Modular control-flow integrity B Niu, G Tan Proceedings of the 35th ACM SIGPLAN Conference on Programming Language …, 2014 | 201 | 2014 |
RockSalt: better, faster, stronger SFI for the x86 G Morrisett, G Tan, J Tassarotti, JB Tristan, E Gan Proceedings of the 33rd ACM SIGPLAN conference on Programming Language …, 2012 | 151 | 2012 |
Per-input control-flow integrity B Niu, G Tan Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 145 | 2015 |
RockJIT: Securing just-in-time compilation using modular control-flow integrity B Niu, G Tan Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 112 | 2014 |
Combining control-flow integrity and static analysis for efficient and validated data sandboxing B Zeng, G Tan, G Morrisett Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 108 | 2011 |
Nativeguard: Protecting android applications from third-party native libraries M Sun, G Tan Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014 | 107 | 2014 |
Dynamic Typing with Dependent Types Y Mandelbaum, X Ou, G Tan, D Walker IFIP Advances in Information and Communication Technology (AICT) 155 (155 …, 2011 | 105* | 2011 |
Sensitive information tracking in commodity IoT ZB Celik, L Babun, AK Sikder, H Aksu, G Tan, P McDaniel, AS Uluagac 27th {USENIX} Security Symposium ({USENIX} Security 18), 1687-1704, 2018 | 104 | 2018 |
Soteria: Automated iot safety and security analysis ZB Celik, P McDaniel, G Tan 2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18), 147-158, 2018 | 94 | 2018 |
Methods for enforcing control flow of a computer program G Tan, B Niu US Patent 9,361,102, 2016 | 82 | 2016 |
Monitor integrity protection with space efficiency and separate compilation B Niu, G Tan Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 78 | 2013 |
An Empirical Security Study of the Native Code in the JDK. G Tan, J Croft Usenix Security Symposium, 365-378, 2008 | 72 | 2008 |
Smartphone dual defense protection framework: Detecting malicious applications in android markets X Su, M Chuah, G Tan 2012 8th International Conference on Mobile Ad-hoc and Sensor Networks (MSN …, 2012 | 71 | 2012 |
Safe Java native interface G Tan, AW Appel, S Chakradhar, A Raghunathan, S Ravi, D Wang Proceedings of IEEE International Symposium on Secure Software Engineering …, 2006 | 70 | 2006 |
Robusta: Taming the native beast of the JVM J Siefers, G Tan, G Morrisett Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 66 | 2010 |
IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT. ZB Celik, G Tan, PD McDaniel NDSS, 2019 | 65 | 2019 |
Detection and classification of different botnet C&C channels G Fedynyshyn, MC Chuah, G Tan International Conference on Autonomic and Trusted Computing, 228-242, 2011 | 62 | 2011 |
A compositional logic for control flow G Tan, AW Appel International Workshop on Verification, Model Checking, and Abstract …, 2006 | 59 | 2006 |
Program analysis of commodity iot applications for security and privacy: Challenges and opportunities ZB Celik, E Fernandes, E Pauley, G Tan, P McDaniel ACM Computing Surveys (CSUR) 52 (4), 1-30, 2019 | 57 | 2019 |
Strato: A retargetable framework for low-level inlined-reference monitors B Zeng, G Tan, Ś Erlingsson 22nd {USENIX} Security Symposium ({USENIX} Security 13), 369-382, 2013 | 50 | 2013 |