USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 8 results:
Filters: Author is Ruoyu Wang [Clear All Filters]
Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation. 32nd USENIX Security Symposium (USENIX Security 23). :5791--5808.
.
2023. MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries. 32nd USENIX Security Symposium (USENIX Security 23). :841--858.
.
2023. Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs. 31st USENIX Security Symposium (USENIX Security 22). :413--430.
.
2022. Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service. 30th USENIX Security Symposium (USENIX Security 21). :4169--4186.
.
2021. Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers. 14th USENIX Workshop on Offensive Technologies (WOOT 20).
.
2020. HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security. 27th USENIX Security Symposium (USENIX Security 18). :99--116.
.
2018. REPT: Reverse Debugging of Failures in Deployed Software. 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). :17--32.
.
2018. Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services. 22nd USENIX Security Symposium (USENIX Security 13). :687--702.
.
2013.