Ruowen Wang

Orcid: 0000-0002-9824-1026

According to our database1, Ruowen Wang authored at least 11 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Automatic Permission Check Analysis for Linux Kernel.
IEEE Trans. Dependable Secur. Comput., 2023

2020
From Sentiment to Well-Being: Internet Users in an Uncertain and Risky Environment.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Does "COVID" Search via Social Networking Sites Cause COVID-19 Fatality Growth?
Proceedings of the 41st International Conference on Information Systems, 2020

2019
PeX: A Permission Check Analysis Framework for Linux Kernel.
Proceedings of the 28th USENIX Security Symposium, 2019

A Lightweight Framework for Fine-Grained Lifecycle Control of Android Applications.
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019

2017
NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
SKEE: A lightweight Secure Kernel-level Execution Environment for ARM.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning.
Proceedings of the 24th USENIX Security Symposium, 2015

2013
MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2010
Always up-to-date: scalable offline patching of VM images in a compute cloud.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010


  Loading...