Publications (bibtex entries)

  • K. Tian, D. Yao, B. G. Ryder, G. Tan, G. Peng. Detection of Repackaged Android Malware with Code-Heterogeneity Features. IEEE Transactions on Dependable and Secure Computing. To appear. 2017.
  • Bidirectional Grammars for Machine-Code Decoding and Encoding. G. Tan and G. Morrisett. In 8th International Conference on Verified Software: Theories, Tools, and Experiments (VSTTE), pages 73–89, 2016. [paper]
  • Languages Must Expose Memory Heterogeneity. X. Guo, A. Shrivastava, M. Spear, and G. Tan. In Second International Symposium on Memory Systems (MEMSYS), pages 251–256, 2016. [paper]
  • Analysis of Code Heterogeneity for High-Precision Classification of Repackaged Malware. K. Tian, D. Yao, B. G. Ryder, and G. Tan. In Workshop on Mobile Security Technologies (MoST), pages 262–271, 2016. [paper]
  • Per-Input Control-Flow Integrity. B. Niu and G. Tan. In 22nd ACM Conference on Computer and Communications Security (CCS), pages 914–926, 2015. [paper]
  • Producing Hook Placements to Enforce Expected Access Control Policies. D. Muthukumaran, N. Talele, T. Jaeger, and G. Tan. In 7th International Symposium on Engineering Secure Software and Systems (ESSoS), pages 178–195, 2015. [paper]
  • J. Yin, G. Tan, X. Bai, and S. Hu. WebC: toward a portable framework for deploying legacy code in web browsers. Science China Information Sciences, 58(7):1–15, 2015
  • G. Tan. JNI Light: an operational model for the core JNI. Mathematical Structures in Computer Science, 25(4):805–840, 2015. [paper]
  • Assurance for Defense-in-Depth via Retrofitting. V. Ganapathy, T. Jaeger, C. Skalka, and G. Tan. In 8th Layered Assurance Workshop (LAW), December 2014
  • RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity. B. Niu and G. Tan. In 21st ACM Conference on Computer and Communications Security (CCS), pages 1317–1328, 2014. [paper]
  • Finding Reference-Counting Errors in Python/C Programs with Affine Analysis. S. Li and G. Tan. In European Conference on Object-Oriented Programming (ECOOP), 2014. [paper]
  • NativeGuard: protecting android applications from third-party native libraries. M. Sun and G. Tan. In 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec), pages 165–176, 2014. [paper]
  • Modular Control Flow Integrity. B. Niu and G. Tan. In ACM Conference on Programming Language Design and Implementation (PLDI), pages 577–587, 2014. [paper]
  • S. Li and G. Tan. Exception analysis in the Java Native Interface. Science of Computer Programming, 89:273–297, 2014. [paper]
  • Monitor Integrity Protection with Space Efficiency and Separate Compilation. B. Niu and G. Tan. In 20th ACM Conference on Computer and Communications Security (CCS), 2013. [paper]
  • Strato: A Retargetable Framework for Low-Level Inlined-Reference Monitors. B. Zeng, G. Tan, and Ú. Erlingsson. In 22nd Usenix Security Symposium, pages 369–382, 2013. [paper]
  • Efficient user-space information flow control. B. Niu and G. Tan. In 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS), pages 131–142, 2013. [paper]
  • M. Sun, G. Tan, J. Siefers, B. Zeng, and G. Morrisett. Bringing Java’s wild native world under control. ACM Transactions on Information and System Security (TISSEC), 16(3):9:1–9:28, 2013. [paper]
  • Smartphone Dual Defense Protection Framework: Detecting Malicious Applications in Android Markets. X. Su, M.-C. Chuah, and G. Tan. In 8th International Conference on Mobile Ad-hoc and Sensor Networks, pages 153–160, 2012
  • JATO: Native Code Atomicity for Java. S. Li, D. Y. Liu, and G. Tan. In Asian Symposium on Programming Languages and Systems (APLAS), pages 2–17, 2012. [paper]
  • JVM-Portable Sandboxing of Java’s Native Libraries. M. Sun and G. Tan. In 17th European Symposium on Research in Computer Security (ESORICS), pages 842–858, 2012. [paper]
  • Enforcing User-Space Privilege Separation with Declarative Architectures. B. Niu and G. Tan. In Proceedings of the Sixth ACM Workshop on Scalable Trusted Computing (STC), pages 9–20, 2012. [paper]
  • RockSalt: Better, Faster, Stronger SFI for the x86. G. Morrisett, G. Tan, J. Tassarotti, J.-B. Tristan, and E. Gan. In ACM Conference on Programming Language Design and Implementation (PLDI), pages 395–404, 2012. [paper]
  • Combining control-flow integrity and static analysis for efficient and validated data sandboxing. B. Zeng, G. Tan, and G. Morrisett. In 18th ACM Conference on Computer and Communications Security (CCS), pages 29–40, 2011. [paper]
  • JET: Exception checking in the Java Native Interface. S. Li and G. Tan. In ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), pages 345–358, 2011. [paper]
  • Detection and Classification of Different Botnet C&C Channels. G. Fedynyshyn, M. C. Chuah, and G. Tan. In 8th International Conference on Autonomic and Trusted Computing (ATC), pages 228–242, 2011
  • S. Bai, J. Yin, G. Tan, Y. Wang, and S. Hu. FDTL: a unified flash memory and hard disk translation layer. IEEE Transactions on Consumer Electronics, 57(4):1719–1727, 2011
  • E. Kim, X. Huang, and G. Tan. Markup SVG: An Online Content-Aware Image Abstraction and Annotation Tool. IEEE Transactions on Multimedia, 13(5):993–1006, 2011
  • G. Tan, Z. Shao, X. Feng, and H. Cai. Weak updates and separation logic. New Generation Compting, 29(1):3–29, 2011. [paper]
  • JNI Light: An Operational Model for the Core JNI. G. Tan. In Asian Symposium on Programming Languages and Systems (APLAS), pages 114–130, 2010
  • A Hierarchical SVG Image Abstraction Layer for Medical Imaging. E. Kim, X. Huang, G. Tan, L. R. Long, and S. K. Antani. In SPIE Medical Imaging: Advanced PACS-based Imaging Informaticsand Therapeutic Applications, volume 7628, 2010
  • Robusta: Taming the Native Beast of the JVM. J. Siefers, G. Tan, and G. Morrisett. In 17th ACM Conference on Computer and Communications Security (CCS), pages 201–211, 2010. [paper|presentation]
  • A. Ahmed, A. Appel, C. Richards, K. Swadi, G. Tan, and D. Wang. Semantic Foundations for Typed-Assembly Languages. ACM Transactions on Programming Languages and Systems, 32(3):1–67, Mar. 2010. [paper]
  • Weak updates and separation logic. G. Tan, Z. Shao, X. Feng, and H. Cai. In Asian Symposium on Programming Languages and Systems (APLAS), pages 178–193, 2009
  • Document Analysis Support for the Manual Auditing of Elections. D. P. Lopresti, X. Zhou, X. Huang, and G. Tan. In 10th International Conference on Document Analysis and Recognition (ICDAR), pages 733–737, 2009
  • Finding bugs in exceptional situations of JNI programs. S. Li and G. Tan. In 16th ACM Conference on Computer and Communications Security (CCS), pages 442–452, 2009. [paper]
  • The New Jersey voting-machine lawsuit and the AVC advantage DRE voting machine. A. W. Appel, M. Ginsburg, H. Hursti, B. W. Kernighan, C. D. Richards, G. Tan, and P. Venetis. In Conference on Electronic Voting Technology/Workshop on Trustworthy Elections (EVT/WOTE), 2009
  • An empirical security study of the native code in the JDK. G. Tan and J. Croft. In 17th Usenix Security Symposium, pages 365–377, 2008. [paper|tech report|presentation]
  • ILEA: Inter-Language Analysis across Java and C. G. Tan and G. Morrisett. In ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), pages 39–56, 2007. [paper|presentation]
  • Delayed and Controlled Failures in Tamper-Resistant Software. G. Tan, Y. Chen, and M. H. Jakubowski. In 8th International Workshop on Information Hiding (IH), pages 216–231, 2006. [paper|presentation]
  • Safe Java Native Interface. G. Tan, A. Appel, S. Chakradhar, A. Raghunathan, S. Ravi, and D. Wang. In IEEE International Symposium on Secure Software Engineering, pages 97–106, 2006. [paper|presentation]
  • A Compositional Logic for Control Flow. G. Tan and A. Appel. In International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI), pages 80–94, 2006. [paper|presentation]
  • Mechanized Metatheory for User-Defined Type Extensions. D. Marino, B. Chin, T. Millstein, G. Tan, R. J. Simmons, and D. Walker. In Workshop on Mechanizing Metatheory, Sept. 2006
  • Dynamic Typing with Dependent Types. X. Ou, G. Tan, Y. Mandelbaum, and D. Walker. In Proceedings of IFIP 3rd International Conference on Theoretical Computer Science, pages 437–450, 2004. [paper]
  • Construction of a Semantic Model for a Typed Assembly Language. G. Tan, A. Appel, K. Swadi, and D. Wu. In International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI), pages 30–43, Jan. 2004. [paper|presentation]
  • Enforcing Resource Usage Protocols via Scoped Methods. G. Tan, X. Ou, and D. Walker. In Proceedings of 10th International Workshop on Foundations of Object-Oriented Languages (FOOL), 2003. [paper]
  • M. Jiang, X. Zhu, G. G. E. Gielen, E. Drábek, Y. Xia, G. Tan, and T. Bao. Braille to print translations for Chinese. Information & Software Technology, 44(2):91–100, 2002
  • Segmentation of Mandarin Braille Word and Braille Translation Based on Multi-knowledge. M. Jiang, X. Zhu, Y. Xia, G. Tan, B. Yuan, and X. Tang. In 5th International Conference on Signal Processing (ICSP), pages 2070–2073, 2000

The documents contained in these pages are included to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.