Gang Tan, PhD, PE

    • Source: Scopus
    • Calculated based on no. of publications stored in Pure and citations from Scopus
    20002020

    Research activity per year

    If you made any changes in Pure these will be visible here soon.
    Filter
    Conference contribution

    Search results

    • 2020

      IoTRepair: Systematically addressing device faults in commodity IoT

      Norris, M., Celik, B., Venkatesh, P., Zhao, S., McDaniel, P., Sivasubramaniam, A. & Tan, G., Apr 2020, Proceedings - 5th ACM/IEEE Conference on Internet of Things Design and Implementation, IoTDI 2020. Institute of Electrical and Electronics Engineers Inc., p. 142-148 7 p. 9097606. (Proceedings - 5th ACM/IEEE Conference on Internet of Things Design and Implementation, IoTDI 2020).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      1 Scopus citations
    • Lightweight kernel isolation with virtualization and VM functions

      Narayanan, V., Huang, Y., Tan, G., Jaeger, T. & Burtsev, A., Mar 17 2020, VEE 2020 - Proceedings of the 16th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments. Association for Computing Machinery, Inc, p. 157-171 15 p. (VEE 2020 - Proceedings of the 16th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
      2 Scopus citations
    • PFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings

      Muntean, P., Neumayer, M., Lin, Z., Tan, G., Grossklags, J. & Eckert, C., Dec 7 2020, Proceedings - 36th Annual Computer Security Applications Conference, ACSAC 2020. Association for Computing Machinery, p. 466-479 14 p. 3427246. (ACM International Conference Proceeding Series).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • SOTERIA: Automated IoT safety and security analysis

      Berkay Celik, Z., McDaniel, P. & Tan, G., Jan 1 2020, Proceedings of the 2018 USENIX Annual Technical Conference, USENIX ATC 2018. USENIX Association, p. 147-158 12 p. (Proceedings of the 2018 USENIX Annual Technical Conference, USENIX ATC 2018).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      50 Scopus citations
    • 2019

      Analyzing control flow integrity with LLVM-CFI

      Muntean, P., Neumayer, M., Lin, Z., Tan, G., Grossklags, J. & Eckert, C., Dec 9 2019, Proceedings - 35th Annual Computer Security Applications Conference, ACSAC 2019. Association for Computing Machinery, p. 584-597 14 p. (ACM International Conference Proceeding Series).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      1 Scopus citations
    • CaSym: Cache aware symbolic execution for side channel detection and mitigation

      Brotzman, R., Liu, S., Zhang, D., Tan, G. & Kandemir, M., May 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. Institute of Electrical and Electronics Engineers Inc., p. 505-521 17 p. 8835249. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2019-May).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      12 Scopus citations
    • Program-mandering: Quantitative privilege separation

      Liu, S., Zeng, D., McCamant, S., Huang, Y., Jaeger, T., Capobianco, F. & Tan, G., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1023-1040 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • Using safety properties to generate vulnerability patches

      Huang, Z., Lie, D., Tan, G. & Jaeger, T., May 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. Institute of Electrical and Electronics Engineers Inc., p. 539-554 16 p. 8835226. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2019-May).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      4 Scopus citations
    • 2018

      From debugging-information based binary-level type inference to CFG generation

      Zeng, D. & Tan, G., Mar 13 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 366-376 11 p. (CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy; vol. 2018-January).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      4 Scopus citations
    • One Secure Access Scheme Based on Trusted Execution Environment

      Fan, Y., Liu, S., Tan, G., Lin, X., Zhao, G. & Bai, J., Sep 5 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. Institute of Electrical and Electronics Engineers Inc., p. 16-21 6 p. 8455881. (Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      6 Scopus citations
    • Sensitive information tracking in commodity IoT

      Celik, Z. B., Babun, L., Sikder, A. K., Aksu, H., Tan, G., McDaniel, P. & Uluagac, A. S., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 1687-1704 18 p. (Proceedings of the 27th USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      59 Scopus citations
    • τCFI: Type-assisted control flow integrity for x86-64 binaries

      Muntean, P., Fischer, M., Tan, G., Lin, Z., Grossklags, J. & Eckert, C., 2018, Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Proceedings. Bailey, M., Ioannidis, S., Stamatogiannakis, M. & Holz, T. (eds.). Springer Verlag, p. 423-444 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11050 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      2 Scopus citations
    • 2017

      CFG construction soundness in Control-Flow integrity

      Tan, G. & Jaeger, T., Oct 30 2017, PLAS 2017 - Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 3-13 11 p. (PLAS 2017 - Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, co-located with CCS 2017; vol. 2017-January).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      5 Scopus citations
    • Maintaining Authorization Hook Placements Across Program Versions

      Talele, N., Muthukumaran, D., Capobianco, F., Jaeger, T. & Tan, G., Feb 1 2017, Proceedings - 2016 IEEE Cybersecurity Development, SecDev 2016. Institute of Electrical and Electronics Engineers Inc., p. 67-68 2 p. 7839793. (Proceedings - 2016 IEEE Cybersecurity Development, SecDev 2016).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • PtrSplit: Supporting general pointers in automatic program partitioning

      Liu, S., Tan, G. & Jaeger, T., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2359-2371 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      7 Scopus citations
    • ReDroid: Prioritizing data flows and sinks for app security transformation

      Tian, K., Tan, G., Yao, D. D. & Ryder, B. G., Nov 3 2017, FEAST 2017 - Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 35-41 7 p. (FEAST 2017 - Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, co-located with CCS 2017).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      2 Scopus citations
    • 2016

      Analysis of Code Heterogeneity for High-Precision Classification of Repackaged Malware

      Tian, K., Yao, D., Ryder, B. G. & Tan, G., Aug 1 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016. Institute of Electrical and Electronics Engineers Inc., p. 262-271 10 p. 7527778. (Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      22 Scopus citations
    • Bidirectional grammars for machine-code decoding and encoding

      Tan, G. & Morrisett, G., Jan 1 2016, Verified Software: Theories, Tools, and Experiments - 8th International Conference, VSTTE 2016, Revised Selected Papers. Blazy, S. & Chechik, M. (eds.). Springer Verlag, p. 73-89 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9971 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      1 Scopus citations
    • Languages must expose memory heterogeneity

      Guo, X., Shrivastava, A., Spear, M. & Tan, G., Oct 3 2016, MEMSYS 2016 - Proceedings of the International Symposium on Memory Systems. Association for Computing Machinery, p. 251-256 6 p. (ACM International Conference Proceeding Series; vol. 03-06-October-2016).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      2 Scopus citations
    • 2015

      Per-input control-flow integrity

      Niu, B. & Tan, G., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 914-926 13 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      72 Scopus citations
    • Producing hook placements to enforce expected access control policies

      Muthukumaran, D., Talele, N., Jaeger, T. & Tan, G., 2015, Engineering Secure Software and Systems - 7th International Symposium, ESSoS 2015, Proceedings. Piessens, F., Caballero, J. & Bielova, N. (eds.). Springer Verlag, p. 178-195 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8978).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      4 Scopus citations
    • 2014

      Finding reference-counting errors in Python/C programs with affine analysis

      Li, S. & Tan, G., Jan 1 2014, ECOOP 2014 - Object-Oriented Programming: 28th European Conference, Proceedings. Springer Verlag, p. 80-104 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8586 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      6 Scopus citations
    • Modular control-flow integrity

      Niu, B. & Tan, G., 2014, PLDI 2014 - Proceedings of the 2014 ACM SIGPLAN Conference on Programming Language Design and Implementation. Association for Computing Machinery, p. 577-587 11 p. (Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      58 Scopus citations
    • NativeGuard: Protecting android applications from third-party native libraries

      Sun, M. & Tan, G., 2014, WiSec 2014 - Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, p. 165-176 12 p. (WiSec 2014 - Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      55 Scopus citations
    • RockJIT: Securing Just-In-Time compilation using modular Control-Flow Integrity

      Niu, B. & Tan, G., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 1317-1328 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      52 Scopus citations
    • 2013

      Efficient user-space information flow control

      Niu, B. & Tan, G., 2013, ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. p. 131-141 11 p. (ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      4 Scopus citations
    • Monitor integrity protection with space efficiency and separate compilation

      Niu, B. & Tan, G., 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 199-209 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      35 Scopus citations
    • Strato: A retargetable framework for low-level inlined-reference monitors

      Zeng, B., Tan, G. & Erlingsson, Ú., 2013, Proceedings of the 22nd USENIX Security Symposium. USENIX Association, p. 369-382 14 p. (Proceedings of the 22nd USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      26 Scopus citations
    • 2012

      Enforcing user-space privilege separation with declarative architectures

      Niu, B. & Tan, G., 2012, STC'12 - Proceedings of the Workshop on Scalable Trusted Computing. p. 9-20 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      3 Scopus citations
    • JATO: Native code atomicity for java

      Li, S., Liu, Y. D. & Tan, G., Dec 1 2012, Programming Languages and Systems - 10th Asian Symposium, APLAS 2012, Proceedings. p. 2-17 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7705 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      2 Scopus citations
    • JVM-portable sandboxing of Java's native libraries

      Sun, M. & Tan, G., 2012, Computer Security, ESORICS 2012 - 17th European Symposium on Research in Computer Security, Proceedings. p. 842-858 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7459 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      13 Scopus citations
    • RockSalt: Better, faster, stronger SFI for the x86

      Morrisett, G., Tan, G., Tassarotti, J., Tristan, J. B. & Gan, E., 2012, PLDI'12 - Proceedings of the 2012 ACM SIGPLAN Conference on Programming Language Design and Implementation. p. 395-404 10 p. (Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      46 Scopus citations
    • Smartphone dual defense protection framework: Detecting malicious applications in android markets

      Su, X., Chuah, M. & Tan, G., Dec 1 2012, Proceedings - 2012 8th International Conference on Mobile Ad Hoc and Sensor Networks, MSN 2012. p. 153-160 8 p. 6516479. (Proceedings - 2012 8th International Conference on Mobile Ad Hoc and Sensor Networks, MSN 2012).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      39 Scopus citations
    • 2011

      Combining Control-Flow Integrity and static analysis for efficient and validated data sandboxing

      Zeng, B., Tan, G. & Morrisett, G., 2011, CCS'11 - Proceedings of the 18th ACM Conference on Computer and Communications Security. p. 29-39 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      53 Scopus citations
    • Detection and classification of different botnet C&C channels

      Fedynyshyn, G., Chuah, M. C. & Tan, G., 2011, Autonomic and Trusted Computing - 8th International Conference, ATC 2011, Proceedings. p. 228-242 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6906 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      34 Scopus citations
    • JET: Exception checking in the java native interface

      Li, S. & Tan, G., Nov 23 2011, OOPSLA'11 - Proceedings of the 2011 ACM International Conference on Object Oriented Programming Systems Languages and Applications. p. 345-357 13 p.

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      8 Scopus citations
    • 2010

      A hierarchical SVG image abstraction layer for medical imaging

      Kim, E., Huang, X., Tan, G., Long, L. R. & Antani, S., 2010, Medical Imaging 2010 - Advanced PACS-based Imaging Informatics and Therapeutic Applications. 762809. (Progress in Biomedical Optics and Imaging - Proceedings of SPIE; vol. 7628).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      4 Scopus citations
    • JNI light: An operational model for the core JNI

      Tan, G., Dec 1 2010, Programming Languages and Systems - 8th Asian Symposium, APLAS 2010, Proceedings. p. 114-130 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6461 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      8 Scopus citations
    • Robusta: Taming the native beast of the JVM

      Siefers, J., Tan, G. & Morrisett, G., 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 201-211 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      41 Scopus citations
    • 2009

      Document analysis support for the manual auditing of elections

      Lopresti, D., Zhou, X., Huang, X. & Tan, G., 2009, ICDAR2009 - 10th International Conference on Document Analysis and Recognition. p. 733-737 5 p. 5277494. (Proceedings of the International Conference on Document Analysis and Recognition, ICDAR).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Finding bugs in exceptional situations of JNI programs

      Li, S. & Tan, G., Dec 1 2009, CCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security. p. 442-452 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      33 Scopus citations
    • Weak updates and separation logic

      Tan, G., Shao, Z., Feng, X. & Cai, H., Dec 28 2009, Programming Languages and Systems - 7th Asian Symposium, APLAS 2009, Proceedings. p. 178-193 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5904 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      2 Scopus citations
    • 2007

      Delayed and controlled failures in tamper-resistant software

      Tan, G., Chen, Y. & Jakubowski, M. H., Jan 1 2007, Information Hiding - 8th International Workshop, IH 2006, Revised Selected Papers. Springer Verlag, p. 216-231 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4437 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      14 Scopus citations
    • ILEA: Inter-language analysis across java and c

      Tan, G. & Morrisett, G., 2007, Proceedings of the 22nd Annual ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA'07. p. 39-56 18 p.

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • ILEA: Inter-language analysis across java and C

      Gang, T. & Morrisett, G., 2007, OOPSLA: 22nd International Conference on Object-Oriented Programming, Systems, Languages, and Applications - Proceedings. p. 39-56 18 p. (Proceedings of the Conference on Object-Oriented Programming Systems, Languages, and Applications, OOPSLA).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      7 Scopus citations
    • 2006

      A compositional logic for control flow

      Tan, G. & Appel, A. W., Jul 6 2006, Verification, Model Checking, and Abstract Interpretation - 7th International Conference, VMCAI 2006, Proceedings. p. 80-94 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3855 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      30 Scopus citations
    • 2004

      Construction of a semantic model for a typed assembly language

      Tan, G., Appel, A. W., Swadi, K. N. & Wu, D., Jan 1 2004, Verification, Model Checking, and Abstract Interpretation - 5th International Conference, VMCAI 2004, Proceedings. Steffen, B. & Levi, G. (eds.). Springer Verlag, p. 30-43 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2937).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      8 Scopus citations
    • Dynamic typing with dependent types

      Ou, X., Tan, G., Mandelbaum, Y. & Walker, D., 2004, Exploring New Frontiers of Theoretical Informatics - IFIP 18th World Computer Congress TC1 and 3rd International Conference on Theoretical Computer Science, TCS 2004. Springer New York LLC, p. 437-450 14 p. (IFIP Advances in Information and Communication Technology; vol. 155).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
      50 Scopus citations