Jun Wang
Jun Wang
Palo Alto Networks, Inc.
Verified email at paloaltonetworks.com
Title
Cited by
Cited by
Year
Taintpipe: Pipelined symbolic taint analysis
J Ming, D Wu, G Xiao, J Wang, P Liu
24th {USENIX} Security Symposium ({USENIX} Security 15), 65-80, 2015
592015
Straighttaint: Decoupled offline symbolic taint analysis
J Ming, D Wu, J Wang, G Xiao, P Liu
2016 31st IEEE/ACM International Conference on Automated Software …, 2016
392016
Risk assessment of buffer" Heartbleed" over-read vulnerabilities
J Wang, M Zhao, Q Zeng, D Wu, P Liu
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
232015
Between mutual trust and mutual distrust: Practical fine-grained privilege separation in multithreaded applications
J Wang, X Xiong, P Liu
2015 {USENIX} Annual Technical Conference ({USENIX}{ATC} 15), 361-373, 2015
202015
Unsupervised clustering for identification of malicious domain campaigns
M Weber, J Wang, Y Zhou
Proceedings of the First Workshop on Radical and Experiential Security, 33-39, 2018
92018
Program-object level data flow analysis with applications to data leakage and contamination forensics
G Xiao, J Wang, P Liu, J Ming, D Wu
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
82016
Detecting Malicious Campaigns in Obfuscated JavaScript with Scalable Behavioral Analysis
O Starov, Y Zhou, J Wang
2019 IEEE Security and Privacy Workshops (SPW), 218-223, 2019
42019
Discover and tame long-running idling processes in enterprise systems
J Wang, Z Qian, Z Li, Z Wu, J Rhee, X Ning, P Liu, G Jiang
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
42015
固体粗糙界面与超声的非线性相互作用研究
肖齐, 王珺, 郭霞生, 章东
物理学报 62 (9), 094301, 2013
22013
The system can't perform the operation now. Try again later.
Articles 1–9