秘書長

第三、四屆秘書長 黃育綸博士

l聯絡方式

Email: ylhuang@cn.nctu.edu.tw

電話: 03-571-2121 ext. 31476

傳真: 03-5715998

地址:新竹市大學路1001交通大學電機工程系


l 學歷

交通大學 資訊工程系 學士

交通大學 資訊工程系 博士


l 學術專長暨研究領域

資訊安全

作業系統

嵌入式系統



l 經歷與榮譽

u IEEE Reliability Society Taipei Section 財務長, 2008 – present.

u UC Berkeley 訪問學者, 2008.1 – 2008.7.

u 中華民國資訊安全學會監事, 2009.6 – 2012.5.

u 美商謀智公司(Mozilla Taiwan)技術顧問, 2012 - present.

u 交通大學數位內容製作中心主任, 2014 - present


l 國際會議擔任之職務

u Publicity Chair, ACM Symposium on Information, Computer and Communications Security, 2006.

u Local Arrangement Chair, IEEE International Conference on Advanced Robotics and Its Social Impacts, 2007.

u Program Chair, Cryptology and Information Security Conference, 2010.

u Publication Chair, IEEE International Conference on Software Security and Reliability, 2013.

u Publication Chair, IEEE International Conference on Software Security and Reliability, 2014.

l 教學經歷

u 2005年至2009年參與教育部嵌入式軟體(ESW)教改計畫,積極推動嵌入式軟體相關課程的教學改進計畫,強化學生在嵌入式系統方面的實務操作能力。

u 2004年至2007年參與經濟部工業局晶片系統人才培訓計畫,開設多班嵌入式系統相關培訓課程,強化國內嵌入式系統開發能量。

l 近五年內執行之計畫

u 系統工程教育之創意課程設計與評量-系統工程教育之建構式創意課程 - 以「嵌入式作業系統」為例(102-2511-S-009-013-MY3),主持人

u 具智慧型遠端服務之網路化CNC控制器(I)(102-2218-E-009-023-),共同主持人

u 先進機器手臂控制器系統-先進機器手臂控制器系統(102-2218-E-009-012-MY3),共同主持人

u 結合雲端運算之智慧型行動載具系統暨應用於高齡社會之研究, -總計畫兼子計畫一:結合雲端運算之智慧型行動載具系統暨應用於高齡社會智慧樂活之研究(102-2221-E-009-141-),共同主持人

u 智慧型多重感測行動裝置雲端服務架構平台之研究(101-2219-E-009-027-),共同主持人

u 前瞻性雲端動態防護、安全授權、與風險評估-子計畫三:基於虛擬化技術之雲端系統風險評估機制(101-2221-E-009-075-MY3),主持人

u 惡意程式動態行為分群、隱藏行為誘發、與行為特徵的自動產生(101-2221-E-009-072-MY3) ,共同主持人

u 前瞻性雲端安全儲存、偵測、行為分析與觀測-總計畫(2/2)(100-2218-E-009-003-),共同主持人

u 具強健性之智慧型機器人語音與影像互動介面技術開發-具強健性之智慧型機器人語音與影像互動介面技術開發(2/2)(99-2622-E-009-005-CC2),共同主持人

u 結合襪底感測與慣性儀之可攜式步態偵測系統(99-3113-P-009-003-) ,主持人


l 論文發表情形

(Journal Papers)

l Lo-Yao Yeh, Yu-Lun Huang, Shiuhpyng Shieh, Anthony D. Joseph, Woei-Jiunn Tsaur, “A Batch Authenticated and Key Agreement Framework for P2P-based Online Social Networks," IEEE Transactions on Vehicular Technology, Vol. 61, Issue 4, May 2012, pp. 1907-1924.

l Hsin-Yi Tsai, Melanie Siebenhaar, André Miede, Yu-Lun Huang, Ralf Steinmetz, "Threat as a Service?: Virtualization's Impact on Cloud Security, " IEEE IT Professional, Vol.14, Issue 1, January/February 2012, pp. 32-37.

l Yu-Lun Huang, Chih-Ya Shen, Shiuhpyng Shieh, "S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks," IEEE Transactions on Vehicular Technology, Vol. 60, Issue 9, November 2011, pp. 4509-4519.

l Hsin-Yi Tsai, Yu-Lun Huang, "An Analytic Hierarchy Process-based Risk Assessment Method for Wireless Networks," IEEE Transactions on Reliability, Vol. 60, Issue 4, December 2011, pp. 801-816.

l Yu-Lun Huang, Chin-Yan Tseng, Jwu-Sheng Hu, Kai-Hsiang Huang, "Design and Implementation of a Dual-Robot System using ESAIR," Journal of Software Engineering Studies, Vol. 4, No. 1, June 2009, pp. 44-55.

l Yu-Lun Huang, Alvaro A. Cardenas, Saurabh Amin, Zong-Syun Lin, Hsin-Yi Tsai, Shankar Sastry, "Understanding the Physical and Economic Consequences of Attacks on Control Systems," International Journal of Critical Infrastructure Protection, Vol. 2, Issue 3, October 2009, pp. 73-83.

l Yu-Lun Huang, Pei-Hua Lu, J. Doug Tygar, Anthony D. Joseph, "OSNP: Secure Wireless Authentication Protocol using One-Time Key," Computers and Security, Vol. 28, Issue 8, November 2009, pp. 803–815.

l Hsin-Yi Tsai, Yu-Lun Huang, David Wagner,"A Graph Approach to Quantitative Analysis of Control-Flow Obfuscating Transformations," IEEE Transactions on Information Forensics and Security, Vol. 4, Issue 2, June 2009, pp. 257-267.

l Yu-Lun Huang and Jwu-Sheng Hu, "Hands-on Oriented Curriculum and Laboratory Development for Embedded System Design," ACM SIGBED Review, Vol. 6, Issue 1, No. 3, January 2009.

l Yu-Lun Huang, Shiuhpyng Shieh, Jian-Chuan Wang, “Efficient Key Distribution Schemes for Secure Media Delivery in Pay-TV Systems,” IEEE Transactions on Multimedia, Vol. 6, Issue 5, October 2004, pp. 760-769

l Shiuhpyng Shieh, Ya-Chin Tsai, Yu-Lun Huang, “Optimal Information Dispersal for Fault-Tolerant Wireless Communication,” IEEE Transactions on Reliability, Vol. 52, Issue 3, September 2003, pp. 354-366.

l Shiuhpyng Shieh, Fu-Shen Ho, Yu-Lun Huang, and Jia-Ning Luo, “NETWORK ADDRESS TRANSLATORS: Effects on Security Protocols and Applications in the TCP/IP Stacks,” IEEE Internet Computing, Vol. 4, No. 6, November/December 2000, pp. 42-49.

l Yu-Lun Huang, Shiuhpyng Shieh, Fu-Shen Ho, "A Generic Electronic Payment Model Supporting Multiple Merchant Transactions," Computers and Security, Vol. 19, No. 5, 2000, pp. 453-465.

l Shiuhpyng Shieh, Fu-Shen Ho, Yu-Lun Huang, "An Efficient Authentication Protocol for Mobile Networks," Journal of Information Science and Engineering, Vol.15 No.4, July 1999, pp. 505-520.

(Conference Papers)

l Yu-Lun Huang, Ya-Hsuan Wang, “ Investigating the Security Control of a Water System: An Overview,” in 9th Asian Control Conference, Istanbul Turkey, June 23-26, 2013.

l Borting Chen, Chien-Yu Lai, Yu-Lun Huang, “A Performance Mapping Model for Physical-to-Virtual Migration,” in proceedings of the Seventh IEEE International Conference on Software Security and Reliability (SERE ‘13), Washington D. C., June 18-20, 2013.

l Yu-Lun Huang, Borting Chen, Ming-Wei Shih, Chien-Yu Lai, “Security Impacts of Virtualization on a Network Testbed,” in the Sixth IEEE International Conference on Software Security and Reliability (SERE ‘12), Washington D. C., June 20-22, 2012.

l Borting Chen, Chia-Chi Wu, Yi-Chi Huang, Yu-Lun Huang, “START: a Selective Thresholding Augmented Reality Toolkit,” The 8th Asian Control Conference, Kaohsiung, Taiwan, May 15-18, 2011.

l Alvaro Cardenas, Saurabh Amin, Zong-Syun Lin, Yu-Lun Huang, Chi-Yen Huang and Shankar Sastry, "Attacks Against Process Control Systems: Risk Assessment, Detection, and Response," in the proceedings of the ACM Symposium on Information, Computer and Communications Security (AsiaCCS ‘11), March 22-24, HongKong, 2011. (Acceptance Rate: 35/217=16%)

l Bo-Ting Chen, Yu-Lun Huang, "The Design and Implementation of a Multi-core Supported Network Intrusion Detection System," The 20th Cryptology and Information Security Conference (CISC ‘10), Hsinchu Taiwan, May 27-28, 2010. (Acceptance Rate: 43/70 = 61%)

l Yu-Lun Huang, Chih-Ya Shen, Shiuhpyng Shieh, Hung-Jui Wang, Cheng-Chun Lin, "Provable Secure AKA Scheme with Reliable Key Delegation in UMTS," The 3rd IEEE International Conference on Secure Software Integration Reliability Improvement, Shanghai, China, July 8-10, 2009. (Acceptance Rate: 29/130+ = 23%)

l Zong-Syun Lin, Alvaro Cardenas, Hsin-Yi Tsai, Saurabh Amin, Yu-Lun Huang and Shankar Sastry, “Understanding the Physical Consequences of Attacks on Control Systems, ”Third Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 22-25, 2009.

l Zong-Syun Lin, Alvaro Cardenas, Saurabh Amin, Yu-Lun Huang, Chi-Yen Huang and Shankar Sastry, "Security Analysis for Process Control Systems," 16th ACM Conference on Computer and Communications Security (CCS ‘09), November 9-13, Chicago, IL, USA. (Acceptance Rate: 58/315=18.4%)

l Chia-Chi Wu, Shih-Ying Wu, Yu-Lun Huang, " A Realization of Assistive Devices for Health-Care Applications using a Panel PC, " in the proceeding of 2009 CACS Automatic Control Conference, November 27-29, 2009.

l Yu-Lun Huang, Hsiaoying Lin, Doug Tygar, Shiuhpyng Shieh et al., “SWOON: A Testbed for Secure Wireless Overlay Networks, ”USENIX Workshop on Cyber Security Experimentation and Test (CSET ‘08), 2008. (Acceptance Rate: 9/27 = 33%)

l Ching-You Hung, Un-Pan Ian, Yu-Lun Huang, "On Designing a Flexible Software Framework of Assistive Devices for Health-Care Applications, " in the proceeding of 2008 CACS Automatic Control Conference, November 21-23, 2008.

l Yu-Lun Huang, Jwu-Sheng Hu, “Design Methodology and Hands-on Practices for Embedded Operating Systems,” The 1st Asia-Pacific Workshop on Embedded System Education and Research (APESER ‘07), December 7, 2007.

l Yu-Lun Huang, Pei-Hua Lu, M. Newlin Rajkumar, Chen-Tao Hsu, “Secure and Fast Authentication Protocol for Wireless Networks in Homecare Systems,” in the proceeding of 2007 CACS Automatic Control Conference, November 9-10, 2007.

l Yu-Lun Huang, En-Chieh Hsia, Jwu-Sheng Hu, “The Design and Implementation of an Embedded Software Architecture for Intelligent Robots (ESAIR), ” in the proceeding of International Conference on Open Source, November 1-4, 2007.

l Yu-Lun Huang, Jwu-Sheng Hu, “The Curriculum and Teaching Laboratory for Embedded Systems,” 2007 Workshop on Embedded System Education, Salzburg, Austria, October 4-5, 2007.

l Yu-Lun Huang, M. Newlin Rajkumar, En-Chieh Hsia, “A Hybrid Network and Software Architecture for Digital Home Care Systems,” in the proceeding of 2006 CACS Automatic Control Conference, November 10-11, 2006.

l John K Zao, Jwu-Sheng Hu, Jin-Chern Chiou, Yu-Lun Huang, Shu-Chen Li, Zee-Yih Kuo, Ming-Chuen Chuang, Shang-Hwa Hsu, Yu-Chee Tseng, Jane W. S. Liu, Chin-Teng Lin, “Kannon: Ubiquitous Sensor/Actuator Technologies for Elderly Living and Care: A Multidisciplinary Effort in National Chiao Tung University, Taiwan”, IEEE International Conference on Systems, Man and Cybernetics, 2006 (ICSMC ‘06), Vol. 5, October 8-11 2006, pp. 4297–4303.

l Yu-Lun Huang, Fu-Shen Ho, Hsin-Yi Tsai, Huan-Ming Kao, “A Control Flow Obfuscation Method to Discourage Malicious Tampering of Software Codes,” in the proceedings of the ACM Symposium on Information, Computer and Communications Security (AsiaCCS ‘06), Taipei, Taiwan, March 21-24, 2006. (Acceptance Rate: 33/186=18%)

l Yu-Lun Huang, Fu-Shen Ho, En-Chieh Hsia, Chin-Chao Tsao, “A Multi-Interface Control Infrastructure for Bio-Sensing Devices in Home Care Systems, " the 2005 CACS Automatic Control Conference, November 17-19, 2005

l Yu-Lun Huang, Jwu-Sheng Hu, “A Teaching Laboratory and Course Programs for Embedded Software Design”, the iCEER-2005 iNEER Conference for Engineering Education and Research, March 1-5, 2005.

l Fu-Shen Ho, Shiuhpyng Shieh, Yu-Lun Huang, Kuan-Lai Tsai, “A Service Probing and Channel Establishment Protocol across Multiple Network Address Translation Realms,” the Proceedings of 2002 International Computer Symposium, December 18–21, 2002

l Yu-Lun Huang, Shiuhpyng Shieh, Jian-Chuan Wang, "Practical Key Distribution Schemes for Channel Protection," The 24th IEEE Computer Society International Computer Software and Applications Conference, October 2000.

l Yu-Lun Huang, Shiuhpyng Shieh, "A Fair Settlement Protocol for Online Transactions," Information Security Conference, May 2000.

l Fu-Shen Ho, Shiuhpyng Shieh, Yu-Lun Huang, "An Efficient Authentication Protocol for Mobile Networks," International Conference on Computer System Technologies for Industrial Applications, April 1997.

l Shiuhpyng Shieh, Yu-Lun Huang, Fu-Shen Ho, "A Family of Secure Network Protocols," the Proceedings of Information Security Conference, May 1996.

(Patents)

l Yueh-Ju Lee, Shang-Pin Chang, Phuong Luong, Hang Shi, Frank. Lin, Yu-Lun Huang, “Non-Intrusive PSQM/PESQ Voice Quality Measurement,” US patent No. 7299176, November 2007.

l Shiuhpyng Shieh, Yu-Lun Huang, “Smart Card-Based Key Distribution Schemes in Conditional Access Systems,” ROC patent no. 203525, May 2004 – October 2022.

l Shiuhpyng Shieh, Yu-Lun Huang, Fu-Shen Ho, "A Generic Payment Method Supporting Multiple Merchants and its Applications," ROC patent no. 87106480, December 1999.

l Shiuhpyng Shieh, Yu-Lun Huang, Fu-Shen Ho, "Method and System for Online Transactions Involving Multiple Merchants," US patent pending, November 1999.

l Shiuhpyng Shieh, Wen-Her Yang, Fu-Shen Ho, Hsiang-Ting Cheng, Yu-Lun Huang, "An Authentication System for Computer Networks," ROC patent no. 079094, June 1996.