Follow
Ruoyu "Fish" Wang
Ruoyu "Fish" Wang
Verified email at asu.edu - Homepage
Title
Cited by
Cited by
Year
SOK:(State of) The Art of War: Offensive Techniques in Binary Analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
Security and Privacy (S&P), 2016 IEEE Symposium on, 138-157, 2016
12072016
Driller: Augmenting Fuzzing Through Selective Symbolic Execution
N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ...
Proceedings of the Network and Distributed System Security Symposium, 2016
11232016
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware
Y Shoshitaishvili, R Wang, C Hauser, C Kruegel, G Vigna
Proceedings of the Network and Distributed System Security Symposium, 2015
4762015
Ramblr: Making Reassembly Great Again
R Wang, Y Shoshitaishvili, A Bianchi, A Machiry, J Grosen, P Grosen, ...
Proceedings of the Network and Distributed System Security Symposium, 2017
1772017
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments
A Machiry, E Gustafson, C Spensky, C Salls, N Stephens, R Wang, ...
Proceedings of the Network and Distributed System Security Symposium, 2017
1282017
KARONTE: Detecting Insecure Multi-binary Interactions in Embedded Firmware
N Redini, A Machiry, R Wang, C Spensky, A Continella, Y Shoshitaishvili, ...
2020 IEEE Symposium on Security and Privacy (SP), 431-448, 2020
972020
{REPT}: Reverse debugging of failures in deployed software
W Cui, X Ge, B Kasikci, B Niu, U Sharma, R Wang, I Yun
13th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2018
972018
Angr-the next generation of binary analysis
F Wang, Y Shoshitaishvili
2017 IEEE Cybersecurity Development (SecDev), 8-9, 2017
892017
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing
P Zhang, A Oest, H Cho, Z Sun, RC Johnson, B Wardman, S Sarker, ...
IEEE Symposium on Security and Privacy, 2021
752021
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits
T Bao, R Wang, Y Shoshitaishvili, D Brumley
Security and Privacy (SP), 2017 IEEE Symposium on, 824-839, 2017
722017
Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services
R Wang, Y Shoshitaishvili, C Kruegel, G Vigna
Proceedings of the 22nd USENIX conference on Security, 687-702, 2013
722013
Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance
Y Shoshitaishvili, M Weissbacher, L Dresel, C Salls, R Wang, C Kruegel, ...
692017
{HeapHopper}: Bringing bounded model checking to heap implementation security
M Eckert, A Bianchi, R Wang, Y Shoshitaishvili, C Kruegel, G Vigna
27th USENIX Security Symposium (USENIX Security 18), 99-116, 2018
672018
De-obfuscation and Detection of Malicious PDF Files with High Accuracy
X Lu, J Zhuge, R Wang, Y Cao, Y Chen
System Sciences (HICSS), 2013 46th Hawaii International Conference on, 4890-4899, 2013
642013
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems
GJA Efrén López-Morales, Carlos Rubio-Medrano, Adam Doupé, Yan ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
592020
Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases.
ST Dinh, H Cho, K Martin, A Oest, K Zeng, A Kapravelos, GJ Ahn, T Bao, ...
NDSS, 2021
432021
Scam pandemic: How attackers exploit public fear through phishing
M Bitaab, H Cho, A Oest, P Zhang, Z Sun, R Pourmohamad, D Kim, T Bao, ...
2020 APWG Symposium on Electronic Crime Research (eCrime), 1-10, 2020
412020
BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation
N Redini, R Wang, A Machiry, Y Shoshitaishvili, G Vigna, C Kruegel
Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019
412019
An empirical study on arm disassembly tools
M Jiang, Y Zhou, X Luo, R Wang, Y Liu, K Ren
Proceedings of the 29th ACM SIGSOFT international symposium on software …, 2020
332020
Mechanical phish: Resilient autonomous hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
282018
The system can't perform the operation now. Try again later.
Articles 1–20