Search

Onur Onur Aciicmez

from San Jose, CA
Age ~44

Onur Aciicmez Phones & Addresses

  • 53 Bassett St, San Jose, CA 95110
  • Santa Ana, CA
  • Santa Clara, CA
  • Corvallis, OR
  • Hillsboro, OR
  • 1109 E San Fernando St, San Jose, CA 95116

Work

Company: Samsung information systems america Feb 2007 Address: San Francisco Bay Area Position: Research scientist

Education

Degree: PhD School / High School: Oregon State University 2004 to 2006 Specialities: Electrical and Computer Engineering, Information Security

Skills

Cryptography • Algorithms • Security • Computer Security • Computer Science • C • Software Engineering • Embedded Systems • Linux • R&D • Software Design • Mobile Devices • Cloud Computing • Machine Learning • Network Security • Computer Engineering • Computer Architecture • System Architecture • Information Security • Research • Embedded Software • Mobile Platforms • Operating Systems • Internet Security • Cloud Security • Security System Design • Smartphones • Access Control • Hardware Architecture • Linux Kernel • Trusted Computing • Webkit • Technical Leadership • Project Generation • Javascript • X86 • Arm • Browsers

Languages

English

Industries

Computer & Network Security

Resumes

Resumes

Onur Aciicmez Photo 1

Research Scientist

View page
Location:
53 Bassett St, San Jose, CA 95110
Industry:
Computer & Network Security
Work:
Samsung Information Systems America - San Francisco Bay Area since Feb 2007
Research Scientist

Intel Corporation - Hillsboro, Oregon, USA 2006 - 2006
Research Scientist

Oregon State University Sep 2002 - Dec 2006
MS/PhD Student
Education:
Oregon State University 2004 - 2006
PhD, Electrical and Computer Engineering, Information Security
Oregon State University 2002 - 2004
MS, Electrical and Computer Engineering, Information Security
Bilkent University 1998 - 2002
BS, Computer Engineering and Information Sciences
Skills:
Cryptography
Algorithms
Security
Computer Security
Computer Science
C
Software Engineering
Embedded Systems
Linux
R&D
Software Design
Mobile Devices
Cloud Computing
Machine Learning
Network Security
Computer Engineering
Computer Architecture
System Architecture
Information Security
Research
Embedded Software
Mobile Platforms
Operating Systems
Internet Security
Cloud Security
Security System Design
Smartphones
Access Control
Hardware Architecture
Linux Kernel
Trusted Computing
Webkit
Technical Leadership
Project Generation
Javascript
X86
Arm
Browsers
Languages:
English

Publications

Us Patents

Enhancing The Security Of Public Key Cryptosystem Implementations

View page
US Patent:
7903814, Mar 8, 2011
Filed:
Jul 26, 2007
Appl. No.:
11/828849
Inventors:
Onur Aciicmez - San Jose CA, US
Jean-Pierre Seifert - Tirol, AT
Qingwei Ma - Fremont CA, US
Xinwen Zhang - Milpitas CA, US
Assignee:
Samsung Electronics Co., Ltd. - Suwon
International Classification:
H04L 9/00
G06F 11/30
US Classification:
380 30, 380 28, 713189
Abstract:
In one embodiment, cryptographic transformation of a message is performed by first performing a table initiation phase to populate a data structure. Then, a first random number multiplied by a public key is added to each value in the data structure, in modulo of a second random number multiplied by the public key. Then an exponentiation phase is performed, wherein each modular multiplication and square operation in the exponentiation phase is performed in modulo of the second random number multiplied by the public key, producing a result. Then the result of the exponentiation phase is reduced in modulo of the public key. The introduction of the random numbers aids in the prevention of potential security breaches from the deduction of operands in the table initiation phase by malicious individuals.

Altering The Size Of Windows In Public Key Cryptographic Computations

View page
US Patent:
7936871, May 3, 2011
Filed:
Sep 4, 2007
Appl. No.:
11/849765
Inventors:
Onur Aciicmez - San Jose CA, US
Jean-Pierre Seifert - Tirol, AT
Xinwen Zhang - Milpitas CA, US
Assignee:
Samsung Electronics Co., Ltd. - Suwon
International Classification:
H04K 1/00
H04L 9/00
H04L 9/30
H04L 12/58
H04L 9/08
G06F 15/00
G06F 13/00
G09C 1/00
US Classification:
380 30, 380 28, 380 44, 380277
Abstract:
In one embodiment, cryptographic transformation of a message is performed by first performing a table initiation phase. Then an exponentiation phase is performed, wherein the exponentiation phase includes two or more parsing steps, wherein each of the parsing steps includes parsing a part of a cryptographic key into a window of size n, wherein n is a difficult to predict number.

Changing The Order Of Public Key Cryptographic Computations

View page
US Patent:
7974409, Jul 5, 2011
Filed:
Sep 4, 2007
Appl. No.:
11/849757
Inventors:
Onur Aciicmez - San Jose CA, US
Jean-Pierre Seifert - Tirol, AT
Xinwen Zhang - Milpitas CA, US
Assignee:
Samsung Electronics Co., Ltd. - Suwon
International Classification:
H04L 9/00
US Classification:
380 30, 713174, 713193, 713194
Abstract:
In one embodiment, cryptographic transformation of a message is performed by first performing a table initiation phase. This may be accomplished by creating a permutation of an order of powers and then performing a table initiation phase using a part of a key and the permuted order of powers to populate a data structure.

Method And System For Securing Instruction Caches Using Cache Line Locking

View page
US Patent:
8019946, Sep 13, 2011
Filed:
Jul 31, 2008
Appl. No.:
12/183908
Inventors:
Onur Aciicmez - San Jose CA, US
Jean-Pierre Seifert - San Jose CA, US
Qingwei Ma - Fremont CA, US
Xinwen Zhang - San Jose CA, US
Assignee:
Samsung Electronics Co., Ltd. - Suwon
International Classification:
G06F 12/08
US Classification:
711125, 711119, 711138, 711E12017
Abstract:
A method and system is provided for securing micro-architectural instruction caches (I-caches). Securing an I-cache involves providing security critical instructions to indicate a security critical code section; and implementing an I-cache locking policy to prevent unauthorized eviction and replacement of security critical instructions in the I-cache. Securing the I-cache may further involve dynamically partitioning the I-cache into multiple logical partitions, and sharing access to the I-cache by an I-cache mapping policy that provides access to each I-cache partition by only one logical processor.

Method And System For Securing Instruction Caches Using Substantially Random Instruction Mapping Scheme

View page
US Patent:
8055848, Nov 8, 2011
Filed:
Jul 31, 2008
Appl. No.:
12/183689
Inventors:
Onur Aciicmez - San Jose CA, US
Jean-Pierre Seifert - San Jose CA, US
Qingwei Ma - Fremont CA, US
Xinwen Zhang - San Jose CA, US
Assignee:
Samsung Electronics Co., Ltd. - Suwon
International Classification:
G06F 12/08
US Classification:
711125, 711202, 711E12017
Abstract:
A method and system is provided for securing micro-architectural instruction caches (I-caches). Securing an I-cache involves maintaining a different substantially random instruction mapping policy into an I-cache for each of multiple processes, and for each process, performing a substantially random mapping scheme for mapping a process instruction into the I-cache based on the substantially random instruction mapping policy for said process. Securing the I-cache may further involve dynamically partitioning the I-cache into multiple logical partitions, and sharing access to the I-cache by an I-cache mapping policy that provides access to each I-cache partition by only one logical processor.

Secure Inter-Process Communication For Safer Computing Environments And Systems

View page
US Patent:
8108519, Jan 31, 2012
Filed:
Feb 2, 2009
Appl. No.:
12/364303
Inventors:
Xinwen Zhang - San Jose CA, US
Wenjuan Xu - NE Concord NC, US
Onur Aciicmez - San Jose CA, US
Jean-Pierre Seifert - Tirol, AT
Assignee:
Samsung Electronics Co., Ltd. - Suwon
International Classification:
G06F 13/00
US Classification:
709225, 709227, 719330
Abstract:
Techniques for Inter-Process Communication (IPC) in a more secure manner are disclosed. A communication component operating outside of an operating system can obtain operating-system data pertaining to processes that also operate outside of the operating system. The operating-system data can be more reliable than information that may have been provided by the processes, thereby allowing more secure IPC and consequently a more secure computing environment and/or system. A communication component can also be operable to make control decisions regarding the IPC data (e. g. , IPC messages) based on the information provided and/or originated by the operating system (or operating-system data) and/or effectively provide the operating-system data pertaining to a sender process to its intended recipient process. A recipient process can also be operable to obtain the operating-system data pertaining to a sender process. Moreover, a recipient process can make control decisions regarding the IPC data originated by the sender process based on the operating-system data effectively provided and/or originated by the operating system rather than the sender process, thereby allowing the recipient process to make control decisions based on information provided by a more reliable (e. g.

Security-Enhanced Storage Devices Using Media Location Factor In Encryption Of Hidden And Non-Hidden Partitions

View page
US Patent:
8112634, Feb 7, 2012
Filed:
Jun 4, 2008
Appl. No.:
12/132862
Inventors:
Onur Aciicmez - San Jose CA, US
Xinwen Zhang - San Jose CA, US
Jean-Pierre Seifert - San Jose CA, US
Assignee:
Samsung Electronics Co., Ltd. - Suwon
International Classification:
G06F 11/30
G06F 12/14
US Classification:
713189, 713190, 713191, 713192, 713193, 713194
Abstract:
Methods and devices for increasing or hardening the security of data stored in a storage device, such as a hard disk drive, are described. A storage device provides for increased or hardened security of data stored in hidden and non-hidden partitions of a storage medium in the device. An algorithm may be utilized for deriving a key that is used to encrypt or decrypt text before it is read from or written to the hard disk. The algorithm accepts as input a specific media location factor, such as an end address or start address of the block where the text is being read from or written to, and a secret key of the storage component. The output of the algorithm is a final key that may be used in the encryption and decryption process. Thus, in this manner, the final key is dependent on the location of the block where the data is being written or read, thereby making it more difficult to tamper with the data, which may be stored in a hidden or non-hidden partition of a hard disk.

Securing Cpu Affinity In Multiprocessor Architectures

View page
US Patent:
8136153, Mar 13, 2012
Filed:
Nov 8, 2007
Appl. No.:
11/937320
Inventors:
Xinwen Zhang - Milpitas CA, US
Jean-Pierre Seifert - Tirol, AT
Onur Aciicmez - San Jose CA, US
Qingwei Ma - Fremont CA, US
Assignee:
Samsung Electronics Co., Ltd. - Suwon
International Classification:
G06F 13/00
US Classification:
726 17
Abstract:
In an embodiment of the present invention, the ability for a user or process to set or modify affinities is restricted in order to method for control a multi-processor environment. This may be accomplished by using a reference monitor that controls a process' capability to retrieve and set its or another process' affinity. This aids in the prevention of security breaches.
Onur Onur Aciicmez from San Jose, CA, age ~44 Get Report