• 245 Citations
  • 4 h-Index
20132022

Research output per year

If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Ruoyu Wang is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 9 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

  • 245 Citations
  • 4 h-Index
  • 8 Conference contribution

BinTrimmer: Towards static binary debloating through abstract interpretation

Redini, N., Wang, R., Machiry, A., Shoshitaishvili, Y., Vigna, G. & Kruegel, C., Jan 1 2019, Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Proceedings. Maurice, C., Giacinto, G., Perdisci, R., Almgren, M. & Perdisci, R. (eds.). Springer Verlag, p. 482-501 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11543 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 1 Scopus citations

    SLeak: Automating address space layout derandomization

    Hauser, C., Menon, J., Shoshitaishvili, Y., Wang, R., Vigna, G. & Kruegel, C., Dec 9 2019, Proceedings - 35th Annual Computer Security Applications Conference, ACSAC 2019. Association for Computing Machinery, p. 190-202 13 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • HEAPHOPPER: Bringing bounded model CheckingtoHeap implementation security

    Eckert, M., Bianchi, A., Wang, R., Shoshitaishvili, Y., Kruegel, C. & Vigna, G., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 99-116 18 p. (Proceedings of the 27th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • How Shall We Play a Game? A Game-theoretical Model for Cyber-warfare Games

    Bao, T., Shoshitaishvili, Y., Wang, R., Kruegel, C., Vigna, G. & Brumley, D., Sep 25 2017, Proceedings - IEEE 30th Computer Security Foundations Symposium, CSF 2017. IEEE Computer Society, p. 7-21 15 p. 8049648

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 3 Scopus citations

    Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits

    Bao, T., Wang, R., Shoshitaishvili, Y. & Brumley, D., Jun 23 2017, 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 824-839 16 p. 7958612

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 15 Scopus citations

    Projects