Ruoyu "Fish" Wang

Ruoyu "Fish" Wang

Arizona State University

H-index: 21

North America-United States

About Ruoyu "Fish" Wang

Ruoyu "Fish" Wang, With an exceptional h-index of 21 and a recent h-index of 21 (since 2020), a distinguished researcher at Arizona State University, specializes in the field of System Security, Binary Analysis.

His recent articles reflect a diverse array of research interests and contributions to the field:

Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation

"Len or index or count, anything but v1": Predicting Variable Names in Decompilation Output with Transfer Learning

Toss a fault to your witcher: Applying grey-box coverage-guided mutational fuzzing to detect sql and command injection vulnerabilities

RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections

angr: A Powerful and User-friendly Binary Analysis Platform

Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images

Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation

Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer

Ruoyu "Fish" Wang Information

University

Position

___

Citations(all)

4104

Citations(since 2020)

3343

Cited By

1922

hIndex(all)

21

hIndex(since 2020)

21

i10Index(all)

28

i10Index(since 2020)

27

Email

University Profile Page

Arizona State University

Google Scholar

View Google Scholar Profile

Ruoyu "Fish" Wang Skills & Research Interests

System Security

Binary Analysis

Top articles of Ruoyu "Fish" Wang

Title

Journal

Author(s)

Publication Date

Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation

33st USENIX Security Symposium (USENIX Security 24)

Zion Leonahenahe Basque

Ati Priya Bajaj

Wil Gibbs

Jude O’Kain

Derron Miao

...

2024/8

"Len or index or count, anything but v1": Predicting Variable Names in Decompilation Output with Transfer Learning

Kuntal Kumar Pal

Ati Priya Bajaj

Pratyay Banerjee

Audrey Dutcher

Mutsumi Nakamura

...

2024/5

Toss a fault to your witcher: Applying grey-box coverage-guided mutational fuzzing to detect sql and command injection vulnerabilities

Erik Trickel

Fabio Pagani

Chang Zhu

Lukas Dresel

Giovanni Vigna

...

2023/5/21

RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections

Kyle Zeng

Zhenpeng Lin

Kangjie Lu

Xinyu Xing

Ruoyu Wang

...

2023/11/15

angr: A Powerful and User-friendly Binary Analysis Platform

Yan Shoshitaishvili

Ruoyu Wang

Audrey Dutcher

Christopher Kruegel

Giovanni Vigna

2023

Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images

Eric Gustafson

Paul Grosen

Nilo Redini

Saagar Jha

Andrea Continella

...

2023/10/16

Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation

Hui Jun Tay

Kyle Zeng

Jayakrishna Menon Vadayath

Arvind S Raj

Audrey Dutcher

...

2023/8

Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer

Jaejong Baek

Pradeep Kumar Duraisamy Soundrapandian

Sukwha Kyung

Ruoyu Wang

Yan Shoshitaishvili

...

2023/6/27

MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries

Xingman Chen

Yinghao Shi

Zheyu Jiang

Yuan Li

Ruoyu Wang

...

2023/8

BEYOND PHISH: Toward Detecting Fraudulent e-Commerce Websites at Scale

Marzieh Bitaab

Haehyun Cho

Adam Oest

Zhuoer Lyu

Wei Wang

...

2023/5/21

Exploring the Limits of ChatGPT in Software Security Applications

arXiv preprint arXiv:2312.05275

Fangzhou Wu

Qingzhao Zhang

Ati Priya Bajaj

Tiffany Bao

Ning Zhang

...

2023/12/8

Context-auditor: Context-sensitive content injection mitigation

Faezeh Kalantari

Mehrnoosh Zaeifi

Tiffany Bao

Ruoyu Wang

Yan Shoshitaishvili

...

2022/10/26

Arbiter: Bridging the static and dynamic divide in vulnerability discovery on binary programs

Jayakrishna Vadayath

Moritz Eckert

Kyle Zeng

Nicolaas Weideman

Gokulkrishna Praveen Menon

...

2022

Improving source-code representations to enhance search-based software repair

Pemma Reiter

Antonio M Espinoza

Adam Doupé

Ruoyu Wang

Westley Weimer

...

2022/7/8

A Comprehensive Study on ARM Disassembly Tools

IEEE Transactions on Software Engineering

Muhui Jiang

Qinming Dai

Wenlong Zhang

Rui Chang

Yajin Zhou

...

2022/7/4

“Flawed, but like democracy we don’t have a better system”: The Experts’ Insights on the Peer Review Process of Evaluating Security Papers

Ananta Soneji

Faris Bugra Kokulu

Carlos Rubio-Medrano

Tiffany Bao

Ruoyu Wang

...

2022/5/22

I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior

Penghui Zhang

Zhibo Sun

Sukwha Kyung

Hans Walter Behrens

Zion Leonahenahe Basque

...

2022/11/7

ViK: practical mitigation of temporal memory safety violations through object ID inspection

Haehyun Cho

Jinbum Park

Adam Oest

Tiffany Bao

Ruoyu Wang

...

2022/2/28

Automatically mitigating vulnerabilities in x86 binary programs via partially recompilable decompilation

arXiv preprint arXiv:2202.12336

Pemma Reiter

Hui Jun Tay

Westley Weimer

Adam Doupé

Ruoyu Wang

...

2022/2/24

Variable Name Recovery in Decompiled Binary Code using Constrained Masked Language Modeling

arXiv preprint arXiv:2103.12801

Pratyay Banerjee

Kuntal Kumar Pal

Fish Wang

Chitta Baral

2021/3/23

See List of Professors in Ruoyu "Fish" Wang University(Arizona State University)

Co-Authors

H-index: 115
Christopher Kruegel

Christopher Kruegel

University of California, Santa Barbara

H-index: 65
Gail-Joon Ahn

Gail-Joon Ahn

Arizona State University

H-index: 43
David Brumley

David Brumley

Carnegie Mellon University

H-index: 31
Adam Doupé

Adam Doupé

Arizona State University

H-index: 28
Yan Shoshitaishvili

Yan Shoshitaishvili

Arizona State University

H-index: 20
Antonio Bianchi

Antonio Bianchi

Purdue University

academic-engine