R
Ruoyu Wang
Researcher at Arizona State University
Publications - 43
Citations - 2639
Ruoyu Wang is an academic researcher from Arizona State University. The author has contributed to research in topics: Computer science & Firmware. The author has an hindex of 14, co-authored 33 publications receiving 1773 citations. Previous affiliations of Ruoyu Wang include Tsinghua University & University of California, Santa Barbara.
Papers
More filters
Proceedings ArticleDOI
Driller: Augmenting Fuzzing Through Selective Symbolic Execution.
Nick Stephens,John Grosen,Christopher Salls,Andrew Dutcher,Ruoyu Wang,Jacopo Corbetta,Yan Shoshitaishvili,Christopher Kruegel,Giovanni Vigna +8 more
TL;DR: Driller is presented, a hybrid vulnerability excavation tool which leverages fuzzing and selective concolic execution in a complementary manner, to find deeper bugs and mitigate their weaknesses, avoiding the path explosion inherent in concolic analysis and the incompleteness of fuzzing.
Proceedings ArticleDOI
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis
Yan Shoshitaishvili,Ruoyu Wang,Christopher Salls,Nick Stephens,Mario Polino,Andrew Dutcher,John Grosen,Siji Feng,Christophe Hauser,Christopher Kruegel,Giovanni Vigna +10 more
TL;DR: This paper presents a binary analysis framework that implements a number of analysis techniques that have been proposed in the past and implements these techniques in a unifying framework, which allows other researchers to compose them and develop new approaches.
Proceedings ArticleDOI
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.
TL;DR: Firmalice is presented, a binary analysis framework to support the analysis of firmware running on embedded devices that utilizes a novel model of authentication bypass flaws, based on the attacker’s ability to determine the required inputs to perform privileged operations.
Proceedings ArticleDOI
Ramblr: Making Reassembly Great Again.
Ruoyu Wang,Yan Shoshitaishvili,Antonio Bianchi,Aravind Machiry,John Grosen,Paul Grosen,Christopher Kruegel,Giovanni Vigna +7 more
TL;DR: This paper presents a new systematic approach for binary reassembling that is implemented in a tool called Ramblr and successfully reassembles most of the binaries, which is an improvement over the state-of-the-art approach.
Proceedings ArticleDOI
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
Aravind Machiry,Eric Gustafson,Chad Spensky,Christopher Salls,Nick Stephens,Ruoyu Wang,Antonio Bianchi,Yung Ryn Choe,Christopher Kruegel,Giovanni Vigna +9 more
TL;DR: This paper introduces BOOMERANG, a class of vulnerabilities that arises due to this semantic separation between the TEE and the untrusted environment, and evaluated the two most promising defense proposals and their inherent trade-offs.