Lenx Tao Wei (韦韬)

Project Scientist
EECS
College of Engineering
UC Berkeley

Associate Professor
LiST
Institute of Computer Science and Technology
Peking University

Mailing address:
University of California, Berkeley
337 Cory Hall
Berkeley, CA 94720

Phone: (510)423-1590
Email: lenx.wei at gmail dot com
Office: Cory Hall #337

About

  • Tao Wei (韦韬) is my Chinese name. Lenx is my English name.
  • I am currently visiting Prof. Dawn Song's group in EECS at UC Berkeley.
  • I am an associate professor at Peking University.
  • I received my Ph.D. degree in Computer Science from Peking University in July 2007.
  • I established, and am directing the V group of LiST at ICST, Peking University.
  • I am also a co-organizer of the BitBlaze Group in UC Berkeley.
  • I was a co-founder of the original bbs.mit.edu which now is www.mitbbs.com.

    Research Interests

    My research interests include software analysis and system protection, web trust and privacy, and programing languages.
    Now my research is focusing on provable solutions for software protection which industry is likely to adopt.

    Open Source Projects

  • libproton: Make porting easy from Python to C++11
  • dftwin: high performance dynamic data flow tracking on windows
  • lative emacs customization - my own emacs customization
  • MiSSH: Minimalist Session Manager for SSH

    Awards

  • 2012 Microsoft BlueHat Prize Contest's Special Recognition Award.
  • 2010 IEEE Symposium on Security & Privacy (Oakland'10) Best Student Paper Award.
  • 1993 International Physics Olympiad (IPhO) Silver Medal.
  • Selected Publications

    Journals

    1. Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution. [PDF]
      Tielei Wang, Tao Wei, Guofei Gu, Wei Zou.
      In ACM Transactions on Information and System Security (TISSEC), Vol.14 Issue 2, Sep. 2011.
    2. Using Type Analysis in Compiler to Eliminate Integer-Overflow-to-Buffer-Overflow Threat.[PDF]
      Chao Zhang, Wei Zou, Tielei Wang, Yu Chen, Tao Wei.
      In Journal of Computer Security (JCS), Vol. 19 No. 6, Dec. 2011.

    Conferences

    1. Practical Control Flow Integrity & Randomization for Binary Executables [PDF]
      Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Stephen McCamant, Laszlo Szekeres, Dawn Song, Wei Zou.
      To appear in the 34th IEEE Symposium on Security & Privacy (Oakland), San Francisco, CA, May 2013.
    2. SoK: Eternal War In Memory [PDF]
      Laszlo Szekeres, Mathias Payer, Tao Wei, Dawn Song.
      To appear in the 34th IEEE Symposium on Security & Privacy (Oakland), San Francisco, CA, May 2013.
    3. Protecting Function Pointers in Binary
      Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Stephen McCamant, Laszlo Szekeres.
      To appear in the 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Hangzhou, China, May 2013.
    4. FPGate: The Last Building Block For A Practical CFI Solution. [PDF]
      Tao Wei, Chao Zhang, Zhaofeng Chen, Lei Duan, Laszlo Szekeres, Stephen McCamant, Dawn Song.
      Technical Report For Microsoft BlueHat Prize Contest, Apr. 2012.
    5. How Many Eyes are Spying on Your Shared Folders? [PDF]
      Bingshuang Liu, Zhaoyang Liu, Jianyu Zhang, Tao Wei, Wei Zou.
      In the 19th ACM CCS Workshop on Privacy in the Electronic Society (WPES), Raleigh, NC, Oct. 2012.
    6. Revisiting Why Kad Lookup Fails. [PDF]
      Bingshuang Liu, Tao Wei, Jianyu Zhang, Jun Li, Wei Zou, Mo Zhou.
      In the 12th IEEE International Conference on Peer-to-Peer Computing (P2P), Tarragona, Spain, Sep. 2012.
    7. A Framework to Eliminate Backdoors from Response Computable Authentication. [PDF]
      Shuaifu Dai, Tao Wei, Chao Zhang, Tielei Wang, Yu Ding, Wei Zou, Zhenkai Liang.
      In the 33rd IEEE Symposium on Security and Privacy (Oakland), San Francisco, CA, May 2012.
    8. Heap Taichi: Exploiting Memory Allocation Granularity in Heap-Spraying Attacks. [PDF]
      Yu Ding, Tao Wei, Tielei Wang, Zhenkai Liang, Wei Zou.
      In the 25th Annual Computer Security Applications Conference (ACSAC), Austin, TX, Dec. 2010.
    9. Secure Dynamic Code Generation against Spraying. [PDF]
      Tao Wei, Tielei Wang, Lei Duan, Jing Luo.
      In the 17th ACM Conference on Computer and Communications Security (CCS), poster, Chicago, IL, Oct. 2010.
    10. IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time. [PDF]
      Chao Zhang, Tielei Wang, Tao Wei, Yu Chen, Wei Zou.
      In the 15th European Symposium on Research in Computer Security (ESORICS), Athens, Greece, Sep. 2010.
    11. TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection. [PDF]
      (Best Student Paper Award )
      Tielei Wang, Tao Wei, Guofei Gu, Wei Zou.
      In the 31st IEEE Symposium on Security & Privacy (Oakland), Oakland, CA, May 2010.
    12. Automatically Detecting Integer Overflow Vulnerability In X86 Binary Using Symbolic Execution. [PDF]
      Tielei Wang, Tao Wei, Zhiqiang Lin, and Wei Zou.
      In the 16th Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 2009.
    13. A New Algorithm for Identifying Loops in Decompilation. [PDF]
      Tao Wei, Jian Mao, Wei Zou, Yu Chen.
      In the 14th International Static Analysis Symposium (SAS), Kongens Lyngby, Denmark, Aug. 2007.
    14. Structuring 2-way Branches in Binary Executables. [Full PDF]
      Tao Wei, Jian Mao, Wei Zou, Yu Chen.
      In the 31st Annual IEEE International Computer Software and Applications Conference (COMPSAC), Beijing, China, July 2007.

    Resources

  • Computer Security Conference Ranking List maintained by Prof. Guofei Gu.
  • Computer Security & Privacy Journal List by Microsoft Academic Search.

    V Group Members

  • Leader: Lenx Tao Wei (me)
  • PhD students: Chao Zhang, Shuaifu Dai, Yu Ding
  • MS students: Lei Duan, Zhaofeng Chen, Lihua Zhang
  • Alumni: Jian Mao, Jiajing Li, Tielei Wang, Xinjian Zhao, Tianfang Guo
  • Honorary Member: Prof. Zhenkai Liang, Acacia Zhiyin Liang

    Professional Service

  • PC member: The 20th Annual Network & Distributed System Security Symposium (NDSS'13).
  • PC member: The 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS'13).
  • PC member: The 8th International Conference on Availability, Reliability and Security (ARES'13).
  • PC member: The International Congress on Advances in Citizen, Cyberspace and Environment Safety & Security (ACCESS'13).

    Last update, 1 Apr 2013.