Wenrui Diao
Wenrui Diao
Verified email at sdu.edu.cn - Homepage
TitleCited byYear
When Good Becomes Evil: Keystroke Inference with Smartwatch
X Liu, Z Zhou, W Diao, Z Li, K Zhang
The 22nd ACM Conference on Computer and Communications Security (CCS’15), 2015
982015
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound
Z Zhou, W Diao, X Liu, K Zhang
The 21st ACM Conference on Computer and Communications Security (CCS’14), 2014
652014
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone
W Diao, X Liu, Z Zhou, K Zhang
The 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and …, 2014
632014
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing
J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang, WC Lau, M Sun, R Yang, ...
The 25th Annual Network and Distributed System Security Symposium (NDSS'18), 2018
352018
No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis
W Diao, X Liu, Z Li, K Zhang
The 37th IEEE Symposium on Security and Privacy (IEEE S&P’16), 2016
302016
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
272017
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild
S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang
The 14th EAI International Conference on Security and Privacy in …, 2018
182018
An Empirical Study on Android for Saving Non-shared Data on Public Storage
X Liu, Z Zhou, W Diao, Z Li, K Zhang
The 30th IFIP International Information Security and Privacy Conference …, 2015
17*2015
Evading Android Runtime Analysis Through Detecting Programmed Interactions
W Diao, X Liu, Z Li, K Zhang
The 9th ACM Conference on Security and Privacy in Wireless and Mobile …, 2016
112016
Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU
Z Zhou, W Diao, X Liu, Z Li, K Zhang, R Liu
Proceedings on Privacy Enhancing Technologies 2017 (2), 57-73, 2017
82017
Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections
W Diao, X Liu, Z Zhou, K Zhang, Z Li
The 20th European Symposium on Research in Computer Security (ESORICS’15), 2015
32015
BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals
F Xu, W Diao, Z Li, J Chen, K Zhang
The 26th Annual Network and Distributed System Security Symposium (NDSS'19), 2019
22019
DRLgencert: Deep Learning-based Automated Testing of Certificate Verification in SSL/TLS Implementations
C Chen, W Diao, Y Zeng, S Guo, C Hu
The 34th IEEE International Conference on Software Maintenance and Evolution …, 2018
12018
CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices
L Zhang, J Chen, W Diao, S Guo, J Weng, K Zhang
The 22nd International Symposium on Research in Attacks, Intrusions and …, 2019
2019
Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android
W Diao, Y Zhang, L Zhang, Z Li, F Xu, X Pan, X Liu, J Weng, K Zhang, ...
The 22nd International Symposium on Research in Attacks, Intrusions and …, 2019
2019
Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users
J Chen, C Zuo, W Diao, S Dong, Q Zhao, M Sun, Z Lin, Y Zhang, K Zhang
The 49th IEEE/IFIP International Conference on Dependable Systems and …, 2019
2019
FragDroid: Automated User Interface Interaction with Activity and Fragment Analysis in Android Applications
J Chen, G Han, S Guo, W Diao
The 48th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2018
2018
Accessing Mobile User’s Privacy Based on IME Personalization: Understanding and Practical Attacks
W Diao, R Liu, X Liu, Z Zhou, Z Li, K Zhang
Journal of Computer Security 26 (3), 283-309, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–18