Follow
Rui Wang
Rui Wang
Indiana University, Microsoft Research, AppBugs Inc
Verified email at indiana.edu - Homepage
Title
Cited by
Cited by
Year
Side-channel leaks in web applications: A reality today, a challenge tomorrow
S Chen, R Wang, XF Wang, K Zhang
Security and Privacy (SP), 2010 IEEE Symposium on, 191-206, 2010
5062010
Signing me onto your accounts through Facebook and Google: a traffic-guided security study of commercially deployed single-sign-on web services
R Wang, S Chen, XF Wang
Security and Privacy (SP), 2012 IEEE Symposium on, 365-379, 2012
3222012
Learning your identity and disease from research papers: information leaks in genome wide association study
R Wang, YF Li, XF Wang, H Tang, X Zhou
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2992009
How to shop for free online--Security analysis of cashier-as-a-service based Web stores
R Wang, S Chen, XF Wang, S Qadeer
Security and Privacy (SP), 2011 IEEE Symposium on, 465-480, 2011
1602011
Upgrading your android, elevating my malware: Privilege escalation through mobile os updating
L Xing, X Pan, R Wang, K Yuan, XF Wang
Security and Privacy (SP), 2014 IEEE Symposium on, 393-408, 2014
1532014
Brahmastra: Driving Apps to Test the Security of Third-Party Components.
R Bhoraskar, S Han, J Jeon, T Azim, S Chen, J Jung, S Nath, R Wang, ...
USENIX Security, 1021-1036, 2014
1462014
Unauthorized origin crossing on mobile platforms: Threats and mitigation
R Wang, L Xing, XF Wang, S Chen
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1192013
Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization.
R Wang, Y Zhou, S Chen, S Qadeer, D Evans, Y Gurevich
USENIX Security 13, 2013
1192013
Privacy-preserving genomic computation through program specialization
R Wang, XF Wang, Z Li, H Tang, MK Reiter, Z Dong
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1052009
Sidebuster: automated detection and quantification of side-channel leaks in web application development
K Zhang, Z Li, R Wang, XF Wang, S Chen
Proceedings of the 17th ACM conference on Computer and communications …, 2010
822010
Solving the app-level classification problem of P2P traffic via optimized support vector machines
R Wang, Y Liu, Y Yang, X Zhou
Intelligent Systems Design and Applications, 2006. ISDA'06. Sixth …, 2006
652006
Solving p2p traffic identification problems via optimized support vector machines
Y Yang, R Wang, Y Liu, X Zhou
Computer Systems and Applications, 2007. AICCSA'07. IEEE/ACS International …, 2007
342007
Towards automatic reverse engineering of software security configurations
R Wang, XF Wang, K Zhang, Z Li
Proceedings of the 15th ACM conference on Computer and communications …, 2008
282008
An improvement of one-against-one method for multi-class support vector machine
Y Liu, R Wang, YS Zeng
Machine Learning and Cybernetics, 2007 International Conference on 5, 2915-2920, 2007
282007
Identifying implicit assumptions associated with a software product
R Wang, Y Zhou, S Chen, S Qadeer, Y Gurevich
US Patent 9,372,785, 2016
242016
Applying support vector machine to P2P traffic identification with smooth processing
Y Liu, R Wang, H Huang, Y Zeng, H He
Signal Processing, 2006 8th International Conference on 3, 2006
212006
P2P 流量检测技术初探
王逸欣, 王锐, 樊爱华, 唐川
计算机与数字工程 34 (6), 161-164, 2006
182006
Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software.
R Wang, XF Wang, Z Li
USENIX Security Symposium, 291-306, 2008
162008
Securing multiparty online services via certification of symbolic transactions
EY Chen, S Chen, S Qadeer, R Wang
Security and Privacy (SP), 2015 IEEE Symposium on, 833-849, 2015
122015
基于双重特征的 P2P 流量检测方法
杨岳湘, 王锐, 唐川, 李强
通信学报, 134-139, 2008
92008
The system can't perform the operation now. Try again later.
Articles 1–20