![]() |
Wenrui Diao 刁文瑞Associate Professor College of Cyber Security, Jinan University (暨南大学) Guangzhou, China Email: diaowenrui [AT] link.cuhk.edu.hk [Google Scholar] [DBLP] |
News:
>>> Apr 2018: One paper accepted by SecureComm 2018.
>>> Mar 2018: One paper accepted by Journal of Computer Security.
>>> Feb 2018: I will serve as TPC Member for ACM CCS 2018.
I am an Associate Professor in College of Cyber Security at Jinan University. Before joining JNU, I obtained my Ph.D. degree from The Chinese University of Hong Kong, under the supervision of Prof. Kehuan Zhang. Also, I ever visited / worked / interned at Indiana University Bloomington, City University of Hong Kong, Syniverse Technologies, and EMC Labs China. My research focuses on system security, especially mobile security and IoT security. Also, I work closely with Dr. Zhou Li and Prof. XiaoFeng Wang. I was a member of System Security Lab of CUHK.
Aug 2013 - Aug 2017: Ph.D. in Information Engineering, supervised by Prof. Kehuan Zhang, The Chinese University of Hong Kong, Hong Kong.
Sep 2016 - Jan 2017: Visiting Ph.D. Student, supervised by Prof. XiaoFeng Wang, Indiana University, Bloomington, IN, USA.
Sep 2010 - Jun 2011: M.Sc. in Information Engineering, The Chinese University of Hong Kong, Hong Kong.
Sep 2006 - Jun 2010: B.Sc. in Information Security, Shandong University, Jinan, China.
Sep 2017 - Present: Associate Professor, Jinan University, Guangzhou, China.
Feb 2013 - Jul 2013: Research Assistant, supervised by Prof. Cong Wang, City University of Hong Kong, Hong Kong.
Nov 2011 - Jan 2013: System Application Engineer, Syniverse Technologies AP, Hong Kong.
Jun 2011 - Sep 2011: Software Engineer Intern, EMC Labs China, Shanghai, China.
Publications at top-tier venues (4 papers): IEEE S&P (’16), CCS (’14, ’15), NDSS (’18)
[SecureComm’18] Shuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu, Zhou Li, Fenghao Xu, Kai Chen, XiaoFeng Wang, and Kehuan Zhang. Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild. The 14th EAI International Conference on Security and Privacy in Communication Networks, Singapore. August 2018. [CCF C]
[JCS] Wenrui Diao, Rui Liu, Xiangyu Liu, Zhe Zhou, Zhou Li, and Kehuan Zhang. Accessing Mobile User’s Privacy Based on IME Personalization: Understanding and Practical Attacks. Journal of Computer Security. 2018. [CCF B] [Link]
[NDSS’18] Jiongyi Chen, Wenrui Diao, Qingchuan Zhao, Chaoshun Zuo, Zhiqiang Lin, XiaoFeng Wang, Wing Cheong Lau, Menghan Sun, Ronghai Yang, and Kehuan Zhang. IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing. The 25th Annual Network and Distributed System Security Symposium, San Diego, CA, USA. February 2018. [CCF B] [PDF]
[PETS’17] Zhe Zhou, Wenrui Diao, Xiangyu Liu, Zhou Li, Kehuan Zhang, and Rui Liu. Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU. The 17th Privacy Enhancing Technologies Symposium, Minneapolis, MN, USA. July 2017. [CCF C]
[Preprint] Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, and Yue-Hsun Lin. Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be. arXiv Preprint, CoRR abs1703.09809/. 2017. [PDF]
[WiSec’16] Wenrui Diao, Xiangyu Liu, Zhou Li, and Kehuan Zhang. Evading Android Runtime Analysis Through Detecting Programmed Interactions. The 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Darmstadt, Germany. July 2016. [CCF C] [PDF]
[IEEE S&P’16] Wenrui Diao, Xiangyu Liu, Zhou Li, and Kehuan Zhang. No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis. The 37th IEEE Symposium on Security and Privacy, San Jose, CA, USA. May 2016. [CCF A] [PDF]
[CCS’15] Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, and Kehuan Zhang. When Good Becomes Evil: Keystroke Inference with Smartwatch. The 22nd ACM Conference on Computer and Communications Security, Denver, CO, USA. October 2015. [CCF A] [PDF]
[ESORICS’15] Wenrui Diao, Xiangyu Liu, Zhe Zhou, Kehuan Zhang, and Zhou Li. Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections. The 20th European Symposium on Research in Computer Security, Vienna, Austria. September 2015. [CCF B] [PDF] [Demo] [Media Coverage: AntiHackingOnline]
[IFIP SEC’15] Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, and Kehuan Zhang. An Empirical Study on Android for Saving Non-shared Data on Public Storage. The 30th IFIP International Information Security and Privacy Conference, Hamburg, Germany. May 2015. [CCF C]
[SPSM’14] Wenrui Diao, Xiangyu Liu, Zhe Zhou, and Kehuan Zhang. Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone. The 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, Scottsdale, AZ, USA. November 2014. [PDF] [Demo] [Media Coverage: Yahoo! News, The Register, IBTimes, Help Net Security, Tom's Guide, cnBeta, Ming Pao (明報), Ta Kung Pao (大公報), Sing Tao Daily (星島日報)]
[CCS’14] Zhe Zhou, Wenrui Diao, Xiangyu Liu, and Kehuan Zhang. Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound. The 21st ACM Conference on Computer and Communications Security, Scottsdale, AZ, USA. November 2014. [CCF A] [PDF]
TPC Member:
ACM Conference on Computer and Communications Security (CCS): 2018
Reviewer:
IEEE Transactions on Information Forensics and Security
Journal of Network and Computer Applications (Elsevier)
Applied Computing and Informatics (Elsevier)
The Computer Journal (Oxford)
Journal on Communications (通讯学报)
External Reviewer:
Network and Distributed System Security Symposium (NDSS): 2018
ACM Conference on Computer and Communications Security (CCS): 2014, 2015, 2016, 2017
International Symposium on Research in Attacks, Intrusions and Defenses (RAID): 2017
IEEE European Symposium on Security and Privacy (IEEE EuroS&P): 2017
ACM Asia Conference on Computer and Communications Security (ASIACCS): 2016, 2017
EAI International Conference on Security and Privacy in Communication Networks (SecureComm): 2016
USENIX Workshop on Offensive Technologies (WOOT): 2016
Information Security Conference (ISC): 2014
Security Threats to Android System: Exploration, Understanding, and Defense
May 2017: Shandong University, Jinan, China
Apr 2017: Shanghai Jiao Tong University, Shanghai, China
Teaching Assistant@CUHK:
IERG 4090 - Networking Protocols and Systems: 2016 Spring, 2017 Spring
IERG 4831 - Networking Laboratory I: 2016 Spring, 2017 Spring
IERG 3921 - Information Engineering Lab: 2015 Fall
IEMS 5710 - Cryptography, Information Security & Privacy: 2015 Spring
IERG 4210 - Web Programming and Security: 2015 Spring
IERG 3310 - Computer Networks: 2014 Fall
2017: PETS 2017 Stipends, The 17th Privacy Enhancing Technologies Symposium
2017: Reaching Out Award 2016/17, HKSAR Government Scholarship Fund
2016: IEEE S&P 2016 Student Travel Grants, The 37th IEEE Symposium on Security and Privacy
2012: Dean’s List 2010-2011, Faculty of Engineering, CUHK
AndroidID-32940378, AndroidID-33000178