default search action
Ruoyu Wang 0001
Person information
- affiliation: Arizona State University, USA
- affiliation (former): University of California Santa Barbara, Department of Computer Science, SecLab, CA, USA
- affiliation (former): Tsinghua University, Institute of Network Science and Cyberspace, Beijing, China
Other persons with the same name
- Ruoyu Wang — disambiguation page
- Ruoyu Wang 0002 — South China University of Technology, Information and Network Engineering and Research Center, Guangzhou, China
- Ruoyu Wang 0003 — Southeast University, MoE, Key Laboratory of MEMS, Nanjing, China
- Ruoyu Wang 0004 — Shanghai Jiao Tong University, School of Software, China
- Ruoyu Wang 0005 — Chinese Academy of Sciences, Shanghai Institute of Microsystem and Information Technology, China
- Ruoyu Wang 0006 — Purdue University, Department of Agricultural and Biological Engineering, West Lafayette, IN, USA
- Ruoyu Wang 0007 — California State University Long Beach, CA, USA
- Ruoyu Wang 0008 — Beijing Jiaotong University, Department of Mathematics, China
- Ruoyu Wang 0009 — Leibniz-Institut für innovative Mikroelektronik, Circuit Design Department, Frankfurt (Oder), Germany (and 1 more)
- Ruoyu Wang 0010 — JP Morgan Securities, New York, NY, USA (and 2 more)
- Ruoyu Wang 0011 — Queen's University Belfast, Centre for Public Health, UK (and 2 more)
- Ruoyu Wang 0012 — New York University, Brooklyn, NY, USA
- Ruoyu Wang 0013 — New Jersey Institute of Technology, Department of Computer Science, Newark, NJ, USA
- Ruoyu Wang 0014 — Shanghaitech University, School of Information Science and Technology, China
- Ruoyu Wang 0015 — Zhejiang University, College of Electrical Engineering, Hangzhou, China
- Ruoyu Wang 0016 — Chinese Academy of Sciences, Academy of Mathematics and Systems Science, Beijing, China
- Ruoyu Wang 0017 — Hefei University of Technology, School of Software, Hefei, China
- Ruoyu Wang 0018 — Southwest University for Nationalities, Department of Electric and Information Engineering, Chengdu, China
- Ruoyu Wang 0019 — Beijing University of Posts and Telecommunications, School of Artificial Intelligence, China
- Ruoyu Wang 0020 — Harbin Institute of Technology, Weihai, China
- Ruoyu Wang 0021 — Central South University, School of Computer Science and Engineering, Changsha, China
- Ruoyu Wang 0022 — Beihang University, Beijing, China
- Ruoyu Wang 0023 — McGill University, Canada
- Ruoyu Wang 0024 — Northeastern University, Software College, Shenyang, China
- Ruoyu Wang 0025 — Chinese Academy of Sciences, Tianjin Institute of Industrial Biotechnology, China
- Ruoyu Wang 0026 — Tongji University, College of Electronics and Information Engineering, Shanghai, China
- Ruoyu Wang 0027 — University of Warwick, Department of Computer Science, Tissue Image Analytics Centre, UK
- Ruoyu Wang 0028 — Xi'an Jiaotong-Liverpool University, School of Advanced Technology, Suzhou, China
- Ruoyu Wang 0029 — University of Science and Technology of China, Hefei, China
- Ruoyu Wang 0030 — Lehigh University, Bethlehem, PA, USA
- Ruoyu Wang 0031 — Dalian University, Affiliated Zhongshan Hospital, Oncology Department, China
- Ruoyu Wang 0032 — Chinese University of Hong Kong, Hong Kong
- Ruoyu Wang 0034 — Wuhan University, School of Computer Science, China
- Ruoyu Wang 0035 — Tongji University, Institute of New Rural Development, Shanghai, China
- Ruoyu Wang 0036 — University of California Davis, Department of Land, Air and Water Resources, CA, USA
- Ruoyu Wang 0037 — China Railway Engineering Equipment Group Co., Ltd., Zhengzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c52]Rana Pourmohamad, Steven Wirsz, Adam Oest, Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Adam Doupé, Rida A. Bazzi:
Deep Dive into Client-Side Anti-Phishing: A Longitudinal Study Bridging Academia and Industry. AsiaCCS 2024 - [c51]Arvind S. Raj, Wil Gibbs, Fangzhou Dong, Jayakrishna Menon Vadayath, Michael Tompkins, Steven Wirsz, Yibo Liu, Zhenghao Hu, Chang Zhu, Gokulkrishna Praveen Menon, Brendan Dolan-Gavitt, Adam Doupé, Ruoyu Wang, Yan Shoshitaishvili, Tiffany Bao:
Fuzz to the Future: Uncovering Occluded Future Vulnerabilities via Robust Fuzzing. CCS 2024: 3719-3733 - [c50]Yue Zhang, Melih Sirlanci, Ruoyu Wang, Zhiqiang Lin:
When Compiler Optimizations Meet Symbolic Execution: An Empirical Study. CCS 2024: 4212-4225 - [c49]Mehrnoosh Zaeifi, Faezeh Kalantari, Adam Oest, Zhibo Sun, Gail-Joon Ahn, Yan Shoshitaishvili, Tiffany Bao, Ruoyu Wang, Adam Doupé:
Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem. CODASPY 2024: 55-65 - [c48]Vivin Paliath, Erik Trickel, Tiffany Bao, Ruoyu Wang, Adam Doupé, Yan Shoshitaishvili:
SandPuppy: Deep-State Fuzzing Guided by Automatic Detection of State-Representative Variables. DIMVA 2024: 227-250 - [c47]Zhibo Sun, Faris Bugra Kokulu, Penghui Zhang, Adam Oest, Gianluca Stringhini, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem. RAID 2024: 49-64 - [c46]Irina Ford, Ananta Soneji, Faris Bugra Kokulu, Jayakrishna Vadayath, Zion Leonahenahe Basque, Gaurav Vipat, Adam Doupé, Ruoyu Wang, Gail-Joon Ahn, Tiffany Bao, Yan Shoshitaishvili:
"Watching over the shoulder of a professional": Why Hackers Make Mistakes and How They Fix Them. SP 2024: 350-368 - [c45]Kuntal Kumar Pal, Ati Priya Bajaj, Pratyay Banerjee, Audrey Dutcher, Mutsumi Nakamura, Zion Leonahenahe Basque, Himanshu Gupta, Saurabh Arjun Sawant, Ujjwala Anantheswaran, Yan Shoshitaishvili, Adam Doupé, Chitta Baral, Ruoyu Wang:
"Len or index or count, anything but v1": Predicting Variable Names in Decompilation Output with Transfer Learning. SP 2024: 4069-4087 - [c44]Zion Leonahenahe Basque, Ati Priya Bajaj, Wil Gibbs, Jude O'Kain, Derron Miao, Tiffany Bao, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang:
Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation. USENIX Security Symposium 2024 - [c43]Wil Gibbs, Arvind S. Raj, Jayakrishna Menon Vadayath, Hui Jun Tay, Justin Miller, Akshay Ajayan, Zion Leonahenahe Basque, Audrey Dutcher, Fangzhou Dong, Xavier J. Maso, Giovanni Vigna, Christopher Kruegel, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang:
Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services. USENIX Security Symposium 2024 - [c42]Ziyi Guo, Dang K. Le, Zhenpeng Lin, Kyle Zeng, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé, Xinyu Xing:
Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation. USENIX Security Symposium 2024 - [c41]Chang Zhu, Ziyang Li, Anton Xue, Ati Priya Bajaj, Wil Gibbs, Yibo Liu, Rajeev Alur, Tiffany Bao, Hanjun Dai, Adam Doupé, Mayur Naik, Yan Shoshitaishvili, Ruoyu Wang, Aravind Machiry:
TYGR: Type Inference on Stripped Binaries using Graph Neural Networks. USENIX Security Symposium 2024 - [i10]Ziyi Guo, Dang K. Le, Zhenpeng Lin, Kyle Zeng, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé, Xinyu Xing:
Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation. CoRR abs/2406.02624 (2024) - [i9]Xiang Mei, Pulkit Singh Singaria, Jordi Del Castillo, Haoran Xi, Abdelouahab Benchikh, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Hammond Pearce, Brendan Dolan-Gavitt:
ARVO: Atlas of Reproducible Vulnerabilities for Open Source Software. CoRR abs/2408.02153 (2024) - 2023
- [j3]Muhui Jiang, Qinming Dai, Wenlong Zhang, Rui Chang, Yajin Zhou, Xiapu Luo, Ruoyu Wang, Yang Liu, Kui Ren:
A Comprehensive Study on ARM Disassembly Tools. IEEE Trans. Software Eng. 49(4): 1683-1703 (2023) - [c40]Kyle Zeng, Zhenpeng Lin, Kangjie Lu, Xinyu Xing, Ruoyu Wang, Adam Doupé, Yan Shoshitaishvili, Tiffany Bao:
RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections. CCS 2023: 3093-3107 - [c39]Jaejong Baek, Pradeep Kumar Duraisamy Soundrapandian, Sukwha Kyung, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer. DSN 2023: 261-273 - [c38]Eric Gustafson, Paul Grosen, Nilo Redini, Saagar Jha, Andrea Continella, Ruoyu Wang, Kevin Fu, Sara Rampazzi, Christopher Kruegel, Giovanni Vigna:
Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images. RAID 2023: 32-45 - [c37]Marzieh Bitaab, Haehyun Cho, Adam Oest, Zhuoer Lyu, Wei Wang, Jorij Abraham, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé:
Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale. SP 2023: 2566-2583 - [c36]Erik Trickel, Fabio Pagani, Chang Zhu, Lukas Dresel, Giovanni Vigna, Christopher Kruegel, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé:
Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities. SP 2023: 2658-2675 - [c35]Xingman Chen, Yinghao Shi, Zheyu Jiang, Yuan Li, Ruoyu Wang, Haixin Duan, Haoyu Wang, Chao Zhang:
MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries. USENIX Security Symposium 2023: 841-858 - [c34]Hui Jun Tay, Kyle Zeng, Jayakrishna Menon Vadayath, Arvind S. Raj, Audrey Dutcher, Tejesh Reddy, Wil Gibbs, Zion Leonahenahe Basque, Fangzhou Dong, Zack Smith, Adam Doupé, Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang:
Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation. USENIX Security Symposium 2023: 5791-5808 - [i8]Fangzhou Wu, Qingzhao Zhang, Ati Priya Bajaj, Tiffany Bao, Ning Zhang, Ruoyu Wang, Chaowei Xiao:
Exploring the Limits of ChatGPT in Software Security Applications. CoRR abs/2312.05275 (2023) - 2022
- [j2]Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing. IEEE Secur. Priv. 20(2): 10-21 (2022) - [c33]Haehyun Cho, Jinbum Park, Adam Oest, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
ViK: practical mitigation of temporal memory safety violations through object ID inspection. ASPLOS 2022: 271-284 - [c32]Penghui Zhang, Zhibo Sun, Sukwha Kyung, Hans Walter Behrens, Zion Leonahenahe Basque, Haehyun Cho, Adam Oest, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Gail-Joon Ahn, Adam Doupé:
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior. CCS 2022: 3165-3179 - [c31]Pemma Reiter, Antonio M. Espinoza, Adam Doupé, Ruoyu Wang, Westley Weimer, Stephanie Forrest:
Improving source-code representations to enhance search-based software repair. GECCO 2022: 1336-1344 - [c30]Faezeh Kalantari, Mehrnoosh Zaeifi, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé:
Context-Auditor: Context-sensitive Content Injection Mitigation. RAID 2022: 431-445 - [c29]Ananta Soneji, Faris Bugra Kokulu, Carlos E. Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé:
"Flawed, but like democracy we don't have a better system": The Experts' Insights on the Peer Review Process of Evaluating Security Papers. SP 2022: 1845-1862 - [c28]Jayakrishna Vadayath, Moritz Eckert, Kyle Zeng, Nicolaas Weideman, Gokulkrishna Praveen Menon, Yanick Fratantonio, Davide Balzarotti, Adam Doupé, Tiffany Bao, Ruoyu Wang, Christophe Hauser, Yan Shoshitaishvili:
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs. USENIX Security Symposium 2022: 413-430 - [i7]Pemma Reiter, Hui Jun Tay, Westley Weimer, Adam Doupé, Ruoyu Wang, Stephanie Forrest:
Automatically Mitigating Vulnerabilities in x86 Binary Programs via Partially Recompilable Decompilation. CoRR abs/2202.12336 (2022) - [i6]Faezeh Kalantari, Mehrnoosh Zaeifi, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé:
Context-Auditor: Context-sensitive Content Injection Mitigation. CoRR abs/2204.08592 (2022) - 2021
- [c27]Kuntal Kumar Pal, Kazuaki Kashihara, Pratyay Banerjee, Swaroop Mishra, Ruoyu Wang, Chitta Baral:
Constructing Flow Graphs from Procedural Cybersecurity Texts. ACL/IJCNLP (Findings) 2021: 3945-3957 - [c26]Jaswant Pakki, Yan Shoshitaishvili, Ruoyu Wang, Tiffany Bao, Adam Doupé:
Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask). Financial Cryptography (1) 2021: 117-146 - [c25]Pradeep Kumar Duraisamy Soundrapandian, Tiffany Bao, Jaejong Baek, Yan Shoshitaishvili, Adam Doupé, Ruoyu Wang, Gail-Joon Ahn:
MuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contracts. HICSS 2021: 1-10 - [c24]Sung Ta Dinh, Haehyun Cho, Kyle Martin, Adam Oest, Kyle Zeng, Alexandros Kapravelos, Gail-Joon Ahn, Tiffany Bao, Ruoyu Wang, Adam Doupé, Yan Shoshitaishvili:
Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases. NDSS 2021 - [c23]Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing. SP 2021: 1109-1124 - [c22]Zhibo Sun, Adam Oest, Penghui Zhang, Carlos E. Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service. USENIX Security Symposium 2021: 4169-4186 - [i5]Pratyay Banerjee, Kuntal Kumar Pal, Fish Wang, Chitta Baral:
Variable Name Recovery in Decompiled Binary Code using Constrained Masked Language Modeling. CoRR abs/2103.12801 (2021) - [i4]Marzieh Bitaab, Haehyun Cho, Adam Oest, Penghui Zhang, Zhibo Sun, Rana Pourmohamad, Doowon Kim, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Scam Pandemic: How Attackers Exploit Public Fear through Phishing. CoRR abs/2103.12843 (2021) - [i3]Kuntal Kumar Pal, Kazuaki Kashihara, Pratyay Banerjee, Swaroop Mishra, Ruoyu Wang, Chitta Baral:
Constructing Flow Graphs from Procedural Cybersecurity Texts. CoRR abs/2105.14357 (2021) - 2020
- [c21]Efrén López-Morales, Carlos E. Rubio-Medrano, Adam Doupé, Yan Shoshitaishvili, Ruoyu Wang, Tiffany Bao, Gail-Joon Ahn:
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems. CCS 2020: 279-291 - [c20]Marzieh Bitaab, Haehyun Cho, Adam Oest, Penghui Zhang, Zhibo Sun, Rana Pourmohamad, Doowon Kim, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Scam Pandemic: How Attackers Exploit Public Fear through Phishing. eCrime 2020: 1-10 - [c19]Muhui Jiang, Yajin Zhou, Xiapu Luo, Ruoyu Wang, Yang Liu, Kui Ren:
An empirical study on ARM disassembly tools. ISSTA 2020: 401-414 - [c18]Nilo Redini, Aravind Machiry, Ruoyu Wang, Chad Spensky, Andrea Continella, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware. SP 2020: 1544-1561 - [c17]Haehyun Cho, Jinbum Park, Joonwon Kang, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers. WOOT @ USENIX Security Symposium 2020
2010 – 2019
- 2019
- [c16]Christophe Hauser, Jayakrishna Menon, Yan Shoshitaishvili, Ruoyu Wang, Giovanni Vigna, Christopher Kruegel:
Sleak: automating address space layout derandomization. ACSAC 2019: 190-202 - [c15]Ronny Chevalier, Stefano Cristalli, Christophe Hauser, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, Danilo Bruschi, Andrea Lanzi:
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images. CODASPY 2019: 315-325 - [c14]Nilo Redini, Ruoyu Wang, Aravind Machiry, Yan Shoshitaishvili, Giovanni Vigna, Christopher Kruegel:
BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation. DIMVA 2019: 482-501 - [i2]Ronny Chevalier, Stefano Cristalli, Christophe Hauser, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, Danilo Bruschi, Andrea Lanzi:
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images. CoRR abs/1903.12505 (2019) - 2018
- [j1]Yan Shoshitaishvili, Antonio Bianchi, Kevin Borgolte, Amat Cama, Jacopo Corbetta, Francesco Disperati, Andrew Dutcher, John Grosen, Paul Grosen, Aravind Machiry, Christopher Salls, Nick Stephens, Ruoyu Wang, Giovanni Vigna:
Mechanical Phish: Resilient Autonomous Hacking. IEEE Secur. Priv. 16(2): 12-22 (2018) - [c13]Weidong Cui, Xinyang Ge, Baris Kasikci, Ben Niu, Upamanyu Sharma, Ruoyu Wang, Insu Yun:
REPT: Reverse Debugging of Failures in Deployed Software. OSDI 2018: 17-32 - [c12]Moritz Eckert, Antonio Bianchi, Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security. USENIX Security Symposium 2018: 99-116 - 2017
- [c11]Yan Shoshitaishvili, Michael Weissbacher, Lukas Dresel, Christopher Salls, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna:
Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance. CCS 2017: 347-362 - [c10]Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, David Brumley:
How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games. CSF 2017: 7-21 - [c9]Aravind Machiry, Eric Gustafson, Chad Spensky, Christopher Salls, Nick Stephens, Ruoyu Wang, Antonio Bianchi, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna:
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments. NDSS 2017 - [c8]Ruoyu Wang, Yan Shoshitaishvili, Antonio Bianchi, Aravind Machiry, John Grosen, Paul Grosen, Christopher Kruegel, Giovanni Vigna:
Ramblr: Making Reassembly Great Again. NDSS 2017 - [c7]Fish Wang, Yan Shoshitaishvili:
Angr - The Next Generation of Binary Analysis. SecDev 2017: 8-9 - [c6]Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, David Brumley:
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits. IEEE Symposium on Security and Privacy 2017: 824-839 - [i1]Yan Shoshitaishvili, Michael Weissbacher, Lukas Dresel, Christopher Salls, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna:
Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance. CoRR abs/1708.02749 (2017) - 2016
- [c5]Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
Driller: Augmenting Fuzzing Through Selective Symbolic Execution. NDSS 2016 - [c4]Yan Shoshitaishvili, Ruoyu Wang, Christopher Salls, Nick Stephens, Mario Polino, Andrew Dutcher, John Grosen, Siji Feng, Christophe Hauser, Christopher Krügel, Giovanni Vigna:
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis. IEEE Symposium on Security and Privacy 2016: 138-157 - 2015
- [c3]Yan Shoshitaishvili, Ruoyu Wang, Christophe Hauser, Christopher Kruegel, Giovanni Vigna:
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. NDSS 2015 - 2013
- [c2]Xun Lu, Jianwei Zhuge, Ruoyu Wang, Yinzhi Cao, Yan Chen:
De-obfuscation and Detection of Malicious PDF Files with High Accuracy. HICSS 2013: 4890-4899 - [c1]Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services. USENIX Security Symposium 2013: 687-702
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 19:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint