Yier Jin RESEARCH INTERESTS



Similar documents
Yier Jin. Department of Electrical Engineering and Computer Science University of Central Florida

Paolo Maistri. September 8, Personal Information 2. Education and Studies 2. Academic Activities and Affiliations 3

Harrisonburg, VA 22807

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

RESEARCH INTERESTS Modeling and Simulation, Complex Systems, Biofabrication, Bioinformatics

Zukang Shen Home Address: Work: Kindred Lane Cell:

M.S. in Computer Science

Curriculum Vitae RESEARCH INTERESTS EDUCATION. SELECTED PUBLICATION Journal. Current Employment: (August, 2012 )

09/2015 Lead: George Mason University, Total Budget: $330,481, HU budget: $53,016

CURRICULUM VITAE Herbert L. Dershem

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

Brian Alan Snyder, Ph. D.

Department of Electronic Information Engineering, Beihang Univerisity Specialization: Electrical Engineering, Completion: July 2004

DOMAIN EXPERTISE METHODOLOGY SKILLS

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

KARIM CHALAK PERSONAL. Born: March 1982 Webpage: Phone:

BE Degree with Distinction From Lebanese American University Honor Society at the Lebanese American University ( )

Case 2:08-cv ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8

Ming-Hsing Chiu. Home: (985) Chapel Loop Office: (985) EDUCATION

August Emory University, Atlanta, GA Double major: Sociology and Political Science December 2005

BSc in Computer Engineering, University of Cyprus

Hardware Implementation of AES Encryption and Decryption System Based on FPGA

BEIBEI (BACY) DONG EDUCATION EMPLOYMENT EDITORIAL POSITIONS PUBLICATIONS. Updated 05/25/2015 Beibei (Bacy) Dong

Hsuan-Chi Chen. Associate Professor, Anderson School of Management, The University of New Mexico

Best Paper Award, Hawaii International Conference on System Sciences, HICSS-36 (2003)

Sustainability and Energy Efficiency in Data Centers Design and Operation

Jason A. Duan (Jun Duan)

9700 South Cass Avenue, Lemont, IL URL: fulin

A STUDY ON THE INTEGRATION OF QFD-PMMM IN CLOUD COMPUTING SYSTEM QUALITY. Received June 2010; accepted September 2010

Sharareh Noorbaloochi Department of Psychology New York University 6 Washington Place, 559, New York, NY noorbaloochi@nyu.

Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays

CURRICULUM VITAE. Igor V. Maslov Sasazuka, Shibuya-ku Phone: +81 (80) Web:

State Annual Report Due Dates for Business Entities page 1 of 10

Fengwei Zhang. Research Interest. Education. Employment History

Curriculum Vitae JEFF LOUCKS

Qinyu Liao Resume. Dept of Management & Information Systems Mississippi State University

CURRICULUM VITAE. Dept. of Mechanical Engineering and Industrial Design Τ.Ε.Ι. of Western Macedonia KOZANI, GREECE

Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5

Analysis One Code Desc. Transaction Amount. Fiscal Period

Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009

Victoria Kostina Curriculum Vitae - September 6, 2015 Page 1 of 5. Victoria Kostina

SECOND YEAR. Major Subject 3 Thesis (EE 300) 3 Thesis (EE 300) 3 TOTAL 3 TOTAL 6. MASTER OF ENGINEERING IN ELECTRICAL ENGINEERING (MEng EE) FIRST YEAR

Ningzhong Li. University of Chicago, Booth School of Business, Chicago, IL MBA, Ph.D. in Accounting 2009

G. Bradley Bennett, CPA, Ph.D.

Understanding Integrated Circuit Security Threats. Asif Iqbal Senior Program Manager, Apple Inc. SDM 11

CHRISTIE L. COMUNALE, PH.D, CPA CURRICULUM VITAE SPRING 2015

Power Reduction Techniques in the SoC Clock Network. Clock Power

Kun Huang. B.A. Huazhong University of Science and Technology, Wuhan, China, 1995 Major: English

Gokhan Karaatli. MBA (Marketing), Fairleigh Dickinson University, Silberman College of Business, New Jersey, 1996.

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017

Cryptography & Network-Security: Implementations in Hardware

5/03/2014. EDUCATION 2005 Ph.D. in Computers and Information Systems

Secured Embedded Many-Core Accelerator for Big Data Processing

Tian (Lori) Tang Assistant Professor of Finance University of Louisville

Marsha B. Keune June 2015

2016 Instructor Training & Certification Schedule

Comprehensive Course Schedule

RUI SUN, Ph.D. RESEARCH INTERESTS: Fiscal Federalism State and Local Government Finance Nonprofit finance Economic Development

A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing

Mohammad Arzaghi.

4 Positions Held Prior to Appointment at University of Victora

Workshop on Post-silicon Debug: Technologies, Methodologies, and Best Practices

JUN YU School of Business Emporia State University Phone: (620)

TAO LI. Assistant Professor, Department of Operations Management and Information Systems

ISSN Vol.04,Issue.19, June-2015, Pages:

CURRICULUM VITÆ RICARDO CHAVES. December

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

Yuanjie He Associate Professor, Technology and Operations Management Department, California State Polytechnic University, Pomona

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

ANYI LIU. 125M, 2101 E. Coliseum Blvd. Tel: 1-(260) Indiana Univ. Purdue Univ. Fort Wayne Web:

FELLOWSHIPS, GRANTS, ACADEMIC AWARDS

YONGSEOK JANG 133J Bryan Hall PO Box Gainesville, FL (352) June 2015

DAVID H. BLANKFEIN-TABACHNICK MSU College of Law 648 N. Shaw Lane East Lansing, MI (917)

Curriculum Vitae. Shan Shan Huang

Comprehensive Course Schedule

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Elizabeth A. Arnold. Academic Experience. Education

University of Illinois at Chicago Office: SEO 521 Department of Mathematics, Statistics, (312) and Computer Science

Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013

June Zhang (Zhong-Ju Zhang)

Christian Murphy Dept. of Computer & Information Science, University of Pennsylvania 3330 Walnut Street, Philadelphia, PA cdmurphy@cis.upenn.

EDUCATION TEACHING EXPERIENCE INSTRUCTOR ADDITIONAL COURSES PREPARED TO TEACH

Dr. Shashank Srivastava. Contact. Telephone: Teaching. Courses Taught: Current Courses: Past Courses:

Course Semester Language of Code InstructionDegree College Department Major/Elective Credit Course Type Evaluation College of System.

YUNTAO DONG. Assistant Professor, School of Business, University of Connecticut

Curriculum Vitae. Xinghao (Shaun) Yan

Chia-Yen Lee ( 李 家 岩 )

Workshop Program 23 October 2015

Carl Burch Clifton St mobile Conway AR Education May 00

Transcription:

Yier Jin Department of Electrical Engineering and Computer Science University of Central Florida, Orlando, FL 32816 Phone: (407) 823-5321 (Office), (203) 859-1202 (Mobile) Fax: (407) 823-5483 Email: yier.jin@ucf.edu RESEARCH INTERESTS EDUCATION PROFESSIONAL POSITIONS Trusted and reliable processors and integrated circuits Cryptographic hardware and embedded systems Proof-carrying based hardware IP cores protection Functional programming and proof writing for trusted IP cores Microprocessor architecture with high security and reliability Yale University, New Haven, Connecticut, USA Ph.D. in Electrical Engineering, 2012 Advisor: Yiorgos Makris Thesis Title: Trusted Integrated Circuits Zhejiang University, Hangzhou, China M.S. in Electrical Engineering, June 2007 Advisor: Xiaolang Yan, Haibin Shen Thesis Title: High Performance Finite Field Multipliers B.S. in Electrical Engineering, June 2005 Honors Graudate Assistant Professor Department of Electrical Engineering and Computer Science University of Central Florida 2012 - Present HONORS DISTINCTIONS PUBLICATIONS A. BOOK CHAPTER B. JOURNAL PUBLICATIONS First Place Award, Embedded Systems - Malicious Processor Design Challenge of the 2011 NYU-Poly Cyber Security Awareness Week (CSAW) Third Place Award, Embedded System Challenge, New York University - Polytechnic Institute, 2009 Second Place Award, Embedded System Challenge, New York University - Polytechnic Institute, 2008 Travel Award, NSF-SRC-SIGDA-DAC Design Automation Summer School, 2009 Honor Graduate, Zhejiang Provincial Institution of Higher Learning, The Educational Office of Zhejiang Province, China, 2005 Excellent Graduate Award, Zhejiang University, 2005 Undergraduate Scholarship, Zhejiang University, 2001 2005 1. M. Tehranipoor, C. Wang (Editors), Introduction to Hardware Security and Trust, Springer, 2011 (Y. Jin, E. Love, Y. Makris, Design for Hardware Trust ) (invited) 1. E. Love, Y. Jin, and Y. Makris, Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module Acquisition, IEEE Transactions on Information Forensics and Security (TIFS), vol. 7, no. 1, pp. 25-40, 2012. 2. Y. Jin, and Y. Makris, Hardware Trojans in wireless cryptographic integrated circuits, IEEE Design & Test on Computers,, vol. 27, pp. 10-25, 2010. 3. H. Shen, and Y. Jin, Low Complexity Bit Parallel Multiplier for GF(2 m ) Generated by Equally-Spaced Trinomials, Information Processing Letters, Volume 107, Issue 6, 2008, pp. 211-215.

4. Y. Jin, H. Shen, H. Chen, and X. Yan, Research of Fast Modular Multiplier for a Class of Finite Fields, Journal of Electronics (China), Volume 25, Issue 4, 2008, pp. 482-487. C. CONFERENCE PROCEEDINGS 1. Y. Jin, and D. Sullivan, Real-Time Trust Evaluation in Integrated Circuits, Design, Automation and Test in Europe Conference and Exhibition, (DATE), 2014. (to appear) 2. Y. Jin, EDA Tools Trust Evaluation through Security Property Proofs, Design, Automation and Test in Europe Conference and Exhibition, (DATE), 2014. (to appear) 3. Y. Jin, and Y. Makris, A Proof-Carrying Based Framework for Trusted Microprocessor IP, IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2013, pp. 824-829. 4. Y. Liu, Y. Jin, and Y. Makris, Hardware Trojans in Wireless Cryptographic ICs: Silicon Demonstration and Detection Method Evaluation, IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2013, pp. 399-404. 5. Y. Jin, D. Maliuk and Y. Makris, A Post-Deployment IC Trust Evaluation Architecture, Proceedings of IEEE International On-Line Testing Symposium (IOLTS), 2013. (invited) 6. Y. Jin, B. Yang and Y. Makris, Cycle Accurate Information Assurance by Proof Carrying-Based Signal Sensitivity Tracing, Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2013, pp. 99-106. 7. O. Sinanoglu, N. Karimi, J. Rajendran, R. Karri, Y. Jin, D. Maliuk, K. Huang, Y. Makris, Reconciling the IC Test and Security Dichotomy, Proceedings of 18th IEEE European Test Symposium (ETS), 2013, pp. 1-6. 8. Y. Jin, M. Mihalis and Y. Makris, Exposing Vulnerabilities of Untrusted Computing Platforms, Proceedings of the IEEE International Conference on Computer Design (ICCD), 2012, pp. 131-134. 9. Y. Jin, and Y. Makris, Proof Carrying-Based Information Flow Tracking for Data Secrecy Protection and Hardware Trust, Proceedings of VLSI Test Symposium (VTS), 2012, pp. 252-257. 10. Y. Jin, D. Maliuk and Y. Makris, Post-Deployment Trust Evaluation in Wireless Cryptographic ICs, Proceedings of the Design, Automation & Test in Europe (DATE), 2012, pp. 965-970. 11. Y. Jin and Y. Makris, PSCML: Pseudo-Static Current Mode Logic, Proceedings of 18th IEEE International Conference on Electronics, Circuits, and Systems (ICECS), 2011, pp. 41-44. 12. Y. Jin and Y. Makris, Is Single Trojan Detection Scheme Enough?, Proceedings of the IEEE International Conference on Computer Design (ICCD), 2011, pp. 305-308. 13. E. Love, Y. Jin and Y. Makris, Enhancing Security via Provably Trustworthy Hardware Intellectual Property, Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2011, pp. 12-17. 14. Y. Jin and Y. Makris, DFTT: Design-for-Trojan-Test, Proceedings of 17th IEEE International Conference on Electronics, Circuits, and Systems (ICECS), 2010, pp. 1168-1171. 15. Y. Jin, N. Kupp and Y. Makris, Experiences in Hardware Trojan Design and Implementation, Proceedings of IEEE International Symposium on Hardware- Oriented Security and Trust (HOST), 2009, pp. 50-57.

16. Y. Jin, and Y. Makris, Hardware Trojan Detection Using Path Delay Fingerprint, Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2008, pp. 51-57. 17. Y. Jin, and H. Shen, Revisiting Scalable Modular Multiplication over GF(2 m ) for Elliptic Curve Cryptography, Proceedings of 8th International Conference on Solid-State and Integrated Circuit Technology (ICSICT), 2006, pp. 2114-2117. 18. Y. Jin, H. Shen, and R. You, Implementation of SMS4 Block Cipher on FPGA, Proceedings of International Conference on Communications and Networking in China (CHINACOM), 2006, pp. 1-4. 19. H. Shen, and Y. Jin, Unbalanced Exponent Modular Reduction over Binary Field and Its Implementation, Proceedings of International Conference on Innovative Computing, Information and Control (ICICIC), 2006, pp. 190-193. 20. D. Li, Y. Jin, H. Shen, and X. Yan, Design of Random Number Generation Algorithm, Proceedings of International Conference on Computational Intelligence and Security (CIS), 2006, pp. 1287-1290. 21. R. You, H. Shen, and Y. Jin, Interconnect Estimation for Mesh-Based Reconfigurable Computing, Proceedings of The IFIP International Conference on Embedded and Ubiquitous Computing (EUC), LNCS 4096, 2006, pp. 766-775. D. PRESENTATIONS INVITED PRESENTATIONS 1. Y. Jin, and Y. Makris, A Proof-Carrying Based Framework for Trusted Microprocessor IP, IEEE/ACM International Conference on Computer-Aided Design (ICCAD), San Jose, CA, Nov 2013. 2. Y. Jin, and Y. Makris, Cycle Accurate Information Assurance by Proof Carrying-Based Signal Sensitivity Tracing, Presented at the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), Austin, TX, Jun 2013. 3. Y. Jin and Y. Makris, PSCML: Pseudo-Static Current Mode Logic, Presented at the IEEE International Conference on Electronics, Circuits, and Systems (ICECS), Beirut, Lebanon, Dec 2011. 4. Y. Jin and Y. Makris, Is Single Trojan Detection Scheme Enough?, Presented at the IEEE International Conference on Computer Design (ICCD), Amherst, MA, Oct 2011. 5. Y. Jin, N. Kupp and Y. Makris, Experiences in Hardware Trojan Design and Implementation, Presented at the IEEE International Symposium on Hardware- Oriented Security and Trust (HOST), Anaheim, CA, Jul 2009. Intel Corp. Hillsboro, OR Nov 2013 Title: Proof-Carrying Based Trusted Embedded System Design and Secure SoC Integration (Host: David Ott and Mukesh Ranjan) Trustworthy Hardware Workshop New York, NY Nov 2013 Title: Trusted Embedded System Design Through the Unification of Trusted Third-Party Software Programs and Hardware IP Cores (Host: Cliff Want) Northeastern University Boston, MA Apr 2012 Title: Trusted Integrated Circuits (Host: Edmund Yeh) University of New Mexico Albuquerque, NM Apr 2012 Title: Trusted Integrated Circuits (Host: Nasir Ghani) Stony Brook University New York, NY Apr 2012 Title: Trusted Integrated Circuits (Host: Kenneth Short) University of Maryland College Park, MD Mar 2012 Title: Trusted Integrated Circuits (Host: Gang Qu) George Mason University Fairfax, VA Mar 2012 Title: Trusted Integrated Circuits (Host: Kris Gaj)

Illinois Institute of Technology Chicago, IL Mar 2012 Title: Trusted Integrated Circuits (Host: Kui Ren) Intel Corp. Hillsboro, OR Jan 2012 Title: Trusted Integrated Circuits and Proof Carrying-based Hardware Intellectual Property Protection (Host: Dhinesh Manoharan) RESEARCH FUNDING NSF / CISE, CNS 1319105, TWC: Small: Collaborative: Toward Trusted 3rd- Party Microprocessor Cores: A Proof Carrying Code Approach, 10/01/2013-09/30/2016 (PI: Yier Jin, co-pi: Yiorgos Makris, 450K(240K+210K)) CURRENT PHD STUDENTS Mr. Xiaolong Guo Topic: Proof-Carrying based Hardware IP Protection Aug 2013 - Present TEACHING EXPERIENCE Instructor for Courses Dec 2012 - Present Electrical Engineering and Computer Science Department, University of Central Florida Graduate Course: EEE 5390 - Full Custom VLSI Design Graduate Course: EEE 4932 - Hardware Security and Trusted Circuit Design Teaching Fellow Fall 2010, Fall 2008 School of Engineering and Applied Science, Yale University Graduate Course: EENG875 - Introduction to VLSI System Design Teaching Fellow Spring 2010 School of Engineering and Applied Science, Yale University Undergraduate Course: EENG201b - Introduction to Computer Engineering Undergraduate Research Advisor Mr. Eric Love 2010-2011 Topic: Proof carrying-based hardware IP acquisition and delivery protocol Mr. Steven Pyle Jan 2013 - May 2013 Topic: Hardware security in embedded systems Mr. Dean Sullivan Topic: Hardware Trojan detection in FPGAs Jan 2013 - Present Mr. Ryan Dixon Jan 2013 - Dec 2013 Topic: Counterfeit chip detection and prevention Mr. Grant Hernandez Topic: Vulnerability analysis on embedded systems Mr. Jeff Biggers Mr. Brandon Jan 2014 - Present Sep 2013 - Present Sep 2013 - Present INSTITUTIONAL SERVICE Faculty Library Representative for the Electrical and Computer Engineering Division of the Department of Electrical Engineering and Computer Science, University of Central Florida. PROFESSIONAL SERVICE Publication Chair International Symposium on VLSI Design and Test (VDAT 14) Technical Program Committee Member IEEE Hardware Oriented Security and Trust (HOST 14) IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT 12) IEEE International Conference on Computer Design (ICCD 12)

Technical Referee Frontiers of Computer Science (FCS) IEEE Transaction on Reliability (TR) Springer Press IEEE Transactions on Computers (TC) IEEE Transaction on Emerging Topics in Computing (TETC) IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD) Journal of Cryptology (JoC) IEEE Transaction on VLSI Systems (TVLSI) IEEE Transactions on Emerging Topics in Computing (TETC) IEEE Transactions on Information Forensics and Security (TIFS) IEEE Design and Test on Computers (D&T) Design Automation Conference (DAC) IEEE International Conference on Computer-Aided Design (ICCAD) IEEE International Symposium on Hardware Oriented Security and Trust (HOST) Workshop on Cryptographic Hardware and Embedded Systems (CHES) IEEE Design Automation and Test in Europe (DATE) IEEE VLSI Test Symposium (VTS) IEEE European Test Symposium (ETS) IEEE On-line Testing Symposium (IOLTS) IEEE International Conference on Computer Design (ICCD)