USENIX reaffirms its commitment to diversity, equity, and inclusion.
Biblio
Export 5 results:
Filters: Author is Ruoyu Wang [Clear All Filters]
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service. 30th USENIX Security Symposium (USENIX Security 21). :4169--4186.
.
2021. Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers. 14th USENIX Workshop on Offensive Technologies (WOOT 20).
.
2020. HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security. 27th USENIX Security Symposium (USENIX Security 18). :99--116.
.
2018. REPT: Reverse Debugging of Failures in Deployed Software. 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). :17--32.
.
2018. Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services. 22nd USENIX Security Symposium (USENIX Security 13). :687--702.
.
2013.