Andrew Ruef
Andrew Ruef
Unknown affiliation
Verified email at mimisbrunnr.net
Title
Cited by
Cited by
Year
Identifying software execution behavior
AM Saunders, AW Ruef
US Patent 8,533,836, 2013
1652013
Introduction to cyber-warfare: A multidisciplinary approach
P Shakarian, J Shakarian, A Ruef
Newnes, 2013
1382013
Evaluating fuzz testing
G Klees, A Ruef, B Cooper, S Wei, M Hicks
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1342018
Mcsema: Static translation of x86 instructions to llvm
A Dinaburg, A Ruef
ReCon 2014 Conference, Montreal, Canada, 2014
392014
Build it, break it, fix it: Contesting secure development
A Ruef, M Hicks, J Parker, D Levin, ML Mazurek, P Mardziel
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
382016
Cyber-deception and attribution in capture-the-flag exercises
E Nunes, N Kulkarni, P Shakarian, A Ruef, J Little
Cyber Deception, 149-165, 2016
192016
Counterexample-guided approach to finding numerical invariants
TV Nguyen, T Antonopoulos, A Ruef, M Hicks
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
172017
Checked C: Making C safe by extension
AS Elliott, A Ruef, M Hicks, D Tarditi
2018 IEEE Cybersecurity Development (SecDev), 53-60, 2018
142018
Summoning demons: The pursuit of exploitable bugs in machine learning
R Stevens, O Suciu, A Ruef, S Hong, M Hicks, T Dumitraş
arXiv preprint arXiv:1701.04739, 2017
122017
Attacking Iranian Nuclear Facilities: Stuxnet
P Shakarian, J Shakarian, A Ruef
Introduction to cyber-warfare: A multidisciplinary approach, 223-239, 2013
102013
Systems and methods for tracking and recording events in a network of computing systems
M Viscuso, B Johnson, A Saunders, A Ruef, J McFarland
US Patent 10,185,822, 2019
92019
Argumentation models for cyber attribution
E Nunes, P Shakarian, GI Simari, A Ruef
2016 IEEE/ACM International Conference on Advances in Social Networks …, 2016
82016
Evaluating design tradeoffs in numeric static analysis for Java
S Wei, P Mardziel, A Ruef, JS Foster, M Hicks
European Symposium on Programming, 653-682, 2018
72018
Cyber attacks and public embarrassment: A survey of some notable hacks
J Shakarian, P Shakarian, A Ruef
arXiv preprint arXiv:1501.05990, 2015
62015
Build it break it: Measuring and comparing development security
A Ruef, M Hicks, J Parker, D Levin, A Memon, J Plane, P Mardziel
8th Workshop on Cyber Security Experimentation and Test ({CSET} 15), 2015
52015
The Dragon and the Computer: Why Intellectual Property Theft is Compatible with Chinese Cyber-Warfare Doctrine
P Shakarian, J Shakarian, A Ruef
arXiv preprint arXiv:1309.6450, 2013
52013
Achieving safety incrementally with checked c
A Ruef, L Lampropoulos, I Sweet, D Tarditi, M Hicks
International Conference on Principles of Security and Trust, 76-98, 2019
42019
Volume-based merge heuristics for disjunctive numeric domains
A Ruef, K Hietala, A Cox
International Static Analysis Symposium, 383-401, 2018
22018
Programming Language Theoretic Security in the Real World: A Mirage or the Future?
A Ruef, C Rohlf
Cyber Warfare, 307-321, 2015
22015
Build it, break it, fix it: Contesting secure development
J Parker, M Hicks, A Ruef, ML Mazurek, D Levin, D Votipka, P Mardziel, ...
ACM Transactions on Privacy and Security (TOPS) 23 (2), 1-36, 2020
12020
The system can't perform the operation now. Try again later.
Articles 1–20