Gang Tan, PhD, PE

    • 615 Citations
    • 16 h-Index
    20002019
    If you made any changes in Pure, your changes will be visible here soon.

    Fingerprint Fingerprint is based on mining the text of the experts' scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

    • 8 Similar Profiles
    Flow control Engineering & Materials Science
    Flow graphs Engineering & Materials Science
    Static analysis Engineering & Materials Science
    Java Mathematics
    Semantics Engineering & Materials Science
    Application programs Engineering & Materials Science
    Specifications Engineering & Materials Science
    DSL Engineering & Materials Science

    Network Recent external collaboration on country level. Dive into details by clicking on the dots.

    Research Output 2000 2019

    • 615 Citations
    • 16 h-Index
    • 38 Conference contribution
    • 18 Article

    Debugopt: Debugging fully optimized natively compiled programs using multistage instrumentation

    Yin, J., Tan, G., Li, H., Bai, X., Wang, Y. P. & Hu, S. M., Jan 1 2019, In : Science of Computer Programming. 169, p. 18-32 15 p.

    Research output: Contribution to journalArticle

    Bidirectional Grammars for Machine-Code Decoding and Encoding

    Tan, G. & Morrisett, G., Mar 1 2018, In : Journal of Automated Reasoning. 60, 3, p. 257-277 21 p.

    Research output: Contribution to journalArticle

    DSL
    Decoding
    Specifications
    1 Citations

    Fine-grained access control based on Trusted Execution Environment

    Fan, Y., Liu, S., Tan, G. & Qiao, F., Jan 1 2018, (Accepted/In press) In : Future Generation Computer Systems.

    Research output: Contribution to journalArticle

    Access control
    Application programs
    Cryptography
    Mobile devices

    From debugging-information based binary-level type inference to CFG generation

    Zeng, D. & Tan, G., Mar 13 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, Vol. 2018-January. p. 366-376 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Flow graphs
    Inference engines
    Relocation
    Level control
    Flow control

    One Secure Access Scheme Based on Trusted Execution Environment

    Fan, Y., Liu, S., Tan, G., Lin, X., Zhao, G. & Bai, J., Sep 5 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. Institute of Electrical and Electronics Engineers Inc., p. 16-21 6 p. 8455881

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cloud computing
    Mobile devices
    Leakage