Daoyuan Wu
Research Assistant Professor
Department of Information Engineering
Chinese University of Hong Kong (CUHK)
Email: dywu [at] ie.cuhk.edu.hk
Gmail: daoyuan0x DBLP | Google Scholar
I am currently a Research Assistant Professor in the Department of Information Engineering at The Chinese University of Hong Kong (CUHK), starting from August 2019. Prior to CUHK, I earned my PhD degree in 2019 from Singapore Management University (SMU) in the School of Computing and Information Systems. My PhD study was generously supported by SMU's Secure Mobile Center (SMC) PhD Scholarship (the only awardee). Before pursuing my PhD in Singapore, I received the M.Phil. from Department of Computing at The Hong Kong Polytechnic University in 2015 and B.E. from Department of Information Security at Nanjing University of Posts and Telecommunications in 2011.
I am broadly interested in systems and network security, with a focus on vulnerability and privacy research. My major research methodology includes system building, program analysis, code mining, and network measurement. In particular, I am one of the pioneers in using on-device app crowdsourcing (e.g., the MopEye app) for security and networking research. I am also an expert in developing practical Android static analysis, for which I am leading a long-term project on using search-based static analysis for Android security. Besides publishing papers in top-tier venues (NDSS, USENIX ATC, DSN, CoNEXT, and INFOCOM), I have reported many app vulnerabilities on both Android and iOS (over 60 CVEs), as well as ~10 system issues in Android (e.g., CVE-2014-7224) and one in iOS (CVE-2015-5921). With my students, we have detected ~100 vulnerabilities in top blockchains. In short, I love building practical systems with security impacts or benefits. If you love too, please join my team!
I am leading the Vulnerability and Privacy Research (VPR) Lab, which is affiliated with Prof. Kehuan Zhang's LASR.
I am looking for one self-motivated and hard-working student who could do RA with me this year and start PhD in 2022.
Priority will be given to the candidate with mobile app development experience so that he/she could lead our app crowdsourcing project (with some blockchain elements). The blockchain topic itself has identified the right candidate.
Positions available: HKPF/Oversea PhD Students in CUHK; Research Engineers and Postdoctoral Fellows in SMU.
Research Areas
-
Mobile and IoT Security: static/dynamic program analysis, app crowdsourcing, and side channels.
BackDroid [DSN'21], Insecure Open Ports [NDSS'19], IABI Usability Insecurity [RAID'21], Remote Webview Attacks [MoST'15], Local Webview File:// Attack [ISC'14], DSDK Inconsistency [EMSE, WASA'17], SCLib [CODASPY'18], PendingIntent [Blackhat Europe'21], App Repackaging [TDSC], SideNet [TII], UpDroid [WiSec'18], Native Stack [ICISC'15], and ECVDetector [arXiv'14]. -
Blockchain and FinTech: decentralized systems, vulnerability analysis, and smart contract analysis.
MineBlockVuln [arXiv'21, under review]. AGChain [arXiv'21, under review]. Two more ongoing works will be sumitted soon. -
Mining for Code Security: code mining and learning for security analysis and vulnerability discovery.
MineAndroidVuln [AsiaCCS'19]. One work is currently under review and another will be submitted by early next year. -
Web Privacy Research: discovering, measuring, and preventing web privacy leakage in the Internet.
Two works will be submitted this year and another is expected to be submitted by next year. -
Network Measurement: performance measurement, traffic inspection, and network component fuzzing.
MopEye [ATC'17], MopEye Dataset [IWQoS'19], Speedtest Inaccuracy [INFOCOM'15, TMC], AcuteMon [CoNEXT'16], and VoIP Fuzzing [DIMVA'20].
Publications
Papers Led by Me
P13 |
(NEW) Diving Into Blockchain's Weaknesses: An Empirical Study of Blockchain System Vulnerabilities arXiv '21Xiao Yi, Daoyuan Wu*, Lingxiao Jiang, Kehuan Zhang, and Wei Zhang |
P12 |
(NEW) AGChain: A Blockchain-based Gateway for Permanent, Distributed, and Secure App Delegation from Existing Mobile App Markets arXiv '21Mengjie Chen, Daoyuan Wu*, Xiao Yi, and Jianliang Xu |
P11 |
(NEW) On the Usability (In)Security of In-App Browsing Interfaces in Mobile Apps RAID '21Zicheng Zhang, Daoyuan Wu*, Lixiang Li, and Debin Gao |
P10 |
(NEW) When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid DSN '21Daoyuan Wu, Debin Gao, Robert H. Deng, and Rocky K. C. Chang |
P9 |
(NEW) Scalable Online Vetting of Android Apps for Measuring Declared SDK Versions and Their Consistency with API Calls EMSE '21Daoyuan Wu, Debin Gao, and David Lo |
P8 |
(NEW) Understanding Android VoIP Security: A System-level Vulnerability Assessment DIMVA '20En He, Daoyuan Wu*, and Robert H. Deng |
P7 |
Towards Understanding Android System Vulnerabilities: Techniques and Insights AsiaCCS '19Daoyuan Wu, Debin Gao, Eric K. T. Cheng, Yichen Cao, Jintao Jiang, and Robert H. Deng |
P6 |
Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment NDSS '19Daoyuan Wu, Debin Gao, Rocky K. C. Chang, En He, Eric K. T. Cheng, and Robert H. Deng |
P5 |
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications CODASPY '18Daoyuan Wu, Yao Cheng, Debin Gao, Yingjiu Li, and Robert H. Deng |
P4 |
MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance USENIX ATC '17Daoyuan Wu, Rocky K. C. Chang, Weichao Li, Eric K. T. Cheng, and Debin Gao |
P3 |
Measuring the Declared SDK Versions and Their Consistency with API Calls in Android Apps WASA '17Daoyuan Wu, Ximing Liu, Jiayun Xu, David Lo, and Debin Gao |
P2 |
Indirect File Leaks in Mobile Applications MoST '15Daoyuan Wu and Rocky K. C. Chang |
P1 |
Analyzing Android Browser Apps for file:// Vulnerabilities ISC '14Daoyuan Wu and Rocky K. C. Chang |
Papers Led by Collaborators
C8 |
(NEW) Active Warden Attack: On the (In)Effectiveness of Android App Repackage-Proofing TDSC '21Haoyu Ma, Shijia Li, Debin Gao, Daoyuan Wu, Qiaowen Jia, and Chunfu Jia |
C7 |
(NEW) Deep-Learning-Based App Sensitive Behavior Surveillance for Android Powered Cyber-Physical Systems TII '21Haoyu Ma, Jianwen Tian, Kefan Qiu, David Lo, Debin Gao, Daoyuan Wu, Chunfu Jia, and Thar Baker |
C6 |
An Empirical Study of Mobile Network Behavior and Application Performance in the Wild IWQoS '19Shiwei Zhang, Weichao Li, Daoyuan Wu, Bo Jin, Rocky K. C. Chang, Debin Gao, Yi Wang, and Ricky K. P. Mok |
C5 |
Towards Dynamically Monitoring Android Applications on Non-rooted Devices in the Wild WiSec '18Xiaoxiao Tang, Yan Lin, Daoyuan Wu, and Debin Gao |
C4 |
Toward Accurate Network Delay Measurement on Android Phones TMC '17Weichao Li, Daoyuan Wu, Rocky K. C. Chang, and Ricky K. P. Mok |
C3 |
Demystifying and Puncturing the Inflated Delay in Smartphone-based WiFi Network Measurement CoNEXT '16Weichao Li, Daoyuan Wu, Rocky K. C. Chang, and Ricky K. P. Mok |
C2 |
Stack Layout Randomization with Minimal Rewriting of Android Binaries ICISC '15Yu Liang, Xinjie Ma, Daoyuan Wu, Xiaoxiao Tang, Debin Gao, Guojun Peng, Chunfu Jia, and Huanguo Zhang |
C1 |
On the Accuracy of Smartphone-based Mobile Network Measurement INFOCOM '15Weichao Li, Ricky K. P. Mok, Daoyuan Wu, and Rocky K. C. Chang |
Technical Reports
R2 |
MopEye: Monitoring Per-app Network Performance with Zero Measurement Traffic CoNEXT '15 PosterDaoyuan Wu, Weichao Li, Rocky K. C. Chang, and Debin Gao |
R1 |
A Sink-driven Approach to Detecting Exposed Component Vulnerabilities in Android Apps arXiv '14Daoyuan Wu, Xiapu Luo, and Rocky K. C. Chang |
Industrial or Seminar Talks
T6 |
(NEW) Re-route Your Intent for Privilege Escalation: A Universal Way to Exploit Android PendingIntents in High-profile and System Apps Blackhat Europe '21En He, Wenbo Chen, and Daoyuan Wu* |
T5 |
(NEW) Leveraging Automatic Face Recognition for Online Exam Monitoring and Analysis CUHK Expo '21In CUHK Teaching and Learning Innovation Expo, 29 July 2021. |
T4 |
Boosting Android Security through App-, Network-, and System-level Vulnerability Analysis CUHK Seminar '19In Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong SAR, China, March 2019. |
T3 |
On-device Crowdsourcing and Bytecode Search for Advancing Android App Analysis HKBU Seminar '19In Department of Computer Science, Hong Kong Baptist University, Hong Kong SAR, China, January 2019. |
T2 |
Cross-Platform Analysis of Indirect File Leaks in Android and iOS Applications HitCon Pacific '17In Hacks in Taiwan Conference, Taipei, Taiwan, China, December 2017. |
T1 |
On the Feasibility of Automatically Generating Android Component Hijacking Exploits HitCon '14In Hacks in Taiwan Conference, Taipei, Taiwan, China, August 2014. |
Teaching
-
2021 Fall - IERG4130 Introduction to Cyber Security: homepage (only in CUHK) and mirror website (public).
-
2021 Spring - IEMS5722 Mobile Network Programming and Distributed Server Architecture: homepage and mirror website.
-
2020 Fall - IEMS5710 Cryptography, Information Security and Privacy: homepage (only in CUHK) and mirror website (public).
-
2019 Fall - IEMS5710 Cryptography, Information Security and Privacy: homepage (only in CUHK) and mirror website (public).
2021 Fall - IERG4130 Introduction to Cyber Security: homepage (only in CUHK) and mirror website (public).
2021 Spring - IEMS5722 Mobile Network Programming and Distributed Server Architecture: homepage and mirror website.
2020 Fall - IEMS5710 Cryptography, Information Security and Privacy: homepage (only in CUHK) and mirror website (public).
2019 Fall - IEMS5710 Cryptography, Information Security and Privacy: homepage (only in CUHK) and mirror website (public).
Students
Current Students:
-
PhD Students: Xiao Yi (at CUHK since 2019; code security) and Zicheng Zhang (at SMU since 2020; Android security).
-
Research Assistants: Yuzhou Fang (since 2021; blockchain and DeFI) and Xu Yang (since 2021; iExam and DeFI).
-
MSc Students at CUHK (21-22): ZHANG Lu (blockchain and DeFI).
-
Master Students: Lijia Yang (at NUPT since 2020; HTTPS security) and Zulin Gu (at NUPT since 2020; Web measurement).
-
Undergraduate Students: Yufan Chen (at Xidian since 2021; OSS and smart contract security).
Past Students:
-
Research Assistants: Mengjie Chen (20-21; blockchain and smart contract security), Qingdan Zheng (2021; improving MopEye), and Eric Cheng (2020; improving BackDroid).
-
MSc Students at CUHK (20-21): LI Siqin (on FinTech Privacy) and WU Yan (on Code Mining).
-
MSc Students at CUHK (19-20): CHEN Mengjie (AGChain), FANG Ming, LI Lixiang (IABIs), and XIONG Weiyan.
-
FYP Students at CUHK (20-21): YANG Xu (iExam), CHAU Pak Shing and ZHENG Zeqin (on Flutter-based app development).
-
Master Students: Lingzhi Qiu (at NUPT in 2014 for ICC'15).
-
Undergraduate Students: Shiwei Zhang (at SUSTech in 2018 for IWQoS'19) and Zixiong Zhang (at NUPT in 2014 for ICC'15).
Collabrators
-
CUHK: Kehuan Zhang, Guoliang Xing, and Jimmy Lee.
-
SMU: Debin Gao (my PhD advisor), Robert H. Deng (my PhD co-advisor), Lingxiao Jiang, David Lo, and Yingjiu Li.
-
PolyU: Rocky K. C. Chang (my MPhil advisor), Eric K. T. Cheng, and Xiapu Luo (the advisor with whom I did RA in 2011/12).
-
Others: Haoyu Ma (at Xidian), En He (at OPPO), Wei Zhang (at NUPT), Weichao Li (at SUSTech), Ricky K. P. Mok (at UCSD), Jianliang Xu (at HKBU), and Yao Cheng (at Huawei).
CUHK: Kehuan Zhang, Guoliang Xing, and Jimmy Lee.
SMU: Debin Gao (my PhD advisor), Robert H. Deng (my PhD co-advisor), Lingxiao Jiang, David Lo, and Yingjiu Li.
PolyU: Rocky K. C. Chang (my MPhil advisor), Eric K. T. Cheng, and Xiapu Luo (the advisor with whom I did RA in 2011/12).
Others: Haoyu Ma (at Xidian), En He (at OPPO), Wei Zhang (at NUPT), Weichao Li (at SUSTech), Ricky K. P. Mok (at UCSD), Jianliang Xu (at HKBU), and Yao Cheng (at Huawei).
Useful Links
-
-
I am maintaining a list of interesting computer security papers and a list of mobile app related software engineering papers.
-
Security Journals: TIFS (special issues), TDSC (special issues), Computers & Security (special issues), TISSEC and JCS.
-
-
-
-
-
Storytelling 101: Writing Tips for Academics (by Nick Feamster)
-
Computer Security Conference Ranking and Statistic (by Guofei Gu)
-
Top Crypto and Security Conferences Ranking (by Jianying Zhou)
-
Top Publication Venues in Computer Science (by Andrew Myers)
-
ArnetMiner CS Rank: conference rank and organization rank.
-
CCF Conference and Journal Rankings: Security, Networking, System, and Software Engineering.
-
Google Scholar Metrics in Computer Security, Computing Systems, Computer Networks, and Software Systems.
-
Industry Cybersecurity Conference Directory, SKKU seclab | Upcoming Events, and Cipher Call-for-papers.
I am maintaining a list of interesting computer security papers and a list of mobile app related software engineering papers.
Security Journals: TIFS (special issues), TDSC (special issues), Computers & Security (special issues), TISSEC and JCS.
Storytelling 101: Writing Tips for Academics (by Nick Feamster)
Computer Security Conference Ranking and Statistic (by Guofei Gu)
Top Crypto and Security Conferences Ranking (by Jianying Zhou)
Top Publication Venues in Computer Science (by Andrew Myers)
ArnetMiner CS Rank: conference rank and organization rank.
CCF Conference and Journal Rankings: Security, Networking, System, and Software Engineering.
Google Scholar Metrics in Computer Security, Computing Systems, Computer Networks, and Software Systems.
Industry Cybersecurity Conference Directory, SKKU seclab | Upcoming Events, and Cipher Call-for-papers.