Wenyuan Xu

• Professor

• Department of System Science and Engineering

• Zhejiang University

• Research Lab: USSLAB

• Email: xuwenyuan (at) zju dot edu dot cn

News

  • We are hiring faculty members, Post Doc, and Ph.D students. Drop us emails if you are interested.

  • "Ultracomm" won the Best Paper Award of Qshine 2019, congratulations to Guoming.

  • "DeWiCam" won the Best Paper Award of AsiaCCS 2018, congratulations to Yushi!

  • "DolphinAttacks" won the Best Paper Award of CCS 2017, congratulations to Guoming and Chen!

Research Interests

My research interests include wireless networking security and embedded system security. I have a particular interest in diving into the analog world, and to improve the devicewise security by analyzing both the analog and digital aspects. We have analyzed a collection of IoT devices, e.g., Tesla automobiles, smartphones, smart speakers.

DolphinAttack

DeWiCam

Awards and Honors

Best Paper ACM CCS 2017, ACM AsiaCCS 2018, Qshine 2019

Tesla Hall of Fame Tesla Security Researcher Hall of Fame 2016 & 2014

Career Award National Science Foundation of United States 2009

Publications (selected)

Conference Publications

2021

  • Yushi Cheng, Xiaoyu Ji, Lixu Wang, Qi Pang, Yichao Chen, Wenyuan Xu, "mID: Tracing Screen Photos via Moiré Patterns", 30th {USENIX} Security Symposium ({USENIX} Security 21). 2021. PDF

  • Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Wenyuan Xu, Kevin Fu, "Poltergeist: Acoustic Manipulation of Image Stabilization towards Object Mis-Labeling", accepted by IEEE Security & Privacy (Oakland) 2021 (acceptance ratio: 12.1%).

  • Guoming Zhang, Xiaoyu Ji*, Xinfeng Li, Gang Qu, Wenyuan Xu, "EarArray: Defending against Dolphinattacks via Acoustic Attenuation", accepted by the Network and Distributed System Security Symposium (NDSS) 2021. PDF

2020

  • Juchuan Zhang, Xiaoyu Ji, Wenyuan Xu, Yi-Chao Chen, Yuting Tang, Gang Qu "MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding ", in IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 357-366. PDF

  • Chen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, Kevin Fu, "SoK: A Minimalist Approach to Formalizing Analog Sensor Security", in 2020 IEEE Symposium on Security and Privacy (SP), 480-495. PDF

2019

  • Xinyan Zhou, Xiaoyu Ji, Chen Yan, Jiangyi Deng, Wenyuan Xu. NAuth: Secure Face-to-Face Device Authentication via Nonlinearity, in Proceedings of the IEEE INFOCOM 2019. PDF

  • Chen Yan, Yan Long, Xiaoyu Ji, Wenyuan Xu. “The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification”, in Proceedings of the ACM Conference on Computer and Communications Security (CCS) 2019. PDF

  • Yushi Cheng, Xiaoyu Ji*, Wenyuan Xu., Yichao Chen, "DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU", in Proceedings of ACM Conference on Computer and Communications Security (CCS), 2019. (acceptance ratio: 16%). PDF

  • Yushi Cheng, Xiaoyu Ji, Wenyuan Xu., Hao Pan, Zhuangdi Zhu, Chuangwen You, Yi-Chao Chen, Lili Qiu "MagAttack: Guessing Application Launching and Operation via Smartphone", in Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS) 2019. PDF

2018

  • Yushi Cheng, Xiaoyu Ji, Tianyang Lu, and Wenyuan Xu, “DeWiCam: Detecting Hidden Wireless Cameras via Smartphones,” in Proceedings of ACM Asia Conference on Computer & Communications Security (AsiaCCS) 2018, June 4th-8th, Songdo, Incheon, Korea

  • Chaohao Li, Xiaoyu Ji, Xinyan Zhou, Juchuan Zhang, Jing Tian, Yanmiao Zhang, and Wenyuan Xu, “HlcAuth: Key-free and Secure Communications via Home-Limited Channel,” in Proceedings of ACM Asia Conference on Computer & Communications Security (AsiaCCS) 2018, June 4th-8th, Songdo, Incheon, Korea

  • Zhou Zhuang, Xiaoyu Ji, Taimin Zhang, Juchuan Zhang, Wenyuan Xu, Zhenhua Li, and Yunhao Liu, “FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting,” in Proceedings of ACM Asia Conference on Computer & Communications Security (AsiaCCS) 2018, June 4th-8th, Songdo, Incheon, Korea

2017

  • Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu, “DolphinAttack: Inaudible Voice Commands,” in Proceedings of the 24th ACM Conference on Computer and Communications Security 2017 (Acceptance ratio: 18.0%) (Best Paper Award) Bibtex PDF

  • Yuwei Zheng, Lin Huang, Haoqi Shan, Jun Li, Qing Yang, and Wenyuan Xu, “Ghost Telephonist Impersonates You: Vulnerability in 4G LTE CS Fallback,” in Proceedings of the IEEE Communications and Network Security (CNS) 2017 Bibtex PDF

  • Xiaopeng Li, Wenyuan Xu, Song Wang, and Xianshan Qu, “Are You Lying: Validating the Time-Location of Outdoor Images,” in Proceedings of International Conference on Applied Cryptography and Network Security (ACNS), pp 103-123, 2017 Bibtex PDF

  • Timothy Trippel, Ofir Weisse, Wenyuan Xu, Peter Honeyman, Kevin Fu, “WALNUT: Waging doubt on integrity of MEMS AcceLerometers by iNjecting acoUsTics,” in Proceedings of the 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), Paris France, April 26-28 2017 (Acceptance ratio: 19.6%) Bibtex PDF

More

Journal Publications

2020

  • Xiaoyu Ji, Chaohao Li, Xinyan Zhou, Juchuan Zhang, Yanmiao Zhang, Wenyuan Xu "Authenticating Smart Home Devices via Home Limited Channels", in ACM Transactions on Internet of Things 1 (4), 1-24 PDF

  • Yushi Cheng, Xiaoyu Ji, Xiaopeng Li, Tianchen Zhang, Sharaf Malebary, Xianshan Qu, Wenyaun Xu "Identifying child users via touchscreen interactions ", in ACM Transactions on Sensor Networks (TOSN) 16 (4), 1-25 PDF

  • Xiaoyu Ji, Xinyan Zhou, Miao Xu, Wenyuan Xu, Yabo Dong. "OPCIO: Optimizing Power Consumption for Embedded Devices via GPIO Configuration ", in ACM Transactions on Sensor Networks (TOSN) 16 (2), 1-28 PDF

2019

  • Chen Yan, Guoming Zhang, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu. “The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants”, in IEEE Transactions on Dependable and Secure Computing (TDSC). PDF

  • Chen Yan, Kevin Fu, Wenyuan Xu “On Cuba, Diplomats, Ultrasound, and Intermodulation Distortion.” Computers in Biology and Medicine 104 (2019): 250-266. PDF

2018

  • Wenyuan Xu, Chen Yan, Xiaoyu Ji, and Jianhao Liu, “Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles," to appear in the IEEE Internet of Things Journal PDF

2017

  • Wenyuan Xu, Jing Tian, Yu Chao, and Song Wang, “Challenge-Response Authentication using In-Air Handwriting Style Verification,” IEEE Transactions on Dependable and Secure Computing (TDSC), accepted 2017 PDF

2016

  • Weili Han, Zhigong Li, Minyue Ni, Guofei Gu, and Wenyuan Xu, “Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis,” IEEE Transactions on Dependable and Secure Computing (TDSC), May 2016 PDF

  • Hossen Mustafa, Wenyuan Xu, Ahmad-Reza Sadeghi, and Steffen Schulz, “End-to-End Detection of Caller ID Spoofing Attacks,” IEEE Transactions on Dependable and Secure Computing (TDSC), June 2016 PDF

  • Miao Xu, Wenyuan Xu, Tingrui Han, and Zhiyun Lin, “Energy Efficient Time Synchronization in Wireless Sensor Networks via Temperature-Aware Compensation,” ACM Transactions on Sensor Networks (TOSN), Vol. 12(2), May 2016 PDF

  • Wweili Han, Zhigong Li, Lang Yuan, Wenyuan Xu, “Regional Patterns and Vulnerability Analysis of Chinese Web Passwords,” IEEE Transactions on Information Forensics and Security (TIFS), Vol. 11(2), pp. 258 – 272, October 2015 PDF

More

Book and Book Chapter Publications

Yingying Chen, Wenyuan Xu, Wade Trappe, Yanyong Zhang, “Securing Emerging Wireless Systems: Lower-layer Approaches,” ISBN: 978-0-387-88490-5, Springer, 2009.

Professional Activities

Associated Editor

  • IEEE Transactions on Mobile Computing

  • ACM Transactions on Sensor Networks

  • ACM Transactions on Internet of Things

  • IEEE Internet of Things Journal

Program Chair

  • The 8th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS '12)

  • The First IEEE International Workshop on Generation C Wireless Networks (GenCWiNets 2008)

Technical Program Committees

  • Usenix Security Symposium (2011, 2014, 2019-2021)

  • CCS: ACM Conference on Computer and Communications Security (2015-2016, 2018-2019)

  • NDSS (2014, 2019-2020)

  • Oakland: IEEE Symposium on Security and Privacy (2019-2020)

  • Usenix Enigma (2015, 2017)

  • Percom (2013-2015)

  • ACNS (2014, 2016)

  • Mobysis (2014)

  • IEEE CNS (2013-2016)

  • IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2012)

  • International Conference On Principles Of DIstributed Systems(OPODIS 2012)

  • WiSec (The ACM Conference on Wireless Network Security) (2009, 2010, 2012, 2013, 2016)

  • The International Conference on Computer Communications and Networks (ICCCN 2007, ICCCN 2009, ICCCN2010, ICCCN2011)

  • IEEE International Conference on Communications 2010, System Security Symposium ( ICC’11 CISS, ICC’12 CISS, ICC’13 CISS)

  • IEEE Global Telecommunications Conference (GlobeCom 2011)