Wenrui Diao
Orcid: 0000-0003-0916-8806
According to our database1,
Wenrui Diao
authored at least 47 papers
between 2014 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
From guidelines to practice: assessing Android app developer compliance with google's security recommendations.
Empir. Softw. Eng., February, 2025
2024
From Promises to Practice: Evaluating the Private Browsing Modes of Android Browser Apps.
Proceedings of the ACM on Web Conference 2024, 2024
Understanding Android OS Forward Compatibility Support for Legacy Apps: A Data-Driven Analysis.
Proceedings of the IEEE International Conference on Software Analysis, 2024
Proceedings of the ACM Workshop on Secure and Trustworthy Superapps, SaTS 2024, 2024
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Beyond the Horizon: Exploring Cross-Market Security Discrepancies in Parallel Android Apps.
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024
Android's Cat-and-Mouse Game: Understanding Evasion Techniques against Dynamic Analysis.
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024
DEMISTIFY: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile Apps.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
MiniCAT: Understanding and Detecting Cross-Page Request Forgery Vulnerabilities in Mini-Programs.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Can We Trust the Phone Vendors? Comprehensive Security Measurements on the Android Firmware Ecosystem.
IEEE Trans. Software Eng., July, 2023
Bad Apples: Understanding the Centralized Security Risks in Decentralized Ecosystems.
Proceedings of the ACM Web Conference 2023, 2023
Lost in Conversion: Exploit Data Structure Conversion with Attribute Loss to Break Android Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023
Living in the Past: Analyzing BLE IoT Devices Based on Mobile Companion Apps in Old Versions.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023
Do App Developers Follow the Android Official Data Security Guidelines? An Empirical Measurement on App Data Security.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023
2022
IEEE Trans. Software Eng., 2022
PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
2021
Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
2018
Accessing mobile user's privacy based on IME personalization: Understanding and practical attacks.
J. Comput. Secur., 2018
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild.
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
DRLgencert: Deep Learning-Based Automated Testing of Certificate Verification in SSL/TLS Implementations.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018
FragDroid: Automated User Interface Interaction with Activity and Fragment Analysis in Android Applications.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
2017
Proc. Priv. Enhancing Technol., 2017
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be.
CoRR, 2017
2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound.
CoRR, 2014
Gateless Treasure: How to Get Sensitive Information from Unprotected External Storage on Android Phones.
CoRR, 2014
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014