• Professor
• Department of System Science and Engineering
• Zhejiang University
• Research Lab: USSLAB
• Email: xuwenyuan (at) zju dot edu dot cn
We are hiring faculty members, Post Doc, and Ph.D students. Drop us emails if you are interested.
"Ultracomm" won the Best Paper Award of Qshine 2019, congratulations to Guoming.
"DeWiCam" won the Best Paper Award of AsiaCCS 2018, congratulations to Yushi!
"DolphinAttacks" won the Best Paper Award of CCS 2017, congratulations to Guoming and Chen!
My research interests include wireless networking security and embedded system security. I have a particular interest in diving into the analog world, and to improve the devicewise security by analyzing both the analog and digital aspects. We have analyzed a collection of IoT devices, e.g., Tesla automobiles, smartphones, smart speakers.
Best Paper ACM CCS 2017, ACM AsiaCCS 2018, Qshine 2019
Tesla Hall of Fame Tesla Security Researcher Hall of Fame 2016 & 2014
Career Award National Science Foundation of United States 2009
2021
Yushi Cheng, Xiaoyu Ji, Lixu Wang, Qi Pang, Yichao Chen, Wenyuan Xu, "mID: Tracing Screen Photos via Moiré Patterns", 30th {USENIX} Security Symposium ({USENIX} Security 21). 2021. PDF
Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Wenyuan Xu, Kevin Fu, "Poltergeist: Acoustic Manipulation of Image Stabilization towards Object Mis-Labeling", accepted by IEEE Security & Privacy (Oakland) 2021 (acceptance ratio: 12.1%).
Guoming Zhang, Xiaoyu Ji*, Xinfeng Li, Gang Qu, Wenyuan Xu, "EarArray: Defending against Dolphinattacks via Acoustic Attenuation", accepted by the Network and Distributed System Security Symposium (NDSS) 2021. PDF
2020
Juchuan Zhang, Xiaoyu Ji, Wenyuan Xu, Yi-Chao Chen, Yuting Tang, Gang Qu "MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding ", in IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 357-366. PDF
Chen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, Kevin Fu, "SoK: A Minimalist Approach to Formalizing Analog Sensor Security", in 2020 IEEE Symposium on Security and Privacy (SP), 480-495. PDF
2019
Xinyan Zhou, Xiaoyu Ji, Chen Yan, Jiangyi Deng, Wenyuan Xu. NAuth: Secure Face-to-Face Device Authentication via Nonlinearity, in Proceedings of the IEEE INFOCOM 2019. PDF
Chen Yan, Yan Long, Xiaoyu Ji, Wenyuan Xu. “The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification”, in Proceedings of the ACM Conference on Computer and Communications Security (CCS) 2019. PDF
Yushi Cheng, Xiaoyu Ji*, Wenyuan Xu., Yichao Chen, "DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU", in Proceedings of ACM Conference on Computer and Communications Security (CCS), 2019. (acceptance ratio: 16%). PDF
Yushi Cheng, Xiaoyu Ji, Wenyuan Xu., Hao Pan, Zhuangdi Zhu, Chuangwen You, Yi-Chao Chen, Lili Qiu "MagAttack: Guessing Application Launching and Operation via Smartphone", in Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS) 2019. PDF
2018
Yushi Cheng, Xiaoyu Ji, Tianyang Lu, and Wenyuan Xu, “DeWiCam: Detecting Hidden Wireless Cameras via Smartphones,” in Proceedings of ACM Asia Conference on Computer & Communications Security (AsiaCCS) 2018, June 4th-8th, Songdo, Incheon, Korea
Chaohao Li, Xiaoyu Ji, Xinyan Zhou, Juchuan Zhang, Jing Tian, Yanmiao Zhang, and Wenyuan Xu, “HlcAuth: Key-free and Secure Communications via Home-Limited Channel,” in Proceedings of ACM Asia Conference on Computer & Communications Security (AsiaCCS) 2018, June 4th-8th, Songdo, Incheon, Korea
Zhou Zhuang, Xiaoyu Ji, Taimin Zhang, Juchuan Zhang, Wenyuan Xu, Zhenhua Li, and Yunhao Liu, “FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting,” in Proceedings of ACM Asia Conference on Computer & Communications Security (AsiaCCS) 2018, June 4th-8th, Songdo, Incheon, Korea
2017
Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu, “DolphinAttack: Inaudible Voice Commands,” in Proceedings of the 24th ACM Conference on Computer and Communications Security 2017 (Acceptance ratio: 18.0%) (Best Paper Award) Bibtex PDF
Yuwei Zheng, Lin Huang, Haoqi Shan, Jun Li, Qing Yang, and Wenyuan Xu, “Ghost Telephonist Impersonates You: Vulnerability in 4G LTE CS Fallback,” in Proceedings of the IEEE Communications and Network Security (CNS) 2017 Bibtex PDF
Xiaopeng Li, Wenyuan Xu, Song Wang, and Xianshan Qu, “Are You Lying: Validating the Time-Location of Outdoor Images,” in Proceedings of International Conference on Applied Cryptography and Network Security (ACNS), pp 103-123, 2017 Bibtex PDF
Timothy Trippel, Ofir Weisse, Wenyuan Xu, Peter Honeyman, Kevin Fu, “WALNUT: Waging doubt on integrity of MEMS AcceLerometers by iNjecting acoUsTics,” in Proceedings of the 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), Paris France, April 26-28 2017 (Acceptance ratio: 19.6%) Bibtex PDF
2020
Xiaoyu Ji, Chaohao Li, Xinyan Zhou, Juchuan Zhang, Yanmiao Zhang, Wenyuan Xu "Authenticating Smart Home Devices via Home Limited Channels", in ACM Transactions on Internet of Things 1 (4), 1-24 PDF
Yushi Cheng, Xiaoyu Ji, Xiaopeng Li, Tianchen Zhang, Sharaf Malebary, Xianshan Qu, Wenyaun Xu "Identifying child users via touchscreen interactions ", in ACM Transactions on Sensor Networks (TOSN) 16 (4), 1-25 PDF
Xiaoyu Ji, Xinyan Zhou, Miao Xu, Wenyuan Xu, Yabo Dong. "OPCIO: Optimizing Power Consumption for Embedded Devices via GPIO Configuration ", in ACM Transactions on Sensor Networks (TOSN) 16 (2), 1-28 PDF
2019
Chen Yan, Guoming Zhang, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu. “The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants”, in IEEE Transactions on Dependable and Secure Computing (TDSC). PDF
Chen Yan, Kevin Fu, Wenyuan Xu “On Cuba, Diplomats, Ultrasound, and Intermodulation Distortion.” Computers in Biology and Medicine 104 (2019): 250-266. PDF
2018
Wenyuan Xu, Chen Yan, Xiaoyu Ji, and Jianhao Liu, “Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles," to appear in the IEEE Internet of Things Journal PDF
2017
Wenyuan Xu, Jing Tian, Yu Chao, and Song Wang, “Challenge-Response Authentication using In-Air Handwriting Style Verification,” IEEE Transactions on Dependable and Secure Computing (TDSC), accepted 2017 PDF
2016
Weili Han, Zhigong Li, Minyue Ni, Guofei Gu, and Wenyuan Xu, “Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis,” IEEE Transactions on Dependable and Secure Computing (TDSC), May 2016 PDF
Hossen Mustafa, Wenyuan Xu, Ahmad-Reza Sadeghi, and Steffen Schulz, “End-to-End Detection of Caller ID Spoofing Attacks,” IEEE Transactions on Dependable and Secure Computing (TDSC), June 2016 PDF
Miao Xu, Wenyuan Xu, Tingrui Han, and Zhiyun Lin, “Energy Efficient Time Synchronization in Wireless Sensor Networks via Temperature-Aware Compensation,” ACM Transactions on Sensor Networks (TOSN), Vol. 12(2), May 2016 PDF
Wweili Han, Zhigong Li, Lang Yuan, Wenyuan Xu, “Regional Patterns and Vulnerability Analysis of Chinese Web Passwords,” IEEE Transactions on Information Forensics and Security (TIFS), Vol. 11(2), pp. 258 – 272, October 2015 PDF
Yingying Chen, Wenyuan Xu, Wade Trappe, Yanyong Zhang, “Securing Emerging Wireless Systems: Lower-layer Approaches,” ISBN: 978-0-387-88490-5, Springer, 2009.
IEEE Transactions on Mobile Computing
ACM Transactions on Sensor Networks
ACM Transactions on Internet of Things
IEEE Internet of Things Journal
The 8th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS '12)
The First IEEE International Workshop on Generation C Wireless Networks (GenCWiNets 2008)
Usenix Security Symposium (2011, 2014, 2019-2021)
CCS: ACM Conference on Computer and Communications Security (2015-2016, 2018-2019)
NDSS (2014, 2019-2020)
Oakland: IEEE Symposium on Security and Privacy (2019-2020)
Usenix Enigma (2015, 2017)
Percom (2013-2015)
ACNS (2014, 2016)
Mobysis (2014)
IEEE CNS (2013-2016)
IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2012)
International Conference On Principles Of DIstributed Systems(OPODIS 2012)
WiSec (The ACM Conference on Wireless Network Security) (2009, 2010, 2012, 2013, 2016)
The International Conference on Computer Communications and Networks (ICCCN 2007, ICCCN 2009, ICCCN2010, ICCCN2011)
IEEE International Conference on Communications 2010, System Security Symposium ( ICC’11 CISS, ICC’12 CISS, ICC’13 CISS)
IEEE Global Telecommunications Conference (GlobeCom 2011)