu, G Liu, T Wang, H Xu
11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17), 2017
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20