Research

My current research in computing is focused on applying the decomposition theory of machines to the specialized areas of embedded computing, communication protocols, and theory of computation. My work is primarily concerned with improving security and fault tolerance using the several forms of decompositions (e.g., parallel, cascade, factorized, hierarchical) of machines and computational models.

I am fortunate to have collaborators at institutions, including Prof. L. Bossuet and Dr. B. Colombier of Univ. of Lyon/UJM at Laboratoire Hubert Curien, France. In the past, I worked with researchers at Xerox Palo Alto Research Center (PARC), Cambridge University/UK, SUIA/St. Petersburg/Russia, WINLAB/Rutgers Univ., and Samsung Research, mostly in the area of computing security (embedded system security, IP protection, security protocols/primitives, applied crypto, DRM).

Research Interests

  • Dependable computing

  • Security (security protocols, IP watermarking algorithms)

  • Fault tolerance (detection/diagnosis/masking algorithms)

Publications

Book Chapter

  • Jung, E. and Bossuet, L., IP FSM Watermarking (Chapter 4), Foundations of Hardware IP Protection by Springer (Eds. L. Bossuet and L. Torres), DOI 10.1007/978-3-319-50380-6_4, ISBN 978-3-319-50378-3, pp. 65-84, Jan. 2017.

Journals/Conferences (Selected)

  • Jung, E., Bossuet, L., Choi, S., Marchand, C, “Identification of IP Control Units by State Encoding and Side Channel Verification,” ELSEVIER Embedded Hardware Design (ELSEVIER MICPRO), Vol. 47, Part A, http://dx.doi.org/10.1016/j.micpro.2016.02.019, pp. 11-22, Nov. 2016.

  • Jung, E., Choi, S., “Identification of IP Control Units by State Encoding,” IEEE Computer Society Annual Symp. on VLSI (IEEE ISVLSI 2015), Montpellier, France, July 2015.

  • Marchand, C., Bossuet, L.,Jung, E., “IP Watermarking Verification Based On Power Consumption Analysis,” Proc. of the 27th IEEE Int. Sys.-on-Chip Conf. (IEEE SOCC ’14), Las Vegas, Sept. 2014.

  • Choi, S., Sun, K., Eom, H.,Jung, E., “Multi-Source Broadcast Authentication with Combined Key Chains for Wireless Ad Hoc Networks,” Security and Communication Networks, DOI: 10.1002/sec.1072, June 2014.

  • Marchand, C., Bossuet, L., E. Jung, Verification of IP Watermark using Correlation Analysis, International Workshops on Cryptographic Architectures Embedded in Reconfigurable Devices (Cryptarchi 2014), pp. 13, Annecy, France , 2014.
  • Jung, E., Hung, C-C., Yang, M., Choi, S., “An Locking and Unlocking Primitive Function of FSM-modeled Sequential Systems Based on Extracting Logical Property,” Int. Journal of Information (INFORMATION), Vol. 16, No. 8(B), pp. 6279-6290, Aug. 2013.

  • Choi, S., Eom, H., Jung, E., “Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol,” Journal of Systemics, Cybernetics and Informatics (JSCI), Vol., 10, No. 6, pp. 19-24, 2012.

  • Rodoper, M., Jung, E., Baliga, A., Trappe, W., “An Efficient Security Framework for Mobile WiMAX,” Proc. of ACM 27th Symp. on Applied Comp. (ACM SAC), Trento, Italy, Mar. 2012.

  • Rodoper, M., Trappe, W., Jung, E., “An IBC and Certificate Based Hybrid Approach to WiMAX Security,” Journal of Communications and Networks (JCN), Special Issue on Secure Wireless Networking, Vol. 11, No. 6, pp. 615-625, 2009.

  • Garner, G., Feng, F., Hollander, K., Jeong, H., Kim, B., Lee, B., Jung, E., “IEEE 802.1 AVB and its Application in Carrier-Grade Ethernet,” IEEE Communication Magazine, Vol. 45, Issue 12, pp. 126-134, 2007.

  • Shi, Y., Lee, A., Lee, G., Park, T., Jung, E., Kang, B., “Indirect Branch Validation Unit for Secure Program Execution,” Proc. of the 10th IEEE Inter. Symp. on Low-Power and High-Speed Chips (IEEE COOL Chips X), pp. 251-260, Yokohama, Japan, 2007.

  • Stepanov, M., Bezzateev, S., Jung, E., “Privacy Homomorphism for Delegation of the Computations,” Lecture Notes in Computer Science (LNCS), Vol. 4003, pp. 474-480, 2006.

  • Michail, S., Bezzateev, S., Jung, E., “Elliptic-Griesmer Codes and Their Applications to Cover Free Families Construction,” Proc. of 8th Inter. Symp. on Sys. and Information Security, 2006.

  • Bezzateev, Krouk, S., Lee, K., Linsky, E., Jung, E., “Sub-codes of Goppa Codes for Multi-level Access Control Systems,” Proc. of IEEE Inter. Conf. on Next Generation Tele-traffic and Wired/Wireless Advanced Networking (IEEE NEW2AN), 2004.

  • Choi, Y., Jung, E., “System-Level Self-Diagnosis in Sparsely Interconnected Systems,” IEEE Trans. on Reliability, Vol. 41, No. 3, pp. 433-439, 1992.

Patents (Computing security)

  • Broadcast encryption method and broadcast decryption method thereof, with M. H. Sung, W. I. Jin, H. Kim, B. Jung, J. H. Park, D. H. Lee, J. I. Lim, K. Y. Ohoi, J. Y. Hwang, US patent 8,625,784, Jan. 7, 2014.

  • Method and apparatus for digital signature generation and validation, with M. Huh, K. Lee, S. Bezzateev, A. Sitalov, US patent 8,412,948, Apr. 2, 2013.

  • Method of and device for updating group key, with D. Y. Kim, M. S. Huh, H. J. Kim, US patent 8,401,182, Mar. 19, 2013.

  • Method and apparatus for updating a group key, with D. Y. Kim, M. S. Huh, H. J. Kim, US patent 8,374,353, Feb. 12, 2013.

  • Key generation method for self-configuration, with J. Yi, US patent 8,370,624, Feb. 5, 2013.

  • Method of updating group key and group key update device using the same, with D. Y. Kim, M. S. Huh, H. J. Kim, US patent 8,270,614, Sept. 18, 2012.

  • Method of protecting broadcast frame, terminal authenticating broadcast frame, and access point broadcasting broadcast frame, with E. A. Kim, J. H. Yi, A. Fomin, E. Linsky, M. Stepanov, S. Bezzateev, US patent 8,270,607, Sept. 18, 2012.

  • Method of generating node identifier in tree structure, with M. S. Huh, D. Y. Kim, H. J. Kim, US patent 8,121,974, Feb. 21, 2012.

  • Method for generating, operating, and using a sparse w-NAF key for encryption, with J. Yi, J. Cheon, T. Kwon, H. Kim, M. Lee, US patent 7,970,134, June 28, 2011.

  • Distributed Rivest Shamir Adleman signature method and signature generation node, with J. Yi, E. A. Kim, A. Afanasyeva, A. Fomin, US patent 7,971,064, June 28, 2011.

  • Public key generation method in elliptic curve cryptography and public key generation system executing the method, with J. H. Yi, S. Bezzateev, E. A. Kim, M. Stepanov, US patent 7,940,936, May 10, 2011.

  • Method and apparatus for generating and verifying digital signature, with M. Huh, K. Lee, S. Bezzateev, E. Krouk, A. Afanasyeva, A. Sitalov, US patent number 7,895,438, Feb. 22, 2011.

  • Weighted secret sharing and reconstructing method, with K. Lee, E. Krouk, S. Bezzateev, E., Linsky, US patent 7,551,740, June 23, 2009.

  • Central processing unit having branch instruction verification unit for secure program execution, with G. H. Lee, T. J. Park, B. C. Chang, Y. Shi, US patent 8,006,078, Aug. 23, 2011.

  • Method for encrypting and decrypting data for multi-level access control in an ad-hoc network, with K. Lee, E. Krouk, A. Sitalov, S. Bezzateev, US patent 7,532,724, May 12, 2009.

  • Method and system for updating time information of a DRM device, with H. J. Kim, M. H. Sung, W. I. Jin, B., E. Jung, US patent 8,595,496, Nov. 26, 2013.

  • Method for supporting mutual exclusion function and DRM device thereof, with H. J. Kim, P. R. Sivaradjane, V. P. Singh, M. H. Sung, W. I. Jin, B. E. Jung, US patent 7,617,323, Nov. 10, 2009.

  • Apparatus for restricting access to application module in mobile wireless device and method of restricting access to application module using the same, with T.J Park, US patent 8,225,393, July 17, 2012.

  • Apparatus for detecting intrusion code and method using the same, with T. J Ahn, T. J. Park, US patent 8,205,256, June 19, 2012.

©