Skip to content
David Lie

Smartphone Security and Reliability

As of 2010, there are more smartphones shipped than desktop PCs and the trend is continuing.  For many ...

Details

Vulnerability Detection and Mitigation

Computer systems get compromised because humans are imperfect.  Human developers inevitably make mistakes in their code.  Some of ...

Details

Hardware/Software Codesign for Security

We have been exploring how designs at the hardware-software interface can improve overall systems security.  Traditionally, security has ...

Details

Security in Cloud Computing

Cloud computing offers a new exciting form of service to users in need of compute infrastructure. It provides ...

Details

Hypervisor Security

Since 2015, the size of the public IaaS cloud market has almost tripled, from 25B to 65B in ...

Details

Open Source Projects

We build a lot of software in my group, and when time allows we try to open source ...

Details

PGP Key

—–BEGIN PGP PUBLIC KEY BLOCK—– Version: GnuPG v2 mQGiBEpjzWIRBACK8dNty6tAAyvxgkeQGsqSU1ZidnbYAQ5ay+q39UUjAWS7DUiZ EpjHSXR1NNW+TKlq+KQZggSg/NInyhiOaxq6l0/crD1hxtJu1rmjhjdXm0LKd7ts Ctb4WVki2iuNGMmi22EMaM0f0zhXrchuFadZV51/d3isPq7R87Ix8WLz6wCgyyCP mgJeNe37PtpIepl4ditqj9MD/Rr0Kw4Rg2ClL7vHNFA0zDkq53O5OtANEwqQxBHL mdITKocyNyiJ7JQSYpQmOBIXVti5M6p43y2A3B4iY1mefCQyS+BWPyyAThb3fLGa 9albnSNUwNZeghTEnO7bcyybrfKmEfdptl5xZcH48nBgfzyy1ohfQ/8/tItfg0w1 pR5sA/0QWSVgYCvo+5WMaR/ubjm0ZuyrTl0+oAjjbPwPZ9YTFFTKLlrLqUeVGTS6 MbqjiSfQc/RkEXb4EvCfXwc3vbIPbgqKunAc38RF2s14lteMWJ7PWI0FQm1JhhqM Aa5s1QC/bsB+GSncv/QDvvQM1KCZ++2fbKwyPlk3eQfUNYfE47QgRGF2aWQgTGll IDxsaWVAZWVjZy50b3JvbnRvLmVkdT6IYAQTEQIAIAUCSmPNYgIbAwYLCQgHAwIE ...

Details

Postdoctoral Fellowship Position

The Toronto Systems Security Group is searching for talented and motivated postdoctoral fellows to become part of our ...

Details