Gang Tan

According to our database1, Gang Tan authored at least 52 papers between 2002 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Debugopt: Debugging fully optimized natively compiled programs using multistage instrumentation.
Sci. Comput. Program., 2019

2018
Sensitive Information Tracking in Commodity IoT.
Proceedings of the 27th USENIX Security Symposium, 2018

Soteria: Automated IoT Safety and Security Analysis.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

One Secure Access Scheme Based on Trusted Execution Environment.
Proceedings of the 17th IEEE International Conference On Trust, 2018

τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

From Debugging-Information Based Binary-Level Type Inference to CFG Generation.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Study on Climate and Grassland Fire in HulunBuir, Inner Mongolia Autonomous Region, China.
Sensors, 2017

The Influence of Land Use on the Grassland Fire Occurrence in the Northeastern Inner Mongolia Autonomous Region, China.
Sensors, 2017

Principles and Implementation Techniques of Software-Based Fault Isolation.
Foundations and Trends in Privacy and Security, 2017

ReDroid: Prioritizing Data Flows and Sinks for App Security Transformation.
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017

CFG Construction Soundness in Control-Flow Integrity.
Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, 2017

PtrSplit: Supporting General Pointers in Automatic Program Partitioning.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Bidirectional Grammars for Machine-Code Decoding and Encoding.
Proceedings of the Verified Software. Theories, Tools, and Experiments, 2016

Analysis of Code Heterogeneity for High-Precision Classification of Repackaged Malware.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Maintaining Authorization Hook Placements Across Program Versions.
Proceedings of the IEEE Cybersecurity Development, 2016

Languages Must Expose Memory Heterogeneity.
Proceedings of the Second International Symposium on Memory Systems, 2016

2015
WebC: toward a portable framework for deploying legacy code in web browsers.
SCIENCE CHINA Information Sciences, 2015

Producing Hook Placements to Enforce Expected Access Control Policies.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

Per-Input Control-Flow Integrity.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Exception analysis in the Java Native Interface.
Sci. Comput. Program., 2014

NativeGuard: protecting android applications from third-party native libraries.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Modular control-flow integrity.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014

Finding Reference-Counting Errors in Python/C Programs with Affine Analysis.
Proceedings of the ECOOP 2014 - Object-Oriented Programming - 28th European Conference, Uppsala, Sweden, July 28, 2014

RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Bringing java's wild native world under control.
ACM Trans. Inf. Syst. Secur., 2013

Strato: A Retargetable Framework for Low-Level Inlined-Reference Monitors.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Monitor integrity protection with space efficiency and separate compilation.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Efficient user-space information flow control.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
RockSalt: better, faster, stronger SFI for the x86.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2012

JVM-Portable Sandboxing of Java's Native Libraries.
Proceedings of the Computer Security - ESORICS 2012, 2012

JATO: Native Code Atomicity for Java.
Proceedings of the Programming Languages and Systems - 10th Asian Symposium, 2012

2011
Markup SVG - An Online Content-Aware Image Abstraction and Annotation Tool.
IEEE Trans. Multimedia, 2011

FDTL: a unified flash memory and hard disk translation layer.
IEEE Trans. Consumer Electronics, 2011

JET: exception checking in the Java native interface.
Proceedings of the 26th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2011

Combining control-flow integrity and static analysis for efficient and validated data sandboxing.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Poster: uPro: a compartmentalization tool supporting fine-grained and flexible security configuration.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Detection and Classification of Different Botnet C&C Channels.
Proceedings of the Autonomic and Trusted Computing - 8th International Conference, 2011

2010
Semantic foundations for typed assembly languages.
ACM Trans. Program. Lang. Syst., 2010

Robusta: taming the native beast of the JVM.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

JNI Light: An Operational Model for the Core JNI.
Proceedings of the Programming Languages and Systems - 8th Asian Symposium, 2010

2009
The New Jersey Voting-machine Lawsuit and the AVC Advantage DRE Voting Machine.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009

Document Analysis Support for the Manual Auditing of Elections.
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009

Finding bugs in exceptional situations of JNI programs.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Weak updates and separation logic.
Proceedings of the Programming Languages and Systems, 7th Asian Symposium, 2009

2008
An Empirical Security Study of the Native Code in the JDK.
Proceedings of the 17th USENIX Security Symposium, 2008

2007
Ilea: inter-language analysis across java and c.
Proceedings of the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2007

2006
A Compositional Logic for Control Flow.
Proceedings of the Verification, 2006

Delayed and Controlled Failures in Tamper-Resistant Software.
Proceedings of the Information Hiding, 8th International Workshop, 2006

2004
Construction of a Semantic Model for a Typed Assembly Language.
Proceedings of the Verification, 2004

EEG Source Localization Using Independent Residual Analysis.
Proceedings of the Advances in Neural Networks, 2004

Dynamic Typing with Dependent Types.
Proceedings of the Exploring New Frontiers of Theoretical Informatics, 2004

2002
Braille to print translations for Chinese.
Information & Software Technology, 2002


  Loading...