Gang Tan
Gang Tan
Associate professor of computer science and engineering, Penn State University
Verified email at cse.psu.edu - Homepage
Title
Cited by
Cited by
Year
Modular control-flow integrity
B Niu, G Tan
Proceedings of the 35th ACM SIGPLAN Conference on Programming Language …, 2014
1722014
RockSalt: better, faster, stronger SFI for the x86
G Morrisett, G Tan, J Tassarotti, JB Tristan, E Gan
Proceedings of the 33rd ACM SIGPLAN conference on Programming Language …, 2012
1422012
Per-input control-flow integrity
B Niu, G Tan
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1192015
Combining control-flow integrity and static analysis for efficient and validated data sandboxing
B Zeng, G Tan, G Morrisett
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1042011
Nativeguard: Protecting android applications from third-party native libraries
M Sun, G Tan
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
1002014
Dynamic Typing with Dependent Types
Y Mandelbaum, X Ou, G Tan, D Walker
IFIP Advances in Information and Communication Technology (AICT) 155 (155 …, 2011
100*2011
RockJIT: Securing just-in-time compilation using modular control-flow integrity
B Niu, G Tan
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
962014
Monitor integrity protection with space efficiency and separate compilation
B Niu, G Tan
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
712013
An Empirical Security Study of the Native Code in the JDK.
G Tan, J Croft
Usenix Security Symposium, 365-378, 2008
632008
Safe Java native interface
G Tan, AW Appel, S Chakradhar, A Raghunathan, S Ravi, D Wang
Proceedings of IEEE International Symposium on Secure Software Engineering …, 2006
632006
Robusta: Taming the native beast of the JVM
J Siefers, G Tan, G Morrisett
Proceedings of the 17th ACM conference on Computer and communications …, 2010
622010
Sensitive information tracking in commodity IoT
ZB Celik, L Babun, AK Sikder, H Aksu, G Tan, P McDaniel, AS Uluagac
27th {USENIX} Security Symposium ({USENIX} Security 18), 1687-1704, 2018
612018
Smartphone dual defense protection framework: Detecting malicious applications in android markets
X Su, M Chuah, G Tan
2012 8th International Conference on Mobile Ad-hoc and Sensor Networks (MSN …, 2012
592012
A compositional logic for control flow
G Tan, AW Appel
International Workshop on Verification, Model Checking, and Abstract …, 2006
582006
Detection and classification of different botnet C&C channels
G Fedynyshyn, MC Chuah, G Tan
International Conference on Autonomic and Trusted Computing, 228-242, 2011
572011
Methods for enforcing control flow of a computer program
G Tan, B Niu
US Patent 9,361,102, 2016
552016
Soteria: Automated iot safety and security analysis
ZB Celik, P McDaniel, G Tan
2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18), 147-158, 2018
512018
Strato: A retargetable framework for low-level inlined-reference monitors
B Zeng, G Tan, Ú Erlingsson
Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security …, 2013
472013
Finding bugs in exceptional situations of JNI programs
S Li, G Tan
Proceedings of the 16th ACM conference on Computer and communications …, 2009
362009
ILEA: Inter-language analysis across Java and C
G Tan, G Morrisett
Proceedings of the 22nd annual ACM SIGPLAN conference on Object-oriented …, 2007
342007
The system can't perform the operation now. Try again later.
Articles 1–20