Gang Tan

Orcid: 0000-0001-6109-6091

According to our database1, Gang Tan authored at least 132 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ValidCNN: A Large-Scale CNN Predictive Integrity Verification Scheme Based on zk-SNARK.
IEEE Trans. Dependable Secur. Comput., 2024

psvCNN: A Zero-Knowledge CNN Prediction Integrity Verification Strategy.
IEEE Trans. Cloud Comput., 2024

V-Star: Learning Visibly Pushdown Grammars from Program Inputs.
Proc. ACM Program. Lang., 2024

Comprehensive Memory Safety Validation: An Alternative Approach to Memory Safety.
IEEE Secur. Priv., 2024

FairLay-ML: Intuitive Debugging of Fairness in Data-Driven Social-Critical Software.
CoRR, 2024

Scaling Automatic Extraction of Pseudocode.
CoRR, 2024

ORANalyst: Systematic Testing Framework for Open RAN Implementations.
Proceedings of the 33rd USENIX Security Symposium, 2024

Veiled Pathways: Investigating Covert and Side Channels Within GPU Uncore.
Proceedings of the 57th IEEE/ACM International Symposium on Microarchitecture, 2024

NeuFair: Neural Network Fairness Repair with Dropout.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Causal Graph Fuzzing for Fair ML Sofware Development.
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings, 2024

Top of the Heap: Efficient Memory Error Protection of Safe Heap Objects.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Quantifying and Mitigating Cache Side Channel Leakage with Differential Set.
Proc. ACM Program. Lang., October, 2023

ABSLearn: a GNN-based framework for aliasing and buffer-size information retrieval.
Pattern Anal. Appl., August, 2023

CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis.
IET Inf. Secur., July, 2023

μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code.
IEEE Trans. Dependable Secur. Comput., 2023

Interval Parsing Grammars for File Format Parsing.
Proc. ACM Program. Lang., 2023

Top of the Heap: Efficient Memory Error Protection for Many Heap Objects.
CoRR, 2023

FairLay-ML: Intuitive Remedies for Unfairness in Data-Driven Social-Critical Algorithms.
CoRR, 2023

LibScan: Towards More Precise Third-Party Library Identification for Android Applications.
Proceedings of the 32nd USENIX Security Symposium, 2023

DISV: Domain Independent Semantic Validation of Data Files.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

Hardware Support for Constant-Time Programming.
Proceedings of the 56th Annual IEEE/ACM International Symposium on Microarchitecture, 2023

Information-Theoretic Testing and Debugging of Fairness Defects in Deep Neural Networks.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Evolving Operating System Kernels Towards Secure Kernel-Driver Interfaces.
Proceedings of the 19th Workshop on Hot Topics in Operating Systems, 2023

2022
IoTRepair: Flexible Fault Handling in Diverse IoT Deployments.
ACM Trans. Internet Things, 2022

Artifact Suppression for the Joint Imaging of Primaries and Internal Multiples.
IEEE Trans. Geosci. Remote. Sens., 2022

TraceChain: A blockchain-based scheme to protect data confidentiality and traceability.
Softw. Pract. Exp., 2022

Mitigating Vulnerabilities in Closed Source Software.
EAI Endorsed Trans. Security Safety, 2022

Building a Privacy-Preserving Smart Camera System.
Proc. Priv. Enhancing Technol., 2022

Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices.
CoRR, 2022

Certified Parsing of Dependent Regular Grammars.
Proceedings of the 43rd IEEE Security and Privacy, 2022

KSplit: Automating Device Driver Isolation.
Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation, 2022

The Taming of the Stack: Isolating Stack Data from Memory Errors.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

ROS-SF: A Transparent and Efficient ROS Middleware using Serialization-Free Message.
Proceedings of the Middleware '22: 23rd International Middleware Conference, Quebec, QC, Canada, November 7, 2022

Impulsive Noise Suppression and Concatenated Code for OFDM Underwater Acoustic Communications.
Proceedings of the IEEE International Conference on Signal Processing, 2022

Fairness-aware Configuration of Machine Learning Libraries.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Performant Binary Fuzzing without Source Code using Static Instrumentation.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

BinPointer: towards precise, sound, and scalable binary-level pointer analysis.
Proceedings of the CC '22: 31st ACM SIGPLAN International Conference on Compiler Construction, Seoul, South Korea, April 2, 2022

2021
SPX64: A Scratchpad Memory for General-purpose Microprocessors.
ACM Trans. Archit. Code Optim., 2021

A derivative-based parser generator for visibly Pushdown grammars.
Proc. ACM Program. Lang., 2021

SpecSafe: detecting cache side channels in a speculative world.
Proc. ACM Program. Lang., 2021

PPMCK: Privacy-preserving multi-party computing for K-means clustering.
J. Parallel Distributed Comput., 2021

CryptoEval: Evaluating the Risk of Cryptographic Misuses in Android Apps with Data-Flow Analysis.
CoRR, 2021

MazeRunner: Evaluating the Attack Surface of Control-Flow Integrity Policies.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Bohemia - A Validator for Parser Frameworks.
Proceedings of the IEEE Security and Privacy Workshops, 2021

iTOP: Automating Counterfeit Object-Oriented Programming Attacks.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow Tracking.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Refining Indirect Call Targets at the Binary Level.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Fine-grained Program Partitioning for Security.
Proceedings of the EuroSec '21: Proceedings of the 14th European Workshop on Systems Security, 2021

Ghost Thread: Effective User-Space Cache Side Channel Protection.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

ReCFA: Resilient Control-Flow Attestation.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Using Safety Properties to Generate Vulnerability Patches.
login Usenix Mag., 2020

Detection of Repackaged Android Malware with Code-Heterogeneity Features.
IEEE Trans. Dependable Secur. Comput., 2020

SNPL: One Scheme of Securing Nodes in IoT Perception Layer.
Sensors, 2020

Artificial intelligence manages congenital cataract with individualized prediction and telehealth computing.
npj Digit. Medicine, 2020

Privacy preserving based logistic regression on big data.
J. Netw. Comput. Appl., 2020

Fine-grained access control based on Trusted Execution Environment.
Future Gener. Comput. Syst., 2020

IoTRepair: Systematically Addressing Device Faults in Commodity IoT (Extended Paper).
CoRR, 2020

Prioritizing data flows and sinks for app security transformation.
Comput. Secur., 2020

A fast modeling and optimization scheme for greenhouse environmental system using proper orthogonal decomposition and multi-objective genetic algorithm.
Comput. Electron. Agric., 2020

Lightweight kernel isolation with virtualization and VM functions.
Proceedings of the VEE '20: 16th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2020

IoTRepair: Systematically Addressing Device Faults in Commodity IoT.
Proceedings of the Fifth IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2020

Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Debugopt: Debugging fully optimized natively compiled programs using multistage instrumentation.
Sci. Comput. Program., 2019

IVT: an efficient method for sharing subtype polymorphic objects.
Proc. ACM Program. Lang., 2019

SmartShell: Automated Shell Scripts Synthesis from Natural Language.
Int. J. Softw. Eng. Knowl. Eng., 2019

CSCAC: one constant-size CPABE access control scheme in trusted execution environment.
Int. J. Comput. Sci. Eng., 2019

Verifying Internet of Things Safety and Security in Physical Spaces.
IEEE Secur. Priv., 2019

One secure data integrity verification scheme for cloud storage.
Future Gener. Comput. Syst., 2019

A secure privacy preserving deduplication scheme for cloud computing.
Future Gener. Comput. Syst., 2019

Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities.
ACM Comput. Surv., 2019

Measuring Attack Surface Reduction in the Presence of Code (Re-)Randomization.
CoRR, 2019

CaSym: Cache Aware Symbolic Execution for Side Channel Detection and Mitigation.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

An Improved Apriori Algorithm Research in Massive Data Environment.
Proceedings of the Cyber Security Intelligence and Analytics, 2019

Towards Secure and Reliable IoT Applications.
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019

Program-mandering: Quantitative Privilege Separation.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Analyzing control flow integrity with LLVM-CFI.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Bidirectional Grammars for Machine-Code Decoding and Encoding.
J. Autom. Reason., 2018

Sensitive Information Tracking in Commodity IoT.
Proceedings of the 27th USENIX Security Symposium, 2018

Soteria: Automated IoT Safety and Security Analysis.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

One Secure Access Scheme Based on Trusted Execution Environment.
Proceedings of the 17th IEEE International Conference On Trust, 2018

τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

From Debugging-Information Based Binary-Level Type Inference to CFG Generation.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Protecting dynamic code.
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018

2017
Study on Climate and Grassland Fire in HulunBuir, Inner Mongolia Autonomous Region, China.
Sensors, 2017

The Influence of Land Use on the Grassland Fire Occurrence in the Northeastern Inner Mongolia Autonomous Region, China.
Sensors, 2017

Principles and Implementation Techniques of Software-Based Fault Isolation.
Found. Trends Priv. Secur., 2017

ReDroid: Prioritizing Data Flows and Sinks for App Security Transformation.
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017

CFG Construction Soundness in Control-Flow Integrity.
Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, 2017

PtrSplit: Supporting General Pointers in Automatic Program Partitioning.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Analysis of Code Heterogeneity for High-Precision Classification of Repackaged Malware.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Maintaining Authorization Hook Placements Across Program Versions.
Proceedings of the IEEE Cybersecurity Development, 2016

Languages Must Expose Memory Heterogeneity.
Proceedings of the Second International Symposium on Memory Systems, 2016

2015
JNI light: an operational model for the core JNI.
Math. Struct. Comput. Sci., 2015

WebC: toward a portable framework for deploying legacy code in web browsers.
Sci. China Inf. Sci., 2015

Producing Hook Placements to Enforce Expected Access Control Policies.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

Per-Input Control-Flow Integrity.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Exception analysis in the Java Native Interface.
Sci. Comput. Program., 2014

NativeGuard: protecting android applications from third-party native libraries.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Modular control-flow integrity.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014

Finding Reference-Counting Errors in Python/C Programs with Affine Analysis.
Proceedings of the ECOOP 2014 - Object-Oriented Programming - 28th European Conference, Uppsala, Sweden, July 28, 2014

RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Bringing java's wild native world under control.
ACM Trans. Inf. Syst. Secur., 2013

Strato: A Retargetable Framework for Low-Level Inlined-Reference Monitors.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Monitor integrity protection with space efficiency and separate compilation.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Efficient user-space information flow control.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
RockSalt: better, faster, stronger SFI for the x86.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2012

Smartphone Dual Defense Protection Framework: Detecting Malicious Applications in Android Markets.
Proceedings of the 8th International Conference on Mobile Ad-hoc and Sensor Networks, 2012

JVM-Portable Sandboxing of Java's Native Libraries.
Proceedings of the Computer Security - ESORICS 2012, 2012

JATO: Native Code Atomicity for Java.
Proceedings of the Programming Languages and Systems - 10th Asian Symposium, 2012

2011
Markup SVG - An Online Content-Aware Image Abstraction and Annotation Tool.
IEEE Trans. Multim., 2011

FDTL: a unified flash memory and hard disk translation layer.
IEEE Trans. Consumer Electron., 2011

Weak Updates and Separation Logic.
New Gener. Comput., 2011

JET: exception checking in the Java native interface.
Proceedings of the 26th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2011

Combining control-flow integrity and static analysis for efficient and validated data sandboxing.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Poster: uPro: a compartmentalization tool supporting fine-grained and flexible security configuration.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Detection and Classification of Different Botnet C&C Channels.
Proceedings of the Autonomic and Trusted Computing - 8th International Conference, 2011

2010
Semantic foundations for typed assembly languages.
ACM Trans. Program. Lang. Syst., 2010

Robusta: taming the native beast of the JVM.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
The New Jersey Voting-machine Lawsuit and the AVC Advantage DRE Voting Machine.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009

Document Analysis Support for the Manual Auditing of Elections.
Proceedings of the 10th International Conference on Document Analysis and Recognition, 2009

Finding bugs in exceptional situations of JNI programs.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
An Empirical Security Study of the Native Code in the JDK.
Proceedings of the 17th USENIX Security Symposium, 2008

2007
Ilea: inter-language analysis across java and c.
Proceedings of the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2007

2006
A Compositional Logic for Control Flow.
Proceedings of the Verification, 2006

Safe Java Native Interface.
Proceedings of the 2006 IEEE International Symposium on Secure Software Engineering, 2006

Delayed and Controlled Failures in Tamper-Resistant Software.
Proceedings of the Information Hiding, 8th International Workshop, 2006

2004
Construction of a Semantic Model for a Typed Assembly Language.
Proceedings of the Verification, 2004

EEG Source Localization Using Independent Residual Analysis.
Proceedings of the Advances in Neural Networks, 2004

Dynamic Typing with Dependent Types.
Proceedings of the Exploring New Frontiers of Theoretical Informatics, 2004

2002
Braille to print translations for Chinese.
Inf. Softw. Technol., 2002


  Loading...