Andrew Ruef

According to our database1, Andrew Ruef authored at least 17 papers between 2013 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Build It, Break It, Fix It: Contesting Secure Development.
ACM Trans. Priv. Secur., 2020

2019
Achieving Safety Incrementally with Checked C.
Proceedings of the Principles of Security and Trust - 8th International Conference, 2019

2018
Tools and Experiments for Software Security.
PhD thesis, 2018

Checked C: Making C Safe by Extension.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

Volume-Based Merge Heuristics for Disjunctive Numeric Domains.
Proceedings of the Static Analysis - 25th International Symposium, 2018

Evaluating Design Tradeoffs in Numeric Static Analysis for Java.
Proceedings of the Programming Languages and Systems, 2018

Evaluating Fuzz Testing.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning.
CoRR, 2017

Counterexample-guided approach to finding numerical invariants.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Measuring cyber attribution in games.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017

2016
Build It, Break It, Fix It: Contesting Secure Development.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Argumentation models for cyber attribution.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

Cyber-Deception and Attribution in Capture-the-Flag Exercises.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016

2015
Programming Language Theoretic Security in the Real World: A Mirage or the Future?
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015

Cyber Attacks and Public Embarrassment: A Survey of Some Notable Hacks.
CoRR, 2015

Cyber-Deception and Attribution in Capture-the-Flag Exercises.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2013
The Dragon and the Computer: Why Intellectual Property Theft is Compatible with Chinese Cyber-Warfare Doctrine.
CoRR, 2013


  Loading...