Computing devices, whether they be an individual work station or embedded as a part
of another system, may have vulnerabilities that lead to the compromise of data. Our
research group focuses on developing methods and process for detecting, improving,
and protecting systems from compromise. This encompasses a broad range of topics,
such as investigating the causes of compromise, developing new communications protocols,
and finding techniques to integrate security across hardware, software, and network
interfaces.
Research areas of interest include:
Sung Min Hong