Yang

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
  • Beng Heng, Ng Earlence Fernandes, Ajit Aluri, Atul Prakash, James Zijiang, Yang
  • 2013
Dynamic taint analysis (DTA) plays a fundamental role in computer security research. However, current implementations of DTA are often inefficient as taint information is propagated for each instruction. Previous work has suggested propagating taint information at higher abstractions such as functions. But, this has only been achieved by manually(More)
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to(More)
  • 1