• 230 Citations
  • 4 h-Index
20132022
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Dive into the research topics where Ruoyu Wang is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 5 Similar Profiles
Media streaming Engineering & Materials Science
Video on demand Engineering & Materials Science
Transplants Engineering & Materials Science
Binary codes Engineering & Materials Science
Abstract Interpretation Mathematics
Military operations Engineering & Materials Science
Metadata Engineering & Materials Science
Data storage equipment Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2013 2019

  • 230 Citations
  • 4 h-Index
  • 7 Conference contribution

BinTrimmer: Towards static binary debloating through abstract interpretation

Redini, N., Wang, R., Machiry, A., Shoshitaishvili, Y., Vigna, G. & Kruegel, C., Jan 1 2019, Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Proceedings. Maurice, C., Giacinto, G., Perdisci, R., Almgren, M. & Perdisci, R. (eds.). Springer Verlag, p. 482-501 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11543 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract Interpretation
Binary
Acoustic waves
Engineers
Interval

HEAPHOPPER: Bringing bounded model CheckingtoHeap implementation security

Eckert, M., Bianchi, A., Wang, R., Shoshitaishvili, Y., Kruegel, C. & Vigna, G., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 99-116 18 p. (Proceedings of the 27th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Metadata
Data storage equipment
2 Citations (Scopus)

How Shall We Play a Game? A Game-theoretical Model for Cyber-warfare Games

Bao, T., Shoshitaishvili, Y., Wang, R., Kruegel, C., Vigna, G. & Brumley, D., Sep 25 2017, Proceedings - IEEE 30th Computer Security Foundations Symposium, CSF 2017. IEEE Computer Society, p. 7-21 15 p. 8049648

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Military operations
Game theory
Decision making
14 Citations (Scopus)

Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits

Bao, T., Wang, R., Shoshitaishvili, Y. & Brumley, D., Jun 23 2017, 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 824-839 16 p. 7958612

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Transplants
Remediation
Data storage equipment
172 Citations (Scopus)

SOK: (State of) the Art of War: Offensive Techniques in Binary Analysis

Shoshitaishvili, Y., Wang, R., Salls, C., Stephens, N., Polino, M., Dutcher, A., Grosen, J., Feng, S., Hauser, C., Kruegel, C. & Vigna, G., Aug 16 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016. Institute of Electrical and Electronics Engineers Inc., p. 138-157 20 p. 7546500

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary codes
Data structures

Projects 2018 2022