Department of Electrical and Computer Engineering University of Toronto |
2024 - ECE568 Computer Security @ University of Toronto
2023 - ECE568 Computer Security @ University of Toronto
I graduated with a Ph.D. degree from University of Toronto in 2023, under the supervision of Professor David Lie. I got my master's degree from The University of Hong Kong and bachelor's degree from Nanjing University, China.
My research interest includes operating systems, computer security and networks.
Email: wh.huang@mail.utoronto.ca
Lianying Zhao, He Shuang, Shengjie Xu, Wei Huang, Rongzhen Cui, Pushkar Bettadpur and David Lie,"A Survey of Hardware Improvements to Secure Program Execution", ACM Computing Surveys (CSUR), 2024.
Shengjie Xu, Eric Liu, Wei Huang and David Lie, "MIFP: Selective Fat-Pointer Bounds Compression for Accurate Bounds Checking", In Proceedings of the 26th International Symposium on Recent Advances in Intrusion Detection (RAID), 2023.
Wei Huang, Shengjie Xu, Yueqiang Cheng and David Lie, "Aion Attacks: Exposing Software Timer in Trusted Execution Environment", In Proceedings of The 18th Conference on Detection of Intrusion and Malware and Vulnerability Assessment (DIMVA), July 2021. (Best Paper Award)
Shengjie Xu, Wei Huang and David Lie, " In-Fat Pointer: Hardware-assisted tagged-pointer spatial memory safety defense with subobject granularity protection", In Proceedings of the 26th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), April 2021.
He Shuang, Wei Huang, Pushkar Bettadpur, Lianying Zhao, Ivan Pustogarov and David Lie, "Using Inputs and Context to Verify User Intentions in Internet Services", In Proceedings of the 10th ACM SIGOPS Asia-Pacific Workshop on Systems (APSys 2019), August 2019.
Wei Huang, Vasily Rudchenko, He Shuang, Zhen Huang and David Lie. "Pearl-TEE: Supporting Untrusted Applications in TrustZone", In Proceedings of the 3rd Workshop on System Software for Trusted Execution (SysTEX 2018), October 2018.
Wei Huang, Zhen Huang, Dhaval Miyani and David Lie. "LMP: Light-Weighted Memory Protection with Hardware Assistance", In Proceedings of the 2016 Annual Computer Security Applications Conference (ACSAC 2016), December 2016.
Wei Huang, Afshar Ganjali, Beom Heyn Kim, Sukwon Oh and David Lie. "The State of Public Infrastructure-as-a-Service Cloud Security," ACM Computing Surveys 47, 4, Article 68 (June 2015).
Wei Huang, Chuan Wu, Zongpeng Li and Francis C.M. Lau. "The Performance and Locality Tradeoff in BitTorrent-like File Sharing Systems," Peer-to-Peer Networking and Applications Journal, vol.7, no.4, 2014, 469-484.
Beom Heyn Kim, Wei Huang and David Lie. "Unity: Secure and Durable Personal Cloud Storage". In Proceedings of the ACM Cloud Computing Security Workshop (CCSW 2012), Raleigh, NC, USA, Oct. 19, 2012.
Hongxing Li, Chuan Wu, Zongpeng Li, Wei Huang and Francis C.M. Lau. "Stochastic Optimal Multirate Multicast in Socially Selfish Wireless Networks". In Proceedings of IEEE International Conference on Computer Communications (INFOCOM), Orlando, USA, Mar. 25-30, 2012.
Wei Huang, Xuanjia Qiu, Chuan Wu, Zongpeng Li and Francis C.M. Lau. "Exploring the Sustainability of Credit-incentivized Peer-to-Peer Content Distribution". In Proceedings of HotPOST'12 in conjunction with ICDCS'12, Macau, China, June 21, 2012. (Best Paper Award)
Hongxing Li, Wei Huang, Chuan Wu, Zongpeng Li and Francis C.M. Lau. "Utility-Maximizing Data Dissemination in Socially Selfish Cognitive Radio Networks". In Proceedings of IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), Valencia, Spain, Oct. 17-22, 2011.
Wei Huang, Chuan Wu and Francis C.M. Lau. "The Performance and Locality Tradeoff in BitTorrent-like P2P File-Sharing Systems". In Proceedings of the IEEE International Communications Conference (IEEE ICC 2010), Cape Town, South Africa, May 23-27, 2010.
Xuanjia Qiu, Wei Huang, Chuan Wu, Francis C.M. Lau and Xiaola Lin. "InstantLeap: An Architecture for Fast Neighbor Discovery in Large-Scale P2P VoD Streaming". ACM/Springer Multimedia Systems Journal, v.16, number 3, pp.183-198, 2010.
Lei Xia, Wei Huang and Hao Huang. "A Compositional Multiple Policies Operating System Security Model". In Proceedings of the 8th International Workshop on Information Security Applications (WISA 2007), LNCS 4867, pp.291-302, Jeju Island, Korea, Sep. 23-25, 2008.
U Toronto: ECE568 Computer Security
U Toronto: ECE353 Systems Software
U Toronto: ECE344F & ECE344S Operating Systems
HKU:2009–2010: CSIS8301 Advanced Topics in Computer Systems
HKU:2009–2010: CSIS0803 System Integration Project
HKU:2008–2009: CSIS0322 World Wide Web and the Internet