Welcome

Yier Jin

Research Interests

  • Trusted and reliable processors and integrated circuits
  • Cryptographic hardware and embedded systems
  • Proof-carrying based hardware IP cores protection
  • Functional programming and proof writing for trusted IP cores
  • Trustworthy SoC architecture
  • Hardware-software co-design for system level security protection 

​Education

  • 2012, Yale University, New Haven, Connecticut, USA, Ph.D. in Electrical Engineering - Advisor: Yiorgos Makris, Thesis Title: "Trusted Integrated Circuits"
  • 2007, Zhejiang University, Hangzhou, China, M.S. in Electrical Engineering - Advisor: Shiju Li, Xiaolang Yan and Haibin Shen, Thesis Title, "High Performance Finite Field Multipliers"
  • 2005, Zhejiang University, Hangzhou, China, B.S. in Electrical Engineering, Honors Graduate

Professional Positions

  • 2012 to Present, Assistant Professor, Department of Electrical Engineering and Computer Science University of Central Florida 
  • 2015 to Present, Hardware Security Subcommittee Chair, IEEE Technical Committee on Cybernetics for Cyber-Physical Systems (CCPS)
  • 2015 to Present, Member of the Florida Institute for Cyber Security (FICS) at the University of Florida
  • 2014 to Present, Associate Partner of Intel Collaborative Research Institute for Secure Computing

Honors Distinctions

  • Best Paper Award, Design Automation Conference (DAC), 2015
  • Second Place Award (Advisor), Embedded System Challenge, Polytechnic School of Engineering, New York University, 2014
  • Second Place Award (Advisor), Embedded System Challenge, Polytechnic School of Engineering, New York University, 2013
  • First Place Award, Embedded Systems - Malicious Processor Design Challenge of the 2011 NYU-Poly Cyber Security Awareness Week (CSAW)
  • Third Place Award, Embedded System Challenge, New York University - Poly- technic Institute, 2009
  • Second Place Award, Embedded System Challenge, New York University - Poly- technic Institute, 2008
  • Travel Award, NSF-SRC-SIGDA-DAC Design Automation Summer School, 2009
  • Honor Graduate, Zhejiang Provincial Institution of Higher Learning, The Educational Office of Zhejiang Province, China, 2005
  • Excellent Graduate Award, Zhejiang University, 2005 
  • Undergraduate Scholarship, Zhejiang University, 2001–2005

Panels

  • ATARC Visionary Panel - Mobile Technology of the Future, ATARC Federal Mobile Computing Summit, August 12, 2015
  • Hacking Things: Security and Privacy Challenges in Internet of Things, IEEE Conference on Communication and Network Security, September 28, 2015 

Publications

Book Chapters
  • C. Hong, M. Potkonjak (Editors), “Secure System Design and Trustable Com- puting,” Springer, 2015 (Y. Jin, D. Maliuk, Y. Makris, “Chapter 7. Hardware Trojan Detection in Analog/RF Integrated Circuits”) (to appear)
  • M. Tehranipoor, C. Wang (Editors), “Introduction to Hardware Security and Trust,” Springer, 2011 (Y. Jin, E. Love, Y. Makris, “Design for Hardware Trust”) 
Journal Publications
  • O. Arias, J. Wurm, Khoa Hoang, Y. Jin, “Privacy and Security in Internet of Things and Wearable Devices,” IEEE Transactions on Multi-Scale Computing Systems. (to appear)
  • Y. Jin, “Introduction to Hardware Security,” Electronics, vol. 4, issue. 4, pp. 763-784, 2015.
  • Y. Bi, K. Shamsi, J. Yuan, P. Gaillardon, G. Micheli, X. Yin, X. Hu, M. Niemier, and Y. Jin, “Emerging Technology based Design of Primitives for Hardware Security,” ACM Journal on Emerging Technologies in Computing Systems. (to appear)
  • Y. Bi, J. Yuan, and Y. Jin, “Beyond the Interconnections: Split Manufacturing in RF Designs,” Electronics, vol. 4, issue. 3, pp. 541-564, 2015.
  • D. Oliveira, N. Wetzel, M. Bucci, J. Navarro, D. Sullivan, and Y. Jin, “Hardware- Software Collaboration for Secure Coexistence with Kernel Extensions,” ACM SIGAPP Applied Computing Review, vol. 14, no. 3, pp. 22-35, September 2014.
  • E. Love, Y. Jin, and Y. Makris, “Proof-Carrying Hardware Intellectual Prop- erty: A Pathway to Trusted Module Acquisition,” IEEE Transactions on In- formation Forensics and Security (TIFS), vol. 7, no. 1, pp. 25-40, January 2012.
  • Y. Jin, and Y. Makris, “Hardware Trojans in wireless cryptographic integrated circuits,” IEEE Design & Test on Computers,, vol. 27, pp. 10-25, 2010.
  • H. Shen, and Y. Jin, “Low Complexity Bit Parallel Multiplier for GF(2m) Gen- erated by Equally-Spaced Trinomials,” Information Processing Letters, Volume 107, Issue 6, 2008, pp. 211-215.
  • Y. Jin, H. Shen, H. Chen, and X. Yan, “Research of Fast Modular Multiplier for a Class of Finite Fields,” Journal of Electronics (China), Volume 25, Issue 4, 2008, pp. 482-487. 
Newsletters
  • Y. Jin, “Hardware Security: Past, Current, and Future,” VLSI Circuits and Systems Letter, vol. 1, no. 1, pp. 11-15, April 2015. (invited)
  • Dean Sullivan, Y. Jin, “What is Hardware-based Cybersecurity?” ACM/SIGDA E-Newsletter, vol. 45, no. 4, April 2015. (invited) 

Conference Proceedings

  1. Sandip Ray, Yier Jin, “Security Policy Enforcement in Modern SoC Designs,” International Conference On Computer Aided Design, 2015. (invited)
  2. Kaveh Shamsi, Yu Bi, Yier Jin, Pierre-Emmanuel Gaillardon, Michael Niemier and X. Sharon Hu, “Reliable and High Performance STT-MRAM Architectures based on Controllable-Polarity Devices,” IEEE International Conference on Computer Design (ICCD), 2015. (accepted)
  3. Omar Nakhila, Yier Jin, and Cliff Zou, “Parallel Active Dictionary Attack on WPA2-PSK Wi-Fi Networks,” IEEE Military Communications Conference (MILCOM), 2015. (accepted)
  4. Yu Bi, Jiann-Shiun Yuan, and Yier Jin, “Split Manufacturing in Radio-Frequency Designs,” The 2015 International Conference on Security and Management (SAM’15), 2015, pp. 204-210.
  5. Lucas Davi, Matthias Hanreich, Debayan Paul, Ahmad-Reza Sadeghi, Patrick Koeberl, Dean Sullivan, Orlando Arias, and Yier Jin, “HAFIX: Hardware- Assisted Flow Integrity Extension,” IEEE/ACM Design Automation Confer- ence (DAC’15), 2015. (Best Paper Award)
  6. Xiaolong Guo, Raj Gautam Dutta, Yier Jin, Farimah Farahmandi, and Prab- hat Mishra, “Pre-Silicon Security Verification and Validation: A Formal Per- spective,”IEEE/ACM Design Automation Conference (DAC’15), 2015.
  7. Y. Liu, S. Hu, J. Wu, Y. Shi, Y. Jin, Y. Hu, and X. Li, “Impact assessment of net metering on smart home cyberattack detection,” IEEE/ACM Design Automation Conference (DAC’15), 2015.
  8. Charalambos Konstantinou, Michail Maniatakos, Fareena Saqib, Shiyan Hu, Jim Plusquellic, and Y. Jin, “Cyber-Physical Systems: A Security Perspec- tive,” European Test Symposium (ETS’15), 2015.
  9. J. Biggers, T. Meade, S. Zhang, Y. Pino, and Y. Jin, “Automated RTL Code Rebuilding through Netlist Analysis,” Government Microcircuit Applications and Critical Technology Conference (GOMACTech-15), 2015, pp. 155-158.
  10. Y. Bi, P-E. Gaillardon, X. Hu, M. Niemier, J-S. Yuan, and Y. Jin, “Leveraging Emerging Technology for Hardware Security - Case Study on Silicon Nanowire FETs and Graphene SymFETs,” Asia Test Symposium (ATS), 2014, pp. 342- 247.
  11. Y. Jin, “Design-for-Security vs. Design-for-Testability: A Case Study on DFT Chain in Cryptographic Circuits,” IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2014, pp. 19-24.
  12. D. Sullivan, J. Biggers, G. Zhu, S. Zhang, and Y. Jin, “FIGHT-Metric: Func- tional Identification of Gate-Level Hardware Trustworthiness,” Design Automa- tion Conference (DAC), 2014, pp. 173:1–173:4.
  13. Y. Jin, and D. Sullivan, “Real-Time Trust Evaluation in Integrated Circuits,” Design, Automation and Test in Europe Conference and Exhibition, (DATE), 2014.
  14. Y. Jin, “EDA Tools Trust Evaluation through Security Property Proofs,” Design, Automation and Test in Europe Conference and Exhibition, (DATE), 2014.
  15. Y. Jin, and Y. Makris, “A Proof-Carrying Based Framework for Trusted Micro- processor IP,” IEEE/ACM International Conference on Computer-Aided De- sign (ICCAD), November 2013, pp. 824-829.
  16. Y. Liu, Y. Jin, and Y. Makris, “Hardware Trojans in Wireless Cryptographic ICs: Silicon Demonstration and Detection Method Evaluation,” IEEE/ACM International Conference on Computer-Aided Design (ICCAD), November 2013, pp. 399-404. 
  17. Y. Jin, D. Maliuk and Y. Makris, “A Post-Deployment IC Trust Evaluation Architecture,” Proceedings of IEEE International On-Line Testing Symposium (IOLTS), July 2013, pp. 224-225. (invited)
  18. Y. Jin, B. Yang and Y. Makris, “Cycle Accurate Information Assurance by Proof Carrying-Based Signal Sensitivity Tracing,” Proceedings of IEEE Inter- national Symposium on Hardware-Oriented Security and Trust (HOST), June 2013, pp. 99-106.
  19. O. Sinanoglu, N. Karimi, J. Rajendran, R. Karri, Y. Jin, D. Maliuk, K. Huang, Y. Makris, “Reconciling the IC Test and Security Dichotomy,” Proceedings of 18th IEEE European Test Symposium (ETS), May 2013, pp. 1-6.
  20. Y. Jin, M. Mihalis and Y. Makris, “Exposing Vulnerabilities of Untrusted Computing Platforms,” Proceedings of the IEEE International Conference on Computer Design (ICCD), 2012, pp. 131-134.
  21. Y. Jin, and Y. Makris, “Proof Carrying-Based Information Flow Tracking for Data Secrecy Protection and Hardware Trust,” Proceedings of VLSI Test Symposium (VTS), 2012, pp. 252-257.
  22. Y. Jin, D. Maliuk and Y. Makris, “Post-Deployment Trust Evaluation in Wire- less Cryptographic ICs,” Proceedings of the Design, Automation & Test in Eu- rope (DATE), 2012, pp. 965-970.
  23. Y. Jin and Y. Makris, “PSCML: Pseudo-Static Current Mode Logic,” Pro- ceedings of 18th IEEE International Conference on Electronics, Circuits, and Systems (ICECS), 2011, pp. 41-44.
  24. Y. Jin and Y. Makris, “Is Single Trojan Detection Scheme Enough?,” Proceed- ings of the IEEE International Conference on Computer Design (ICCD), 2011, pp. 305-308.
  25. E. Love, Y. Jin and Y. Makris, “Enhancing Security via Provably Trustworthy Hardware Intellectual Property,” Proceedings of the IEEE International Sym- posium on Hardware-Oriented Security and Trust (HOST), 2011, pp. 12-17.
  26. Y. Jin and Y. Makris, “DFTT: Design-for-Trojan-Test,” Proceedings of 17th IEEE International Conference on Electronics, Circuits, and Systems (ICECS), 2010, pp. 1168-1171.
  27. Y. Jin, N. Kupp and Y. Makris, “Experiences in Hardware Trojan Design and Implementation,” Proceedings of IEEE International Symposium on Hardware- Oriented Security and Trust (HOST), 2009, pp. 50-57.
  28. Y. Jin, and Y. Makris, “Hardware Trojan Detection Using Path Delay Finger- print,” Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2008, pp. 51-57.
  29. Y. Jin, and H. Shen, “Revisiting Scalable Modular Multiplication over GF(2m) for Elliptic Curve Cryptography,” Proceedings of 8th International Conference on Solid-State and Integrated Circuit Technology (ICSICT), 2006, pp. 2114- 2117.
  30. Y. Jin, H. Shen, and R. You, “Implementation of SMS4 Block Cipher on FPGA,” Proceedings of International Conference on Communications and Net- working in China (CHINACOM), 2006, pp. 1-4.
  31. H. Shen, and Y. Jin, “Unbalanced Exponent Modular Reduction over Binary Field and Its Implementation,” Proceedings of International Conference on In- novative Computing, Information and Control (ICICIC), 2006, pp. 190-193.
  32. D. Li, Y. Jin, H. Shen, and X. Yan, “Design of Random Number Generation Algorithm,” Proceedings of International Conference on Computational Intelli- gence and Security (CIS), 2006, pp. 1287-1290.
  33. R. You, H. Shen, and Y. Jin, “Interconnect Estimation for Mesh-Based Re- configurable Computing,” Proceedings of The IFIP International Conference on Embedded and Ubiquitous Computing (EUC), LNCS 4096, 2006, pp. 766-775.

Workshop Publications

  1. R. Potter, Y. Jin, “Don’t Touch That Dial: How Smart Thermostats Have Made Us Vulnerable,” RSA Conference, 2015.
  2. Y. Jin, “Security and Privacy in Internet of Things and Wearable Devices,” CHASE Conference on Secure/Trustworthy Systems and Supply Chain Assur- ance, 2015.
  3. Y. Jin, “Embedded System Security in Smart Consumer Electronics,” 4th In- ternational Workshop on Trustworthy Embedded Devices (TrustED 2014), 2014, pp. 59-59.
  4. Y. Jin, G. Hernandez, and D. Buentello, “Smart Nest Thermostat: A Smart Spy in Your Home,” Black Hat USA, 2014.
  5. Y. Jin, and D. Oliveira, “Trustworthy SoC Architecture with On-Demand Security Policies and HW-SW Cooperation,” 5th Workshop on SoCs, Hetero- geneous Architectures and Workloads (SHAW-5), 2014. 

Invited Presentations

  • 2015 China Internet Security Conference (Keynote Speech), Beijing, China Sep 2015 Title: “Smart vs. Security: IoT Security and Protections”
  • Notre Dame University, Notre Dame, IN Sep 2015 Title: “Introduction to Hardware Security - Formal Methods, IoT Security, and Reverse Engineering” (Host: X. Sharon Hu)
  • 2015 NIST - Cybersecurity Innovation Forum, Washington, DC Sep 2015
  • Title: “Hardware Trust and Integrity: The First Step Toward Securing Com- puter Systems” (Host: Andrew Regenscheid)
  • Cisco, Gainesville, FL Sep 2015 Title: “IoT Security” (Host: Tony Jeffs)
  • National Security Campus, Gainesville, FL Aug 2015 Title: “Introduction to Hardware Security - Formal Methods, IoT Security, and Reverse Engineering” (Host: Perry Tapp)
  • Honeywell - FICS, Gainesville, FL Jun 2015 Title: “IoT/Hardware Security” (Host: Mark Tehranipoor)
  • Raytheon - FICS, Gainesville, FL Jun 2015 Title: “Automated Functionality Rebuilding Through Netlist Reverse Engi- neering” (Host: Mark Tehranipoor)
  • Trustworthy Hardware Workshop New York, NY Nov 2014 Title: “Computer System Protection through Run-time Hardware-Software Collaboration,” (Host: Ramesh Karri)
  • University of George, Athens, GA Sep 2014 Title: “Computer System Protection through Hardware-Software Collabora- tion” (Host: Kang Li)
  • Pennsylvania State University, State College, PA Sep 2014 Title: “Computer System Protection through Run-Time Hardware-Software Collaboration” (Host: Vijaykrishnan Narayanan)
  • University of Connecticut Storrs, CT Aug 2014 Title: “Embedded System Security in Smart Consumer Electronics: A Case Study on Google Nest Thermostat” (Host: Domenic Forte)
  • Information Sciences Institute/USC Washington, D.C. May 2014 Title: “Security in Silicon - Challenges and Opportunities Ahead” (Host: Youn- gok Pino)
  • Intel Corp. Hillsboro, OR Nov 2013 Title: “Proof-Carrying Based Trusted Embedded System Design and Secure SoC Integration” (Host: David Ott and Mukesh Ranjan) 
  • Trustworthy Hardware Workshop New York, NY Nov 2013 Title: “Trusted Embedded System Design Through the Unification of Trusted Third-Party Software Programs and Hardware IP Cores” (Host: Cliff Wang)
  • Northeastern University Boston, MA Title: “Trusted Integrated Circuits” (Host: Edmund Yeh)
  • University of New Mexico Albuquerque, NM Title: “Trusted Integrated Circuits” (Host: Nasir Ghani)
  • Stony Brook University New York, NY Title: “Trusted Integrated Circuits” (Host: Kenneth Short)
  • University of Maryland College Park, MD Title: “Trusted Integrated Circuits” (Host: Gang Qu)
  • George Mason University Fairfax, VA Title: “Trusted Integrated Circuits” (Host: Kris Gaj)
  • Illinois Institute of Technology Chicago, IL Title: “Trusted Integrated Circuits” (Host: Kui Ren)
  • Intel Corp. Hillsboro, OR Title: “Trusted Integrated Circuits and Proof Carrying-based Hardware Intel- lectual Property Protection” (Host: Dhinesh Manoharan) 

Research Funding

  • NSF / CISE, CNS 1319105, “TWC: Small: Collaborative: Toward Trusted 3rd-Party Microprocessor Cores: A Proof Carrying Code Approach,” 2013 - 2016 (PI: Yier Jin, co-PI: Yiorgos Makris, $450K ($240K + $210K)) (REU Supplement $16K)
  • UCF In-House Award, “Trustworthiness Evaluation in Integrated Circuits,” 2015 - 2016, $7.5K
  • Florida Center for Cybersecurity (FC2) Collaborative Seed Grant Program, “Smart Grid Security Protection through Cross-Layer Approaches,” 2015 - 2016 (PI: Yier Jin, co-PI: Yao Liu, Cliff Zou, $50K)
  • UCF COS/ORC SEED Grant, “SmartPhrog: A Responsive Low-Cost High- Performance Bioacoustic Solution Using the Raspberry Pi Single-Board Com- puter for Frog Population Monitoring,” 2015 - 2016 (PI: Anna Savage, co-PI: Shaojie Zhang, Yier Jin, $36K)
  • SCEEE/WoodyEverettResearchInitiationGrants,“AvalancheEffectinCyber- Physical Systems Security Under Large-Scale Cyberattacks on Smart Devices,” 2015 - 2016 (Single PI, $32K) 

Teaching Experience

Instructor for Courses Dec 2012 - Present Electrical Engineering and Computer Science Department, University of Central Florida

  • Graduate Course: EEE 5390 - Full Custom VLSI Design
  • Undergraduate Course: EEE 4346C - Hardware Security and Trusted Circuit Design

Teaching Fellow Fall 2010, Fall 2008 School of Engineering and Applied Science, Yale University

  • Graduate Course: EENG875 - Introduction to VLSI System Design 

Teaching Fellow Spring 2010, School of Engineering and Applied Science, Yale University

  • Undergraduate Course: EENG201b - Introduction to Computer Engineering 

Institutional Service

  • UCF cyber cluster faculty search committee Sep 2015 - Present
  • Computer Engineering (CpE) faculty search committee Oct 2014 - Present
  • ECE representative on the cybersecurity task force committee Aug 2014 - Present
  • Faculty Library Representative for the Electrical and Computer Engineering Division of the Department of Electrical Engineering and Computer Science, University of Central Florida 2013 - Present
  • PhD Defense Committee: Sirui Luo (Advisor: Dr. Juin J. Liou), Zhixin Wang (Advisor: Dr. Juin J. Liou), Jianling Yin (Advisor: Dr. Jun Wang) 

Professional Service

Guest Editor

  • IEEE Transactions on Multi-Scale Computing Systems. Special Issue/Section on Hardware/Software Cross-Layer Technologies for Trustworthy and Secure Computing.

Associate Editor

  • IEEE SMC Society Technical Committee on CCPS Newsletter

Organizing Committee

  • Security B-Sides Orlando, 2015, 2016.
  • IEEEInternationalSymposiumonHardware-OrientedSecurityandTrust (HOST ’15, ’16)
  • International Symposium on VLSI Design and Test (VDAT ’14)

Technical Program Committee

  • Design Automation Conference (DAC ’15, ’16)
  • Great Lake Symposium on VLSI (GLSVLSI ’16)
  • The 28th Conference on VLSI Design and the 15th Conference on Embedded Systems (VLSI Design ’16)
  • Asia and South Pacific Design Automation Conference (ASP-DAC ’16) 
  • IEEE International Symposium on Nanoelectronic and Information Systems (iNIS ’15)
  • International Test Conference (ITC ’15)
  • IEEE International System-on-Chip Conference (SOCC ’15)
  • IFIP/IEEE International Conference on Very Large Scale Integration (VLSI- SoC ’15)
  • IEEE Computer Society Annual Symposium on VLSI (ISVLSI ’14, ’15)
  • The 13th International Conference on Information Technology (ICIT ’14)
  • The 23rd Asian Test Symposium (ATS ’14)
  • IEEEInternationalSymposiumonHardwareOrientedSecurityandTrust(HOST ’14)
  • IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT ’12)
  • IEEE International Conference on Computer Design (ICCD ’12)