Jun Wang
Jun Wang
Palo Alto Networks, Inc.
Verified email at
Cited by
Cited by
{TaintPipe}: Pipelined symbolic taint analysis
J Ming, D Wu, G Xiao, J Wang, P Liu
24th USENIX Security Symposium (USENIX Security 15), 65-80, 2015
Straighttaint: Decoupled offline symbolic taint analysis
J Ming, D Wu, J Wang, G Xiao, P Liu
Proceedings of the 31st IEEE/ACM International Conference on Automated …, 2016
Risk assessment of buffer" Heartbleed" over-read vulnerabilities
J Wang, M Zhao, Q Zeng, D Wu, P Liu
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
Between mutual trust and mutual distrust: Practical fine-grained privilege separation in multithreaded applications
J Wang, X Xiong, P Liu
2015 USENIX Annual Technical Conference (USENIX ATC 15), 361-373, 2015
Unsupervised clustering for identification of malicious domain campaigns
M Weber, J Wang, Y Zhou
Proceedings of the First Workshop on Radical and Experiential Security, 33-39, 2018
Program-object level data flow analysis with applications to data leakage and contamination forensics
G Xiao, J Wang, P Liu, J Ming, D Wu
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
Detecting malicious campaigns in obfuscated JavaScript with scalable behavioral analysis
O Starov, Y Zhou, J Wang
2019 IEEE Security and Privacy Workshops (SPW), 218-223, 2019
Discover and tame long-running idling processes in enterprise systems
J Wang, Z Qian, Z Li, Z Wu, J Rhee, X Ning, P Liu, G Jiang
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
肖齐, 王珺, 郭霞生, 章东
物理学报 62 (9), 094301, 2013
The system can't perform the operation now. Try again later.
Articles 1–9