Follow
Tielei Wang
Tielei Wang
Verified email at gatech.edu
Title
Cited by
Cited by
Year
TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection
T Wang, T Wei, G Gu, W Zou
2010 IEEE Symposium on Security and Privacy, 497-512, 2010
5592010
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
T Wang, T Wei, Z Lin, W Zou
NDSS, 2009
2762009
Preventing Use-after-free with Dangling Pointers Nullification.
B Lee, C Song, Y Jang, T Wang, T Kim, L Lu, W Lee
NDSS, 2015
2302015
Jekyll on {iOS}: When Benign Apps Become Evil
T Wang, K Lu, L Lu, S Chung, W Lee
22nd USENIX Security Symposium (USENIX Security 13), 559-572, 2013
1802013
A11y Attacks: Exploiting Accessibility in Operating Systems
Y Jang, C Song, SP Chung, T Wang, W Lee
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1122014
From zygote to morula: Fortifying weakened aslr on android
B Lee, L Lu, T Wang, T Kim, W Lee
2014 IEEE Symposium on Security and Privacy, 424-439, 2014
862014
IntPatch: Automatically fix integer-overflow-to-buffer-overflow vulnerability at compile-time
C Zhang, T Wang, T Wei, Y Chen, W Zou
European Symposium on Research in Computer Security, 71-86, 2010
722010
Exploiting and Protecting Dynamic Code Generation.
C Song, C Zhang, T Wang, W Lee, D Melski
NDSS, 2015
692015
Heap taichi: exploiting memory allocation granularity in heap-spraying attacks
Y Ding, T Wei, TL Wang, Z Liang, W Zou
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
652010
Checksum-aware fuzzing combined with dynamic taint analysis and symbolic execution
T Wang, T Wei, G Gu, W Zou
ACM Transactions on Information and System Security (TISSEC) 14 (2), 1-28, 2011
642011
Mactans: Injecting malware into iOS devices via malicious chargers
B Lau, Y Jang, C Song, T Wang, PH Chung, P Royal
Black Hat USA 92, 2013
612013
Secure dynamic code generation against spraying
T Wei, T Wang, L Duan, J Luo
Proceedings of the 17th ACM conference on Computer and communications …, 2010
422010
Behavior-based malware detection on mobile phone
S Dai, Y Liu, T Wang, T Wei, W Zou
2010 6th international conference on wireless communications networking and …, 2010
352010
INSeRT: Protect dynamic code generation against spraying
T Wei, T Wang, L Duan, J Luo
International Conference on Information Science and Technology, 323-328, 2011
342011
Diagnosis and emergency patch generation for integer overflow exploits
T Wang, C Song, W Lee
International Conference on Detection of Intrusions and Malware, and …, 2014
322014
{iOS}, Your {OS}, Everybody's {OS}: Vetting and Analyzing Network Services of {iOS} Applications
Z Tang, K Tang, M Xue, Y Tian, S Chen, M Ikram, T Wang, H Zhu
29th USENIX Security Symposium (USENIX Security 20), 2415-2432, 2020
302020
On the feasibility of large-scale infections of ios devices
T Wang, Y Jang, Y Chen, S Chung, B Lau, W Lee
23rd {USENIX} Security Symposium ({USENIX} Security 14), 79-93, 2014
242014
A framework to eliminate backdoors from response-computable authentication
S Dai, T Wei, C Zhang, T Wang, Y Ding, Z Liang, W Zou
2012 IEEE Symposium on Security and Privacy, 3-17, 2012
172012
Using type analysis in compiler to mitigate integer-overflow-to-buffer-overflow threat
C Zhang, W Zou, T Wang, Y Chen, T Wei
Journal of Computer Security 19 (6), 1083-1107, 2011
112011
Exploitations of Uninitialized Uses on macOS Sierra
Z Xu, G Liu, T Wang, H Xu
11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17), 2017
82017
The system can't perform the operation now. Try again later.
Articles 1–20