Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Andrew Ruef
@article{DBLP:journals/tissec/ParkerHRMLVMF20, author = {James Parker and Michael Hicks and Andrew Ruef and Michelle L. Mazurek and Dave Levin and Daniel Votipka and Piotr Mardziel and Kelsey R. Fulton}, title = {Build It, Break It, Fix It: Contesting Secure Development}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {2}, pages = {10:1--10:36}, year = {2020}, url = {https://doi.org/10.1145/3383773}, doi = {10.1145/3383773}, timestamp = {Thu, 02 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ParkerHRMLVMF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/RuefLSTH19, author = {Andrew Ruef and Leonidas Lampropoulos and Ian Sweet and David Tarditi and Michael Hicks}, editor = {Flemming Nielson and David Sands}, title = {Achieving Safety Incrementally with Checked {C}}, booktitle = {Principles of Security and Trust - 8th International Conference, {POST} 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11426}, pages = {76--98}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17138-4\_4}, doi = {10.1007/978-3-030-17138-4\_4}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/RuefLSTH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-12113, author = {ThanhVu Nguyen and Timos Antonopoulos and Andrew Ruef and Michael Hicks}, title = {A Counterexample-guided Approach to Finding Numerical Invariants}, journal = {CoRR}, volume = {abs/1903.12113}, year = {2019}, url = {http://arxiv.org/abs/1903.12113}, eprinttype = {arXiv}, eprint = {1903.12113}, timestamp = {Tue, 02 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-12113.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-01679, author = {James Parker and Michael Hicks and Andrew Ruef and Michelle L. Mazurek and Dave Levin and Daniel Votipka and Piotr Mardziel and Kelsey R. Fulton}, title = {Build It, Break It, Fix It: Contesting Secure Development}, journal = {CoRR}, volume = {abs/1907.01679}, year = {2019}, url = {http://arxiv.org/abs/1907.01679}, eprinttype = {arXiv}, eprint = {1907.01679}, timestamp = {Mon, 08 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-01679.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Ruef18, author = {Andrew Ruef}, title = {Tools and Experiments for Software Security}, school = {University of Maryland, College Park, MD, {USA}}, year = {2018}, url = {https://hdl.handle.net/1903/22152}, doi = {10.13016/QA2U-F1TR}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Ruef18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KleesRCW018, author = {George Klees and Andrew Ruef and Benji Cooper and Shiyi Wei and Michael Hicks}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Evaluating Fuzz Testing}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {2123--2138}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243804}, doi = {10.1145/3243734.3243804}, timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KleesRCW018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/WeiMRF018, author = {Shiyi Wei and Piotr Mardziel and Andrew Ruef and Jeffrey S. Foster and Michael Hicks}, editor = {Amal Ahmed}, title = {Evaluating Design Tradeoffs in Numeric Static Analysis for Java}, booktitle = {Programming Languages and Systems - 27th European Symposium on Programming, {ESOP} 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10801}, pages = {653--682}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89884-1\_23}, doi = {10.1007/978-3-319-89884-1\_23}, timestamp = {Tue, 05 Jul 2022 08:30:25 +0200}, biburl = {https://dblp.org/rec/conf/esop/WeiMRF018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sas/RuefHC18, author = {Andrew Ruef and Kesha Hietala and Arlen Cox}, editor = {Andreas Podelski}, title = {Volume-Based Merge Heuristics for Disjunctive Numeric Domains}, booktitle = {Static Analysis - 25th International Symposium, {SAS} 2018, Freiburg, Germany, August 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11002}, pages = {383--401}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99725-4\_23}, doi = {10.1007/978-3-319-99725-4\_23}, timestamp = {Mon, 28 Aug 2023 21:17:53 +0200}, biburl = {https://dblp.org/rec/conf/sas/RuefHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/ElliottR0T18, author = {Archibald Samuel Elliott and Andrew Ruef and Michael Hicks and David Tarditi}, title = {Checked {C:} Making {C} Safe by Extension}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {53--60}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00015}, doi = {10.1109/SECDEV.2018.00015}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/ElliottR0T18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-08927, author = {Shiyi Wei and Piotr Mardziel and Andrew Ruef and Jeffrey S. Foster and Michael Hicks}, title = {Evaluating Design Tradeoffs in Numeric Static Analysis for Java}, journal = {CoRR}, volume = {abs/1802.08927}, year = {2018}, url = {http://arxiv.org/abs/1802.08927}, eprinttype = {arXiv}, eprint = {1802.08927}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-08927.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-09700, author = {George Klees and Andrew Ruef and Benji Cooper and Shiyi Wei and Michael Hicks}, title = {Evaluating Fuzz Testing}, journal = {CoRR}, volume = {abs/1808.09700}, year = {2018}, url = {http://arxiv.org/abs/1808.09700}, eprinttype = {arXiv}, eprint = {1808.09700}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-09700.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/RuefNSS17, author = {Andrew Ruef and Eric Nunes and Paulo Shakarian and Gerardo I. Simari}, title = {Measuring cyber attribution in games}, booktitle = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix, AZ, USA, April 25-27, 2017}, pages = {28--32}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ECRIME.2017.7945051}, doi = {10.1109/ECRIME.2017.7945051}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/RuefNSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/NguyenARH17, author = {ThanhVu Nguyen and Timos Antonopoulos and Andrew Ruef and Michael Hicks}, editor = {Eric Bodden and Wilhelm Sch{\"{a}}fer and Arie van Deursen and Andrea Zisman}, title = {Counterexample-guided approach to finding numerical invariants}, booktitle = {Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, {ESEC/FSE} 2017, Paderborn, Germany, September 4-8, 2017}, pages = {605--615}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3106237.3106281}, doi = {10.1145/3106237.3106281}, timestamp = {Tue, 01 Feb 2022 10:45:16 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/NguyenARH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/StevensSRHHD17, author = {Rock Stevens and Octavian Suciu and Andrew Ruef and Sanghyun Hong and Michael W. Hicks and Tudor Dumitras}, title = {Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning}, journal = {CoRR}, volume = {abs/1701.04739}, year = {2017}, url = {http://arxiv.org/abs/1701.04739}, eprinttype = {arXiv}, eprint = {1701.04739}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/StevensSRHHD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/NunesSSR16, author = {Eric Nunes and Paulo Shakarian and Gerardo I. Simari and Andrew Ruef}, editor = {Ravi Kumar and James Caverlee and Hanghang Tong}, title = {Argumentation models for cyber attribution}, booktitle = {2016 {IEEE/ACM} International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2016, San Francisco, CA, USA, August 18-21, 2016}, pages = {837--844}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ASONAM.2016.7752335}, doi = {10.1109/ASONAM.2016.7752335}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asunam/NunesSSR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RuefHPLMM16, author = {Andrew Ruef and Michael W. Hicks and James Parker and Dave Levin and Michelle L. Mazurek and Piotr Mardziel}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Build It, Break It, Fix It: Contesting Secure Development}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {690--703}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978382}, doi = {10.1145/2976749.2978382}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RuefHPLMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/16/NunesKSRL16, author = {Eric Nunes and Nimish Kulkarni and Paulo Shakarian and Andrew Ruef and Jay Little}, editor = {Sushil Jajodia and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Cyber-Deception and Attribution in Capture-the-Flag Exercises}, booktitle = {Cyber Deception, Building the Scientific Foundation}, pages = {151--167}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-32699-3\_7}, doi = {10.1007/978-3-319-32699-3\_7}, timestamp = {Wed, 25 Sep 2019 17:41:11 +0200}, biburl = {https://dblp.org/rec/books/sp/16/NunesKSRL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RuefHPLMM16, author = {Andrew Ruef and Michael W. Hicks and James Parker and Dave Levin and Michelle L. Mazurek and Piotr Mardziel}, title = {Build It, Break It, Fix It: Contesting Secure Development}, journal = {CoRR}, volume = {abs/1606.01881}, year = {2016}, url = {http://arxiv.org/abs/1606.01881}, eprinttype = {arXiv}, eprint = {1606.01881}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RuefHPLMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/NunesSSR16, author = {Eric Nunes and Paulo Shakarian and Gerardo I. Simari and Andrew Ruef}, title = {Argumentation Models for Cyber Attribution}, journal = {CoRR}, volume = {abs/1607.02171}, year = {2016}, url = {http://arxiv.org/abs/1607.02171}, eprinttype = {arXiv}, eprint = {1607.02171}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/NunesSSR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/NunesKSRL15, author = {Eric Nunes and Nimish Kulkarni and Paulo Shakarian and Andrew Ruef and Jay Little}, editor = {Jian Pei and Fabrizio Silvestri and Jie Tang}, title = {Cyber-Deception and Attribution in Capture-the-Flag Exercises}, booktitle = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France, August 25 - 28, 2015}, pages = {962--965}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808797.2809362}, doi = {10.1145/2808797.2809362}, timestamp = {Thu, 11 Mar 2021 17:04:51 +0100}, biburl = {https://dblp.org/rec/conf/asunam/NunesKSRL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/RuefR15, author = {Andrew Ruef and Chris Rohlf}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Programming Language Theoretic Security in the Real World: {A} Mirage or the Future?}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {307--321}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_15}, doi = {10.1007/978-3-319-14039-1\_15}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/RuefR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ShakarianSR15, author = {Jana Shakarian and Paulo Shakarian and Andrew Ruef}, title = {Cyber Attacks and Public Embarrassment: {A} Survey of Some Notable Hacks}, journal = {CoRR}, volume = {abs/1501.05990}, year = {2015}, url = {http://arxiv.org/abs/1501.05990}, eprinttype = {arXiv}, eprint = {1501.05990}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ShakarianSR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/NunesKSRL15, author = {Eric Nunes and Nimish Kulkarni and Paulo Shakarian and Andrew Ruef and Jay Little}, title = {Cyber-Deception and Attribution in Capture-the-Flag Exercises}, journal = {CoRR}, volume = {abs/1507.01922}, year = {2015}, url = {http://arxiv.org/abs/1507.01922}, eprinttype = {arXiv}, eprint = {1507.01922}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/NunesKSRL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ShakarianSR13, author = {Paulo Shakarian and Jana Shakarian and Andrew Ruef}, title = {The Dragon and the Computer: Why Intellectual Property Theft is Compatible with Chinese Cyber-Warfare Doctrine}, journal = {CoRR}, volume = {abs/1309.6450}, year = {2013}, url = {http://arxiv.org/abs/1309.6450}, eprinttype = {arXiv}, eprint = {1309.6450}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ShakarianSR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.