SoK: Eternal War In Memory L Szekeres, M Payer, T Wei, D Song The 34th IEEE Symposium on Security & Privacy (Oakland), 2013 | 1024 | 2013 |
Practical Control Flow Integrity & Randomization for Binary Executables C Zhang, T Wei, Z Chen, L Duan, S McCamant, L Szekeres, D Song, ... The 34th IEEE Symposium on Security & Privacy (Oakland), 2013 | 714 | 2013 |
TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection T Wang, T Wei, G Gu, W Zou 2010 IEEE Symposium on Security and Privacy, 497-512, 2010 | 541 | 2010 |
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution. T Wang, T Wei, Z Lin, W Zou NDSS, 1-14, 2009 | 270 | 2009 |
Taintart: A practical multi-level information-flow tracking system for android runtime M Sun, T Wei, JCS Lui Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 214 | 2016 |
SAVIOR: Towards Bug-Driven Hybrid Testing LL Yaohui Chen, Peng Li, Jun Xu, Shengjian Guo, Rundong Zhou, Yulong Zhang ... IEEE Symposium on Security and Privacy 2020, 2020 | 170* | 2020 |
Phishing-alarm: Robust and efficient phishing detection via page component similarity J Mao, W Tian, P Li, T Wei, Z Liang IEEE Access 5, 17020-17030, 2017 | 106 | 2017 |
Fooling detection alone is not enough: Adversarial attack against multiple object tracking Y Jia, Y Lu, J Shen, QA Chen, H Chen, Z Zhong, T Wei International Conference on Learning Representations (ICLR'20), 2020 | 101 | 2020 |
Towards memory safe enclave programming with rust-sgx H Wang, P Wang, Y Ding, M Sun, Y Jing, R Duan, L Li, Y Zhang, T Wei, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 94 | 2019 |
A new algorithm for identifying loops in decompilation T Wei, J Mao, W Zou, Y Chen International Static Analysis Symposium, 170-183, 2007 | 93 | 2007 |
BaitAlarm: detecting phishing sites using similarity in fundamental visual features J Mao, P Li, K Li, T Wei, Z Liang 2013 5th international conference on intelligent networking and …, 2013 | 79 | 2013 |
Phishing page detection via learning classifiers from page layout feature J Mao, J Bian, W Tian, S Zhu, T Wei, A Li, Z Liang EURASIP Journal on Wireless Communications and Networking 2019, 1-14, 2019 | 74 | 2019 |
Adaptive Android Kernel Live Patching Y Chen, Y Zhang, Z Wang, L Xia, C Bao, T Wei Usenix Security, 2017 | 73 | 2017 |
IntPatch: Automatically fix integer-overflow-to-buffer-overflow vulnerability at compile-time C Zhang, T Wang, T Wei, Y Chen, W Zou Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010 | 72 | 2010 |
Fingerprints on mobile devices: Abusing and leaking Y Zhang, Z Chen, H Xue, T Wei Black Hat Conference, 2015 | 63 | 2015 |
Heap taichi: exploiting memory allocation granularity in heap-spraying attacks Y Ding, T Wei, TL Wang, Z Liang, W Zou Proceedings of the 26th Annual Computer Security Applications Conference …, 2010 | 63 | 2010 |
Detecting phishing websites via aggregation analysis of page layouts J Mao, J Bian, W Tian, S Zhu, T Wei, A Li, Z Liang Procedia Computer Science 129, 224-230, 2018 | 62 | 2018 |
Checksum-aware fuzzing combined with dynamic taint analysis and symbolic execution T Wang, T Wei, G Gu, W Zou ACM Transactions on Information and System Security (TISSEC) 14 (2), 1-28, 2011 | 62 | 2011 |
COIN attacks: On insecurity of enclave untrusted interfaces in SGX MR Khandaker, Y Cheng, Z Wang, T Wei Proceedings of the Twenty-Fifth International Conference on Architectural …, 2020 | 61 | 2020 |
Downgrade attack on trustzone Y Chen, Y Zhang, Z Wang, T Wei arXiv preprint arXiv:1707.05082, 2017 | 61 | 2017 |