Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Daniel P. Kennedy
Yong Wang
Dan Graur
Barbara Aquilani
Roland Zumkeller
Maximilian Dürr
Liangliang Shang
Dexiang Li
Chen Ma
Yong Fang
Home
/
Author
/
RUOYU WANG
Author Info
Open Visualization
Name
Affiliation
Papers
RUOYU WANG
Tsinghua Univ, Inst Network Sci & Cyberspace, Beijing, Peoples R China
22
Collaborators
Citations
PageRank
78
282
16.23
Referers
Referees
References
843
431
192
Search Limit
100
843
Publications (22 rows)
Collaborators (78 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing
0
0.34
2022
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs
0
0.34
2022
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing
1
0.38
2021
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service
0
0.34
2021
An Empirical Study on ARM Disassembly Tools
2
0.37
2020
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems
5
0.46
2020
Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware
5
0.44
2020
BootKeeper - Validating Software Integrity Properties on Boot Firmware Images.
0
0.34
2019
Sleak: automating address space layout derandomization
1
0.38
2019
Mechanical Phish: Resilient Autonomous Hacking.
2
0.39
2018
A 12 Bit 120 Ms/S Sha-Less Pipeline Adc With Capacitor Mismatch Error Calibration
0
0.34
2018
REPT: Reverse Debugging of Failures in Deployed Software.
0
0.34
2018
HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security.
0
0.34
2018
How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games
0
0.34
2017
Ramblr: Making Reassembly Great Again.
9
0.49
2017
Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance.
20
0.90
2017
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits
8
0.76
2017
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis.
64
1.82
2016
Driller: Augmenting Fuzzing Through Selective Symbolic Execution.
93
2.70
2016
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.
52
3.33
2015
De-obfuscation and Detection of Malicious PDF Files with High Accuracy
11
0.56
2013
Steal this movie - automatically bypassing DRM protection in streaming media services
9
0.57
2013
1