Research

Security in Computing

  • Lightweight key management (digital signature; broadcast encryption)
  • Secure authentication protocols; IBC
  • Nondestructive IP watermarking; DRM

Fault-Tolerant Computing/Testability

  • System-level self-diagnosis algorithms
  • Design-for-Testability (DFT)

Publications

Book Chapters

  • Jung, E. and Bossuet, L., IP FSM Watermarking (Chapter 4), Foundations of Hardware IP Protection by Springer (Eds. L. Bossuet and L. Torres), DOI 10.1007/978-3-319-50380-6_4, ISBN 978-3-319-50378-3, pp. 65-84, January 2017.

Journals (Selected)

  • Jung, E., Bossuet, L., Choi, S., and Marchand, C, “Identification of IP Control Units by State Encoding and Side Channel Verification,” ELSEVIER Embedded Hardware Design (ELSEVIER MICPRO), Vol. 47, Part A, http://dx.doi.org/10.1016/j.micpro.2016.02.019, pp. 11-22, Nov. 2016.

  • Choi, S., Sun, K., Eom, H., and Jung, E., “Multi-Source Broadcast Authentication with Combined Key Chains for Wireless Ad Hoc Networks,” Security and Communication Networks, DOI: 10.1002/sec.1072, June 2014.

  • Yang, M., Rutherfoord, B., and Jung, E., “Learning Cloud Computing and Security through CloudSim Simulation,” Information Security Education Journal, Vol. 1, No. 1, June 2014.

  • Choi, S., Bijou, M., Sun K., and Jung, E., “API Tracing Tool for Android-Based Mobile Devices,” Int. Journal of Information and Education Technology, Vol. 5, No. 6, pp. 460-465, June 2014.

  • Jung, E., Hung, C-C., Yang, M. and Choi, S., “An Locking and Unlocking Primitive Function of FSM-modeled Sequential Systems Based on Extracting Logical Property,” Int. Journal of Information (INFORMATION), Vol. 16, No. 8(B), pp. 6279-6290, August 2013.

  • Yang, M, Hung, C-C., and Jung, E., “Secure Information Delivery through High Bitrate Data Embedding within Digital Video and its Application to Audio/Video Synchronization,” Int. Journal of Information Security and Privacy (IJISP), Vol. 6, No. 4, pp. 71-93, Oct – Dec 2012.

  • Choi, S., Eom, H. and Jung, E., “Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol,” Journal of Systemics, Cybernetics and Informatics (JSCI), Vol., 10, No. 6, pp. 19-24, 2012.

  • Choi, S., Eom, H. and Jung, E., “Securing Wireless Sensor Networks Against Broadcast Service Attacks,” Int. Journal of Computers and Applications, Vol., 34, No. 3, pp. 185-191, 2012.

  • Tsui, F., Jung, E. and Duggins, S., “Software Composition of Different Security Level Components,” Journal of Computer Technology and Application (JCTA), Vol. 2, No. 11, 2011.

  • Rodoper, M., Trappe, W. and Jung, E., “An IBC and Certificate Based Hybrid Approach to WiMAX Security,” Journal of Communications and Networks (JCN), Special Issue on Secure Wireless Networking, Vol. 11, No. 6, pp. 615-625, 2009.

  • Garner, G., Feng, F., Hollander, K., Jeong, H., Kim, B., Lee, B. and Jung, E., “IEEE 802.1 AVB and its Application in Carrier-Grade Ethernet,” IEEE Communication Magazine, Vol. 45, Issue 12, pp. 126-134, 2007.

  • Stepanov, M., Bezzateev, S. and Jung, E., “Privacy Homomorphism for Delegation of the Computations,” Lecture Notes in Computer Science (LNCS), Vol. 4003, pp. 474-480, 2006.

  • Choi, Y. and Jung, E., “System-Level Self-Diagnosis in Sparsely Interconnected Systems,” IEEE Trans. on Reliability, Vol. 41, No. 3, pp. 433-439, 1992.

Conferences (Selected)

  • Jung, E. and Choi, S., “Identification of IP Control Units by State Encoding,” IEEE Computer Society Annual Symp. on VLSI  (IEEE ISVLSI 2015), Montpellier, France, July 2015.

  • Marchand, C., Bossuet, L., and Jung, E., “IP Watermarking Verification Based On Power Consumption Analysis,” Proc. of the 27th IEEE Int. Sys.-on-Chip Conf. (IEEE SOCC ’14), Las Vegas, September 2014.

  • Jung, E., Hung, C-C., and Choi, S., “FSM Watermarks Based On Ordering of Flip Flops,” Proc. of ACM Research in Adaptive and Convergent Sys. (ACM RACS 2014), Baltimore, MD, Oct. 2014.

  • Hung, C-C, Casper, E., Kuo B-C, Jung, E., Yang, M. and Liu W., “A Quantum-Modeled Artificial Bee Colony Clustering Algorithm for Remotely Sensed Multi-Band Image Segmentation,” Proc. of IEEE Inter. Geo. and Rem. Sensing Symp. (IEEE IGARSS), Melbourne, Australia, July 2013.

  • Hung, C-C, Casper, E., Kuo B-C, Liu, W.,  Jung, E., Yang, M. and Yu X., “A Quantum-Modeled Fuzzy C-means Clustering Algorithm for Remotely Sensed Multi-Band Image Segmentation,” Proc. of IEEE Inter. Geo. and Rem. Sensing Symp. (IEEE IGARSS), Melbourne, Australia, July 2013.

  • Jung, E., Hung, C-C., Choi S. and Yang M., “An Efficient Locking and Unlocking Method of Sequential Systems,” Proc. of ACM Research in Applied Computation Symp. (ACM RACS 2012), San Antonio, Texas, Oct. 2012.

  • Casper, E., Hung, C-C., Jung, E. and Yang, M., “A Quantum-Modeled K-Means Clustering Algorithm for Multi-band Image Segmentation,” Proc. of ACM Research in Applied Computation Symp. (ACM RACS 2012), San Antonio, Texas, Oct. 2012.

  • Rodoper, M., Jung, E., Baliga, A. and Trappe, W., “An Efficient Security Framework for Mobile WiMAX,” Proc. of ACM 27th Symp. on Applied Comp. (ACM SAC), Trento, Italy, March 2012.

  • Choi, S., Eom, H. and Jung, E., ''Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol,'' Inter. Conf. on Information and Communication Technologies and Applications (ICTA 2011), Orlando, FL, December 2011.

  • Jung, E., Hung, C., Ma, G. and Choi, S. "A Unified Design Method Utilizing Decomposability and Composability for Secure Systems," Proc. of ACM Research in Applied Computation Symp. (ACM RACS), Miami, FL, Nov 2011.

  • Jung, E., Hung, C., Ma, G. and Choi, S. "The Investigation of the Structural Properties of Machines for the Design of Secure and Trustworthy Systems," Proc. of ACM Research in Applied Computation Symp. (ACM RACS), Miami, FL, November 2011.

  • Zhang, Y., Sun, M., Hung, C. and Jung, E. "An Empirical Study on the Effectiveness of Hyperspectral Image Classification Algorithms with Dimensionality Reduction," Proc. of ACM Research in Applied Computation Symp. (ACM RACS), Miami, FL, November 2011.

  • Hung, C., Jung, E., Kuo, B. and Zhang, Y. "A New Weighted Fuzzy C-Means Algorithm for Hyperspectral Image Classification, "IEEE Inter. Geoscience and Remote Sensing Symp. (IEEE IGARSS), Vancouver, Canada, July 2011.

  • Hung, C., Ijaz, H., Jung, E. and Kuo, B. "Optimizing the Self-organizing Map for Pattern and Image Classification," IEEE Inter. Geo. and Remote Sensing Symp. (IEEE IGARSS), Vancouver, Canada, July 2011.

  • Tsui, F., Gharaat, A., Duggins, S. and Jung, E., “Measuring Levels of Abstraction in Software Development,” Proc. of the 23rd Inter.Conf. on Software Eng. and Knowledge Eng. (SEKE), Miami Beach, FL, July 2011.

  • Shi, Y., Lee, A., Lee, G., Park, T., Jung, E. and Kang, B., “Indirect Branch Validation Unit for Secure Program Execution,” Proc. of the 10th IEEE Inter. Symp. on Low-Power and High-Speed Chips (IEEE COOL Chips X), pp. 251-260, Yokohama, Japan, 2007.

  • Park, S., Kwon, T. and Jung, E., “Short-time Message Authentication Mechanism in Multimedia Environments,” Proc. of Conf. on Information Security and Cryptography (CISC-W07), Vol. 17, No. 21, pp. 317-320, Seoul, Korea, 2007.

  • Michail, S., Bezzateev, S. and Jung, E., “Elliptic-Griesmer Codes and Their Applications to Cover Free Families Construction,” Proc. of 8th Inter. Symp. on Sys. and Information Security, 2006.

  • Bezzateev, Krouk, S., Lee, K., Linsky, E. and Jung, E., “Sub-codes of Goppa Codes for Multi-level Access Control Systems,” Proc. of IEEE Inter. Conf. on Next Generation Tele-traffic and Wired/Wireless Advanced Networking (IEEE NEW2AN), 2004.

  • Choi, Y., Kim, C. and Jung, E., “Configuring Multiple Boundary Scan Chains for Board Testing,” Proc. of IEEE Inter. Symp. on Circuits and Systems (IEEE ISCAS), pp. 2128-2131, 1995.

  • Choi, Y. and Jung, E., “Configuration of a Boundary Scan Chain for Optimal Testing of Clusters of non-Boundary Scan Devices,” Proc. of IEEE/ACM Inter. Conf. on Computer-Aided Design (IEEE ICCAD), pp. 13-16, 1992.

  • Choi, Y. and Jung, E., “Divide-and-Conquer in Wafer Scale Array Testing,” Proc. of IEEE Inter. Conf. on Wafer Scale Integration (IEEE WSI), pp. 265-171, 1990.

  • Choi, Y. and Jung, E., “Fault Diagnosis of Interconnection Circuits in Wafer Scale Arrays,” Proc. of the 32nd IEEE Midwest Symp. on Circuits and Systems (IEEE MWSCAS), pp. 295-298, 1989.

Patents (US)

  • Broadcast encryption method and broadcast decryption method thereof, with M. H. Sung, W. I. Jin, H. Kim, B. Jung, J. H. Park, D. H. Lee, J. I. Lim, K. Y. Ohoi and J. Y. Hwang, US patent number 8,625,784, January 7, 2014.

  • Method and apparatus for digital signature generation and validation, with M. Huh, K. Lee, S. Bezzateev and A. Sitalov, US patent number 8,412,948, April 2, 2013.

  • Method of and device for updating group key, with D. Y. Kim, M. S. Huh and H. J. Kim, US patent number 8,401,182, March 19, 2013.

  • Method and apparatus for updating a group key, with D. Y. Kim, M. S. Huh and H. J. Kim, US patent number 8,374,353, February 12, 2013.

  • Key generation method for self-configuration, with J. Yi, US patent number 8,370,624, Feb. 5, 2013.

  • Method of updating group key and group key update device using the same, with D. Y. Kim, M. S. Huh and H. J. Kim, US patent number 8,270,614, September 18, 2012.

  • Method of protecting broadcast frame, terminal authenticating broadcast frame, and access point broadcasting broadcast frame, with E. A. Kim, J. H. Yi, A. Fomin, E. Linsky, M. Stepanov and S. Bezzateev, US patent number 8,270,607, September 18, 2012.

  • Method of generating node identifier in tree structure, with M. S. Huh, D. Y. Kim and H. J. Kim, US patent number 8,121,974, February 21, 2012.

  • Method for generating, operating, and using a sparse w-NAF key for encryption, with J. Yi, J. Cheon, T. Kwon, H. Kim and M. Lee, US patent number 7,970,134, June 28, 2011.

  • Distributed Rivest Shamir Adleman signature method and signature generation node, with J. Yi, E. A. Kim, A. Afanasyeva and A. Fomin, US patent number 7,971,064, June 28, 2011.

  • Public key generation method in elliptic curve cryptography and public key generation system executing the method, with J. H. Yi, S. Bezzateev, E. A. Kim and M. Stepanov, US patent number 7,940,936, May 10, 2011.

  • Method and apparatus for generating and verifying digital signature, with M. Huh, K. Lee, S. Bezzateev, E. Krouk, A. Afanasyeva and A. Sitalov, US patent number 7,895,438, Feb. 22, 2011.

  • Weighted secret sharing and reconstructing method, with K. Lee, E. Krouk, S. Bezzateev, E. and Linsky, US patent number 7,551,740, June 23, 2009.

  • Central processing unit having branch instruction verification unit for secure program execution, with G. H. Lee, T. J. Park, B. C. Chang, and Y. Shi, US patent number 8,006,078, August 23, 2011.

  • Method for encrypting and decrypting data for multi-level access control in an ad-hoc network, with K. Lee, E. Krouk, A. Sitalov ad S. Bezzateev, US patent number 7,532,724, May 12, 2009.

  • Method and system for updating time information of a DRM device, with H. J. Kim, M. H. Sung, W. I. Jin, B. and E. Jung, US patent number 8,595,496, November 26, 2013.

  • Method for supporting mutual exclusion function and DRM device thereof, with H. J. Kim, P. R. Sivaradjane, V. P. Singh, M. H. Sung, W. I. Jin and B. E. Jung, US patent number 7,617,323, November 10, 2009.

  • Apparatus for restricting access to application module in mobile wireless device and method of restricting access to application module using the same, with T.J Park, US patent number 8,225,393, July 17, 2012.

  • Apparatus for detecting intrusion code and method using the same, with T. J Ahn and T. J. Park, US patent number 8,205,256, June 19, 2012.

©