What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Gang Tan
Google Scholar
ORCID:
0000-0001-6109-6091
42
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
C2VPG: Translating Practical Context-Free Grammars into Visibly Pushdown Grammars by Order-Based Tagging.
Xiaodong Jia
Gang Tan
2025
conf/sp
SoK: Challenges and Paths Toward Memory Safety for eBPF.
Kaiming Huang
Mathias Payer
Zhiyun Qian
Jack Sampson
Gang Tan
Trent Jaeger
2024
conf/ccs
Top of the Heap: Efficient Memory Error Protection of Safe Heap Objects.
Kaiming Huang
Mathias Payer
Zhiyun Qian
Jack Sampson
Gang Tan
Trent Jaeger
2024
conf/uss
ORANalyst: Systematic Testing Framework for Open RAN Implementations.
Tianchang Yang
Syed Md. Mukit Rashid
Ali Ranjbar
Gang Tan
Syed Rafiul Hussain
2024
conf/acsac
VIMU: Effective Physics-based Realtime Detection and Recovery against Stealthy Attacks on UAVs.
Yunbo Wang
Cong Sun
Qiaosen Liu
Bingnan Su
Zongxu Zhang
Michael Norris
Gang Tan
Jianfeng Ma
2023
conf/uss
LibScan: Towards More Precise Third-Party Library Identification for Android Applications.
Yafei Wu
Cong Sun
Dongrui Zeng
Gang Tan
Siqi Ma
Peicheng Wang
2023
conf/sp
DISV: Domain Independent Semantic Validation of Data Files.
Ashish Kumar
Bill Harris
Gang Tan
2022
journals/popets
Building a Privacy-Preserving Smart Camera System.
Yohan Beugin
Quinn Burke
Blaine Hoak
Ryan Sheatsley
Eric Pauley
Gang Tan
Syed Rafiul Hussain
Patrick D. McDaniel
2022
conf/sp
Certified Parsing of Dependent Regular Grammars.
John Sarracino
Gang Tan
Greg Morrisett
2022
conf/cns
Performant Binary Fuzzing without Source Code using Static Instrumentation.
Eric Pauley
Gang Tan
Danfeng Zhang
Patrick D. McDaniel
2022
conf/ndss
The Taming of the Stack: Isolating Stack Data from Memory Errors.
Kaiming Huang
Yongzhe Huang
Mathias Payer
Zhiyun Qian
Jack Sampson
Gang Tan
Trent Jaeger
2021
conf/sp
Bohemia - A Validator for Parser Frameworks.
Anish Paranjpe
Gang Tan
2021
conf/ndss
Refining Indirect Call Targets at the Binary Level.
Sun Hyoung Kim
Cong Sun
Dongrui Zeng
Gang Tan
2021
conf/acsac
ReCFA: Resilient Control-Flow Attestation.
Yumei Zhang
Xinzhi Liu
Cong Sun
Dongrui Zeng
Gang Tan
Xiao Kan
Siqi Ma
2020
journals/compsec
Prioritizing data flows and sinks for app security transformation.
Ke Tian
Gang Tan
Barbara G. Ryder
Danfeng (Daphne) Yao
2020
conf/ccs
Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP.
Salman Ahmed
Ya Xiao
Kevin Z. Snow
Gang Tan
Fabian Monrose
Danfeng (Daphne) Yao
2020
conf/acsac
ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings.
Paul Muntean
Matthias Neumayer
Zhiqiang Lin
Gang Tan
Jens Grossklags
Claudia Eckert
2019
conf/ccs
Program-mandering: Quantitative Privilege Separation.
Shen Liu
Dongrui Zeng
Yongzhe Huang
Frank Capobianco
Stephen McCamant
Trent Jaeger
Gang Tan
2019
conf/ccs
Towards Secure and Reliable IoT Applications.
Gang Tan
2019
conf/sp
Using Safety Properties to Generate Vulnerability Patches.
Zhen Huang
David Lie
Gang Tan
Trent Jaeger
2019
conf/sp
CaSym: Cache Aware Symbolic Execution for Side Channel Detection and Mitigation.
Robert Brotzman
Shen Liu
Danfeng Zhang
Gang Tan
Mahmut T. Kandemir
2019
conf/ndss
IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT.
Z. Berkay Celik
Gang Tan
Patrick D. McDaniel
2019
conf/acsac
Analyzing control flow integrity with LLVM-CFI.
Paul Muntean
Matthias Neumayer
Zhiqiang Lin
Gang Tan
Jens Grossklags
Claudia Eckert
2018
conf/uss
Sensitive Information Tracking in Commodity IoT.
Z. Berkay Celik
Leonardo Babun
Amit Kumar Sikder
Hidayet Aksu
Gang Tan
Patrick D. McDaniel
A. Selcuk Uluagac
2017
conf/ccs
ReDroid: Prioritizing Data Flows and Sinks for App Security Transformation.
Ke Tian
Gang Tan
Danfeng Daphne Yao
Barbara G. Ryder
2017
conf/ccs
CFG Construction Soundness in Control-Flow Integrity.
Gang Tan
Trent Jaeger
2017
conf/ccs
PtrSplit: Supporting General Pointers in Automatic Program Partitioning.
Shen Liu
Gang Tan
Trent Jaeger
2016
conf/sp
Analysis of Code Heterogeneity for High-Precision Classification of Repackaged Malware.
Ke Tian
Danfeng Yao
Barbara G. Ryder
Gang Tan
2015
conf/ccs
Per-Input Control-Flow Integrity.
Ben Niu
Gang Tan
2014
conf/ccs
RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity.
Ben Niu
Gang Tan
2014
conf/wisec
NativeGuard: protecting android applications from third-party native libraries.
Mengtao Sun
Gang Tan
2013
conf/ccs
Monitor integrity protection with space efficiency and separate compilation.
Ben Niu
Gang Tan
2013
conf/ccs
Efficient user-space information flow control.
Ben Niu
Gang Tan
2013
conf/uss
Strato: A Retargetable Framework for Low-Level Inlined-Reference Monitors.
Bin Zeng
Gang Tan
Úlfar Erlingsson
2012
conf/esorics
JVM-Portable Sandboxing of Java's Native Libraries.
Mengtao Sun
Gang Tan
2011
conf/ccs
Combining control-flow integrity and static analysis for efficient and validated data sandboxing.
Bin Zeng
Gang Tan
Greg Morrisett
2011
conf/ccs
Poster: uPro: a compartmentalization tool supporting fine-grained and flexible security configuration.
Ben Niu
Gang Tan
2010
conf/ccs
Robusta: taming the native beast of the JVM.
Joseph Siefers
Gang Tan
Greg Morrisett
2009
conf/ccs
Finding bugs in exceptional situations of JNI programs.
Siliang Li
Gang Tan
2009
conf/uss
The New Jersey Voting-machine Lawsuit and the AVC Advantage DRE Voting Machine.
Andrew W. Appel
Maia Ginsburg
Harri Hursti
Brian W. Kernighan
Christopher D. Richards
Gang Tan
Penny Venetis
2008
conf/uss
An Empirical Security Study of the Native Code in the JDK.
Gang Tan
Jason Croft
2006
conf/ih
Delayed and Controlled Failures in Tamper-Resistant Software.
Gang Tan
Yuqun Chen
Mariusz H. Jakubowski
Coauthors
A. Selcuk Uluagac
(1)
Ali Ranjbar
(1)
Amit Kumar Sikder
(1)
Andrew W. Appel
(1)
Anish Paranjpe
(1)
Ashish Kumar
(1)
Barbara G. Ryder
(3)
Ben Niu
(5)
Bill Harris
(1)
Bin Zeng
(2)
Bingnan Su
(1)
Blaine Hoak
(1)
Brian W. Kernighan
(1)
Christopher D. Richards
(1)
Claudia Eckert
(2)
Cong Sun
(4)
Danfeng (Daphne) Yao
(2)
Danfeng Daphne Yao
(1)
Danfeng Yao
(1)
Danfeng Zhang
(2)
David Lie
(1)
Dongrui Zeng
(4)
Eric Pauley
(2)
Fabian Monrose
(1)
Frank Capobianco
(1)
Gang Tan
(42)
Greg Morrisett
(3)
Harri Hursti
(1)
Hidayet Aksu
(1)
Jack Sampson
(3)
Jason Croft
(1)
Jens Grossklags
(2)
Jianfeng Ma
(1)
John Sarracino
(1)
Joseph Siefers
(1)
Kaiming Huang
(3)
Ke Tian
(3)
Kevin Z. Snow
(1)
Leonardo Babun
(1)
Mahmut T. Kandemir
(1)
Maia Ginsburg
(1)
Mariusz H. Jakubowski
(1)
Mathias Payer
(3)
Matthias Neumayer
(2)
Mengtao Sun
(2)
Michael Norris
(1)
Patrick D. McDaniel
(4)
Paul Muntean
(2)
Peicheng Wang
(1)
Penny Venetis
(1)
Qiaosen Liu
(1)
Quinn Burke
(1)
Robert Brotzman
(1)
Ryan Sheatsley
(1)
Salman Ahmed
(1)
Shen Liu
(3)
Siliang Li
(1)
Siqi Ma
(2)
Stephen McCamant
(1)
Sun Hyoung Kim
(1)
Syed Md. Mukit Rashid
(1)
Syed Rafiul Hussain
(2)
Tianchang Yang
(1)
Trent Jaeger
(7)
Úlfar Erlingsson
(1)
Xiao Kan
(1)
Xiaodong Jia
(1)
Xinzhi Liu
(1)
Ya Xiao
(1)
Yafei Wu
(1)
Yohan Beugin
(1)
Yongzhe Huang
(2)
Yumei Zhang
(1)
Yunbo Wang
(1)
Yuqun Chen
(1)
Z. Berkay Celik
(2)
Zhen Huang
(1)
Zhiqiang Lin
(2)
Zhiyun Qian
(3)
Zongxu Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to