Wenrui Diao's homepage

alt text 

Wenrui Diao

Ph.D. Candidate

Department of Information Engineering, The Chinese University of Hong Kong

Email: dw013 [AT] ie.cuhk.edu.hk

Address: Rm 726, Ho Sin-Hang Engineering Building, CUHK

[Google Scholar] [DBLP]

Biography

I am a Ph.D candidate in Department of Information Engineering at The Chinese University of Hong Kong, under the supervision of Prof. Kehuan Zhang and Prof. Minghua Chen (co-supervisor). Before joining CUHK, I ever worked / interned in EMC Labs China, Syniverse Technologies and City University of Hong Kong. I also work closely with Dr. Zhou Li of RSA Laboratories. My research areas include system security, mobile security, vulnerability analysis, etc. I am a member of System Security Lab of CUHK.

Education

Experience

Publications

  1. Zhe Zhou, Wenrui Diao, Xiangyu Liu, Zhou Li, Kehuan Zhang, and Rui Liu. Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU. The 17th Privacy Enhancing Technologies Symposium (PETS’17), Minneapolis, MN, USA. July 2017.

  2. Wenrui Diao, Xiangyu Liu, Zhou Li, and Kehuan Zhang. Evading Android Runtime Analysis Through Detecting Programmed Interactions. The 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’16), Darmstadt, Germany. July 2016. [PDF]

  3. Wenrui Diao, Xiangyu Liu, Zhou Li, and Kehuan Zhang. No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis. The 37th IEEE Symposium on Security and Privacy (IEEE S&P’16), San Jose, CA, USA. May 2016. [PDF] [Presentation]

  4. Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, and Kehuan Zhang. When Good Becomes Evil: Keystroke Inference with Smartwatch. The 22nd ACM Conference on Computer and Communications Security (CCS’15), Denver, CO, USA. October 2015.

  5. Wenrui Diao, Xiangyu Liu, Zhe Zhou, Kehuan Zhang, and Zhou Li. Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections. The 20th European Symposium on Research in Computer Security (ESORICS’15), Vienna, Austria. September 2015. [PDF] [Demo]

  6. Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, and Kehuan Zhang. An Empirical Study on Android for Saving Non-shared Data on Public Storage. The 30th IFIP International Information Security and Privacy Conference (IFIP SEC’15), Hamburg, Germany. May 2015. [Nominated for the Best Student Paper Award]

  7. Wenrui Diao, Xiangyu Liu, Zhe Zhou, and Kehuan Zhang. Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone. The 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM’14), Scottsdale, AZ, USA. November 2014. [PDF] [Demo] [Media Coverage: Yahoo! News, The Register, IBTimes, Help Net Security, Tom's Guide, cnBeta, Ta Kung Pao, Sing Tao Daily ]

  8. Zhe Zhou, Wenrui Diao, Xiangyu Liu, and Kehuan Zhang. Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound. The 21st ACM Conference on Computer and Communications Security (CCS’14), Scottsdale, AZ, USA. November 2014.

Professional Activities

Reviewer:

External Reviewer:

Teaching

Teaching Assistant:

Part-time Instructor:

Awards

Reported Vulnerabilities

Useful Links