scispace - formally typeset
R

Ruoyu Wang

Researcher at Arizona State University

Publications -  43
Citations -  2639

Ruoyu Wang is an academic researcher from Arizona State University. The author has contributed to research in topics: Computer science & Firmware. The author has an hindex of 14, co-authored 33 publications receiving 1773 citations. Previous affiliations of Ruoyu Wang include Tsinghua University & University of California, Santa Barbara.

Papers
More filters
Proceedings ArticleDOI

Driller: Augmenting Fuzzing Through Selective Symbolic Execution.

TL;DR: Driller is presented, a hybrid vulnerability excavation tool which leverages fuzzing and selective concolic execution in a complementary manner, to find deeper bugs and mitigate their weaknesses, avoiding the path explosion inherent in concolic analysis and the incompleteness of fuzzing.
Proceedings ArticleDOI

SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis

TL;DR: This paper presents a binary analysis framework that implements a number of analysis techniques that have been proposed in the past and implements these techniques in a unifying framework, which allows other researchers to compose them and develop new approaches.
Proceedings ArticleDOI

Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.

TL;DR: Firmalice is presented, a binary analysis framework to support the analysis of firmware running on embedded devices that utilizes a novel model of authentication bypass flaws, based on the attacker’s ability to determine the required inputs to perform privileged operations.
Proceedings ArticleDOI

Ramblr: Making Reassembly Great Again.

TL;DR: This paper presents a new systematic approach for binary reassembling that is implemented in a tool called Ramblr and successfully reassembles most of the binaries, which is an improvement over the state-of-the-art approach.
Proceedings ArticleDOI

BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.

TL;DR: This paper introduces BOOMERANG, a class of vulnerabilities that arises due to this semantic separation between the TEE and the untrusted environment, and evaluated the two most promising defense proposals and their inherent trade-offs.