Ruoyu Wang

Orcid: 0000-0003-1524-2566

Affiliations:
  • Arizona State University, USA
  • University of California Santa Barbara, Department of Computer Science, SecLab, CA, USA (former)
  • Tsinghua University, Institute of Network Science and Cyberspace, Beijing, China (former)


According to our database1, Ruoyu Wang authored at least 45 papers between 2013 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Comprehensive Study on ARM Disassembly Tools.
IEEE Trans. Software Eng., April, 2023

Exploring the Limits of ChatGPT in Software Security Applications.
CoRR, 2023

Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation.
Proceedings of the 32nd USENIX Security Symposium, 2023

MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries.
Proceedings of the 32nd USENIX Security Symposium, 2023

Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing.
IEEE Secur. Priv., 2022

Automatically Mitigating Vulnerabilities in x86 Binary Programs via Partially Recompilable Decompilation.
CoRR, 2022

Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs.
Proceedings of the 31st USENIX Security Symposium, 2022

"Flawed, but like democracy we don't have a better system": The Experts' Insights on the Peer Review Process of Evaluating Security Papers.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Context-Auditor: Context-sensitive Content Injection Mitigation.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Improving source-code representations to enhance search-based software repair.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Boston, Massachusetts, USA, July 9, 2022

I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

ViK: practical mitigation of temporal memory safety violations through object ID inspection.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022

2021
Variable Name Recovery in Decompiled Binary Code using Constrained Masked Language Modeling.
CoRR, 2021

Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service.
Proceedings of the 30th USENIX Security Symposium, 2021

Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

MuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contracts.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask).
Proceedings of the Financial Cryptography and Data Security, 2021

Constructing Flow Graphs from Procedural Cybersecurity Texts.
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021

2020
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

An empirical study on ARM disassembly tools.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

Scam Pandemic: How Attackers Exploit Public Fear through Phishing.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

BootKeeper: Validating Software Integrity Properties on Boot Firmware Images.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Sleak: automating address space layout derandomization.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Mechanical Phish: Resilient Autonomous Hacking.
IEEE Secur. Priv., 2018

HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security.
Proceedings of the 27th USENIX Security Symposium, 2018

REPT: Reverse Debugging of Failures in Deployed Software.
Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation, 2018

2017
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Angr - The Next Generation of Binary Analysis.
Proceedings of the IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, 2017

Ramblr: Making Reassembly Great Again.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Driller: Augmenting Fuzzing Through Selective Symbolic Execution.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2013
Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

De-obfuscation and Detection of Malicious PDF Files with High Accuracy.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013


  Loading...