Advising

  • Research Funds

    [PENDING/IN PREPARATION]

    1. PI, Research on Range Counting Technology for Privacy Protection in Massive IoT Data, Research Grant, April 1, 2022 - November 30, 2023.
      • Electronics and Telecommunications Research Institute (KRW₩ 50,000,000), South Korea
    2. PI, Analysis of implementation status of network segmentation policy in major overseas countries and improvement plans, Research Grant, April 1, 2022 - November 30, 2023.
      • National Secaurity Research Institute (KRW₩ 50,000,000), South Korea
    3. PI, A Development of Protection of Large-capacity Multimedia Contents Framwork, April 1, 2023 - December 31, 2023 (Phase 3).
      • LSware (KRW₩ 33,000,000), South Korea

    [Completed]:

    1. PI, Research on Core Technology Research on Trust Data Connectome, Research Grant, Jun 1, 2022 - November 14, 2022.
      • Electronics and Telecommunications Research Institute (KRW₩ 50,000,000), South Korea
    2. PI, Research on In-depth analysis of future information security technology, Research Grant, May 1, 2022 - November 14, 2022.
      • National Secaurity Research Institute (KRW₩ 60,000,000), South Korea
    3. PI, A Development of Protection of Large-capacity Multimedia Contents Framwork, May 15, 2022 - December 31, 2022 (Phase 2).
      • LSware (KRW₩ 33,000,000), South Korea
    4. Participant, High-Potential Individuals Global Training Program, May 1, 2021 - April 30, 2022.
      • IITP (KRW₩ 600,000,000), South Korea [with Georgia state university/ICN Consortium/Donghyun Kim, Zhipeng Cai]
    5. PI, A Development of Protection of Large-capacity Multimedia Contents Framwork, June 1, 2021 - December 31, 2021 (Phase 1).
      • LSware (KRW₩ 20,000,000), South Korea
    6. Participant, AI-big data-based cyber security orchestration and automatic response technology development, May 1, 2021 - December 31, 2024.
      • IITP (KRW₩ 11,120,000,000), South Korea [with SMU (Cheonan)]
    7. PI, Research on National Security Technology R&D Mid & Long Term Business Plan, Research Grant, April 1, 2021 - October 30, 2021.
      • National Secaurity Research Institute (KRW₩ 50,000,000), South Korea
    8. External: PI, Development of multi-level authentication key management and recovery application platform based on blockchain, Phase 1, July 1, 2020.
      • Institute of Information & Communications Technology Planning & Evaluation (IITP), South Korea, KRW₩ 500,000,000 with GSU portion of US$ 40,000 [ICN Consortium/Donghyun Kim, Zhipeng Cai, Daehee Seo]
    9. External: Co-PI, Research and Development of Social Networking Services - Integrated Management System based on Single-Sign-On – Phase 2 and Phase 3, December 1, 2019 - May 15, 2020.
      • Like it System LLC, Doraville, GA, US$ 1,500,000 [ICN Consortium/Donghyun Kim, Zhipeng Cai, Daehee Seo]
    10. External: Co-PI, Social Networking Services-Integrated Management System based on Single-Sign-On Development, February 1, 2019 - November 31, 2019.
      • YoKim Marketing LLC, Alpharetta, GA, US$ 100,000 (including $50,000 subcontracted amount) [ICN Consortium/Donghyun Kim, Zhipeng Cai, Daehee Seo]
    11. SmartGrid Infrastructure Security & Automotive Cyber security, 2015 ~ 2018, found by KOREA Gov (2.2 million $/yr & 1.5million/yr).
      • Automotive V2X cyber security technologies for safe autonomous driving.
      • Remote hacking prevention & anomaly detection technology for autonomous vehicle.
      • V2X security acceleration technology based on CPU/GPU hybrid multi-core scheduling.
      • International collaborative research on V2X security technology.
    12. Web-based attacker Trace and visualization, 2012-2015, found by KOREA Gov (1million $/yr).
      • Digital forensic of malware.
      • Reverse Engineering for Attacker Tracer.
    13. Development of Global Collaborative Integrated Security Control System, 2009-2012, found by KOREA Gov (4million $/yr).
      • We are developing an autonomous security framework and system technology capable of dynamically re-configuring security functions and intelligently analyzing/responding them to provide security services customized for various environments.
      • Dynamic configuration/management technology for customized security services to provide optimized security services to users.
      • Intelligent security analysis and control technology for threat analysis and response to specific environments such as SMEs, IoT / CPS and public infrastructure.
      • An autonomous cloud security infrastructure technology that provides a robust, dynamic execution environment platform and self-protection method for security functions.
    14. IPTV 2.0 Security Development, 2008-2011, found by KOREA Gov (3million $/yr).
      • A Novel service framework is developed was advantageous over the conventional content protection techniques in easily producing the scaleable content with lightweight and transcodable security.
    15. Group key mechanism for wireless environment, 2005.04~2005.11, National Security Research Institute
    16. Development of IPv6 security technology, 2003-2008, Korea Information Security Agency
    17. A Study on Group Key Mechanism for Wireless Environment, 2005.04~2005.11, National Security Research Institute.
    18. A Development RTIDS and Attacker trace applying to ITS of Multimedia server, 2003.12~2006.08, Korea Information Security Agency.
    19. A Study on Information Security System Analysis Technology, 2004.03~2004.11, National Security Research Institute.
      • This research aims to analyses and check general environment of domestic information security industry to pursue the conversion of society to the place information is security.
    20. The Analysis of Wireless Electronic Payment System, 2003.08~2004.01, Korea Information Security Agency.
    21. A Development to be Information Protection Profile in union that have Composition Function, 2003.03~2003.11, National Security Research Institute.
      • This research ultimately seeks to analyses evaluation methodologies to develop a domestic protection profile for various security products and a Korean-made security evaluation system by examining different evaluation methodologies and trends in other countries
    22. CC Evaluation System Development, 2002.05~2002.11, National Security Research Institute.
    23. A Study on the Security Improvement of Java based Key Recovery System, 2002.04~2002.08, Electronics and Telecommunications Research Institute.
    24. Analysis of weakness on IMT-2000 Information Security Structure, 2001.07~2001.11, National Security Research Institute.
    25. A Study on Analysis of Group Key Distribution Algorithm's Capability, 2001.04~2004. 12, Electronics and Telecommunications Research Institute.
    26. The Analysis of Bluetooth Product and Standardization, 2001.01~2001.11, Korea Information Security Agency.