CAD & Security Research Laboratory
Sogang University

Address Sogang University, R 906A
1 Shinsoo-dong, Mapo-ku, Seoul 121-742, Korea
E-mail
Tel. +82-2-706-3997
Fax +82-2-706-3997

 * Research Areas

   Our laboratory has two research areas:
 
- CAD (Computer Aided Design)
- Computer security & forensics


  * CAD (Computer Aided Design)
Contemporary telecommunication device and computer are made by VLSI chip design. Such a VLSI is leading to the part of environment for chip design developing. CAD & VLSI of various research parts which are related to that is not the field which helping radical development of technology but the research part which has a broad application area. Recently so many mobile devices, likewise laptop, computer, mobile phone, PDA, and PMP, appearing to the world. hence the research of chip requiring ultra micro scale, High performance, and Low power is lively. So the role of CAD becomes more important.

A. Low Power Design
As a very large scale integrated of digital and analog circuit comes possible, the systems operate on each chip are able to operate together on only one chip. The importance of this researches are growing as we can see through cell phone, laptop computer which are popular device on our lives.

This devices are evaluated with running time with a same electric power or how much power dissipation are able to be reduced. therefore, in order to High performance - Low power design, the researches for optimized designs are in progress very actively like Gate Sizing Method, Glitch Reduction, Buffer Insertion.

B. Static Timing Analysis and Statistical Timing Analysis
The minimization of semiconductor process technology is making progress gradually at present. the affection of the progress variation that could be happen in semiconductor manufacturing process to semiconductor performance is relatively increasing, as semiconductor process has undersized smaller than 90 nano. This process variations are uncertain factors and they also need the probabilistic access and modeling. However, corner based and static timing analysis methodology of instance based that used to be used are not able to consider this is uncertain, and generally consider worst condition. therefore the results are not expected to be good. So now it is researching that statistical timing analysis which can probabilistic modeling and calculation.


  * Computer security and forensics

Computer security imposes requirements on computers that are different from most system requirements because they often take the form of constraints on what computers are not supposed to do. This makes computer security particularly challenging because we find it hard enough just to make computer programs do everything they are designed to do correctly. Furthermore, negative requirements are deceptively complicated to satisfy and require exhaustive testing to verify, which is impractical for most computer programs. Computer security provides a technical strategy to convert negative requirements to positive enforceable rules. For this reason, computer security is often more technical and mathematical than some computer science fields.

Typical approaches to improving computer security (in approximate order of strength) can include the following:

  • Physically limit access to computers to only those who will not compromise security.
  • Hardware mechanisms that impose rules on computer programs, thus avoiding depending on computer programs for computer security.
  • Operating system mechanisms that impose rules on programs to avoid trusting computer programs.
  • Programming strategies to make computer programs dependable and resist subversion.
Main areas of research are:

   - Security in Mobile devices (e.g. mobile phones, PDAs, notebooks, UMPCs, PMPs)
   - Trusted computing
   - Digital Forensics
   - Hacking and countermeasures