Jun Wang

Affiliations:
  • Palo Alto Networks, Inc., USA
  • Pennsylvania State University, College of Information Sciences and Technology, University Park, PA, USA


According to our database1, Jun Wang authored at least 9 papers between 2013 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Detecting Malicious Campaigns in Obfuscated JavaScript with Scalable Behavioral Analysis.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

2016
StraightTaint: decoupled offline symbolic taint analysis.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination Forensics.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Instantly Obsoleting the Address-code Associations: A New Principle for Defending Advanced Code Reuse Attack.
CoRR, 2015

TaintPipe: Pipelined Symbolic Taint Analysis.
Proceedings of the 24th USENIX Security Symposium, 2015

Between Mutual Trust and Mutual Distrust: Practical Fine-grained Privilege Separation in Multithreaded Applications.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015

Risk Assessment of Buffer "Heartbleed" Over-Read Vulnerabilities.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

Discover and Tame Long-running Idling Processes in Enterprise Systems.
Proceedings of the 10th ACM Symposium on Information, 2015

2013
Practical Fine-grained Privilege Separation in Multithreaded Applications
CoRR, 2013


  Loading...