Professor of National Chiao Tung University
黃 —— 育 綸 ▪ ▪ ▪ ▪ 教 授
Real-Time Embedded System Laboratory
Arrow down
About 1 About 2 About 3
RTES Lab is a laboratory established on July 4th, 2004. The lab primarily focuses on the researches of embedded and real-time operating systems, network security, software obfuscation, voice-over-IP, network quality, Human-computer interaction, etc. Headed by Professor Yu-Lun Huang, who expertizes in embedded software design and has years of practical experiences in the embedded industry, RTES lab members have been growing to more than fifty members in the past ten years. The lab equips with several desktop and laptop computers, evaluation boards with various embedded processors, Bluetooth development SDK, FPGAs, ZigBee, RFID EV boards, logical analyzers and oscillators. You are welcome to visit our laboratory and enjoy a trip to the world of embedded systems.
Professor of National Chiao Tung University

Consultant of Mozilla Taiwan
Chief of Center for Digital Content Production (NCTU)
Chief of Center for Continuing Education (NCTU)

Ph.D., National Chiao Tung University
M.S., National Chiao Tung University
B.S., National Chiao Tung University
  • Honors
  • Publications
  • Patents
  • 1995 交大資工系第一名畢業。
  • 1995 獲頒斐陶斐榮譽會員。
  • 2005 交通大學電機與控制工程學系績優導師。
  • 2005 交通大學電機與控制工程學系特校績優導師。
  • 2007 交通大學電機與控制工程學系特校績優導師
  • 1995 思源研發獎第一名。
  • 1995 教育部校園軟體創作競賽佳作。
  • 1995 資工系第三屆軟硬體專題作品比賽第一名。
  • 1996 台北市電腦商業公會台北電腦軟體展「明日之星」獎。
  • 2000 第十屆資訊安全會議最佳論文獎。
  • 2006 德州儀器 TI 亞洲區DSP 應用競賽台灣區分賽優等獎。
  • 2008 網路通訊軟體與創意應用競賽值得注目獎
  • Honors
  • Publications
  • Patents
Journal Papers
  • Y. L. Huang, Chih-Ya Shen, Shiuhpyng Shieh, "S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks," submitted to IEEE Transactions on Vehicular Technology.
  • Y. L. Huang, P. H. Lu, J. D. Tygar, A. Joseph, “OSNP: Secure Wireless Authentication Protocol using One-Time Key,” Computers & Security, Vol. 28, Issue 8, November 2009, Page 803-815.
  • Y. L. Huang, Alvaro A. Cardenas, Saurabh Amin, Zong-Syun Lin, Hsin-Yi Tsai, Shankar Sastry, "Understanding the Physical and Economic Consequences of Attacks on Control Systems," International Journal of Critical Infrastructure Protection, Vol. 2, Issue 3, October 2009, Pages 73-83.
  • H. Y. Tsai, Y. L. Huang, D. Wagner, “A Graph Approach to Quantitative Analysis of Control Flow Obfuscating Transformations,” IEEE Transactions on Information Forensics and Security, Vol. 4, Issue 2, June 2009.
  • Y. L. Huang, J. S. Hu, “Hands-on Oriented Curriculum and Laboratory Development for Embedded System Design,”SIGBED Review, Vol. 6, No. 1, January 2009.
  • Y. L. Huang, S. P. Shieh, J. C. Wang, “Efficient Key Distribution Schemes for Secure Media Delivery in Pay-TV Systems,” IEEE Transactions on Multimedia, pp. 760-769, Vol. 6, Issue 5, Oct. 2004.
  • S. P. Shieh, Y. C. Tsai, Y. L. Huang, “Optimal Information Dispersal for Fault-Tolerant Wireless Communication,” IEEE Transactions on Reliability, pp. 354-366, Vol. 52, Issue 3, Sept. 2003.
  • S.P. Shieh, Fu-Shen Ho, Y. L. Huang, and Jia-Ning Luo, “NETWORK ADDRESS TRANSLATORS: Effects on Security Protocols and Applications in the TCP/IP Stacks,” IEEE Internet Computing, pp. 42-49, Vol. 4, Number: 6, Nov/Dec. 2000.
  • Y. L. Huang, S. P. Shieh, F. S. Ho, "A Generic Electronic Payment Model Supporting Multiple Merchant Transactions," Computers and Security, Vol. 19, No. 5, pp.453-465, 2000.
  • S. P. Shieh, F. S. Ho, Y. L. Huang, "An Efficient Authentication Protocol for Mobile Networks," Journal of Information Science and Engineering, Vol.15 No.4, pp.505-520, July 1999.
Conference Papers
  • Alvaro Cardenas, Saurabh Amin, Zong-Syun Lin, Yu-Lun Huang, Chi-Yen Huang and Shankar Sastry, "Attacks Against Process Control Systems: Risk Assessment, Detection, and Response, ”accepted for publication by the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011).
  • B.T. Chen and Y.L. Huang, “The Design and Implementation of a Multi-core Supported Network Intrusion Detection System,”the 20th Cryptology and Information Security Conference (CISC 2010), Taiwan, 2010.
  • 蔡欣宜、王繼偉、陳柏廷、黃育綸、謝續平, “基於虛擬裝置之無線網路安全測試平台,” the 20th Cryptology and Information Security Conference (CISC 2010), Taiwan, 2010.
  • Y. L. Huang, C. Y. Shen, Shiuhpyng Shieh, Hung-Jui Wang, Cheng-Chun Lin, "Provable Secure AKA Scheme with Reliable Key Delegation in UMTS," The 3rd IEEE International Conference on Secure Software Integration Reliability Improvement, Shanghai, China, July 8-10, 2009.
  • Z. S. Lin, A. Cardenas, H. Y. Tsai, S. Amin, Y. L. Huang and S. Sastry, “Understanding the Physical Consequences of Attacks on Control Systems,” Third Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 22 - 25, 2009
  • Zong-Syun Lin, Alvaro Cardenas, Saurabh Amin, Hsinyi Tsai, Y. L. Huang and Shankar Sastry,“Security Analysis for Process Control Systems,”the 16th ACM Conference on Computer and Communications Security, 2009.
  • Y. L. Huang, J. D. Tygar, H. Y. Lin, L. Y. Yeh, H. Y. Tsai, K. Sklower, S. P. Shieh, C. C. Wu, P. H. Lu, S. Y. Chien, Z. S. Lin, L. W. Hsu, C. W. Hsu, C. T. Hsu, Y. C. Wu, M. S. Leong, “SWOON: A Testbed for Secure Wireless Overlay Networks,” USENIX Workshop on Cyber Security Experimentation and Test (CSET’08), San Jose, July 28, 2008.
  • Y. L. Huang, J. S. Hu, “Design Methodology and Hands-on Practices for Embedded Operating Systems,” The 1st Asia-Pacific Workshop on Embedded System Education and Research (APESER 2007), Dec. 7, 2007.
  • Y. L. Huang, P. H. Lu, M. Newlin Rajkumar, C. T. Hsu, “Secure and Fast Authentication Protocol for Wireless Networks in Homecare Systems,” in the proceeding of 2007 CACS Automatic Control Conference, Nov. 9-10, 2007.
  • Y. L. Huang, E. C. Hsia, J. S. Hu, “The Design and Implementation of an Embedded Software Architecture for Intelligent Robots (ESAIR), ” in the procedding of International Conference on Open Source, Nov 1-4, 2007.
  • Y. L. Huang, J. S. Hu, “The Curriculum and Teaching Laboratory for Embedded Systems,” 2007 Workshop on Embedded System Education, Oct. 4-5, Salzburg, Austria.
  • Y. L. Huang, M. Newlin Rajkumar, E. C. Hsia, “A Hybrid Network and Software Architecture for Digital Home Care Systems,” in the proceeding of 2006 CACS Automatic Control Conference, Nov. 10-11, 2006.
  • Zao, John K.; Hu, Jwu-Sheng; Chiou, Jin-Chern; Huang, Yu-Lun; Li, Shu-Chen; Kuo, Zee-Yih; Chuang, Ming-Chuen; Hsu, Shang-Hwa; Tseng, Yu-Chee; Liu, Jane W. S.; Lin, Chin-Teng;, “Kannon: Ubiquitous Sensor/Actuator Technologies for Elderly Living and Care: A Multidisciplinary Effort in National Chiao Tung University, Taiwan”, IEEE International Conference on Systems, Man and Cybernetics, 2006 (ICSMC '06), Volume 5, 8-11 Oct. 2006 Page(s):4297 – 4303.
  • Y. L. Huang, F. S. Ho, H. Y. Tsai, H. M. Kao, “A Control Flow Obfuscation Method to Discourage Malicious Tampering of Software Codes,” in the proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS’06), March 21-24, 2006.
  • Y. L. Huang, F. S. Ho, E. C. Hsia, C. C. Tsao, “A Multi-Interface Control Infrastructure for Bio-Sensing Devices in Home Care Systems, " the 2005 CACS Automatic Control Conference, Nov. 17-19, 2005
  • Y. L. Huang, J. S. Hu, “A Teaching Laboratory and Course Programs for Embedded Software Design”, the iCEER-2005 iNEER Conference for Engineering Education and Research, March 1-5.
  • F.S. Ho, S.P. Shieh, Y. L. Huang, K.L. Tsai, “A Service Probing and Channel Establishment Protocol across Multiple Network Address Translation Realms,” the Proceedings of 2002 International Computer Symposium, Dec. 18–21, 2002.
  • Y. L. Huang, S.P. Shieh, J.C. Wang, "Practical Key Distribution Schemes for Channel Protection," the 24th IEEE Computer Society International Computer Software and Applications Conference, Oct. 2000.
  • Y. L. Huang, S.P. Shieh, "A Fair Settlement Protocol for Online Transactions," the Proceedings of Information Security Conference, May 2000.
  • .P. Shieh, Y. L. Huang, F.S. Ho, "A Family of Secure Network Protocols," the Proceedings of Information Security Conference, May 1996.
  • 黃育綸、蔡欣宜、謝續平,「SWOON: 安全無線疊蓋觀測網路」,投稿至網路通訊國家型計畫辦公室簡訊。
  • 楊景程、黃育綸,「全數位嵌入式伺服運動控制架構應用」,機械工業雜誌 289期,2007年4月。
  • 鄭仁傑、黃育綸等,資通安全專輯之十八「數位智慧財產權管理」,財團法人國家實驗研究院科技政策研究與資訊中心,2005年6月。
  • 謝續平、黃育綸等,資通安全專輯之八「系統與網路安全」,行政院國家科學委員會科學技術資料中心,2003年12月。
  • 黃育綸,「糟了!網路電話被竊聽--談語音網路的安全機制」,網路通訊雜誌,2002年2月。
  • Honors
  • Publications
  • Patents
  • Y. J. Lee, S. P. Chang, P. Luong, H. Shi, F. Lin, Y. L. Huang, “Non-Intrusive PSQM/PESQ Voice Quality Measurement,” US patent No. 7299176, Nov. 2007.
  • “A Wireless Access Point Security Scheme supporting Small-scaled Home Users,” Ambit Corp. Patent pending, April 2003.
  • S.P. Shieh, Y. L. Huang, F.S. Ho, "A Generic Payment Method Supporting Multiple Merchants and its Applications," ROC patent no. 87106480, Dec. 1999.
  • S.P. Shieh, Y. L. Huang, F.S. Ho, "Method and System for Online Transactions Involving Multiple Merchants," US patent pending, Nov. 1999.
  • S.P. Shieh, W.H. Yang, F.S. Ho, H.T. Cheng, Y. L. Huang, "An Authentication System for Computer Networks," ROC patent no. 079094, Jun. 1996.
Works 1
Works 2

EE719, +886 03-5712121 ext 31476

EE913, +886 03-5712121 ext 54398