Follow
Tao Wei
Tao Wei
Vice President, Ant Financial
Verified email at antfin.com - Homepage
Title
Cited by
Cited by
Year
SoK: Eternal War In Memory
L Szekeres, M Payer, T Wei, D Song
The 34th IEEE Symposium on Security & Privacy (Oakland), 2013
10702013
Practical Control Flow Integrity & Randomization for Binary Executables
C Zhang, T Wei, Z Chen, L Duan, S McCamant, L Szekeres, D Song, ...
The 34th IEEE Symposium on Security & Privacy (Oakland), 2013
7342013
TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection
T Wang, T Wei, G Gu, W Zou
2010 IEEE Symposium on Security and Privacy, 497-512, 2010
5512010
IntScope: Automatically detecting integer overflow vulnerability in X86 binary using symbolic execution.
T Wang, T Wei, Z Lin, W Zou
NDSS, 1-14, 2009
2742009
Taintart: A practical multi-level information-flow tracking system for android runtime
M Sun, T Wei, JCS Lui
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
2282016
SAVIOR: Towards Bug-Driven Hybrid Testing
LL Yaohui Chen, Peng Li, Jun Xu, Shengjian Guo, Rundong Zhou, Yulong Zhang ...
IEEE Symposium on Security and Privacy 2020, 2020
187*2020
Phishing-alarm: Robust and efficient phishing detection via page component similarity
J Mao, W Tian, P Li, T Wei, Z Liang
IEEE Access 5, 17020-17030, 2017
1172017
Fooling detection alone is not enough: Adversarial attack against multiple object tracking
Y Jia, Y Lu, J Shen, QA Chen, H Chen, Z Zhong, T Wei
International Conference on Learning Representations (ICLR'20), 2020
1082020
Towards memory safe enclave programming with rust-sgx
H Wang, P Wang, Y Ding, M Sun, Y Jing, R Duan, L Li, Y Zhang, T Wei, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
982019
A new algorithm for identifying loops in decompilation
T Wei, J Mao, W Zou, Y Chen
International Static Analysis Symposium, 170-183, 2007
982007
BaitAlarm: detecting phishing sites using similarity in fundamental visual features
J Mao, P Li, K Li, T Wei, Z Liang
2013 5th international conference on intelligent networking and …, 2013
842013
Phishing page detection via learning classifiers from page layout feature
J Mao, J Bian, W Tian, S Zhu, T Wei, A Li, Z Liang
EURASIP Journal on Wireless Communications and Networking 2019, 1-14, 2019
802019
Adaptive Android Kernel Live Patching
Y Chen, Y Zhang, Z Wang, L Xia, C Bao, T Wei
Usenix Security, 2017
792017
IntPatch: Automatically fix integer-overflow-to-buffer-overflow vulnerability at compile-time
C Zhang, T Wang, T Wei, Y Chen, W Zou
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
722010
Detecting phishing websites via aggregation analysis of page layouts
J Mao, J Bian, W Tian, S Zhu, T Wei, A Li, Z Liang
Procedia Computer Science 129, 224-230, 2018
662018
COIN attacks: On insecurity of enclave untrusted interfaces in SGX
MR Khandaker, Y Cheng, Z Wang, T Wei
Proceedings of the Twenty-Fifth International Conference on Architectural …, 2020
652020
Checksum-aware fuzzing combined with dynamic taint analysis and symbolic execution
T Wang, T Wei, G Gu, W Zou
ACM Transactions on Information and System Security (TISSEC) 14 (2), 1-28, 2011
642011
Heap taichi: exploiting memory allocation granularity in heap-spraying attacks
Y Ding, T Wei, TL Wang, Z Liang, W Zou
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
642010
Fingerprints on mobile devices: Abusing and leaking
Y Zhang, Z Chen, H Xue, T Wei
Black Hat Conference, 2015
632015
Downgrade attack on trustzone
Y Chen, Y Zhang, Z Wang, T Wei
arXiv preprint arXiv:1707.05082, 2017
622017
The system can't perform the operation now. Try again later.
Articles 1–20