Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hong-Il Ju is active.

Publication


Featured researches published by Hong-Il Ju.


international conference on consumer electronics | 2010

Design and implementation of Mobile Trusted Module for trusted mobile computing

Mooseop Kim; Hong-Il Ju; Young-Sae Kim; Jiman Park; Youngsoo Park

This paper presents the design and implementation of a Mobile Trusted Module (MTM), which should satisfy small area and low-power condition. Unlike the general Trusted Platform Module (TPM) for PCs, the MTM, that is to be employed in mobile devices, has very stringent limitations with respect to available power, circuit area and so on. Therefore, MTM needs the spatially-optimized architecture and design method. We firstly introduce the design requirements for MTM and then implement a compact and power efficient MTM chip based-on the introduced requirements. The designed MTM can support all the necessary functions for trusted computing using 400K logic gates and consumes at most 10mA.


international conference on information and communication technology convergence | 2012

Security architecture for smart devices

Hong-Il Ju; Jeong-Nyeo Kim

In this paper, we described security threats on smart devices and proposed the security architecture for smart devices. The proposed security architecture for smart devices is the separated and hardware-based security solution which is strong more than only software-based solutions. In recent, smart devices have been widely used and are becoming an important and serious issue of security. For protecting from security threats, various security solutions have been studied and provided, but they still have security vulnerabilities and limitations for smart devices. Therefore, for the more efficient security solutions for smart devices, we described the analysis of current mobile security solutions and recommended the security architecture for building secure execution environment on smart devices.


The Kips Transactions:parta | 2003

Design and Implementation of Embedded Contactless (Type-B) Protocol Module for RFID

Yong-Sung Jeon; Jimann Park; Hong-Il Ju; Sung-Ik Jun

In recent, as a typical example of RFID, the contactless IC card is widely used in traffic, access control system and so forth. And its use becomes a general tendency more and more because of the development of RF technology and improvement of requirement for user convenience. This paper describes the hardware module to process embedded contactless protocol for implementation contactless IC card. And the hardware module consists of analog circuits and specific digital logic circuits. This paper also describes more effective design method of contactless IC card, which method separates into analog circuit parts, digital logic circuit part, and software parts according to the role of the design parts.


international conference on computational science | 2015

A Study on the Hardware-Based Security Solutions for Smart Devices

Hong-Il Ju; Yong-Sung Jeon; Jeong-Nyeo Kim

For enhanced secure services on smart devices, hardware-based security solutions are required. To this end, the hardware security module is required and it should be physically separated from a smart device. In this paper, we describe the considerations for applying a hardware security module on smart devices. In particular, as smart devices have a limited resource and use a battery, a hardware security module for smart devices should be considered above mobile environment. In this paper, we implemented the hardware security chip for smart devices. In addition, in order to test and equip the implemented chip to a smart device, we implemented the smartphone and verified the secure service on the smart device based on the chip.


Archive | 2015

The Issue of Data Transfer for the Embedded SE on Mobile Devices

Hong-Il Ju; Yong-Sung Jeon; Jeong-Nyeo Kim

This paper describes the issue of data transfer for the embedded SE(Secure Element) on mobile devices. To enhance their security, current mobile devices provide the separate physical secure storage that contains the important and sensitive data for various security services. On the other hand, there is the problem of data migration for above secure storages such as the embedded SE. It is critical and essential problem in the embedded SEs because they cannot be removed from mobile devices. Thus, we explain the above problem in detail and would like to share the problem with service provider and mobile device manufacturers. To this end, we describe the security requirement for the secure data transfer of all data stored in embedded SEs. We also propose the secure data transfer schemes, which meet the proposed security requirements.


IEEE Transactions on Consumer Electronics | 2015

Implementation of a hardware security chip for mobile devices

Hong-Il Ju; Young-Sae Kim; Yong-Sung Jeon; Jeong-Nyeo Kim

The purpose of this study is to suggest a solution to recently emerging security threats to mobile devices and enable users to use mobile services in a secure manner. To that end, this paper presents the design and implementation method for a hardware security chip required for providing advanced mobile security services. The proposed method could be the fastest and most efficient approach among various approaches. This study implements a Mobile Trusted Module (MTM) chip as a hardware security chip and confirms its commercial potential through interface testing with a smartphone. The implemented MTM chip is based on a smart card IC, and it includes an interface conversion chip that supports the I/O interface with a mobile device. The chip size is 5mm × 5mm, and the chip does not consume more than 10 mA of current. In addition, it provides additional security functions, including the required functions for an MTM chip. Therefore, with the proposed hardware security chip, it is possible to establish a secure service execution environment for mobile devices.


Archive | 2002

Wireless communication medium and method for operating the same

Ji Man Park; Yong-Sung Jeon; Hong-Il Ju; Youngsoo Park; Sung-Ik Jun; Kyo-ill Chung


ITC-CSCC :International Technical Conference on Circuits Systems, Computers and Communications | 2004

An implementation of the T=1 protocol for USIM cards

Hong-Il Ju; Sung-Ik Jun


Archive | 2014

METHOD AND APPARATUS FOR DETECTING SMS-BASED MALWARE

Seungyong Yoon; Young-Sae Kim; Jeong-Nyeo Kim; Hyun-Sook Cho; Hong-Il Ju


Archive | 2013

MOBILE COMPUTING SYSTEM FOR PROVIDING HIGH-SECURITY EXECUTION ENVIRONMENT

Hong-Il Ju; Yong-Sung Jeon; Young-Sae Kim; Seungyong Yoon; Jeong-Nyeo Kim

Collaboration


Dive into the Hong-Il Ju's collaboration.

Top Co-Authors

Avatar

Yong-Sung Jeon

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jeong-Nyeo Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Sung-Ik Jun

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Young-Sae Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Seungyong Yoon

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Hyun-Sook Cho

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Youngsoo Park

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Ji Man Park

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jiman Park

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jimann Park

Electronics and Telecommunications Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge