The state of public infrastructure-as-a-service cloud security W Huang, A Ganjali, BH Kim, S Oh, D Lie ACM Computing Surveys (CSUR) 47 (4), 1-31, 2015 | 114 | 2015 |
In-fat pointer: hardware-assisted tagged-pointer spatial memory safety defense with subobject granularity protection S Xu, W Huang, D Lie Proceedings of the 26th ACM international conference on architectural …, 2021 | 37 | 2021 |
Unity: secure and durable personal cloud storage BH Kim, W Huang, D Lie Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, 31-36, 2012 | 23 | 2012 |
Stochastic optimal multirate multicast in socially selfish wireless networks H Li, C Wu, Z Li, W Huang, FCM Lau 2012 Proceedings IEEE INFOCOM, 172-180, 2012 | 23 | 2012 |
Utility-maximizing data dissemination in socially selfish cognitive radio networks H Li, W Huang, C Wu, Z Li, FCM Lau 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor …, 2011 | 22 | 2011 |
LMP: light-weighted memory protection with hardware assistance W Huang, Z Huang, D Miyani, D Lie Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 17 | 2016 |
Aion attacks: Manipulating software timers in trusted execution environment W Huang, S Xu, Y Cheng, D Lie Detection of Intrusions and Malware, and Vulnerability Assessment: 18th …, 2021 | 9 | 2021 |
Sok: Hardware security support for trustworthy execution L Zhao, H Shuang, S Xu, W Huang, R Cui, P Bettadpur, D Lie arXiv preprint arXiv:1910.04957, 2019 | 9 | 2019 |
InstantLeap: an architecture for fast neighbor discovery in large-scale P2P VoD streaming X Qiu, W Huang, C Wu, FCM Lau, X Lin Multimedia systems 16, 183-198, 2010 | 8 | 2010 |
The performance and locality tradeoff in bittorrent-like p2p file-sharing systems W Huang, C Wu, FCM Lau 2010 IEEE International Conference on Communications, 1-5, 2010 | 8 | 2010 |
Pearl-TEE: supporting untrusted applications in trustzone W Huang, V Rudchenko, H Shuang, Z Huang, D Lie Proceedings of the 3rd Workshop on System Software for Trusted Execution, 8-13, 2018 | 6 | 2018 |
Methods, devices, and media for hardware-supported object metadata retrieval D Lie, XU Shengjie, W Huang US Patent 11,200,158, 2021 | 4 | 2021 |
Using inputs and context to verify user intentions in internet services H Shuang, W Huang, P Bettadpur, L Zhao, I Pustogarov, D Lie Proceedings of the 10th ACM SIGOPS Asia-Pacific Workshop on Systems, 76-83, 2019 | 3 | 2019 |
The performance and locality tradeoff in bittorrent-like file sharing systems W Huang, C Wu, Z Li, FCM Lau Peer-to-Peer Networking and Applications 7 (4), 469-484, 2014 | 3 | 2014 |
Exploring the sustainability of credit-incentivized peer-to-peer content distribution X Qiu, W Huang, C Wu, Z Li, FCM Lau 2012 32nd International Conference on Distributed Computing Systems …, 2012 | 3 | 2012 |
MIFP: Selective Fat-Pointer Bounds Compression for Accurate Bounds Checking S Xu, E Liu, W Huang, D Lie Proceedings of the 26th International Symposium on Research in Attacks …, 2023 | 2 | 2023 |
A Survey of Hardware Improvements to Secure Program Execution L Zhao, H Shuang, S Xu, W Huang, R Cui, P Bettadpur, D Lie ACM Computing Surveys, 2024 | 1 | 2024 |
A compositional multiple policies operating system security model L Xia, W Huang, H Huang Information Security Applications: 8th International Workshop, WISA 2007 …, 2007 | 1 | 2007 |
Stream Processing with Adaptive Edge-Enhanced Confidential Computing Y Yan, P Mishra, W Huang, A Mehta, O Balmau, D Lie Proceedings of the 7th International Workshop on Edge Systems, Analytics and …, 2024 | | 2024 |
Lessons Learned in Hardware-Assisted Operating System Security W Huang University of Toronto (Canada), 2023 | | 2023 |