Ruoyu "Fish" Wang
Arizona State University
H-index: 21
North America-United States
Top articles of Ruoyu "Fish" Wang
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation | 33st USENIX Security Symposium (USENIX Security 24) | Zion Leonahenahe Basque Ati Priya Bajaj Wil Gibbs Jude O’Kain Derron Miao | 2024/8 |
"Len or index or count, anything but v1": Predicting Variable Names in Decompilation Output with Transfer Learning | Kuntal Kumar Pal Ati Priya Bajaj Pratyay Banerjee Audrey Dutcher Mutsumi Nakamura | 2024/5 | |
Toss a fault to your witcher: Applying grey-box coverage-guided mutational fuzzing to detect sql and command injection vulnerabilities | Erik Trickel Fabio Pagani Chang Zhu Lukas Dresel Giovanni Vigna | 2023/5/21 | |
RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections | Kyle Zeng Zhenpeng Lin Kangjie Lu Xinyu Xing Ruoyu Wang | 2023/11/15 | |
angr: A Powerful and User-friendly Binary Analysis Platform | Yan Shoshitaishvili Ruoyu Wang Audrey Dutcher Christopher Kruegel Giovanni Vigna | 2023 | |
Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images | Eric Gustafson Paul Grosen Nilo Redini Saagar Jha Andrea Continella | 2023/10/16 | |
Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation | Hui Jun Tay Kyle Zeng Jayakrishna Menon Vadayath Arvind S Raj Audrey Dutcher | 2023/8 | |
Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer | Jaejong Baek Pradeep Kumar Duraisamy Soundrapandian Sukwha Kyung Ruoyu Wang Yan Shoshitaishvili | 2023/6/27 | |
MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries | Xingman Chen Yinghao Shi Zheyu Jiang Yuan Li Ruoyu Wang | 2023/8 | |
BEYOND PHISH: Toward Detecting Fraudulent e-Commerce Websites at Scale | Marzieh Bitaab Haehyun Cho Adam Oest Zhuoer Lyu Wei Wang | 2023/5/21 | |
Exploring the Limits of ChatGPT in Software Security Applications | arXiv preprint arXiv:2312.05275 | Fangzhou Wu Qingzhao Zhang Ati Priya Bajaj Tiffany Bao Ning Zhang | 2023/12/8 |
Context-auditor: Context-sensitive content injection mitigation | Faezeh Kalantari Mehrnoosh Zaeifi Tiffany Bao Ruoyu Wang Yan Shoshitaishvili | 2022/10/26 | |
Arbiter: Bridging the static and dynamic divide in vulnerability discovery on binary programs | Jayakrishna Vadayath Moritz Eckert Kyle Zeng Nicolaas Weideman Gokulkrishna Praveen Menon | 2022 | |
Improving source-code representations to enhance search-based software repair | Pemma Reiter Antonio M Espinoza Adam Doupé Ruoyu Wang Westley Weimer | 2022/7/8 | |
A Comprehensive Study on ARM Disassembly Tools | IEEE Transactions on Software Engineering | Muhui Jiang Qinming Dai Wenlong Zhang Rui Chang Yajin Zhou | 2022/7/4 |
“Flawed, but like democracy we don’t have a better system”: The Experts’ Insights on the Peer Review Process of Evaluating Security Papers | Ananta Soneji Faris Bugra Kokulu Carlos Rubio-Medrano Tiffany Bao Ruoyu Wang | 2022/5/22 | |
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior | Penghui Zhang Zhibo Sun Sukwha Kyung Hans Walter Behrens Zion Leonahenahe Basque | 2022/11/7 | |
ViK: practical mitigation of temporal memory safety violations through object ID inspection | Haehyun Cho Jinbum Park Adam Oest Tiffany Bao Ruoyu Wang | 2022/2/28 | |
Automatically mitigating vulnerabilities in x86 binary programs via partially recompilable decompilation | arXiv preprint arXiv:2202.12336 | Pemma Reiter Hui Jun Tay Westley Weimer Adam Doupé Ruoyu Wang | 2022/2/24 |
Variable Name Recovery in Decompiled Binary Code using Constrained Masked Language Modeling | arXiv preprint arXiv:2103.12801 | Pratyay Banerjee Kuntal Kumar Pal Fish Wang Chitta Baral | 2021/3/23 |