追蹤
Andrew Ruef
Andrew Ruef
未知關係機構
在 mimisbrunnr.net 的電子郵件地址已通過驗證
標題
引用次數
引用次數
年份
Evaluating fuzz testing
G Klees, A Ruef, B Cooper, S Wei, M Hicks
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
7542018
Identifying software execution behavior
AM Saunders, AW Ruef
US Patent 8,533,836, 2013
2482013
Introduction to cyber-warfare: A multidisciplinary approach
P Shakarian, J Shakarian, A Ruef
Newnes, 2013
2282013
Mcsema: Static translation of x86 instructions to llvm
A Dinaburg, A Ruef
ReCon 2014 Conference, Montreal, Canada, 2014
1012014
Build it, break it, fix it: Contesting secure development
A Ruef, M Hicks, J Parker, D Levin, ML Mazurek, P Mardziel
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
842016
Checked C: Making C safe by extension
AS Elliott, A Ruef, M Hicks, D Tarditi
2018 IEEE Cybersecurity Development (SecDev), 53-60, 2018
622018
Counterexample-guided approach to finding numerical invariants
TV Nguyen, T Antonopoulos, A Ruef, M Hicks
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
542017
Achieving safety incrementally with Checked C
A Ruef, L Lampropoulos, I Sweet, D Tarditi, M Hicks
Principles of Security and Trust: 8th International Conference, POST 2019 …, 2019
312019
Cyber-deception and attribution in capture-the-flag exercises
E Nunes, N Kulkarni, P Shakarian, A Ruef, J Little
Proceedings of the 2015 IEEE/ACM International Conference on Advances in …, 2015
302015
Argumentation models for cyber attribution
E Nunes, P Shakarian, GI Simari, A Ruef
2016 IEEE/ACM International Conference on Advances in Social Networks …, 2016
292016
Attacking iranian nuclear facilities: Stuxnet
P Shakarian, J Shakarian, A Ruef
Introduction to cyber-warfare: A multidisciplinary approach, 223-239, 2013
272013
Evaluating design tradeoffs in numeric static analysis for java
S Wei, P Mardziel, A Ruef, JS Foster, M Hicks
Programming Languages and Systems: 27th European Symposium on Programming …, 2018
222018
Summoning demons: The pursuit of exploitable bugs in machine learning
R Stevens, O Suciu, A Ruef, S Hong, M Hicks, T Dumitraş
arXiv preprint arXiv:1701.04739, 2017
222017
Systems and methods for tracking and recording events in a network of computing systems
M Viscuso, B Johnson, A Saunders, A Ruef, J McFarland
US Patent 10,185,822, 2019
182019
Build it, break it, fix it: Contesting secure development
J Parker, M Hicks, A Ruef, ML Mazurek, D Levin, D Votipka, P Mardziel, ...
ACM Transactions on Privacy and Security (TOPS) 23 (2), 1-36, 2020
172020
Checked C: Making C Safe by Extension. In 2018 IEEE Cybersecurity Development (SecDev). 53–60
AS Elliott, A Ruef, M Hicks, D Tarditi
132018
Artificial intelligence tools for cyber attribution
E Nunes, P Shakarian, GI Simari, A Ruef
Springer International Publishing, 2018
92018
The Dragon and the Computer: Why Intellectual Property Theft is Compatible with Chinese Cyber-Warfare Doctrine
P Shakarian, J Shakarian, A Ruef
arXiv preprint arXiv:1309.6450, 2013
82013
Cyber attacks by nonstate hacking groups: The case of Anonymous and its affiliates
P Shakarian, J Shakarian, A Ruef
Shakarian P., Shakarian J., Ruef A. Introduction to Cyber-Warfare Syngress …, 2013
72013
Build it break it: Measuring and comparing development security
A Ruef, M Hicks, J Parker, D Levin, A Memon, J Plane, P Mardziel
8th Workshop on Cyber Security Experimentation and Test (CSET 15), 2015
62015
系統目前無法執行作業,請稍後再試。
文章 1–20