Name
Affiliation
Papers
RUOYU WANG
Tsinghua Univ, Inst Network Sci & Cyberspace, Beijing, Peoples R China
22
Collaborators
Citations 
PageRank 
78
282
16.23
Referers 
Referees 
References 
843
431
192
Search Limit
100843
Title
Citations
PageRank
Year
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing00.342022
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs00.342022
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing10.382021
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service00.342021
An Empirical Study on ARM Disassembly Tools20.372020
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems50.462020
Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware50.442020
BootKeeper - Validating Software Integrity Properties on Boot Firmware Images.00.342019
Sleak: automating address space layout derandomization10.382019
Mechanical Phish: Resilient Autonomous Hacking.20.392018
A 12 Bit 120 Ms/S Sha-Less Pipeline Adc With Capacitor Mismatch Error Calibration00.342018
REPT: Reverse Debugging of Failures in Deployed Software.00.342018
HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security.00.342018
How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games00.342017
Ramblr: Making Reassembly Great Again.90.492017
Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance.200.902017
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits80.762017
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis.641.822016
Driller: Augmenting Fuzzing Through Selective Symbolic Execution.932.702016
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.523.332015
De-obfuscation and Detection of Malicious PDF Files with High Accuracy110.562013
Steal this movie - automatically bypassing DRM protection in streaming media services90.572013