Personal information

Verified email domains

Internet of Things, Offensive Security, Formal Verification
China, United States

Activities

Employment (1)

Institute of Information Engineering: Beijing, CN

2020-09-01 to 2025-06-30 | Security Researcher
Employment
Source: Self-asserted source
Yiwei Fang

Education and qualifications (2)

Indiana University: Bloomington, Indiana, US

2022-09-01 to 2025-06-30 | Visiting Phd Student (System Security Foundations lab, Department of Computer Science)
Education
Source: Self-asserted source
Yiwei Fang

Chinese Academy of Sciences: Beijing, CN

2020-09-01 to 2025-06-30 | Phd (School of Cyber Security)
Education
Source: Self-asserted source
Yiwei Fang

Works (5)

Hidden and Lost Control: on Security Design Risks in IoT User-Facing Matter Controller

32th Annual Network and Distributed System Security Symposium, NDSS 2025, San Diego, California, USA, February 24- 28, 2025
2025 | Conference paper
Contributors: Wang, Haoqiang; Fang, Yiwei; Liu, Yichen; Jin, Ze; Emma Delph; Du, Xiaojiang; Liu, Qixu; Xing, Luyi
Source: Self-asserted source
Yiwei Fang

WIP: Delegation Related Privacy Issues in Matter

Workshop on Security and Privacy in Standardized IoT (SDIoTSec) 2024 Program
2024 | Conference paper
Contributors: Jin, Ze; Fang, Yiwei; Wang, Haoqiang; Chen, Kexin; Liu, Qixu; Xing, Luyi
Source: Self-asserted source
Yiwei Fang

WIP: Security Vulnerabilities and Attack Scenarios in Smart Home with Matter

Workshop on Security and Privacy in Standardized IoT (SDIoTSec) 2024 Program
2024 | Conference paper
Contributors: Wang, Haoqiang; Liu, Yichen; Fang, Yiwei; Jin, Ze; Liu, Qixu; Xing, Luyi
Source: Self-asserted source
Yiwei Fang

IoT Manufacturers' New Nightmare: Design Flaws and Deployment Chaos in Cloud-based IoT Access Control Policies

Informa PLC.
2022-12-05 | Talk, interview, podcast or speech
URI:

http://i.blackhat.com/EU-22/Wednesday-Briefings/EU-22-Jin-IoT-Manufacturers-New-Nightmare.pdf

Contributors: Jin, Ze; Fang, Yiwei; Jia, Yan; Yuan, Bin; Liu, Qixu,; Xing, Luyi
Source: Self-asserted source
Yiwei Fang

P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies

Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
2022-11-07 | Conference paper
Contributors: Ze Jin; Luyi Xing; Yiwei Fang; Yan Jia; Bin Yuan; Qixu Liu
Source: Self-asserted source
Yiwei Fang