Wenrui Diao

Orcid: 0000-0003-0916-8806

According to our database1, Wenrui Diao authored at least 47 papers between 2014 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
From guidelines to practice: assessing Android app developer compliance with google's security recommendations.
Empir. Softw. Eng., February, 2025

2024
Stealing Trust: Unveiling Vulnerabilities in Web3 Authentication.
CoRR, 2024

From Promises to Practice: Evaluating the Private Browsing Modes of Android Browser Apps.
Proceedings of the ACM on Web Conference 2024, 2024

Understanding Android OS Forward Compatibility Support for Legacy Apps: A Data-Driven Analysis.
Proceedings of the IEEE International Conference on Software Analysis, 2024

MiniBLE: Exploring Insecure BLE API Usages in Mini-Programs.
Proceedings of the ACM Workshop on Secure and Trustworthy Superapps, SaTS 2024, 2024

CrypTody: Cryptographic Misuse Analysis of IoT Firmware via Data-flow Reasoning.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

Beyond the Horizon: Exploring Cross-Market Security Discrepancies in Parallel Android Apps.
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024

Android's Cat-and-Mouse Game: Understanding Evasion Techniques against Dynamic Analysis.
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024

DEMISTIFY: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile Apps.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

MiniCAT: Understanding and Detecting Cross-Page Request Forgery Vulnerabilities in Mini-Programs.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Stealing Trust: Unraveling Blind Message Attacks in Web3 Authentication.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Can We Trust the Phone Vendors? Comprehensive Security Measurements on the Android Firmware Ecosystem.
IEEE Trans. Software Eng., July, 2023

Bad Apples: Understanding the Centralized Security Risks in Decentralized Ecosystems.
Proceedings of the ACM Web Conference 2023, 2023

Lost in Conversion: Exploit Data Structure Conversion with Attribute Loss to Break Android Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023

Living in the Past: Analyzing BLE IoT Devices Based on Mobile Companion Apps in Old Versions.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023

Do App Developers Follow the Android Official Data Security Guidelines? An Empirical Measurement on App Data Security.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023

2022
Android Custom Permissions Demystified: A Comprehensive Security Evaluation.
IEEE Trans. Software Eng., 2022

PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Identifying the BLE Misconfigurations of IoT Devices through Companion Mobile Apps.
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022

Cast Away: On the Security of DLNA Deployments in the SmartTV Ecosystem.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Default: Mutual Information-based Crash Triage for Massive Crashes.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Demystifying Android Non-SDK APls: Measurement and Understanding.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Large-scale Security Measurements on the Android Firmware Ecosystem.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

ShadowDroid: Practical Black-box Attack against ML-based Android Malware Detection.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

Android on PC: On the Security of End-user Android Emulators.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
An empirical study of potentially malicious third-party libraries in Android apps.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

2019
CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
Accessing mobile user's privacy based on IME personalization: Understanding and practical attacks.
J. Comput. Secur., 2018

Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild.
Proceedings of the Security and Privacy in Communication Networks, 2018

IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

DRLgencert: Deep Learning-Based Automated Testing of Certificate Verification in SSL/TLS Implementations.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018

FragDroid: Automated User Interface Interaction with Activity and Fragment Analysis in Android Applications.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU.
Proc. Priv. Enhancing Technol., 2017

Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be.
CoRR, 2017

2016
Evading Android Runtime Analysis Through Detecting Programmed Interactions.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
An Empirical Study on Android for Saving Non-shared Data on Public Storage.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections.
Proceedings of the Computer Security - ESORICS 2015, 2015

When Good Becomes Evil: Keystroke Inference with Smartwatch.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound.
CoRR, 2014

Gateless Treasure: How to Get Sensitive Information from Unprotected External Storage on Android Phones.
CoRR, 2014

Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014


  Loading...