BibTeX records: Andrew Ruef

download as .bib file

@article{DBLP:journals/tissec/ParkerHRMLVMF20,
  author       = {James Parker and
                  Michael Hicks and
                  Andrew Ruef and
                  Michelle L. Mazurek and
                  Dave Levin and
                  Daniel Votipka and
                  Piotr Mardziel and
                  Kelsey R. Fulton},
  title        = {Build It, Break It, Fix It: Contesting Secure Development},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {10:1--10:36},
  year         = {2020},
  url          = {https://doi.org/10.1145/3383773},
  doi          = {10.1145/3383773},
  timestamp    = {Thu, 02 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ParkerHRMLVMF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/RuefLSTH19,
  author       = {Andrew Ruef and
                  Leonidas Lampropoulos and
                  Ian Sweet and
                  David Tarditi and
                  Michael Hicks},
  editor       = {Flemming Nielson and
                  David Sands},
  title        = {Achieving Safety Incrementally with Checked {C}},
  booktitle    = {Principles of Security and Trust - 8th International Conference, {POST}
                  2019, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2019, Prague, Czech Republic, April
                  6-11, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11426},
  pages        = {76--98},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17138-4\_4},
  doi          = {10.1007/978-3-030-17138-4\_4},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/RuefLSTH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-12113,
  author       = {ThanhVu Nguyen and
                  Timos Antonopoulos and
                  Andrew Ruef and
                  Michael Hicks},
  title        = {A Counterexample-guided Approach to Finding Numerical Invariants},
  journal      = {CoRR},
  volume       = {abs/1903.12113},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.12113},
  eprinttype    = {arXiv},
  eprint       = {1903.12113},
  timestamp    = {Tue, 02 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-12113.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-01679,
  author       = {James Parker and
                  Michael Hicks and
                  Andrew Ruef and
                  Michelle L. Mazurek and
                  Dave Levin and
                  Daniel Votipka and
                  Piotr Mardziel and
                  Kelsey R. Fulton},
  title        = {Build It, Break It, Fix It: Contesting Secure Development},
  journal      = {CoRR},
  volume       = {abs/1907.01679},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.01679},
  eprinttype    = {arXiv},
  eprint       = {1907.01679},
  timestamp    = {Mon, 08 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-01679.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Ruef18,
  author       = {Andrew Ruef},
  title        = {Tools and Experiments for Software Security},
  school       = {University of Maryland, College Park, MD, {USA}},
  year         = {2018},
  url          = {https://hdl.handle.net/1903/22152},
  doi          = {10.13016/QA2U-F1TR},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Ruef18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KleesRCW018,
  author       = {George Klees and
                  Andrew Ruef and
                  Benji Cooper and
                  Shiyi Wei and
                  Michael Hicks},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Evaluating Fuzz Testing},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {2123--2138},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243804},
  doi          = {10.1145/3243734.3243804},
  timestamp    = {Tue, 10 Nov 2020 20:00:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KleesRCW018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esop/WeiMRF018,
  author       = {Shiyi Wei and
                  Piotr Mardziel and
                  Andrew Ruef and
                  Jeffrey S. Foster and
                  Michael Hicks},
  editor       = {Amal Ahmed},
  title        = {Evaluating Design Tradeoffs in Numeric Static Analysis for Java},
  booktitle    = {Programming Languages and Systems - 27th European Symposium on Programming,
                  {ESOP} 2018, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2018, Thessaloniki, Greece, April
                  14-20, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10801},
  pages        = {653--682},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-89884-1\_23},
  doi          = {10.1007/978-3-319-89884-1\_23},
  timestamp    = {Tue, 05 Jul 2022 08:30:25 +0200},
  biburl       = {https://dblp.org/rec/conf/esop/WeiMRF018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sas/RuefHC18,
  author       = {Andrew Ruef and
                  Kesha Hietala and
                  Arlen Cox},
  editor       = {Andreas Podelski},
  title        = {Volume-Based Merge Heuristics for Disjunctive Numeric Domains},
  booktitle    = {Static Analysis - 25th International Symposium, {SAS} 2018, Freiburg,
                  Germany, August 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11002},
  pages        = {383--401},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99725-4\_23},
  doi          = {10.1007/978-3-319-99725-4\_23},
  timestamp    = {Mon, 28 Aug 2023 21:17:53 +0200},
  biburl       = {https://dblp.org/rec/conf/sas/RuefHC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/ElliottR0T18,
  author       = {Archibald Samuel Elliott and
                  Andrew Ruef and
                  Michael Hicks and
                  David Tarditi},
  title        = {Checked {C:} Making {C} Safe by Extension},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {53--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00015},
  doi          = {10.1109/SECDEV.2018.00015},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/ElliottR0T18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-08927,
  author       = {Shiyi Wei and
                  Piotr Mardziel and
                  Andrew Ruef and
                  Jeffrey S. Foster and
                  Michael Hicks},
  title        = {Evaluating Design Tradeoffs in Numeric Static Analysis for Java},
  journal      = {CoRR},
  volume       = {abs/1802.08927},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.08927},
  eprinttype    = {arXiv},
  eprint       = {1802.08927},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-08927.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-09700,
  author       = {George Klees and
                  Andrew Ruef and
                  Benji Cooper and
                  Shiyi Wei and
                  Michael Hicks},
  title        = {Evaluating Fuzz Testing},
  journal      = {CoRR},
  volume       = {abs/1808.09700},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.09700},
  eprinttype    = {arXiv},
  eprint       = {1808.09700},
  timestamp    = {Tue, 04 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-09700.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/RuefNSS17,
  author       = {Andrew Ruef and
                  Eric Nunes and
                  Paulo Shakarian and
                  Gerardo I. Simari},
  title        = {Measuring cyber attribution in games},
  booktitle    = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix,
                  AZ, USA, April 25-27, 2017},
  pages        = {28--32},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ECRIME.2017.7945051},
  doi          = {10.1109/ECRIME.2017.7945051},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/RuefNSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/NguyenARH17,
  author       = {ThanhVu Nguyen and
                  Timos Antonopoulos and
                  Andrew Ruef and
                  Michael Hicks},
  editor       = {Eric Bodden and
                  Wilhelm Sch{\"{a}}fer and
                  Arie van Deursen and
                  Andrea Zisman},
  title        = {Counterexample-guided approach to finding numerical invariants},
  booktitle    = {Proceedings of the 2017 11th Joint Meeting on Foundations of Software
                  Engineering, {ESEC/FSE} 2017, Paderborn, Germany, September 4-8, 2017},
  pages        = {605--615},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3106237.3106281},
  doi          = {10.1145/3106237.3106281},
  timestamp    = {Tue, 01 Feb 2022 10:45:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/NguyenARH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/StevensSRHHD17,
  author       = {Rock Stevens and
                  Octavian Suciu and
                  Andrew Ruef and
                  Sanghyun Hong and
                  Michael W. Hicks and
                  Tudor Dumitras},
  title        = {Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning},
  journal      = {CoRR},
  volume       = {abs/1701.04739},
  year         = {2017},
  url          = {http://arxiv.org/abs/1701.04739},
  eprinttype    = {arXiv},
  eprint       = {1701.04739},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/StevensSRHHD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/NunesSSR16,
  author       = {Eric Nunes and
                  Paulo Shakarian and
                  Gerardo I. Simari and
                  Andrew Ruef},
  editor       = {Ravi Kumar and
                  James Caverlee and
                  Hanghang Tong},
  title        = {Argumentation models for cyber attribution},
  booktitle    = {2016 {IEEE/ACM} International Conference on Advances in Social Networks
                  Analysis and Mining, {ASONAM} 2016, San Francisco, CA, USA, August
                  18-21, 2016},
  pages        = {837--844},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ASONAM.2016.7752335},
  doi          = {10.1109/ASONAM.2016.7752335},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asunam/NunesSSR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RuefHPLMM16,
  author       = {Andrew Ruef and
                  Michael W. Hicks and
                  James Parker and
                  Dave Levin and
                  Michelle L. Mazurek and
                  Piotr Mardziel},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Build It, Break It, Fix It: Contesting Secure Development},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {690--703},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978382},
  doi          = {10.1145/2976749.2978382},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RuefHPLMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/NunesKSRL16,
  author       = {Eric Nunes and
                  Nimish Kulkarni and
                  Paulo Shakarian and
                  Andrew Ruef and
                  Jay Little},
  editor       = {Sushil Jajodia and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Cyber-Deception and Attribution in Capture-the-Flag Exercises},
  booktitle    = {Cyber Deception, Building the Scientific Foundation},
  pages        = {151--167},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-32699-3\_7},
  doi          = {10.1007/978-3-319-32699-3\_7},
  timestamp    = {Wed, 25 Sep 2019 17:41:11 +0200},
  biburl       = {https://dblp.org/rec/books/sp/16/NunesKSRL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RuefHPLMM16,
  author       = {Andrew Ruef and
                  Michael W. Hicks and
                  James Parker and
                  Dave Levin and
                  Michelle L. Mazurek and
                  Piotr Mardziel},
  title        = {Build It, Break It, Fix It: Contesting Secure Development},
  journal      = {CoRR},
  volume       = {abs/1606.01881},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.01881},
  eprinttype    = {arXiv},
  eprint       = {1606.01881},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RuefHPLMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/NunesSSR16,
  author       = {Eric Nunes and
                  Paulo Shakarian and
                  Gerardo I. Simari and
                  Andrew Ruef},
  title        = {Argumentation Models for Cyber Attribution},
  journal      = {CoRR},
  volume       = {abs/1607.02171},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.02171},
  eprinttype    = {arXiv},
  eprint       = {1607.02171},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/NunesSSR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/NunesKSRL15,
  author       = {Eric Nunes and
                  Nimish Kulkarni and
                  Paulo Shakarian and
                  Andrew Ruef and
                  Jay Little},
  editor       = {Jian Pei and
                  Fabrizio Silvestri and
                  Jie Tang},
  title        = {Cyber-Deception and Attribution in Capture-the-Flag Exercises},
  booktitle    = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances
                  in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France,
                  August 25 - 28, 2015},
  pages        = {962--965},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808797.2809362},
  doi          = {10.1145/2808797.2809362},
  timestamp    = {Thu, 11 Mar 2021 17:04:51 +0100},
  biburl       = {https://dblp.org/rec/conf/asunam/NunesKSRL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/RuefR15,
  author       = {Andrew Ruef and
                  Chris Rohlf},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Programming Language Theoretic Security in the Real World: {A} Mirage
                  or the Future?},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {307--321},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_15},
  doi          = {10.1007/978-3-319-14039-1\_15},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/RuefR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ShakarianSR15,
  author       = {Jana Shakarian and
                  Paulo Shakarian and
                  Andrew Ruef},
  title        = {Cyber Attacks and Public Embarrassment: {A} Survey of Some Notable
                  Hacks},
  journal      = {CoRR},
  volume       = {abs/1501.05990},
  year         = {2015},
  url          = {http://arxiv.org/abs/1501.05990},
  eprinttype    = {arXiv},
  eprint       = {1501.05990},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ShakarianSR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/NunesKSRL15,
  author       = {Eric Nunes and
                  Nimish Kulkarni and
                  Paulo Shakarian and
                  Andrew Ruef and
                  Jay Little},
  title        = {Cyber-Deception and Attribution in Capture-the-Flag Exercises},
  journal      = {CoRR},
  volume       = {abs/1507.01922},
  year         = {2015},
  url          = {http://arxiv.org/abs/1507.01922},
  eprinttype    = {arXiv},
  eprint       = {1507.01922},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/NunesKSRL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ShakarianSR13,
  author       = {Paulo Shakarian and
                  Jana Shakarian and
                  Andrew Ruef},
  title        = {The Dragon and the Computer: Why Intellectual Property Theft is Compatible
                  with Chinese Cyber-Warfare Doctrine},
  journal      = {CoRR},
  volume       = {abs/1309.6450},
  year         = {2013},
  url          = {http://arxiv.org/abs/1309.6450},
  eprinttype    = {arXiv},
  eprint       = {1309.6450},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ShakarianSR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics