Rui Wang

Affiliations:
  • Microsoft Research, Redmond, WA, USA
  • Indiana University, Bloomington, IN, USA


According to our database1, Rui Wang authored at least 13 papers between 2008 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2015
Securing Multiparty Online Services Via Certification of Symbolic Transactions.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

2014
Brahmastra: Driving Apps to Test the Security of Third-Party Components.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

2013
Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Unauthorized origin crossing on mobile platforms: threats and mitigation.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

2011
How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

2010
Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Sidebuster: automated detection and quantification of side-channel leaks in web application development.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Privacy-preserving genomic computation through program specialization.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Learning your identity and disease from research papers: information leaks in genome wide association study.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software .
Proceedings of the 17th USENIX Security Symposium, 2008

Towards automatic reverse engineering of software security configurations.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008


  Loading...