Follow
Wei Huang
Title
Cited by
Cited by
Year
The state of public infrastructure-as-a-service cloud security
W Huang, A Ganjali, BH Kim, S Oh, D Lie
ACM Computing Surveys (CSUR) 47 (4), 1-31, 2015
1112015
In-fat pointer: hardware-assisted tagged-pointer spatial memory safety defense with subobject granularity protection
S Xu, W Huang, D Lie
Proceedings of the 26th ACM international conference on architectural …, 2021
282021
Stochastic optimal multirate multicast in socially selfish wireless networks
H Li, C Wu, Z Li, W Huang, FCM Lau
2012 Proceedings IEEE INFOCOM, 172-180, 2012
232012
Utility-maximizing data dissemination in socially selfish cognitive radio networks
H Li, W Huang, C Wu, Z Li, FCM Lau
2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor …, 2011
222011
Unity: secure and durable personal cloud storage
BH Kim, W Huang, D Lie
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, 31-36, 2012
212012
LMP: light-weighted memory protection with hardware assistance
W Huang, Z Huang, D Miyani, D Lie
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
172016
Sok: Hardware security support for trustworthy execution
L Zhao, H Shuang, S Xu, W Huang, R Cui, P Bettadpur, D Lie
arXiv preprint arXiv:1910.04957, 2019
82019
InstantLeap: an architecture for fast neighbor discovery in large-scale P2P VoD streaming
X Qiu, W Huang, C Wu, FCM Lau, X Lin
Multimedia systems 16, 183-198, 2010
82010
The performance and locality tradeoff in bittorrent-like p2p file-sharing systems
W Huang, C Wu, FCM Lau
2010 IEEE International Conference on Communications, 1-5, 2010
82010
Aion attacks: Manipulating software timers in trusted execution environment
W Huang, S Xu, Y Cheng, D Lie
Detection of Intrusions and Malware, and Vulnerability Assessment: 18th …, 2021
62021
Pearl-TEE: supporting untrusted applications in trustzone
W Huang, V Rudchenko, H Shuang, Z Huang, D Lie
Proceedings of the 3rd Workshop on System Software for Trusted Execution, 8-13, 2018
42018
Using inputs and context to verify user intentions in internet services
H Shuang, W Huang, P Bettadpur, L Zhao, I Pustogarov, D Lie
Proceedings of the 10th ACM SIGOPS Asia-Pacific Workshop on Systems, 76-83, 2019
32019
The performance and locality tradeoff in bittorrent-like file sharing systems
W Huang, C Wu, Z Li, FCM Lau
Peer-to-Peer Networking and Applications 7 (4), 469-484, 2014
32014
Exploring the sustainability of credit-incentivized peer-to-peer content distribution
X Qiu, W Huang, C Wu, Z Li, FCM Lau
2012 32nd International Conference on Distributed Computing Systems …, 2012
32012
A compositional multiple policies operating system security model
L Xia, W Huang, H Huang
Information Security Applications: 8th International Workshop, WISA 2007 …, 2007
12007
Stream Processing with Adaptive Edge-Enhanced Confidential Computing
Y Yan, P Mishra, W Huang, A Mehta, O Balmau, D Lie
Proceedings of the 7th International Workshop on Edge Systems, Analytics and …, 2024
2024
MIFP: Selective Fat-Pointer Bounds Compression for Accurate Bounds Checking
S Xu, E Liu, W Huang, D Lie
Proceedings of the 26th International Symposium on Research in Attacks …, 2023
2023
Lessons Learned in Hardware-Assisted Operating System Security
W Huang
University of Toronto (Canada), 2023
2023
Methods, devices, and media for hardware-supported object metadata retrieval
D Lie, XU Shengjie, W Huang
US Patent 11,200,158, 2021
2021
Unity 2.0: Secure and Durable Personal Cloud Storage
B Heyn Kim, W Huang, A Ganjali, D Lie
arXiv e-prints, arXiv: 1710.03861, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20