Follow
Gang Tan
Gang Tan
Professor of computer science and engineering, Penn State University
Verified email at cse.psu.edu - Homepage
Title
Cited by
Cited by
Year
Soteria: Automated {IoT} safety and security analysis
ZB Celik, P McDaniel, G Tan
2018 USENIX annual technical conference (USENIX ATC 18), 147-158, 2018
3352018
Modular control-flow integrity
B Niu, G Tan
Proceedings of the 35th ACM SIGPLAN Conference on Programming Language …, 2014
3262014
Iotguard: Dynamic enforcement of security and safety policy in commodity IoT.
ZB Celik, G Tan, PD McDaniel
NDSS, 2019
3042019
Sensitive information tracking in commodity {IoT}
ZB Celik, L Babun, AK Sikder, H Aksu, G Tan, P McDaniel, AS Uluagac
27th USENIX Security Symposium (USENIX Security 18), 1687-1704, 2018
2972018
Per-input control-flow integrity
B Niu, G Tan
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
2432015
RockSalt: better, faster, stronger SFI for the x86
G Morrisett, G Tan, J Tassarotti, JB Tristan, E Gan
Proceedings of the 33rd ACM SIGPLAN conference on Programming Language …, 2012
2092012
Methods for enforcing control flow of a computer program
G Tan, B Niu
US Patent 9,361,102, 2016
1922016
RockJIT: Securing just-in-time compilation using modular control-flow integrity
B Niu, G Tan
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1732014
Program analysis of commodity IoT applications for security and privacy: Challenges and opportunities
ZB Celik, E Fernandes, E Pauley, G Tan, P McDaniel
ACM Computing Surveys (CSUR) 52 (4), 1-30, 2019
1642019
Nativeguard: Protecting android applications from third-party native libraries
M Sun, G Tan
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
1632014
Combining control-flow integrity and static analysis for efficient and validated data sandboxing
B Zeng, G Tan, G Morrisett
Proceedings of the 18th ACM conference on Computer and Communications …, 2011
1402011
Dynamic Typing with Dependent Types
Y Mandelbaum, X Ou, G Tan, D Walker
IFIP Advances in Information and Communication Technology (AICT) 155 (155 …, 2011
136*2011
An Empirical Security Study of the Native Code in the JDK.
G Tan, J Croft
Usenix Security Symposium, 365-378, 2008
1052008
CaSym: Cache aware symbolic execution for side channel detection and mitigation
R Brotzman, S Liu, D Zhang, G Tan, M Kandemir
2019 IEEE Symposium on Security and Privacy (SP), 505-521, 2019
992019
Monitor integrity protection with space efficiency and separate compilation
B Niu, G Tan
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
972013
Ptrsplit: Supporting general pointers in automatic program partitioning
S Liu, G Tan, T Jaeger
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
942017
Detection of repackaged android malware with code-heterogeneity features
K Tian, D Yao, BG Ryder, G Tan, G Peng
IEEE Transactions on Dependable and Secure Computing 17 (1), 64-77, 2017
942017
Using safety properties to generate vulnerability patches
Z Huang, D Lie, G Tan, T Jaeger
2019 IEEE symposium on security and privacy (SP), 539-554, 2019
932019
Safe Java Native Interface.
G Tan, AW Appel, S Chakradhar, A Raghunathan, S Ravi, DC Wang
ISSSE, 2006
922006
Smartphone dual defense protection framework: Detecting malicious applications in android markets
X Su, M Chuah, G Tan
2012 8th International Conference on Mobile Ad-hoc and Sensor Networks (MSN …, 2012
892012
The system can't perform the operation now. Try again later.
Articles 1–20