Tao Wei
Tao Wei
Vice President, Ant Financial
Geverifieerd e-mailadres voor antfin.com - Homepage
Geciteerd door
Geciteerd door
SoK: Eternal War In Memory
L Szekeres, M Payer, T Wei, D Song
The 34th IEEE Symposium on Security & Privacy (Oakland), 2013
Practical Control Flow Integrity & Randomization for Binary Executables
C Zhang, T Wei, Z Chen, L Duan, S McCamant, L Szekeres, D Song, ...
The 34th IEEE Symposium on Security & Privacy (Oakland), 2013
TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection
T Wang, T Wei, G Gu, W Zou
2010 IEEE Symposium on Security and Privacy, 497-512, 2010
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
T Wang, T Wei, Z Lin, W Zou
NDSS, 2009
Taintart: A practical multi-level information-flow tracking system for android runtime
M Sun, T Wei, JCS Lui
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Towards discovering and understanding task hijacking in android
C Ren, Y Zhang, H Xue, T Wei, P Liu
24th {USENIX} Security Symposium ({USENIX} Security 15), 945-959, 2015
A new algorithm for identifying loops in decompilation
T Wei, J Mao, W Zou, Y Chen
International Static Analysis Symposium, 170-183, 2007
Phishing-alarm: robust and efficient phishing detection via page component similarity
J Mao, W Tian, P Li, T Wei, Z Liang
IEEE Access 5, 17020-17030, 2017
BaitAlarm: detecting phishing sites using similarity in fundamental visual features
J Mao, P Li, K Li, T Wei, Z Liang
2013 5th International Conference on Intelligent Networking and …, 2013
IntPatch: Automatically fix integer-overflow-to-buffer-overflow vulnerability at compile-time
C Zhang, T Wang, T Wei, Y Chen, W Zou
European Symposium on Research in Computer Security, 71-86, 2010
Heap taichi: exploiting memory allocation granularity in heap-spraying attacks
Y Ding, T Wei, TL Wang, Z Liang, W Zou
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
Checksum-aware fuzzing combined with dynamic taint analysis and symbolic execution
T Wang, T Wei, G Gu, W Zou
ACM Transactions on Information and System Security (TISSEC) 14 (2), 1-28, 2011
Adaptive Android Kernel Live Patching
Y Chen, Y Zhang, Z Wang, L Xia, C Bao, T Wei
Usenix Security, 2017
Drawbridge: software-defined ddos-resistant traffic engineering
J Li, S Berg, M Zhang, P Reiher, T Wei
ACM SIGCOMM Computer Communication Review 44 (4), 591-592, 2014
Fingerprints on mobile devices: Abusing and leaking
Y Zhang, Z Chen, H Xue, T Wei
Black Hat Conference, 2015
Downgrade attack on trustzone
Y Chen, Y Zhang, Z Wang, T Wei
arXiv preprint arXiv:1707.05082, 2017
Secure dynamic code generation against spraying
T Wei, T Wang, L Duan, J Luo
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Towards memory safe enclave programming with rust-sgx
H Wang, P Wang, Y Ding, M Sun, Y Jing, R Duan, L Li, Y Zhang, T Wei, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
INSeRT: Protect dynamic code generation against spraying
T Wei, T Wang, L Duan, J Luo
International Conference on Information Science and Technology, 323-328, 2011
SAVIOR: Towards Bug-Driven Hybrid Testing
LL Yaohui Chen, Peng Li, Jun Xu, Shengjian Guo, Rundong Zhou, Yulong Zhang ...
IEEE Symposium on Security and Privacy 2020, 2020
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20