BYUNGHO'S HOME

Byung-Ho (Paul) Cha received his Bachelor of Science degree (Suma Cum Laude) in Electronic Engineering from Sogang University, Seoul, South Korea, in Feb. 2004. He received his Master of Science degree in May 2006 and Doctor of Philosophy degree in Aug. 2009 at Signal and Image Processing Institute, Ming Hsieh Department of Electrical Engineering, Viterbi School of Engineering, University of Southern California (USC), Los Angeles, CA, USA. He joined Media Communications Lab (MCL) supervised by Prof. C.-C. Jay Kuo at USC from May 2005 to May 2009. He was a member of the Audio/Music Signal Processing (AMSP) subgroup in MCL. He joined Convergence Service/SW Lab, Convergence Solution Team, Samsung Electronics Co., Ltd., DMC R&D center as a Senior Engineer in Suwon, South Korea in Aug. 2009. He developed forensic watermarking technologies against illegal cam-cording pirates, digital rights management solutions, UltraViolet ecosystem (Digital Entertainment Content Ecosystem, DECE) authentication & authorization framework. His lab is changed to Cloud Computing Lab, Convergence Solution Team, Software R&D Center in Jan. 2011, and he worked for developing end-to-end communication security solutions (Identity-based Encryption), privacy protection of the cloud platform. He moved to Service Platform Development Group, Platform Development Team, Media Solution Center (MSC) in Jan. 2013. He developed location-based platform with map, poi, position, context and social location-based service in the AWS cloud. Also, he led the commercialized navigation application development for smart phone connected car applicaiton, and he participated in the development of location sharing platform and SDK in 2013. He worked on B2B healthcare platform development, and took care of B2B partnerships and technical developments with hospitals, insurance companies, IT healthcare companies, etc. in 2014. He handled security and privacy issues of service in the smart phone applicaiton and cloud with data anonymization, privacy issues in a real data platform, cloud and API protection and authentication, identity and access mamangement. He joined Corporate Business Operations Group, Corporate Management Team, HQ, Seoul in Jan. 2015. He managed corporate platform and service business operations related with Internet of Things (IoT) and payment service. He moved to his position to New Business Group, Corporate Management Team, HQ in Mar. 2015 for developing new business strategic opportunities including corporate business planning and new business creation. He moved to Security Lab, Software R&D Center for developing automotive security solutions and threat Intelligence cloud platform in Feb. 2016. He was promoted to Principal Engineer (Career Level 4) in Mar. 2017. He managed projects with automated malware analysis and classification and anomlay detection system for Tizen at Security Lab, Samsung Research. He dispatched to Arizona State University (ASU), Tempe, Arizona in Jul. 2017, and he developed the collaboration relationship between Samsung Electronics and ASU as both Principal Engineer and Visiting Scientist. He moved into the Automotive Industiry in Sep. 2018. He joined Information Technology (IT) Cybersecurity Team as a Vehicle Cybersecurity Research Engineer at Ford Greenfield Labs, Palo Alto, CA. He designed and developed advanced research projects related with connected vehicle and mobility security such as vehicle platform security, vehicle network security, adversarial and interpretable machine learning, Blutooth security. He recently moved to Synopsys Inc., SunnyVale, CA and joined Digital Design Group (DDG) in Electronic Design Automation (EDA) business as Staff Cloud Security R&D Engineer in Sep. 2020. He contributed his security research and development experty to the DARPA project named Automatic Implementation of Secure Silicon (AISS). He passed the exam of Certified Information Systems Security Professional (CISSP) awared by (ISC)² on Jul. 2021, and he became an official member of (ISC)² on Sep. 2021.

PROJECT LIST

  • Automatic Implementation of Secure Silicon (AISS) [2020 - 2021]

    • Developed Hardware Security Module (HSM) PKCS#11 APIs for the adaptive learning engine

    • Developed trust anchor APIs among security engine, HSM, and hyper-ledger

    • Implemented watermarking solutions as the custom programs in the HSM

    • DARPA project requires multiple collaborations with NGC, IBM, ARM, University of Florida

  • Vehicle cyber security of connected vehicle and mobility [2018 - 2020]

    • Researched threat modeling and risk assessment for UNECE WP.29 and ISO 21434

    • Explored vulnerabilities and developed countermeasures of Bluetooth in the vehicle

    • Researched and developed cryptography on vehicle HSM in AUTOSAR

    • Researched and explored vehicle platform (e.g. QNX, Linux, Android) proteciton methods

    • Researched and explored adversarial and interpretable ML

    • Performed threat modeling sessions for vehicle projects

    • Refer [C1] in the section of conference papers below

    • 4 pending patent applications

  • Security of smart cars [2017 - 2018]

    • Developed attack simulators for Controller Area Network (CAN)-bus

    • Implemented and evaluated recent state-of-the-art vehicle intrustion detection systems (IDS)

    • Researched and implemented vehicle identification framework

    • Visiting scientist at center for Cybersecurity and Digital Forensics, Arizona State Univ.

  • Malware analysis/detection/classification [2017]

    • Managed proof-of-concept development project with malware analysis/detection/classification by crawling open malware data sets.

    • Collaborated with 13 developers

  • Malicious activity analysis by situational awareness and host-based intrusion detection system [2017]

    • Managed proof-of-concept development project with host-based intrusion detection system by mointoring Linux kernel system calls

    • Collaborated with 4 developers

  • Threat intelligence analysis and data-driven cyber security for threat intelligence platform in cloud [2017]

    • Managed proof-of-concept development project with malware information sharing platform in cloud

    • Collaborated with Arizona State Univ. and 3 developers

  • On/Off board Communication Protection and trusted platform development for infotainment [2016]

    • Managed proof-of-concept development project with trusted platform and communication protocol protection for in-vehicle infotainment using Trustzone, Secure boot, cryptographic primitives

    • Collaborated with Automotive Business Team, Korea Univ., and 11 developers

  • Intrusion detection and anti-theft system for vehicle [2016]

    • Collaborated proof-of-concept project for vehicle intrustion detection system and anti-theft system using vehicle data analytics

    • Collaborated with Automotive Business Team and Korea Univ.

  • Open source intrusion detection system development for Tizen (ex. SNORT, OSSEC) [2016]

    • Managed proof-of-concept development project using SNORT and OSSEC to enhance Tizen applicaiton framework security

    • Collaborated with Automotive Business Team and 4 developers

  • Corporate operations in charge of corporate business (IoT & Security) [2015]

    • Developed new business strategy and plan related with Smart Health, Home, Vehicle, IoT

    • Explored bew business opportunities, validation, and corresponding business models

    • Participated T/F about new business structure and process creation

    • Operated and validated start-up opportunities for open innovation organizations

  • Patient monitoring application with ECG/PHR data platform development [2014]

    • Managed proof-of-concept project for patient monitoring applicaiton using ECG/PHR data together with hospital

    • Collaborated with Mobile Communication Division (Galaxy S6, Note 4) and 6 developers

  • PHR/EMR integrated HIE solution and HIPAA-compliant health platform development [2014]

    • Managed and designed Health Informaiton Exchange (HIE) system development project witch connects personal Health Record (PHR) collected from smartphone in the HIPAA-compliant server to Electric Medical Record (EMR) in the hospital via sever-to-server API

    • Collaborated with Mobile Communication Division (Galaxy S6, Note 4) and 10 developers

  • Partnership development with hospitals, insurance Co., healthcare IT Co. [2014]

    • Developed strategic technology landscape and point of view through partnership relationship in healthcare industry

  • BLE beacon application, web console and server development, security architecture design [2014]

    • Developed API authentication and authorization mechanism for BLE beacon application

    • Developed service requirements and designed service architecture

  • Connected car application in Android and location share server development [2013 - 2014]

    • Managed and developed navigation feature development project for commercialized connected car applicaiton in Android

    • Managed and designed location share backend server development project and handled the concept of user consent

    • Collaborated with Mobile Communication Division (Galaxy S5/S4, Note 3) and 25 developers

  • Location-based social application and server development [2013]

    • Managed location-based social applicaiton project from the scratch through UX/UI design including android applicaiton and AWS backend server

    • Collaborated with Mobile Communication Division (Galaxy S5/S4, Note 3) and 8 developers

  • Location privacy and personally identifiable information (PII) consulting [2013]

    • Researched and consulted PII in account and privacy issue with location data

  • Partnership development with Map/LBS/Navigation Co. [2013]

    • Developed strategic technology landscape and point of view through partnership relationship in LBS industry

  • Samsung Developer Conference (SDC) session speaker [2014]

    • Gave session talk by the topic with integrating BLE beacon based service into your application

  • Secure communications using Identity-based Encryption (IBE) on Linux/Android [2012]

    • Implemented identity-based encryption mechanisms based on pairings on Linux and Anroid environment for secure communications

  • Digital rights management technology (Forensic watermarking/CAS) partnership and operation [2012]

    • Participated meeting with Hollywood studios and demonstrated digital rights management technologies for official DRM approval

    • Refer [P1-P3] in the section of patents below

  • Digital Entertainment Content Ecosystem (DECE) client implementation using DECE Spec./SAML [2011]

    • I developed and tested authenticaiton mechanisms with standardized cloud-based content distribution system.

    • I followed up full DECE (Ultraviolet) and test case specifications.

  • Automatic printing quality evaluation system [2011 - 2012]

    • Implented the prototype of automated printing quality testing system for the testing automation

  • Official security audit from 3rd Party Co. [2010]

    • Commercialized watermarking solution is officially audited by 3rd party company which is recognized by Hollywood studio

  • Forensic watermarking design and Performance Improvement [2010 - 2012]

    • Designed and developed watermarking embedding and detection algorithms

    • Improved the performance of watermarking detector by computer vision and image processing techniques

  • Forensic watermarking invisibility and robustness evaluation on Hotel TV [2009 - 2012]

    • Performed invisibility evaluation with full HD smart TV using various video sources

    • Performed robustness evaluation with camcorded video sources from the display of smart TV

  • Multimedia fingerprinting by modeling collusion-free code and multi-colluder detector [2006 - 2015]

    • Designed theory of multimedia fingerprinting in the cryptographic scenario practically by building collusion-free code and advaced detector

    • Refer [C6-C11] in the section of conference papers and [J1,J3-J5] in the section of journal papers below

  • Steganography and steganalysis [2007 - 2013]

    • Co-worked on block-based image steganography to prevent machine learning-based steganalysis

    • Refer [C2-C4] in the section of conference papers and [J2] in the section of journal papers below

  • Multimedia forensics [2008 - 2009]

    • Co-wored on the method to check multimedia integrity using mathematical models

    • Refer [C5] in the section of conference papers below

  • Evaluation of multimedia watermarking and scrambling [2006 - 2007]

    • Designed and implemented the evaluation framework of multimedia watermarking and scrambling

    • Reported evaluation results to Walt Disney company

  • Multimedia quality assessment [2007]

    • Developed automatic quaility accessment system by watermarking in order to develop semi-blind quality assessment framework

    • Refer [P4] in the section of patents below

  • Multimedia quality monitoring system [2006]

    • Co-developed automatic multiedia quality monitoring system by machine learning techniques

    • The levels of image blurring were measured and classified by Support Vector Machine (SVM) algorithms in order to develop blind quality assessment framework.

  • Adaptive image interpolation [2003 - 2006]

    • Proposed a novel adaptive image interpolation method based on the weight classified vector quantization (CVQ) using optimal coefficients which are constrained by a quadratic signal class

    • Improved the performance of second-order image interpolation method in terms of both time and quality

    • Refer [C12] in the section of conference papers below

  • Edge and feature masks [2003 - 2004]

    • Organized various edge and feature masks using circulant matrix formula and performed corresponding image experiments. I published those contexts into the book chapter

    • Presented a criculant matrix interpretation of the edge and feature detection of images in the frequency domain and its further applications in various fields

    • Refer [B1] in the section of book chapters below

PH.D. DISSERTATION

B.-H. Cha, Design and analysis of collusion-resistant fingerprinting systems, Aug. 2009

JOURNAL PAPERS

[J1] B.-H. Cha and S.-I. Choi, "Continuous media fingerprinting against time-varying collusion attacks," Information Sciences, vol. 298, pp. 66--79, Mar. 2015

[J2] S. Cho, B.-H. Cha, M. Gawecki, and C.-C. Jay Kuo, "Block-based image steganalysis: algorithm and performance evaluation," Journal of Visual Communication and Image Representation, Jun. 2013

[J3] B.-H. Cha and C.-C. Jay Kuo, "Collusion-resistant fingerprinting systems: review and recent results," LNCS Transactions on Data Hiding and Multimedia Security, vol. 5, pp. 34—59, Jun. 2010

[J4] B.-H. Cha and C.-C. Jay Kuo, "Robust MC-CDMA-based fingerprinting against time-varying collusion attacks," IEEE Transactions on Information Forensics and Security, vol. 4, pp. 302—317, Sep. 2009

[J5] B.-H. Cha and C.-C. Jay Kuo, "Design and analysis of high-capacity anti-collusion hiding codes," Journal of Circutis, Systems, and Signal Processing, Special Issue on Digital Watermarking and Multimedia Security, vol. 27, pp. 195—211, Mar. 2008

CONFERENCE PAPERS

[C1] K. Cho, K. Shin, Y. Kim, B.-H. Cha, "Off is not off; on the security of parked vehicle," in Proc. IEEE Conference on Communications and Network Security, Jun. 2020

[C2] S. Cho, B.-H. Cha, J. Wang, and C.-C. Jay Kuo, “Performance study on block-based image steganalysis," in Proc. IEEE International Symposium on Circuits and Systems, Rio de Janeiro, Brazil, May 2011, pp. 2649--2652

[C3] S. Cho, B.-H. Cha, J. Wang, and C.-C. Jay Kuo, “Block-based image steganalysis for a multi-classifier,” in Proc. IEEE International Conference on Multimedia and Expo, CPAF, Singapore, Jul. 2010, pp. 1457—1462

[C4] S. Cho, B.-H. Cha, J. Wang, and C.-C. Jay Kuo, “Block-based image steganalysis: algorithm and performance evaluation,” in Proc. IEEE International Symposium on Circuits and Systems, Special Session on Multimedia Forensics and Security, Paris, France, May 2010, pp. 1679—1682 (Invited)

[C5] J. Wang, B.-H. Cha, S. Cho, and C.-C. Jay Kuo, "Understanding Benford's Law and its vulnerability in image forensics", in Proc. IEEE International Conference on Multimedia and Expo, MSATC, New York City, NY, Jun. 2009, pp. 1568—1571

[C6] B.-H. Cha and C.-C. Jay Kuo, “Analysis of time-varying collusion attacks in fingerprinting systems: capacity and throughput,” in Proc. IEEE International Symposium on Circuits and Systems, Special Session on Multimedia Forensics, Security, and Applications, Taipei, Taiwan, May 2009, pp. 493—496 (Invited)

[C7] B.-H. Cha and C.-C. Jay Kuo, “Anti-collusion fingerprinting with scalar Costa scheme (SCS) and colluder weight recovery,” in Proc. Thirty Fourth IEEE International Conference on Acoustics, Speech, and Signal Processing, Taipei, Taiwan, Apr. 2009, pp. 1437—1440

[C8] B.-H. Cha and C.-C. Jay Kuo, "Advanced colluder detection techniques for OSIFT-based hiding codes," in Proc. IEEE Symposium on Circuits and Systems, Special Issue on Multimedia Forensics andSecurity, May 2008, Seattle, WA, USA, pp. 2961—2964 (Invited)

[C9] B.-H. Cha and C.-C. Jay Kuo, "Design of multiuser collusion-free hiding codes with delayed embedding," in Proc. Third IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Nov. 2007, Kaohsiung, Taiwan, pp. 379—382

[C10] B.-H. Cha and C.-C. Jay Kuo, "Design of collusion-free hiding codes using MAI-free principle," in Proc. Thirty Second IEEE International Conference on Acostics, Speech, and Signal Processing, Apr. 2007, Honolulu, HI, USA, pp. 145—148

[C11] B.-H. Cha and C.-C. Jay Kuo, "Design of collusion-free codes based on MAI-free principle," in Proc. Second IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Dec. 2006, Pasadena, CA, USA, pp. 639—642

[C12] B.-H. Cha and R.-H. Park, "Adaptive image interpolation using weight CVQ," in Proc. Eighth IEEE International Symposium on Multimedia, Dec. 2006, San Diego, CA, pp. 3—10 (Best Student Paper Award)

BOOK CHAPTERS

[B1] R.-H. Park and B. H. Cha, "Circulant matrix representation of feature masks and application," in Advances in imaging and electron physics, vol. 134, p. Hawkes, Ed., Elsevier Inc., pp. 1—68, May 2005

PATENTS

[P1] Yu Seung Kim, Byungho Cha, Detecting Abnormal CAN Bus Wake-up Pattern, US Patent 20220001835, Jan. 2022

[P2] Byungho Cha, Vehicle Security Enhancement, US Patent 1113045, Sep. 2021

[P3] Byungho Cha, Voltage-characteristic-based Vehicle Identification Number, US Patent 1099625B2, May 2021

[P4] Jae-Woo Seo, Hee Chan Han, Byung Il Kwak, Huy Kang Kim, Byung-Ho Cha, Apparatus, Control Method Thereof and Recording Media, KR Patent 20180222407, Aug. 2018

[P5] Jun-Bum Shin, Byung-Ho Cha, Watermarking method and apparatus for tracking hacked content and method and apparatus for blocking hacking of content using the same, US Patent 9384332, Jul. 2016

[P6] Byung-Ho Cha, Yong-Kuk You, Jun-Bum, Shin, Yong-Cheol Yang, Information Providing System Having Content Providing Apparatus and Terminal Apparatus, and Control Method Thereof, US Patent 20150023547, Jun. 2015

[P7] Suk-Jin Yun, Jum-Bum Shin, Moon-gyu Jung, Byung-Ho Cha, Computing System and Method of Operating System, US Patent 20130054978, Feb. 2013

[P8] T. Hamada, M. F. Sabir, C.-C. Jay Kuo, B.-H. Cha, Video monitoring involving embedding a video characteristic in audio of a video/audio signal, US Patent 20100026813, Feb. 2010

2009@copyright by Byung-Ho Cha, Last modified; 30 January 2020