Tielei Wang

According to our database1, Tielei Wang authored at least 18 papers between 2009 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications.
Proceedings of the 29th USENIX Security Symposium, 2020

2017
Exploitations of Uninitialized Uses on macOS Sierra.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

2015
Exploiting and Protecting Dynamic Code Generation.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Preventing Use-after-free with Dangling Pointers Nullification.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
On the Feasibility of Large-Scale Infections of iOS Devices.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

From Zygote to Morula: Fortifying Weakened ASLR on Android.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Diagnosis and Emergency Patch Generation for Integer Overflow Exploits.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

A11y Attacks: Exploiting Accessibility in Operating Systems.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Scanning of real-world web applications for parameter tampering vulnerabilities.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Jekyll on iOS: When Benign Apps Become Evil.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2012
A Framework to Eliminate Backdoors from Response-Computable Authentication.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

2011
Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution.
ACM Trans. Inf. Syst. Secur., 2011

Using type analysis in compiler to mitigate integer-overflow-to-buffer-overflow threat.
J. Comput. Secur., 2011

2010
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time.
Proceedings of the Computer Security, 2010

Secure dynamic code generation against spraying.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
Proceedings of the Network and Distributed System Security Symposium, 2009


  Loading...