System and network security systems using eBPF(extended Berkeley Packet Filter) and LSM(Linux Security Module)
Optimization for cloud-native network function virtualization
Secure overlay file systems in cloud/container environments
Intelligent security policy enforcement for cloud workloads
Secure context exchange and access control in MCP-enabled network control planes
Detection and mitigation of context manipulation and prompt injection in network automation pipelines
Vulnerability analysis in SDN/NFV and MCP-based programmable infrastructures
Security assessment and protection layer design for SDN/NFV systems
System and network security systems using SmartNICs
Access control models for XR devices including AI glasses
Fine-grained permission management for sensors (camera, microphone, gaze tracking)
Privacy-preserving data access and sharing in XR environments
Secure interaction and context-aware authorization in mixed reality systems
System-level security architecture for wearable and XR platforms
"Design and Implementation of an Intelligent Centralized Security Policy Control System for Zero Trust in Cloud-Native Environments," National Research Foundation of Korea (NRF), Principal Investigator, Sep.2025-Aug.2028 (ongoing)
"The Development of Darkweb Hidden Service Identification and Real IP Trace Technology," Institute for Information & Communications Technology Planning & Evaluation (IITP), Co-Principal Investigator, Apr.2022-Dec.2025 (completed)
"Design and implementation of security-enhanced intelligent container network systems for secure cloud environment," National Research Foundation of Korea (NRF), Principal Investigator, Mar.2022-Feb.2025 (completed)