Sign in to view Billy’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Billy’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Mountain View, California, United States

Sign in to view Billy’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
371 followers 360 connections
Mountain View, California, United States
Sign in to view Billy’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
371 followers 360 connections

View mutual connections with Billy
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Billy
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Join to view profile
Sign in to view Billy’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
University of Michigan at Ann Arbor
- Report this profile
Activity
Sign in to view Billy’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
-
The FDA approves Pfizer drugs that have inadequate safety and efficacy data, and then the regulators that make these decisions are paid handsomely by…
The FDA approves Pfizer drugs that have inadequate safety and efficacy data, and then the regulators that make these decisions are paid handsomely by…
Liked by Billy Lau
-
Any real reform of NIH will make a lot of scientists cry-- the mediocre ones who thrive in the current system.Already many have taken a "sky is…
Any real reform of NIH will make a lot of scientists cry-- the mediocre ones who thrive in the current system.Already many have taken a "sky is…
Liked by Billy Lau
-
Trump bans Gain of Function research, good!
Trump bans Gain of Function research, good!
Liked by Billy Lau
Join now to see all activity
Experience & Education
-
Google
***** ******** ********
-
******* ********* ** **********
******** *********
-
****** *** *********** ********** *********** (****), ********** ** ******** ** *** *****
******** *********
-
********** ** ******** ** *** *****
******* ** ******* ******** *******
-
********** ** ******** ** ******-*********
******** ** ******* (*.*.) ******** *********** ******
View Billy’s full experience
See their title, tenure and more.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Licenses & Certifications
-
ATCL
Trinity College of London
Publications
-
Mimesis Aegis: A Mimicry Privacy Shield–A System’s Approach to Data Privacy on Public Cloud
The 23rd USENIX Security Symposium (Security)
Other authors
See publication
-
-
On the Feasibility of Large-Scale Infections of iOS Devices
The 23rd USENIX Security Symposium (Security)
Other authors
See publication
-
Exploiting Unpatched iOS Vulnerabilities for Fun and Profit
BlackHat USA 2014
Other authors
See publication
-
Mactans: Injecting Malware Into iOS Devices via Malicious Chargers
Black Hat USA 2013
Apple iOS devices are considered by many to be more secure than other mobile offerings. In evaluating this belief, we investigated the extent to which security threats were considered when performing everyday activities such as charging a device. The results were alarming: despite the plethora of defense mechanisms in iOS, we successfully injected arbitrary software into current-generation Apple devices running the latest operating system (OS) software. All users are affected, as our approach…
Apple iOS devices are considered by many to be more secure than other mobile offerings. In evaluating this belief, we investigated the extent to which security threats were considered when performing everyday activities such as charging a device. The results were alarming: despite the plethora of defense mechanisms in iOS, we successfully injected arbitrary software into current-generation Apple devices running the latest operating system (OS) software. All users are affected, as our approach requires neither a jailbroken device nor user interaction.
In this presentation, we demonstrate how an iOS device can be compromised within one minute of being plugged into a malicious charger. We first examine Apple’s existing security mechanisms to protect against arbitrary software installation, then describe how USB capabilities can be leveraged to bypass these defense mechanisms. To ensure persistence of the resulting infection, we show how an attacker can hide their software in the same way Apple hides its own built-in applications.
To demonstrate practical application of these vulnerabilities, we built a proof of concept malicious charger, called Mactans, using a BeagleBoard. This hardware was selected to demonstrate the ease with which innocent-looking, malicious USB chargers can be constructed. While Mactans was built with limited amount of time and a small budget, we also briefly consider what more motivated, well-funded adversaries could accomplish. Finally, we recommend ways in which users can protect themselves and suggest security features Apple could implement to make the attacks we describe substantially more difficult to pull off.
Other authors
See publication
-
-
Accessing Trusted Web Sites from Low- Integrity Systems Without End-Host Snooping.
IEEE
The weakest link in secure web site access is often the end-host. Any malicious software installed there, or a runtime browser compromise, can lead to theft of critical information which is stored locally. Today's state-of-the-art in host-based intrusion detection and prevention systems has not succeeded in eradicating this problem. In this paper, we introduce an orthogonal solution: a system that guarantees the confidentiality of sensitive documents produced during web transactions, even on a…
The weakest link in secure web site access is often the end-host. Any malicious software installed there, or a runtime browser compromise, can lead to theft of critical information which is stored locally. Today's state-of-the-art in host-based intrusion detection and prevention systems has not succeeded in eradicating this problem. In this paper, we introduce an orthogonal solution: a system that guarantees the confidentiality of sensitive documents produced during web transactions, even on a compromised browser or operating system. Compared to other solutions that utilizes virtual machines, our approach does not require user to run multiple guests and switch between them. Rather, to get the guarantees, users can switch the mode of operation of its current system to custom-defined compartments when necessary. Documents created in specific compartment will only be accessible within that compartment and can only flow between the authorized sites stated in the corresponding compartment policy. The system only requires a trusted hyper visor within which the user's low-integrity OS runs as a guest. We describe the architecture of the system, a prototype implementation, and the modifications to the hyper visor to make transitions into and out of secure compartment(s) fast enough for interactive use.
Other authors
See publication
-
-
Protecting Confidential Data on Personal Computers with Storage Capsules.
USENIX Security
Protecting confidential information is a major concern for organizations and individuals alike, who stand to suffer huge losses if private data falls into the wrong hands. One of the primary threats to confidentiality is malicious software on personal computers, which is estimated to already reside on 100 to 150 million machines. Current security controls, such as firewalls, anti-virus software, and intrusion detection systems, are inadequate at preventing malware infection. This paper…
Protecting confidential information is a major concern for organizations and individuals alike, who stand to suffer huge losses if private data falls into the wrong hands. One of the primary threats to confidentiality is malicious software on personal computers, which is estimated to already reside on 100 to 150 million machines. Current security controls, such as firewalls, anti-virus software, and intrusion detection systems, are inadequate at preventing malware infection. This paper introduces Storages Capsules, a new approach for protecting confidential files on a personal computer. Storage Capsules are encrypted file containers that allow a compromised machine to securely view and edit sensitive files without malware being able to steal confidential data. The system achieves this goal by taking a checkpoint of the current system state and disabling device output before allowing access a Storage Capsule. Writes to the Storage Capsule are then sent to a trusted module. When the user is done editing files in the Storage Capsule, the system is restored to its original state and device output resumes normally. Finally, the trusted module declassifies the Storage Capsule by re-encrypting its contents, and exports it for storage in a low-integrity environment. This
work presents the design, implementation, and evaluation of Storage Capsules, with a focus on exploring covert channels.Other authors
See publication
-
Patents
-
Systems and methods of safeguarding user information while interacting with online service providers
Issued US US-9659189-B2
The disclosed technology includes techniques for improving data privacy in mobile communications over public cloud services. According to certain implementations, a novel conceptual layer may be interposed between the “application” layer and the “user” layer. In some implementations, the conceptual layer may be at least partially embodied by a transparent window or pane overlaid on top of existing app graphical user interfaces to: (1) intercept plaintext user input before transforming the input…
The disclosed technology includes techniques for improving data privacy in mobile communications over public cloud services. According to certain implementations, a novel conceptual layer may be interposed between the “application” layer and the “user” layer. In some implementations, the conceptual layer may be at least partially embodied by a transparent window or pane overlaid on top of existing app graphical user interfaces to: (1) intercept plaintext user input before transforming the input and feeding it to an underlying app; and (2) reverse transform output data from the app before displaying the plaintext data to the user. Accordingly, the conceptual layer may serve as a protective layer while preserving the original application workflow and look-and-feel.
Other inventors
-
Projects
-
Uraniborg
- Present
Uraniborg is envisioned to be a public observatory/repository that collects and hosts information about preinstalled apps. Users can use tools in this repository to get a "snapshot" on the state of installed devices. When used on a new device prior to or skipping accounts set-up, the state of preinstalled packages on the device can be obtained.
Languages
-
English
Native or bilingual proficiency
-
Malay
Native or bilingual proficiency
-
Foochow
Native or bilingual proficiency
-
Mandarin
Limited working proficiency
-
Cantonese
Limited working proficiency
More activity by Billy
-
Looking for strong Software Engineers to join our team in Google DeepMind working on next-generation privacy and security infrastructure for ML…
Looking for strong Software Engineers to join our team in Google DeepMind working on next-generation privacy and security infrastructure for ML…
Liked by Billy Lau
-
What new rules at Meta mean for censorshipSadly Linkedin is still terrible
What new rules at Meta mean for censorshipSadly Linkedin is still terrible
Liked by Billy Lau
-
Malaysia has truly changed after its political atmosphere filtered to a cleaner air! Excellent rice cooked, l chose buttered chicken,it is called as…
Malaysia has truly changed after its political atmosphere filtered to a cleaner air! Excellent rice cooked, l chose buttered chicken,it is called as…
Liked by Billy Lau
-
The WH0 should not be permitted to continuously fail upward, while insisting on expanding their powers (and profits). Thank you Vinay Prasad 🙏🏼
The WH0 should not be permitted to continuously fail upward, while insisting on expanding their powers (and profits). Thank you Vinay Prasad 🙏🏼
Liked by Billy Lau
-
Another CA fails the turing test, issuing a MITM certificate. This highlights ongoing issues with underperforming CAs. I’ve shared my thoughts on the…
Another CA fails the turing test, issuing a MITM certificate. This highlights ongoing issues with underperforming CAs. I’ve shared my thoughts on the…
Liked by Billy Lau
-
My father John Borders and grandfather were both automotive designers at Ford. A lot has changed, but I hope to carry on their legacy designing…
My father John Borders and grandfather were both automotive designers at Ford. A lot has changed, but I hope to carry on their legacy designing…
Liked by Billy Lau
-
Earlier this week was my 10th Google anniversary. I’ve been having various emotions leading up to it, especially thinking about the humble beginnings…
Earlier this week was my 10th Google anniversary. I’ve been having various emotions leading up to it, especially thinking about the humble beginnings…
Liked by Billy Lau
View Billy’s full profile
- See who you know in common
- Get introduced
- Contact Billy directly
Sign in
Stay updated on your professional world
Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Other similar profiles
- Aarushi Goel Seattle, WA Connect
- Anupam Mehta Ashburn, VA Connect
- Manasi Sachdeva Santa Clara, CA Connect
- Jim Nitterauer Gulf Breeze, FL Connect
- Nathan Cooper Salt Lake City Metropolitan Area Connect
- Matthew Hintz Greater Tampa Bay Area Connect
- John Caseria Atlanta Metropolitan Area Connect
- Andrew Hoffman Seattle, WA Connect
- Sunit Guldas Nashville Metropolitan Area Connect
- Krutik Poojara San Francisco Bay Area Connect
- Anurag Sharma, CISSP Santa Clara, CA Connect
- Ben Tucker Pompano Beach, FL Connect
- Abdalla (Mohamed) Elzedy CISM, SSCP, Cysa+, PenTest+ Princeton, NJ Connect
- Ryan Skelton, CISSP Greater Indianapolis Connect
- Mark Dunmeyer Carpentersville, IL Connect
- John J. Cofounder and CTO of Bumble Auto Sterling, VA Connect
- Chris Munao, CISSP, CEHv8 Greater Chicago Area Connect
- Matt Svensson Atlanta Metropolitan Area Connect
- Daniel Gindin, PMP,CSM,ITIL St. Petersburg, FL Connect
- Jason Kittrell, MS Cybersecurity Carthage, TN Connect
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Billy Lau in United States
- Billy L. Senior Automation Engineer | NRE | SRE | Senior System Engineer | IT Project Manager | Team Leader | Full Stack Developer | Incident Commander Marietta, GA
- Billy Lau San Francisco Bay Area
- Billy Lau Instructor at Stanford University School of Medicine Palo Alto, CA
- Billy Lau Registered Nurse at New York Presbyterian Hospital Brooklyn, NY
140 others named Billy Lau in United States are on LinkedIn
See others named Billy Lau
Add new skills with these courses
- 2h 8m CCSP Cert Prep: 2 Data Security
- 1h 20m ETL in Python and SQL
- 18h 5m ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep
See all courses