Ruilin Li

Orcid: 0000-0003-4395-1351

Affiliations:
  • National University of Defense Technology, College of Electronic Science and Technology, Changsha, China
  • National University of Defense Technology, Science College, Department of Mathematics and System Science, Changsha, China


According to our database1, Ruilin Li authored at least 33 papers between 2008 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Practical Object-Level Sanitizer with Aggregated Memory Access and Custom Allocator.
Proceedings of the 47th IEEE/ACM International Conference on Software Engineering, 2025

2023
Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing.
Proceedings of the 32nd USENIX Security Symposium, 2023

CapSan-UB: Bug Capabilities Detector Based on Undefined Behavior.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

2022
Pusher: an augmented fuzzer based on the connection between input and comparison operand.
Frontiers Comput. Sci., 2022

Automated detection on the security of the linked-list operations.
Frontiers Comput. Sci., 2022

Default: Mutual Information-based Crash Triage for Massive Crashes.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
Reducing Test Cases with Attention Mechanism of Neural Networks.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Automated Data-Processing Function Identification Using Deep Neural Network.
IEEE Access, 2020

2019
Program State Sensitive Parallel Fuzzing for Real World Software.
IEEE Access, 2019

2018
A real-time inversion attack on the GMR-2 cipher used in the satellite phones.
Sci. China Inf. Sci., 2018

2017
Automatic Reverse Engineering of Private Flight Control Protocols of UAVs.
Secur. Commun. Networks, 2017

Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers.
Proceedings of the Information Security Practice and Experience, 2017

Enhancing Anonymity of Bitcoin Based on Ring Signature Algorithm.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2016
Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis.
IACR Cryptol. ePrint Arch., 2016

2015
Differential fault analysis on LED using Super-Sbox.
IET Inf. Secur., 2015

Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis.
IACR Cryptol. ePrint Arch., 2015

2014
On the Practical Security Bound of GF-NLFSR Structure with SPN Round Function.
Proceedings of the Provable Security - 8th International Conference, 2014

2013
Fault analysis study of the block cipher FOX64.
Multim. Tools Appl., 2013

Security evaluation of MISTY structure with SPN round function.
Comput. Math. Appl., 2013

A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

2012
On Algebraic Property of T-Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

2011
A meet-in-the-middle attack on reduced-round ARIA.
J. Syst. Softw., 2011

Impossible differential cryptanalysis of 13-round CLEFIA-128.
J. Syst. Softw., 2011

Differential Fault Analysis on SMS4 using a single fault.
Inf. Process. Lett., 2011

Impossible differential cryptanalysis of SPN ciphers.
IET Inf. Secur., 2011

2010
Improved Fault Attack on FOX.
IACR Cryptol. ePrint Arch., 2010

A Meet-in-the-Middle Attack on ARIA.
IACR Cryptol. ePrint Arch., 2010

Some Observations on MISTY Structure with SPN Round Function.
IACR Cryptol. ePrint Arch., 2010

SQUARE attack on block ciphers with low algebraic degree.
Sci. China Inf. Sci., 2010

Cryptanalysis of a Generalized Unbalanced Feistel Network Structure.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Distinguishing Attacks on a Kind of Generalized Unbalanced Feistel Network.
IACR Cryptol. ePrint Arch., 2009

Differential Fault Analysis on SHACAL-1.
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009

2008
New Impossible Differential Cryptanalysis of ARIA.
IACR Cryptol. ePrint Arch., 2008


  Loading...