Παρακολούθηση
Jun Wang
Jun Wang
Palo Alto Networks, Inc.
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα paloaltonetworks.com
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
{TaintPipe}: Pipelined symbolic taint analysis
J Ming, D Wu, G Xiao, J Wang, P Liu
24th USENIX Security Symposium (USENIX Security 15), 65-80, 2015
1032015
Straighttaint: Decoupled offline symbolic taint analysis
J Ming, D Wu, J Wang, G Xiao, P Liu
Proceedings of the 31st IEEE/ACM International Conference on Automated …, 2016
552016
Risk assessment of buffer" Heartbleed" over-read vulnerabilities
J Wang, M Zhao, Q Zeng, D Wu, P Liu
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
372015
Between mutual trust and mutual distrust: Practical fine-grained privilege separation in multithreaded applications
J Wang, X Xiong, P Liu
2015 USENIX Annual Technical Conference (USENIX ATC 15), 361-373, 2015
332015
Unsupervised clustering for identification of malicious domain campaigns
M Weber, J Wang, Y Zhou
Proceedings of the First Workshop on Radical and Experiential Security, 33-39, 2018
132018
Program-object level data flow analysis with applications to data leakage and contamination forensics
G Xiao, J Wang, P Liu, J Ming, D Wu
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
82016
Detecting malicious campaigns in obfuscated JavaScript with scalable behavioral analysis
O Starov, Y Zhou, J Wang
2019 IEEE Security and Privacy Workshops (SPW), 218-223, 2019
72019
Discover and tame long-running idling processes in enterprise systems
J Wang, Z Qian, Z Li, Z Wu, J Rhee, X Ning, P Liu, G Jiang
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
42015
固体粗糙界面与超声的非线性相互作用研究
肖齐, 王珺, 郭霞生, 章东
物理学报 62 (9), 094301, 2013
22013
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–9