Ruoyu Wang
Orcid: 0000-0003-1524-2566Affiliations:
- Arizona State University, USA
- University of California Santa Barbara, Department of Computer Science, SecLab, CA, USA (former)
- Tsinghua University, Institute of Network Science and Cyberspace, Beijing, China (former)
According to our database1,
Ruoyu Wang
authored at least 56 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services.
Proceedings of the 33rd USENIX Security Symposium, 2024
Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation.
Proceedings of the 33rd USENIX Security Symposium, 2024
"Len or index or count, anything but v1": Predicting Variable Names in Decompilation Output with Transfer Learning.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
"Watching over the shoulder of a professional": Why Hackers Make Mistakes and How They Fix Them.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
SandPuppy: Deep-State Fuzzing Guided by Automatic Detection of State-Representative Variables.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Deep Dive into Client-Side Anti-Phishing: A Longitudinal Study Bridging Academia and Industry.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
IEEE Trans. Software Eng., April, 2023
Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IEEE Secur. Priv., 2022
Automatically Mitigating Vulnerabilities in x86 Binary Programs via Partially Recompilable Decompilation.
CoRR, 2022
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs.
Proceedings of the 31st USENIX Security Symposium, 2022
"Flawed, but like democracy we don't have a better system": The Experts' Insights on the Peer Review Process of Evaluating Security Papers.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Boston, Massachusetts, USA, July 9, 2022
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
ViK: practical mitigation of temporal memory safety violations through object ID inspection.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022
2021
Variable Name Recovery in Decompiled Binary Code using Constrained Masked Language Modeling.
CoRR, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
MuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contracts.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021
2020
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020
Proceedings of the APWG Symposium on Electronic Crime Research, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation, 2018
2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
2015
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
2013
Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013