Follow
Jun Wang
Jun Wang
Palo Alto Networks, Inc.
Verified email at paloaltonetworks.com
Title
Cited by
Cited by
Year
{TaintPipe}: Pipelined symbolic taint analysis
J Ming, D Wu, G Xiao, J Wang, P Liu
24th USENIX Security Symposium (USENIX Security 15), 65-80, 2015
1012015
Straighttaint: Decoupled offline symbolic taint analysis
J Ming, D Wu, J Wang, G Xiao, P Liu
Proceedings of the 31st IEEE/ACM International Conference on Automated …, 2016
542016
Risk assessment of buffer" Heartbleed" over-read vulnerabilities
J Wang, M Zhao, Q Zeng, D Wu, P Liu
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
372015
Between mutual trust and mutual distrust: Practical fine-grained privilege separation in multithreaded applications
J Wang, X Xiong, P Liu
2015 USENIX Annual Technical Conference (USENIX ATC 15), 361-373, 2015
332015
Unsupervised clustering for identification of malicious domain campaigns
M Weber, J Wang, Y Zhou
Proceedings of the First Workshop on Radical and Experiential Security, 33-39, 2018
132018
Program-object level data flow analysis with applications to data leakage and contamination forensics
G Xiao, J Wang, P Liu, J Ming, D Wu
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
82016
Detecting malicious campaigns in obfuscated JavaScript with scalable behavioral analysis
O Starov, Y Zhou, J Wang
2019 IEEE Security and Privacy Workshops (SPW), 218-223, 2019
62019
Discover and tame long-running idling processes in enterprise systems
J Wang, Z Qian, Z Li, Z Wu, J Rhee, X Ning, P Liu, G Jiang
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
42015
固体粗糙界面与超声的非线性相互作用研究
肖齐, 王珺, 郭霞生, 章东
物理学报 62 (9), 094301, 2013
22013
The system can't perform the operation now. Try again later.
Articles 1–9