edward jung - kennesaw state universityfacultyweb.kennesaw.edu/ejung4/ejung_cv_sept2015.pdfedward...

16
1 Edward Jung Associate Professor (Phone) 470-578-5546 Department of Computer Science (Office) Atrium J-385 Kennesaw State University - Marietta Campus (Email) [email protected] Marietta, GA 30060 http://facultyweb.kennesaw.edu/ejung4 RESEARCH INTERESTS General research interest lies in security, reliability and fault-tolerance in computing and networking. In particular, research topics include (1) fault models, design and analysis of real- time fault detection/diagnosis algorithms, (2) IP (Intellectual Property) protection of embedded systems, and (3) mobile network security. EDUCATION Ph.D. in Computer Science, University of Minnesota, Minneapolis, MN. 1994. B.S. in Computer Science, University of Minnesota, Minneapolis, MN. 1987. (Admitted directly to the Ph.D. program after the completion of undergraduate study.) PROFESSIONAL EXPERIENCE Associate Professor (with Tenure), Kennesaw State University, Dept. of Computer Science, Marietta, GA. 8/2015 Present. Assistant Professor, Kennesaw (formerly Southern Polytechnic) State University, Dept. of Computer Science and Software Eng., Marietta, GA. 8/2009 5/2015. TM Murray Visiting Professor, Rutgers University, Dept. of Computer Science and WINLAB/ECE (a joint appointment), New Brunswick, NJ. 2/2008 6/2009. Director and Co-founder, Security Research Group, Samsung Research (Samsung AIT), Seoul, Korea. 1/2003 12/2007. Member of Technical Staff, Bell-Labs, Mobility Sector, Wireless Networks Group, Holmdel/Naperville, NJ/IL. 6/1997 - 12/2002. Senior Software Engineer, Motorola Inc., Cellular Infrastructure Group, Chicago/Arlington Heights, IL. 10/1995- 6/1997. Lecturer, University of Minnesota, Department of Computer Science, Minneapolis, MN. 3/1994 - 10/1995. Software Engineer, Siemens USA, Energy & Power Automation Division, Minneapolis, MN. 5/1994 10/1995. Graduate Teaching Assistant, University of Minnesota, Department of Computer Science, Minneapolis, MN. 9/1989 3/1994.

Upload: lamkhanh

Post on 21-May-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

1

Edward Jung

Associate Professor (Phone) 470-578-5546

Department of Computer Science (Office) Atrium J-385

Kennesaw State University - Marietta Campus (Email) [email protected]

Marietta, GA 30060 http://facultyweb.kennesaw.edu/ejung4

RESEARCH INTERESTS

General research interest lies in security, reliability and fault-tolerance in computing and

networking. In particular, research topics include (1) fault models, design and analysis of real-

time fault detection/diagnosis algorithms, (2) IP (Intellectual Property) protection of embedded

systems, and (3) mobile network security.

EDUCATION

Ph.D. in Computer Science, University of Minnesota, Minneapolis, MN. 1994.

B.S. in Computer Science, University of Minnesota, Minneapolis, MN. 1987. (Admitted

directly to the Ph.D. program after the completion of undergraduate study.)

PROFESSIONAL EXPERIENCE

Associate Professor (with Tenure), Kennesaw State University, Dept. of Computer

Science, Marietta, GA. 8/2015 – Present.

Assistant Professor, Kennesaw (formerly Southern Polytechnic) State University, Dept.

of Computer Science and Software Eng., Marietta, GA. 8/2009 – 5/2015.

TM Murray Visiting Professor, Rutgers University, Dept. of Computer Science and

WINLAB/ECE (a joint appointment), New Brunswick, NJ. 2/2008 – 6/2009.

Director and Co-founder, Security Research Group, Samsung Research (Samsung AIT),

Seoul, Korea. 1/2003 – 12/2007.

Member of Technical Staff, Bell-Labs, Mobility Sector, Wireless Networks Group,

Holmdel/Naperville, NJ/IL. 6/1997 - 12/2002.

Senior Software Engineer, Motorola Inc., Cellular Infrastructure Group,

Chicago/Arlington Heights, IL. 10/1995- 6/1997.

Lecturer, University of Minnesota, Department of Computer Science, Minneapolis, MN.

3/1994 - 10/1995.

Software Engineer, Siemens USA, Energy & Power Automation Division, Minneapolis,

MN. 5/1994 – 10/1995.

Graduate Teaching Assistant, University of Minnesota, Department of Computer

Science, Minneapolis, MN. 9/1989 – 3/1994.

2

Graduate Research Assistant, University of Minnesota, Department of Computer

Science, Minneapolis, MN. 9/1988 – 3/1989.

TEACHING

Kennesaw (formerly Southern Poly) State University (Fall 2015 – present)

CS5020 Foundations of Comp. Arch. and Operating Sys. – Fall 2015*

CS5040 Data Structures and Algorithms – Fall 2015*

CS6027 Adv. Computer Networking – Fall 2015*

Courses with “*” above were offered in hybrid delivery format (one F2F lecture; one recorded lecture)

Southern Polytechnic State University/Undergraduate level (Fall 2009 – Spring 2015)

CS3424 Data Structures (with Labs) – Spr 2013, Fall 2013, Fall 2014

CS3224 Computer Organization and Architecture (with Labs) – Fall 2012, Spr 2015

CS4263 Computer Networks – Spr 2010, Spr 2011, Spr 2012, Spr 2013, Spr 2015

CS4283 Real Time Systems – Fall 2010, Fall 2011, Fall 2012, Fall 2013

CS4903/SWE4903 Special Topic: Software Security – Fall 2011

IT4833 Wireless Security – Fall 2009, Spr 2011*

NOTE: Courses with “*” above were offered both in-class and on-line forms.

Southern Polytechnic State University/Graduate level (Fall 2009 – Spring 2015)

CS5223 Computer Architecture – Fall 2009*, Fall 2010*, Fall 2014*

CS6223 Adv. Computer Systems Architecture – Spr 2012, Spr 2013, Fall 2014*

CS6263 Computer Networks – Spr 2010, Spr 2011, Spr 2012, Spr 2013, Spr 2014*, Spr 2015*

CS6123 Theory and Impl. of Prog. Languages – Fall 2013

CS6283 Real Time Systems – Fall 2010, Fall 2011, Fall 2012, Fall 2013

CS6903/SWE6903 Special Topic: Software Security – Fall 2011

IT6833 Wireless Security – Fall 2009, Spr 2011*

IT6873 Information Security Seminar – Spr 2010*, Spr 2011*

NOTE 1: 5xxx: graduate transition courses, 6xxx: graduate-level courses

NOTE 2: Courses with “*” above were offered both in-class and on-line forms.

Rutgers University, New Brunswick, New Jersey (Spring 2009)

CS461 Operating System Concepts – Spr 2009

University of Minnesota, Minneapolis (1993 – 1995)

CSCI5101 Int. to the Organization of Computer System – Spring Qtr. 1994

CSCI5201 Computer Architecture – Winter Qtr. 1993, Fall Q 1994, Winter Q 1995, Fall

Q 1995

3

Courses Developed (Southern Polytechnic State University)

On-line: “CS6223: Adv. Computer Systems Architecture” (Spring 2012)

On-line: “CS6263: Computer Networks” (Spring 2013)

On-line: “CS6283: Real Time Systems” (Spring 2014)

On-line: “IT6833: Wireless Security” (Spring 2010)

New course offering: “CS4903/SWE4903/CS6903/SWE6903: Software Security” (Fall

2011)

Student Advising:

M.S. Thesis Co-Adviser (Anderson, B.), “Evaluation and Comparison of Dynamic

Configuration Strategies for Moving Target Defense,” Southern Poly. State University

(Defended: 5/2013)

M.S. Thesis Committees (more than 10 graduate students), Southern Poly. State

University (8/2010 – present)

M.S. Study (Rodoper, M.), “An IBC and Certificate Based Hybrid Approach to WiMAX

Security,” Rutgers University (3/2008 – 5/2009)

PUBLICATIONS

Peer-reviewed Journals:

1. Choi, S., Sun, K., Eom, H., and Jung, E., “Multi-Source Broadcast Authentication with

Combined Key Chains for Wireless Ad Hoc Networks,” Security and Communication

Networks, DOI: 10.1002/sec.1072, June 2014.

2. Yang, M., Rutherfoord, B., and Jung, E., “Learning Cloud Computing and Security through

CloudSim Simulation,” Information Security Education Journal, Vol. 1, No. 1, June 2014.

3. Choi, S., Bijou, M., Sun K., and Jung, E., “API Tracing Tool for Android-Based Mobile

Devices,” Int. Journal of Information and Education Technology, Vol. 5, No. 6, pp. 460-

465, June 2014.

4. Jung, E., Hung, C-C., Yang, M. and Choi, S., “An Locking and Unlocking Primitive

Function of FSM-modeled Sequential Systems Based on Extracting Logical Property,” Int.

Journal of Information (INFORMATION), Vol. 16, No. 8(B), pp. 6279-6290, August 2013.

5. Yang, M, Hung, C-C., and Jung, E., “Secure Information Delivery through High Bitrate

Data Embedding within Digital Video and its Application to Audio/Video

Synchronization,” Int. Journal of Information Security and Privacy (IJISP), Vol. 6, No. 4,

pp. 71-93, Oct – Dec 2012.

6. Choi, S., Eom, H. and Jung, E., “Simulation-Based Performance Evaluation of Predictive-

Hashing Based Multicast Authentication Protocol,” Journal of Systemics, Cybernetics and

Informatics (JSCI), Vol., 10, No. 6, pp. 19-24, 2012.

4

7. Choi, S., Eom, H. and Jung, E., “Securing Wireless Sensor Networks Against Broadcast

Service Attacks,” Int. Journal of Computers and Applications, Vol., 34, No. 3, pp. 185-

191, 2012.

8. Tsui, F., Jung, E. and Duggins, S., “Software Composition of Different Security Level

Components,” Journal of Computer Technology and Application (JCTA), Vol. 2, No. 11,

2011.

9. Rodoper, M., Trappe, W. and Jung, E., “An IBC and Certificate Based Hybrid Approach to

WiMAX Security,” Journal of Communications and Networks (JCN), Special Issue on

Secure Wireless Networking, Vol. 11, No. 6, pp. 615-625, 2009.

10. Garner, G., Feng, F., Hollander, K., Jeong, H., Kim, B., Lee, B. and Jung, E., “IEEE 802.1

AVB and its Application in Carrier-Grade Ethernet,” IEEE Communication Magazine, Vol.

45, Issue 12, pp. 126-134, 2007.

11. Jung, E. and Jun, M., “Block-sliced DRM System for Secure Multimedia Contents,” Int.

Journal of Computer Science and Network Security, Vol. 7, No. 19, pp. 234-241, 2007.

12. Stepanov, M., Bezzateev, S. and Jung, E., “Privacy Homomorphism for Delegation of the

Computations,” Lecture Notes in Computer Science (LNCS), Vol. 4003, pp. 474-480, 2006.

13. Choi, Y. and Jung, E., “System-Level Self-Diagnosis in Sparsely Interconnected Systems,”

IEEE Trans. on Reliability, Vol. 41, No. 3, pp. 433-439, 1992.

Peer-reviewed Conference Papers:

14. Jung, E. and Choi, S., “Identification of IP Control Units by State Encoding,” IEEE

Computer Society Annual Symp. on VLSI (ISVLSI 2015), Montpellier, France, July 2015.

15. Jung, E., Marchand, C., and Bossuet, L., “Identification of Embedded Control Units by

State Encoding and Power Consumption Analysis,” Proc. of ACM 30th Symp. on Applied

Computing (ACM SAC), poster, Salamanca, Spain, April 2015.

16. Jung, E., Hung, C-C., and Choi, S., “FSM Watermarks Based On Ordering of Flip Flops,”

Proc. of ACM Research in Adaptive and Convergent Systems (ACM RACS 2014),

Baltimore, MD, Oct. 2014.

17. Marchand, C., Bossuet, L., and Jung, E., “IP Watermarking Verification Based On Power

Consumption Analysis,” Proc. of the 27th IEEE Int. Sys.-on-Chip Conf. (IEEE SOCC ’14),

Las Vegas, September 2014.

18. Hung, C-C, Casper, E., Kuo B-C, Jung, E., Yang, M. and Liu W., “A Quantum-Modeled

Artificial Bee Colony Clustering Algorithm for Remotely Sensed Multi-Band Image

Segmentation,” Proc. of IEEE Inter. Geoscience and Remote Sensing Symp. (IEEE

IGARSS), Melbourne, Australia, July 2013.

19. Hung, C-C, Casper, E., Kuo B-C, Liu, W., Jung, E., Yang, M. and Yu X., “A Quantum-

Modeled Fuzzy C-means Clustering Algorithm for Remotely Sensed Multi-Band Image

Segmentation,” Proc. of IEEE Inter. Geoscience and Remote Sensing Symp. (IEEE

IGARSS), Melbourne, Australia, July 2013.

20. Jung, E., Hung, C-C., Choi S. and Yang M., “An Efficient Locking and Unlocking Method

of Sequential Systems,” Proc. of ACM Research in Applied Computation Symp. (ACM

RACS 2012), San Antonio, Texas, Oct. 2012.

5

21. Casper, E., Hung, C-C., Jung, E. and Yang, M., “A Quantum-Modeled K-Means Clustering

Algorithm for Multi-band Image Segmentation,” Proc. of ACM Research in Applied

Computation Symp. (ACM RACS 2012), San Antonio, Texas, Oct. 2012.

22. Hung, C-C., Jung, E., Li, Z., Kuo, B. and Liu, W., “An Algorithm Based Artificial Immune

Systems for Pattern and Image Classification,” Proc. of IEEE Inter. Geoscience and

Remote Sensing Symp. (IEEE IGARSS), poster, Munich, Germany, July 2012.

23. Xu, L., Zhang, Y., Yang, M., Jung, E., Liu, S. and Hung, C-C., “Feature Selection Using

Ant Colony Optimization for Remote Sensing Image Classification,” Polytechnic Summit

2012, Atlanta/Marietta, GA, June 2012.

24. Rodoper, M., Jung, E., Baliga, A. and Trappe, W., “An Efficient Security Framework for

Mobile WiMAX,” Proc. of ACM 27th Symp. on Applied Computing (ACM SAC), Trento,

Italy, March 2012.

25. Choi, S., Eom, H. and Jung, E., ''Simulation-Based Performance Evaluation of Predictive-

Hashing Based Multicast Authentication Protocol,'' Inter. Conf. on Information and

Communication Technologies and Applications (ICTA 2011), Orlando, FL, December

2011.

26. Jung, E., Hung, C., Ma, G. and Choi, S. "A Unified Design Method Utilizing

Decomposability and Composability for Secure Systems," Proc. of ACM Research in

Applied Computation Symp. (ACM RACS), Miami, FL, Nov 2011.

27. Jung, E., Hung, C., Ma, G. and Choi, S. "The Investigation of the Structural Properties of

Machines for the Design of Secure and Trustworthy Systems," Proc. of ACM Research in

Applied Computation Symp. (ACM RACS), Miami, FL, November 2011.

28. Zhang, Y., Sun, M., Hung, C. and Jung, E. "An Empirical Study on the Effectiveness of

Hyperspectral Image Classification Algorithms with Dimensionality Reduction," Proc. of

ACM Research in Applied Computation Symp. (ACM RACS), Miami, FL, November 2011.

29. Hung, C., Jung, E., Kuo, B. and Zhang, Y. "A New Weighted Fuzzy C-Means Algorithm

for Hyperspectral Image Classification," IEEE Inter. Geoscience and Remote Sensing

Symp. (IEEE IGARSS), Vancouver, Canada, July 2011.

30. Hung, C., Ijaz, H., Jung, E. and Kuo, B. "Optimizing the Self-organizing Map for Pattern

and Image Classification," IEEE Inter. Geoscience and Remote Sensing Symp. (IEEE

IGARSS), Vancouver, Canada, July 2011.

31. Tsui, F., Gharaat, A., Duggins, S. and Jung, E., “Measuring Levels of Abstraction in

Software Development,” Proc. of the 23rd Inter.Conf. on Software Engineering and

Knowledge Engineering (SEKE), Miami Beach, FL, July 2011.

32. Rodoper, M., Baliga, A., Trappe, W. and Jung, E., “An Efficient Security Framework for

Mobile WiMAX Using HIBC,” 3rd ACM Inter. Conf. on Wireless Security (ACM WiSEC),

poster, May 2010.

33. Shi, Y., Lee, A., Lee, G., Park, T., Jung, E. and Kang, B., “Indirect Branch Validation Unit

for Secure Program Execution,” Proceedings of the 10th IEEE Inter. Symp. on Low-Power

and High-Speed Chips (IEEE COOL Chips X), pp. 251-260, Yokohama, Japan, 2007.

34. Park, S., Kwon, T. and Jung, E., “Short-time Message Authentication Mechanism in

Multimedia Environments,” Proc. of Conf. on Information Security and Cryptography

(CISC-W07), Vol. 17, No. 21, pp. 317-320, Seoul, Korea, 2007.

6

35. Michail, S., Bezzateev, S. and Jung, E., “Elliptic-Griesmer Codes and Their Applications to

Cover Free Families Construction,” Proc. of 8th Inter. Symp. on Systems and Information

Security, 2006.

36. Park, T., Jung, E., Kang, B. and Ko, C., “Alarming Malware Invasion in Mobile Handsets

Inspired by Biological Immune System,” Proc. of SAMSUNG Technology Conf., Seoul,

Korea, 2006.

37. Bezzateev, Krouk, S., Lee, K., Linsky, E. and Jung, E., “Sub-codes of Goppa Codes for

Multi-level Access Control Systems,” Proc. of IEEE Inter. Conf. on Next Generation Tele-

traffic and Wired/Wireless Advanced Networking (IEEE NEW2AN), 2004.

38. Choi, Y., Kim, C. and Jung, E., “Configuring Multiple Boundary Scan Chains for Board

Testing,” Proc. of IEEE Inter. Symp. on Circuits and Systems (IEEE ISCAS), pp. 2128-

2131, 1995.

39. Choi, Y. and Jung, E., “Configuration of a Boundary Scan Chain for Optimal Testing of

Clusters of non-Boundary Scan Devices,” Proc. of IEEE/ACM Inter. Conf. on Computer-

Aided Design (IEEE ICCAD), pp. 13-16, 1992.

40. Choi, Y. and Jung, E., “Divide-and-Conquer in Wafer Scale Array Testing,” Proc. of IEEE

Inter. Conf. on Wafer Scale Integration (IEEE WSI), pp. 265-171, 1990.

41. Choi, Y. and Jung, E., “Fault Diagnosis of Interconnection Circuits in Wafer Scale

Arrays,” Proc. of the 32nd IEEE Midwest Symp. on Circuits and Systems (IEEE MWSCAS),

pp. 295-298, 1989.

GRANT PROPOSALS

“A Prediction System under Uncertainty for Locating Criminals in a Damaged Sensor

Environment,” US Dept. of Justice (DoJ), February 2011 (PI), not funded.

“Investigation of Image Textural Features for Face Recognition,” US Dept. of Justice

(DoJ), February 2011 (Co-PI), not funded.

STEM Mini Grant Proposal: “New Instructional Strategy for Innovative Teaching via

Vertical Integration with Thought-Provoking Teaching Components,” September 2010

(PI), not funded.

STEM Mini Grant: “Promote the Interest of STEM Fields during Pre-College

Education,” funded US$5,000 by Southern Polytechnic State University, September 2010

(Co-PI)

AWARDS and HONORS

TM Murray Visiting Professorship Award, Rutgers University, Department of Computer

Science, New Brunswick, NJ. 2/2008 – 6/2009.

Senior Membership, IEEE. 2008.

B.S. in Computer Science with Distinction (Honor), Department of Computer Science,

University of Minnesota, MN. 1987.

7

University Scholarship, University of Minnesota. 1986.

Colonial Dames Scholarship, State of Minnesota. 1986. Awarded to a few international

students.

SERVICES

Academic Committees:

Member, Promotion & Tenure Committee for IT (College Level) (Fall 2015 – present)

Member, Graduate Admission Committee for MSCS (Spring 2015 – present)

Faculty Senate, Computer Science and Software Engineering (8/2014 – 5/2015)

Chair, Sub-committee, CS Undergraduate Course Assessment (Fall 2013)

Chair, Sub-committee, CS Graduate Course Assessment (Spring 2013)

Mentor of new faculty, School of Architecture (Fall 2013, Spring 2014)

Member, IT Faculty Search Committees (Fall 2012, Spring 2013)

Chair, Sub-committee, CS Graduate Course Assessments (Fall 2012, Spring 2013)

Departmental Web-editor for ABET visit (Fall 2011)

Member, Departmental Strategic Planning Committee (Fall 2010, Spring 2011)

Secretary, MSCS Program Review Committee (Fall 2010, Spring 2011)

Coordinator, CS Graduate Course Assessments (Spring 2009, Fall 2010)

Technical Program Committees and Reviewers (Journals; Conferences)

Journal Review, “An ultra-lightweight transmitter for contactless rapid identification of

embedded IP in FPGA,” Embedded Systems Letters (June 2015)

Journal Review, “Hierarchical feature selection based on relative dependency for gear

fault diagnosis, “ Applied Intelligence, Springer (August 2015)

Member of the Technical Program Committee, The 15th Int. Conf. on Algorithms and

Architectures for Parallel Processing, Service Dependability and Security in Distributed

and Parallel Systems Track (ICA3PP 2015)

Member of the Technical Program Committee, 2015 Int. Sym. On Web of Things and

Big Data, (WoTBD2015)

Member of the Technical Program Committee, 2015 IEEE Conf. on Wireless Sensors

(ICWiSe2015)

Member of the Technical Program Committee, 2015Int. Conf. on Advances in

Computing, Communications and Informatics (ICACC2 2015)

Member of the Technical Program Committee, Design and Performance on Networks on

Chip (DPNoC2015)

Member of the Technical Program Committee, Third Int. Sym. On Women in Computing

and Informatics (WCI-2015)

ICACCI Doctoral Consortium (2015)

8

Member of the Technical Program Committee, The 2nd Int. Workshop on Mobile

Applications (MobiApps-15)

Member of the Technical Program Committee, 2015 Int. Conf. on Signal Processing &

Data Mining, (ICSPDM’2015)

Member of the Technical Program Committee, 2015 Int. Sym. On Technology

Management and Emerging Technologies (ISTMET 2015)

Member of the Technical Program Committee, 2015 Progress in Applied Mathematics in

Science and Engineering (PIAMSE’2015)

Member of the Technical Program Committee, Mobile and Wireless Communication

Track, 2014 IEEE Asia-Pacific Conference on Applied Electromagnetics (APACE2014)

Member of the Technical Program Committee, Int. Journal of Computing and Digital

Systems (IJCDS' V3 2014)

Member of the Technical Program Committee and Designated Reviewer, 2014 IEEE

Conference on Wireless Sensors (IEEE ICWiSe2014)

Reviewer, The ACM Research in Adaptive and Convergent Systems (ACM RACS 2014)

Reviewer, The 2014 Int. Workshop on Design on Performance of Networks on Chip

(DPNoC 2014)

Member of the Technical Program Committee, Wireless Communications, Networks and

Security Track, IEEE Symp. on Wireless Technology and Applications (IEEE ISWTA

2014)

Member of the Technical Program Committee, 10th ACM Int. Symp. on QoS and

Security for Wireless and Mobile Networks 2014 (ACM Q2SWinet 2014)

Member of the Technical Program Committee, Computer Applications – Networks and

Communications Track, IEEE Symp. on Industrial Electronics and Applications (IEEE

ISIEA 2014)

Reviewer, 2014 Int. Workshop on Mobile Applications (MobiApps 2014)

Reviewer, Advancement in Information Technology International Conference 2014

(ADVCIT’2014)

Reviewer, Embedded Systems, CAD Algorithms and Techniques Track, Applied

Electromagnetic International Conference 2014 (APPEIC’2014)

Reviewer, Safety and Security of RESSs Track, Renewable Energy and Green

Technology International Conference 2014 (REEGETECH’2014)

Member of the Technical Program Committee, 2014 Int. Conf. on Computer and

Communication Engineering (ICOCOE 2014)

Reviewer, Int. Conf. on Computer, Communications, and Control Technology (I4CT

2014)

Member of the Technical Program Committee, Int. Symp. on Technology Management

and Emerging Technologies (ISTMET 2014)

Member of the Technical Program Committee, Machines and Drives Track, Int.

Electromagnetic Systems and Applications Conf. (ELECTROMASA2014)

9

Member of the Technical Program Committee, 2014 IEEE Symposium on Computer

Applications and Industrial Electronics (IEEE ISCAIE 2014)

Member of the Technical Program Committee, Int. Journal of Computing and Digital

Systems (IJCDS' V3 2013)

Reviewer, International Conference on Consumer Electronics, Communications and

Networks (CECNet 2013)

Member of the Program Committee, Trust, Security and Privacy Track, The 15th IEEE

International Conference on High Performance Computing and Communications (IEEE

HPCC 2013)

Member of the Technical Program Committee, 2013 IEEE Conference on Wireless

Sensors (IEEE ICWiSe2013)

Member of the Technical Program Committee, 2013 IEEE Symposium on Computers &

Informatics (IEEE ISCI 2013)

Reviewer, The 2013 IEEE Symposium on Wireless Technology and Applications (IEEE

ISWTA 2013)

External Reviewer (Ph.D. Dissertation): “Optimization of Security in RTWL Networks

Using ESEPS Algorithm,” by H. K. Chapala, Dept. of Computer Science and

Engineering, Acharya Nagarjuna University, Guntur, India, May 2013

Reviewer for the International Journal of Artificial Intelligence, Neural Networks, and

Complex Problem-Solving Technologies (Springer, Applied Intelligence): “A Local-

domain-based Fault Diagnosis Approach for Wireless Sensor Networks”, Mar. 2013

External Reviewer (Ph.D. Dissertation): “Scenario Approach to Software Architecture

Based on Use CASE Maps,” by I. R. Rao, Dept. of Computer Science and Engineering,

Acharya Nagarjuna University, Guntur, India, Mar. 2013

Reviewer for the International Journal of Artificial Intelligence, Neural Networks, and

Complex Problem-Solving Technologies (Springer, Applied Intelligence): “Intelligent

Churn Prediction in Telecom: Employing mRMR Feature Selection and RotBoost based

Ensemble Classification”, Jan. 2013

External Reviewer (Ph.D. Dissertation): “An Efficient Software Effort Estimation System

with Quality Assurance Using ISO 9126 Quality Metrics,” by V. A. Naralasetti, Dept. of

Computer Science and Engineering, Acharya Nagarjuna University, Guntur, India, Jan.

2013

Session Chair, Security Track, 2012 ACM Research in Applied Computation Symposium

(ACM RACS 2012)

Member of the Technical Program Committee, The 2012 ACM Research in Applied

Computation Symposium (ACM RACS 2012)

Reviewer for the International Journal of Artificial Intelligence, Neural Networks, and

Complex Problem-Solving Technologies (Springer, Applied Intelligence): “Learning

Automata based Multicasting Routing Protocol for Multi-Radio Wireless Mesh

Networks”, Apr-May/2012

10

Reviewer, The 2012 IEEE Symp. on Wireless Technology & Applications (IEEE ISWTA

2012)

Member of the Technical Program Committee, The 50th Annual ACM Southeast

Conference (ACMSE 2012)

Reviewer, The 2012 IEEE Asia-Pacific Conference on Applied Electromagnetics (IEEE

APACE 2012)

Member of the Technical Program Committee, International Conference on Information

Science and Applications (ICISA 2011)

Member of the Technical Program Committee, The 49th Annual ACM Southeast

Conference (ACMSE 2011)

Reviewer for the International Journal of Artificial Intelligence, Neural Networks, and

Complex Problem-Solving Technologies (Springer, Applied Intelligence): “A Hybrid

Grey-based Model for Day-ahead Electricity Prices Forecasting”, Oct-Nov/2011

Reviewer, The ACM Tech. Symp. on Computer Science Education (ACM SIGCSE

2011)

Reviewer for the International Journal of Artificial Intelligence, Neural Networks, and

Complex Problem-Solving Technologies (Springer, Applied Intelligence): “Intelligent

Processing of KNN Queries in 3D Wireless Sensor Networks”, Sept-Oct/2010

Reviewer, The 8th International Conference on Computing, Communications and Control

Technologies (CCCT 2010)

Member of the Technical Program Committee, The 3rd International Conference on

Information Security and Assurance (ISA 2009)

Reviewer, The 40th ACM Technology Symposium on Computer Science Education

(ACM SIGCSE 2009)

Reviewer for the 14th ACM Annual Conference on Innovation and Technology in

Computer Science Education (ACM ITiCSE 2009)

Reviewer, The 16th IEEE International Conference on Network Protocol (IEEE ICNP

2008)

Reviewer, The Information Systems Frontiers (ISF 2008)

Member of the Technical Program Committee, The 2008 Network and Information

Security Symposium (NIS 2008)

Reviewer, The 14th European Information Society Technologies (IST), Mobile and

Wireless Communications Summit, Myconos, Greece (IST 2006)

Member of the Technical Program Committee, The Workshop on Privacy Protection:

Technology & Policy, The Institute of Electronics Engineers of Korea (IEEK 2006)

Member of the Technical Program Committee, The SAMSUNG Technology Conferences

(2005, 2006 and 2007)

Session Chair, The SAMSUNG Technology Conference on Communication and

Networks Track, Seoul, Korea (2005 and 2006)

11

Member of Selection Committee for Best Paper Award at SAMSUNG Tech. Conf.,

(2006)

Member of the Technical Program Committee, The 14th European Information Society

Technologies (IST), Mobile and Wireless Communications Summit (IST 2005)

Journal Review Board

Member of Journal Review Board, International Journal of Applied Intelligence,

Springer (Oct. 2013 – present)

Workshop Organization

Member of organization committee, Annual Workshop between Samsung and Palo Alto

Research Center (PARC), Palo Alto, CA, USA, 2005/2006/2007

Member of organization committee, Samsung and Fraunhofer Institute Research Forum,

Darmstadt, Germany, 2006

Funding Evaluation Committee (NSF of Korea)

Member of National Evaluation Committee, Brain Korea for the 21st Century (BK21),

Korea Research Foundation (NSF of Korea), April/May 2007

Co-Editor

Samsung Journal of Innovative Technology, Samsung Electronics, 2006 and 2007

Invited Talks/Conference Presentations

“Identification of IP Control Units by State Encoding,” IEEE Computer Society Annual

Symp. on VLSI (ISVLSI 2015), Montpellier, France, July 2015.

“FSM Watermarks Based On Ordering of Flip Flops,” Proc. of ACM Research in

Adaptive and Convergent Systems (ACM RACS 2014), Baltimore, MD, Oct. 2014.

“An Efficient Locking and Unlocking Method of Sequential Systems,” ACM RACS

2012, San Antonio, Texas, Oct. 2012.

“An Efficient Security Framework for Mobile WiMAX,” ACM 27th Symp. on Applied

Computing (ACM SAC), Trento, Italy, March 2012.

"A Unified Design Method Utilizing Decomposability and Composability for Secure

Systems," ACM RACS 2011, Miami, FL, Nov 2011.

"The Investigation of the Structural Properties of Machines for the Design of Secure and

Trustworthy Systems," ACM RACS 2011, Miami, FL, November 2011.

(Keynote speech) “Roles of Corporate Research and Development: IT and Information

Security,” Annual meeting at Inf. Security and Cryptology, Seoul National University,

Korea, Dec. 2005

12

(Invited Talk) “Industrial View of Research on Information Security and Privacy,” Center

for Information Security Technologies (CIST), Korea University, Korea, Jan. 2006

(Invited Talk) “R&D Issues and Trends: Personal Privacy and Protection,” 11th

Symposium on Information Security (SIS), June 2006

(Invited Talk) “Security and Privacy Issues in Emerging Mobile and Wireless

Communication Networks,” Workshop on Privacy Protection, The Inst. of Elec. Eng. of

Korea (IEEK), Korea, May 2006

Professional Certificates

Certified Information Systems Security Professional (CISSP), International Information

Systems Security Certificate Consortium (ICS2), 2/2003 – 1/2014

Patents (Granted)

Nineteen patents are granted in the USA, while there are many other pending applications.

A. Mobile Device Security

1. Apparatus for restricting access to application module in mobile wireless device and method

of restricting access to application module using the same, with T.J Park, US patent number

8225393, July 17, 2012.

2. Apparatus for detecting intrusion code and method using the same, with T. J Ahn and T. J.

Park, US patent number 8205256, June 19, 2012.

B. Secure Software

3. Central processing unit having branch instruction verification unit for secure program

execution, with G. H. Lee, T. J. Park, B. C. Chang, and Y. Shi, US patent number 8006078,

August 23, 2011.

C. Ad-hoc Network Security

4. Method for encrypting and decrypting data for multi-level access control in an ad-hoc

network, with K. Lee, E. Krouk, A. Sitalov ad S. Bezzateev, US patent number 7532724,

May 12, 2009.

D. Digital Rights Management (DRM)

5. Method and system for updating time information of a DRM device, with H. J. Kim, M. H.

Sung, W. I. Jin, B. and E. Jung, US patent number 8595496, November 26, 2013.

6. Method for supporting mutual exclusion function and DRM device thereof, with H. J. Kim,

P. R. Sivaradjane, V. P. Singh, M. H. Sung, W. I. Jin and B. E. Jung, US patent number

7617323, November 10, 2009.

13

E. Security Primitives/Applied-Crypto

7. Broadcast encryption method and broadcast decryption method thereof, with M. H. Sung, W.

I. Jin, H. Kim, B. Jung, J. H. Park, D. H. Lee, J. I. Lim, K. Y. Ohoi and J. Y. Hwang, US

patent number 8625784, January 7, 2014.

8. Method and apparatus for digital signature generation and validation, with M. Huh, K. Lee,

S. Bezzateev and A. Sitalov, US patent number 8412948, April 2, 2013.

9. Method of and device for updating group key, with D. Y. Kim, M. S. Huh and H. J. Kim, US

patent number 8401182, March 19, 2013.

10. Method and apparatus for updating a group key, with D. Y. Kim, M. S. Huh and H. J. Kim,

US patent number 8374353, February 12, 2013.

11. Key generation method for self-configuration, with J. Yi, US patent number 8370624,

February 5, 2013.

12. Method of updating group key and group key update device using the same, with D. Y. Kim,

M. S. Huh and H. J. Kim, US patent number 8270614, September 18, 2012.

13. Method of protecting broadcast frame, terminal authenticating broadcast frame, and access

point broadcasting broadcast frame, with E. A. Kim, J. H. Yi, A. Fomin, E. Linsky, M.

Stepanov and S. Bezzateev, US patent number 8270607, September 18, 2012.

14. Method of generating node indentifier in tree structure, with M. S. Huh, D. Y. Kim and H. J.

Kim, US patent number 8121974, February 21, 2012.

15. Method for generating, operating, and using a sparse w-NAF key for encryption, with J. Yi,

J. Cheon, T. Kwon, H. Kim and M. Lee, US patent number 7970134, June 28, 2011.

16. Distributed Rivest Shamir Adleman signature method and signature generation node, with J.

Yi, E. A. Kim, A. Afanasyeva and A. Fomin, US patent number 7971064, June 28, 2011.

17. Public key generation method in elliptic curve cryptography and public key generation

system executing the method, with J. H. Yi, S. Bezzateev, E. A. Kim and M. Stepanov, US

patent number 7940936, May 10, 2011.

18. Method and apparatus for generating and verifying digital signature, with M. Huh, K. Lee, S.

Bezzateev, E. Krouk, A. Afanasyeva and A. Sitalov, US patent number 7895438, February

22, 2011.

19. Weighted secret sharing and reconstructing method, with K. Lee, E. Krouk, S. Bezzateev, E.

and Linsky, US patent number 7551740, June 23, 2009.

14

Appendix A: Projects (Summary) – Security in Computing and Networking (Director/PIs,

mostly at Samsung Research)

Proof-of-concepts / Prototypes (SW/HW)

Self-securing VoIP Phone Security, Samsung Research, Collaboration with Palo Alto

Research Center (PARC), Palo Alto, CA, USA (2 years, 2005 – 2007; a multi-million USD)

Usable Security for Mobile Devices (a.k.a., secure mobile devices for VPN), Samsung

Research, Collaboration with Palo Alto Research Center (PARC), Palo Alto, CA, USA (2

years, 2005 – 2007; a multi-million USD)

Middleware SW for Dynamic Interoperability (bet. Mobile Devices and CE Devices),

Samsung Research, Collaboration with Palo Alto Research Center (PARC), Palo Alto, CA,

USA (2 years, 2005 – 2007; a multi-million USD)

Smart Cards, Samsung Research, Collaboration with Sejong University, Seoul, Korea (2

years, 2003 – 2005; USD 90K)

Mobile DRM, Samsung Research, Collaboration with Korea University, Seoul, Korea (2

years, 2005 – 2007; USD 180K)

RFID Privacy (Pilot Project), Samsung Research, Collaboration with Sejong University,

Seoul, Korea (1 year, 2007 – 2008; USD 50K)

2G/2.5G/3G Mobile Internet Security, Bell-Labs Research, Mobility Sector,

Holmdel/Naperville, NJ/IL, USA (6 years, 1997 – 2002)

Wireless/Cellular Networking Programming, Motorola Research/Development, Cellular

Infrastructure Group, Arlington Heights, IL, USA (2 years, 1995 – 1996)

Real-time Distributed Software, Siemens USA, Power Control Division, Plymouth, MN,

USA (1.5 years, 1994 – 1995)

Cryptographic Protocols & Algorithms

Anti-virus/Malware Detection Algorithms for Mobile Devices, Samsung Research,

Collaboration with University of Michigan, Ann Arbor, MI, USA (2 years, 2005 – 2007;

USD 290K)

Broadcast Encryption Algorithms for Multimedia, Samsung Research, Collaboration with

Seoul National University and Korea University, Seoul, Korea (2 years, 2005 – 2007; USD

180K)

Watermarking for Multimedia, Samsung Research, Collaboration with Seoul National

University and Korea University, Seoul, Korea (2 years, 2005 – 2007; USD 180K)

Privacy for Sensing Applications (Pilot Study), WINLAB, Rutgers University, Dept. of CS &

ECE, New Brunswick, NJ, USA, (2008 - 2009)

Lightweight Key Management Protocols in Mobile Ad-hoc Networks, Samsung Research,

Collaboration with SUAI (University), Saint Petersburg, Russia (2 years, 2005 – 2007; USD

150K)

15

Lightweight Cryptographic Protocols (Secret Sharing), Samsung Research, Collaboration

with SUAI (University), Saint Petersburg, Russia (2 years, 2003 – 2004; USD 150K)

Industrial Project (Complying with US Federal Law)

Legal Wiretapping (CALEA/LAES) in 2G/2.5G Mobile Systems, Bell-Labs, Mobility Sector,

Naperville, IL, USA (2 years, 1997 – 1999)

Security Research Roadmap

Security Research Roadmap and Strategy: Samsung Research, Collaboration with Cambridge

University, UK. (2 years, 2004 – 2006)

Appendix B: OTHER PUBLICATIONS – Dissertation and Technical Reports

1. Jung, E., “Testing and Diagnosis of Digital Systems,” Ph.D. Thesis, Department of Computer

Science, University of Minnesota, Minneapolis, 1994.

2. Jung, E. (co-author), “Design Specification of the Cellular Digital Messaging Services

Protocols,” Wireless Intelligent Network Group, Motorola, Inc., March 1997.

3. Jung, E., “System Requirements Document for Inter-system Handoffs for CDMA/TDMA

Wireless Data Services,” Wireless Networks Group, Bell-Labs/Lucent, December 1997.

4. Jung, E., “System Requirements Document for Lawfully Authorized Enforcement

Surveillance (LAES) for CDMA/TDMA Mobile Data Services,” Wireless Networks Group,

Bell-Labs/Lucent, June 1999.

5. Jung, E., “XML-based Application Programming Interface (API) for Mobile Internet

Gateway,” Mobile Internet Group, Mobility Sector, Bell-Labs/Lucent, Sept., 2000.

6. Jung, E., “Mobile Internet Functional Architecture,” Mobile Internet Group, Mobility Sector,

Bell-Labs/Lucent, July 2001.

7. Jung, E., “UMTS Applications and Services Network Architecture,” Mobile Internet Group,

Mobility Sector, Bell-Labs/Lucent, Jan. 2002.

8. Jung, E., “Applications and Services Network Architecture: Integration of Wireless LAN

with 3G Wireless Networks,” Mobile Internet Group, Mobility Sector, Bell-Labs/Lucent,

Jan. 2002.

9. Jung, E., “Provisioning Solution Architecture: Wireless LAN and End-to-End IPSec VPN

Services,” Mobile Internet Group, Mobility Sector, Bell-Labs/Lucent, April 2002.

10. Jung, E., “Security Requirements for Secure Mobile Data Solution for enterprise (SMDSe),”

Mobile Internet Group, Mobility Sector, Bell-Lab/Lucent, July 2002.

11. Jung, E., “Security Architecture for Secure Mobile Data Solution for enterprise (SMDSe),”

Mobile Internet Group, Mobility Sector, Bell-Labs/Lucent, Oct. 2002.

12. “Key Management for Mobile and Wireless Networking,” (with A. Chmora, A. Ourisvski,

and M Wong), The 16th Wireless World Research Forum (WWRF-16), Shanghai, China,

2006.

16

13. “Protecting the Mobile Network Broadcast Information,” (with S. Bezzateev, A. Fomin, B.

Kang, and M Wong), The 18th Wireless World Research Forum (WWRF-18), Espoo,

Finland, 2007.

Last update: Sept. 2015