Volgen
Wenrui Diao
Wenrui Diao
Geverifieerd e-mailadres voor sdu.edu.cn - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing
J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang, WC Lau, M Sun, R Yang, ...
The 25th Annual Network and Distributed System Security Symposium (NDSS'18), 2018
3782018
When Good Becomes Evil: Keystroke Inference with Smartwatch
X Liu, Z Zhou, W Diao, Z Li, K Zhang
The 22nd ACM Conference on Computer and Communications Security (CCS’15), 2015
2352015
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone
W Diao, X Liu, Z Zhou, K Zhang
The 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and …, 2014
2022014
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild
S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang
The 14th EAI International Conference on Security and Privacy in …, 2018
1492018
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound
Z Zhou, W Diao, X Liu, K Zhang
The 21st ACM Conference on Computer and Communications Security (CCS’14), 2014
1252014
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
752017
No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis
W Diao, X Liu, Z Li, K Zhang
The 37th IEEE Symposium on Security and Privacy (IEEE S&P’16), 2016
722016
BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals
F Xu, W Diao, Z Li, J Chen, K Zhang
The 26th Annual Network and Distributed System Security Symposium (NDSS'19), 2019
512019
Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU
Z Zhou, W Diao, X Liu, Z Li, K Zhang, R Liu
Proceedings on Privacy Enhancing Technologies 2017 (2), 57-73, 2017
372017
CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices
L Zhang, J Chen, W Diao, S Guo, J Weng, K Zhang
The 22nd International Symposium on Research in Attacks, Intrusions and …, 2019
342019
Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users
J Chen, C Zuo, W Diao, S Dong, Q Zhao, M Sun, Z Lin, Y Zhang, K Zhang
The 49th IEEE/IFIP International Conference on Dependable Systems and …, 2019
342019
Evading Android Runtime Analysis Through Detecting Programmed Interactions
W Diao, X Liu, Z Li, K Zhang
The 9th ACM Conference on Security and Privacy in Wireless and Mobile …, 2016
312016
An Empirical Study on Android for Saving Non-shared Data on Public Storage
X Liu, Z Zhou, W Diao, Z Li, K Zhang
The 30th IFIP International Information Security and Privacy Conference …, 2015
27*2015
An Empirical Study of Potentially Malicious Third-Party Libraries in Android Apps
Z Zhang, W Diao, C Hu, S Guo, C Zuo, L Li
The 13th ACM Conference on Security and Privacy in Wireless and Mobile …, 2020
232020
Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings
R Li, W Diao, Z Li, J Du, S Guo
The 42nd IEEE Symposium on Security and Privacy (IEEE S&P'21), 2021
212021
Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android
W Diao, Y Zhang, L Zhang, Z Li, F Xu, X Pan, X Liu, J Weng, K Zhang, ...
The 22nd International Symposium on Research in Attacks, Intrusions and …, 2019
212019
DRLgencert: Deep Learning-based Automated Testing of Certificate Verification in SSL/TLS Implementations
C Chen, W Diao, Y Zeng, S Guo, C Hu
The 34th IEEE International Conference on Software Maintenance and Evolution …, 2018
212018
FragDroid: Automated User Interface Interaction with Activity and Fragment Analysis in Android Applications
J Chen, G Han, S Guo, W Diao
The 48th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2018
122018
Android Custom Permissions Demystified: A Comprehensive Security Evaluation
R Li, W Diao, Z Li, S Yang, S Li, S Guo
IEEE Transactions on Software Engineering 48 (11), 4465 - 4484, 2022
92022
Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections
W Diao, X Liu, Z Zhou, K Zhang, Z Li
The 20th European Symposium on Research in Computer Security (ESORICS’15), 2015
9*2015
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20