Seguir
Gang Tan
Gang Tan
Professor of computer science and engineering, Penn State University
Dirección de correo verificada de cse.psu.edu - Página principal
Título
Citado por
Citado por
Año
Soteria: Automated {IoT} safety and security analysis
ZB Celik, P McDaniel, G Tan
2018 USENIX annual technical conference (USENIX ATC 18), 147-158, 2018
3022018
Modular control-flow integrity
B Niu, G Tan
Proceedings of the 35th ACM SIGPLAN Conference on Programming Language …, 2014
3022014
Iotguard: Dynamic enforcement of security and safety policy in commodity IoT.
ZB Celik, G Tan, PD McDaniel
NDSS, 2019
2702019
Sensitive information tracking in commodity {IoT}
ZB Celik, L Babun, AK Sikder, H Aksu, G Tan, P McDaniel, AS Uluagac
27th USENIX Security Symposium (USENIX Security 18), 1687-1704, 2018
2692018
Per-input control-flow integrity
B Niu, G Tan
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
2232015
RockSalt: better, faster, stronger SFI for the x86
G Morrisett, G Tan, J Tassarotti, JB Tristan, E Gan
Proceedings of the 33rd ACM SIGPLAN conference on Programming Language …, 2012
1982012
Methods for enforcing control flow of a computer program
G Tan, B Niu
US Patent 9,361,102, 2016
1812016
RockJIT: Securing just-in-time compilation using modular control-flow integrity
B Niu, G Tan
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1622014
Nativeguard: Protecting android applications from third-party native libraries
M Sun, G Tan
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
1532014
Program analysis of commodity IoT applications for security and privacy: Challenges and opportunities
ZB Celik, E Fernandes, E Pauley, G Tan, P McDaniel
ACM Computing Surveys (CSUR) 52 (4), 1-30, 2019
1512019
Combining control-flow integrity and static analysis for efficient and validated data sandboxing
B Zeng, G Tan, G Morrisett
Proceedings of the 18th ACM conference on Computer and Communications …, 2011
1362011
Dynamic Typing with Dependent Types
Y Mandelbaum, X Ou, G Tan, D Walker
IFIP Advances in Information and Communication Technology (AICT) 155 (155 …, 2011
132*2011
An Empirical Security Study of the Native Code in the JDK.
G Tan, J Croft
Usenix Security Symposium, 365-378, 2008
992008
Monitor integrity protection with space efficiency and separate compilation
B Niu, G Tan
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
952013
Detection of repackaged android malware with code-heterogeneity features
K Tian, D Yao, BG Ryder, G Tan, G Peng
IEEE Transactions on Dependable and Secure Computing 17 (1), 64-77, 2017
912017
CaSym: Cache aware symbolic execution for side channel detection and mitigation
R Brotzman, S Liu, D Zhang, G Tan, M Kandemir
2019 IEEE Symposium on Security and Privacy (SP), 505-521, 2019
892019
Safe Java native interface
G Tan, AW Appel, S Chakradhar, A Raghunathan, S Ravi, D Wang
Proceedings of IEEE International Symposium on Secure Software Engineering …, 2006
892006
Smartphone dual defense protection framework: Detecting malicious applications in android markets
X Su, M Chuah, G Tan
2012 8th International Conference on Mobile Ad-hoc and Sensor Networks (MSN …, 2012
872012
One secure data integrity verification scheme for cloud storage
Y Fan, X Lin, G Tan, Y Zhang, W Dong, J Lei
Future Generation Computer Systems 96, 376-385, 2019
832019
Ptrsplit: Supporting general pointers in automatic program partitioning
S Liu, G Tan, T Jaeger
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
832017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20