Wenrui Diao
Wenrui Diao
Email verificata su sdu.edu.cn - Home page
Titolo
Citata da
Citata da
Anno
When Good Becomes Evil: Keystroke Inference with Smartwatch
X Liu, Z Zhou, W Diao, Z Li, K Zhang
The 22nd ACM Conference on Computer and Communications Security (CCS’15), 2015
1352015
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone
W Diao, X Liu, Z Zhou, K Zhang
The 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones andá…, 2014
1082014
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing
J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang, WC Lau, M Sun, R Yang, ...
The 25th Annual Network and Distributed System Security Symposium (NDSS'18), 2018
982018
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound
Z Zhou, W Diao, X Liu, K Zhang
The 21st ACM Conference on Computer and Communications Security (CCS’14), 2014
772014
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
402017
No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis
W Diao, X Liu, Z Li, K Zhang
The 37th IEEE Symposium on Security and Privacy (IEEE S&P’16), 2016
372016
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild
S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang
The 14th EAI International Conference on Security and Privacy iná…, 2018
342018
An Empirical Study on Android for Saving Non-shared Data on Public Storage
X Liu, Z Zhou, W Diao, Z Li, K Zhang
The 30th IFIP International Information Security and Privacy Conferenceá…, 2015
18*2015
Evading Android Runtime Analysis Through Detecting Programmed Interactions
W Diao, X Liu, Z Li, K Zhang
The 9th ACM Conference on Security and Privacy in Wireless and Mobileá…, 2016
162016
BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals
F Xu, W Diao, Z Li, J Chen, K Zhang
The 26th Annual Network and Distributed System Security Symposium (NDSS'19), 2019
142019
Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU
Z Zhou, W Diao, X Liu, Z Li, K Zhang, R Liu
Proceedings on Privacy Enhancing Technologies 2017 (2), 57-73, 2017
132017
Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users
J Chen, C Zuo, W Diao, S Dong, Q Zhao, M Sun, Z Lin, Y Zhang, K Zhang
The 49th IEEE/IFIP International Conference on Dependable Systems andá…, 2019
62019
DRLgencert: Deep Learning-based Automated Testing of Certificate Verification in SSL/TLS Implementations
C Chen, W Diao, Y Zeng, S Guo, C Hu
The 34th IEEE International Conference on Software Maintenance and Evolutioná…, 2018
52018
FragDroid: Automated User Interface Interaction with Activity and Fragment Analysis in Android Applications
J Chen, G Han, S Guo, W Diao
The 48th Annual IEEE/IFIP International Conference on Dependable Systems andá…, 2018
32018
Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections
W Diao, X Liu, Z Zhou, K Zhang, Z Li
The 20th European Symposium on Research in Computer Security (ESORICS’15), 2015
32015
Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android
W Diao, Y Zhang, L Zhang, Z Li, F Xu, X Pan, X Liu, J Weng, K Zhang, ...
The 22nd International Symposium on Research in Attacks, Intrusions andá…, 2019
22019
An Empirical Study of Potentially Malicious Third-Party Libraries in Android Apps
Z Zhang, W Diao, C Hu, S Guo, C Zuo, L Li
The 13th ACM Conference on Security and Privacy in Wireless and Mobileá…, 2020
2020
CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices
L Zhang, J Chen, W Diao, S Guo, J Weng, K Zhang
The 22nd International Symposium on Research in Attacks, Intrusions andá…, 2019
2019
Accessing Mobile User’s Privacy Based on IME Personalization: Understanding and Practical Attacks
W Diao, R Liu, X Liu, Z Zhou, Z Li, K Zhang
Journal of Computer Security 26 (3), 283-309, 2018
2018
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–19