Export 6 results:
Filters: Author is Ruoyu Wang  [Clear All Filters]
Eckert M, Bianchi A, Wang R, Shoshitaishvili Y, Kruegel C, Vigna G.  2018.  HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security. 27th USENIX Security Symposium (USENIX Security 18). :99--116.
Cui W, Ge X, Kasikci B, Niu B, Sharma U, Wang R, Yun I.  2018.  REPT: Reverse Debugging of Failures in Deployed Software. 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). :17--32.