Ruoyu Wang [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale BlackHatAsia-2020 - Virtual, Virtual
Sleak: Automating Address Space Layout Derandomization ACSAC2019-2019 - San Juan, Puerto Rico
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images CODASPY2019-2019 - Dallas, United States
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images CODASPY2019-2019 - Dallas, United States
HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security 27thUsenixSecuritySymposium-2018 - Vancouver, Canada
HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security 27thUsenixSecuritySymposium-2018 - Vancouver, Canada
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments NDSS-2017 - california,usa
Driller: Augmenting Fuzzing Through Selective Symbolic Execution NDSS-2016 - california,usa
Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services USENIX-2013 - Washington, D.C.