Tielei Wang
According to our database1,
Tielei Wang
authored at least 18 papers
between 2009 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications.
Proceedings of the 29th USENIX Security Symposium, 2020
2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
2011
ACM Trans. Inf. Syst. Secur., 2011
Using type analysis in compiler to mitigate integer-overflow-to-buffer-overflow threat.
J. Comput. Secur., 2011
2010
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time.
Proceedings of the Computer Security, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
Proceedings of the Network and Distributed System Security Symposium, 2009