Jaejong Baek
-
699 S Mill Ave M1-38 Tempe, AZ 85281
-
Mail code: 8809Campus: Tempe
-
Jaejong Baek is an Assistant Teaching Professor at ASU. He is currently affiliated with the School of Computing and Augmented Intelligence (SCAI), as well as with the Laboratory of Secure Engineering for Future Computing (SEFCOM), His research focuses on cybersecurity and privacy, and his work spans the areas of telecom and mobile security analysis techniques, access mechanism, digital forensics, and blockchain framework. He worked as an adjunct professor at Howon University teaching network security and cyber warfare. He has a background in military cyber warfare and digital forensic expertise in the navy of South Korea He received a doctorate from Yonsei University in South Korea.
- Ph.D.Computer Science, Yonsei University, Seoul, Korea, 2011
- M.S. Computer Science, Yonsei University, Seoul, Korea, 2001
Mobile security, Authentication, Digital Forensics, Blockchain, Vulnerability Analysis
SEFCOM https://sefcom.asu.edu/
-
Jaejong Baek, P. Soundrapandian, S. Kyung, R. Wang, Y. Shoshitaishvili, A. Doup ́e, G. Ahn, Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer, The 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2023), Porto, Portugal, June 27-30, 2023.
-
L. Claramunt, C. Rubio Medrano, Jaejong Baek, G. Ahn, SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality, The ACM Symposium on Access Control Models and Technologies (SACMAT 2023),Trento, Italy, June 7-9, 2023.
-
C. Rubio Medrano, Pradeep Kumar D S, Matthew Hill, Luis Claramunt, Jaejong Baek, Geetha S, and Gail-Joon Ahn, DyPolDroid: Protecting against permission-abuse attacks in android, Information Systems Frontiers, Springer, October 11, 2022
-
C. Rubio Medrano, Matthew Hill, Luis M Claramunt, Jaejong Baek, Gail-Joon Ahn, DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android, The 9th International Conference Secure Knowledge Management (SKM 2021), San Antonio, TX, USA, October 8–9, 2021.
-
Shammya Saha, Nikhil Ravi, Kari Hreinsson, Jaejong Baek, Anna Scaglione, Nathan G. Johnson, A Secure Distributed Ledger for Transactive Energy: The Electron Volt Exchange (EVE) Blockchain, Applied Energy Journal, Elsevier, January 17, 2021
-
Pradeep Kumar D S, Jaejong Baek, Tiffany Bao, Yan Shoshitaishvili, Adam Doup ́e, Ruoyu Wang, Gail-Joon Ahn, MuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contract, HICSS -54, January 4-9, 2021.
-
Jaejong Baek, Sukwha Kyung, Haehyun Cho, Ziming Zhao, Yan Shoshitaishvili, Adam Doup ́e, Gail-Joon Ahn, Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling, Annual Computer Security Applications Conference (ACSAC 2018), San Juan, PR, USA, December 3–7, 2018.
-
Hong Wang, Jia Liu, Wenjie Yi, Ben Niu and Jaejong Baek, An Improved Brainstorm Optimization with Learning Strategy, The International Conference on Swarm Intelligence (ICSI 2017), Fukuoka, Japan, July 27-August 1, 2017
-
Hong Wang, Lulu Zuo, Jia Liu, Chen Yang, Ya Li and Jaejong Baek, A Comparison of Heuristic Algorithms for Bus Dispatch, The International Conference on Swarm Intelligence (ICSI 2017), Fukuoka, Japan, July 27-August 1, 2017
-
Jaejong Baek, Enhanced Method for Preventing Malware by Detecting of Injection Site, Journal of Korea Institute of Information and Communication Convergence Engineering (JKIICE), Volume 14, No. 2, July 1, 2016
-
Jaejong Baek, Secure Pre-authentication Schemes for Fast Handoff in Proxy Mobile IPv6, The Journal of Information and Communication Convergence Engineering (JICCE), Volume 19, No. 2, June 1, 2016
-
Jaejong Baek, An Enhanced Method using NP-complete Problem in Public Key Cryptography System, Journal of Korea Institute of Information and Communication Convergence Engineering(JKIICE), Volume 19, No. 2, December 1, 2015
-
Jaejong Baek, Byoung-Moo Moon, Cyber Defense Analysis and Improvement of Military Ecosystem with Information Security Industry, Journal of the Korea Institute of Information Security & Cryptology(KIISC), Volume 24, Issue 6, December 2014
-
Kyungjoon Kim, Jaejong Baek, Jooseok Song, A Hierarchical Authentication for Proxy Mobile IPv6 Networks, Journal of the Korea Institute of Information Security & Cryptology (KIISC), Volume 24, Issue 1, February, 2014
-
Fei Shi, Jaejong Baek, Jooseok Song, Weijie Liu, A Novel Scheme to Prevent MAC Layer Misbehavior in IEEE 802.11 Ad Hoc Networks, Telecommunication Systems, Volume 52, Issue 4, pp 2397-2406, April 2013
-
Jaejong Baek, Sunghoon Seo, Fei Shi, Jooseok Song, A Novel Pre-authentication Scheme based on Fast Channel Switching in IEEE 802.11 WLANs, EURASIP Journal on Wireless Communications and Networking, Volume 2012, Issue 1, February 2012
-
Jaejong Baek, Hyojin Kim, Jooseok Song, A WLAN Pre-authentication Scheme Based on Fast Channel Switching for 3G-WLAN Interworking, Journal of the Korea Institute of Information Security & Cryptology(KIISC), Volume 21. February 2012
-
Sunghoon Seo, Jaejong Baek, Donggun Kim, Jooseok Song, VirtFrame: A Sniffing-based Throughput Estimation Scheme in IEEE 802.11 Wireless LANs, Journal of the Korea Information Processing Society (KIPS), Volume 18, Issue 3, June 2011
-
Seokung Yoon, Hyuncheol Jung, Xuemei Che, Gyeongho Chu, Han Park, Jaejong Baek, Jooseok Song, Hyeongseon Yoo, Performance Evaluation of VoIP Secure Communication Protocols based on SIP in Mobile Environments, Journal of the Korea Information Processing Society (KIPS), Volume 18, Issue 3, June 2011
-
Han Park, Che Xuemei, Gyungho Chu, Jaejong Baek, Jooseok Song, Empirical Analysis of Security Protocol in Mobile VoIP System, International Conference on Information Security and Artificial Intelligence (ISAI 2010), Chengdu, China, December 2010
-
Sungrae Kim, Kyungjoon Kim, Jaejong Baek, Jooseok Song, A WLAN Handoff Scheme Based on Selective Channel Scan Using Pre-collected AP Information for VoIP Application, International Conference on Innovations in Information Technology (IIT 2009), Al Ain, UAE, December 2009
-
Jaejong Baek, Jooseok Song, Sunghoon Seo, Multiple Pre-authentication Schemes Based on Fast Channel Switching in Public Wireless LANs, International Conference on Innovations in Information Technology (IIT 2009), Al Ain, UAE, December 2009
-
Jaejong Baek, Jooseok Song, Adaptive Context Transfer Scheme For Fast Handoff in Proxy Mobile IPv6, International Conference on Next Generation Mobile Applications, Services and Technologies (IEEE NGMAST 2008), Cardiff, UK, September 2008
-
Sunghoon Seo, Jonghyup Lee, Jaejong Baek, Jooseok Song, A Survey of WiBro Security in Heterogeneous Wireless Networks, The 3rd Joint Workshop on Information Security (JWIS 2008), Seoul, Korea, July, 2008
Patents
• US11588631, Jaejong Baek, Sukwha Kyung, Gail-Joon Ahn, Systems and Methods for Blockchain-Based Automatic Key Generation, Issued on 02/21/2023
• 63/374493, Luis Claramunt, Carlos Rubio-Medrano, Jaejong Baek, Gail-Joon Ahn, Systems and Methods for a Policy-Governed Content Mediation Model for Mobile Augmented Reality Applications, Filed on 09/02/2022
Other Publications
• L. M. Claramunt, L. P. Epse, C. E. Rubio-Medrano, Jaejong Baek, G. -J.Ahn, Poster: Preventing Spatial and Privacy Attacks in Mobile Augmented Reality Technologies, 2021 IEEE EuropeanSymposium on Security and Privacy (EuroS&P), 09/06/2021
• M. Hill, C. E. Rubio-Medrano, L. M. Claramunt, Jaejong Baek, G. -J.Ahn, Poster: DyPolDroid: User Centered Counter-Policies Against Android Permission-Abuse Attacks, 2021 IEEE European Symposium on Security and Privacy (EuroS&P), 09/06/2021.
Google Scholr Citation
Mobile security, Authentication, Digital Forensics, Blockchain, Vulnerability Analysis
Courses
2025 Spring
Course Number | Course Title |
---|---|
CSE 469 | Computer and Network Forensics |
CSE 580 | Practicum |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 543 | Info Assurance & Security |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
ASU 101-CAI | The ASU Experience |
ASU 101-CAI | The ASU Experience |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
2024 Fall
Course Number | Course Title |
---|---|
CSE 580 | Practicum |
CSE 535 | Mobile Computing |
CSE 535 | Mobile Computing |
ASU 101-CAI | The ASU Experience |
ASU 101-CAI | The ASU Experience |
ASU 101-CAI | The ASU Experience |
CSE 469 | Computer and Network Forensics |
CSE 543 | Info Assurance & Security |
2024 Summer
Course Number | Course Title |
---|---|
CSE 548 | Adv Computer Network Security |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
2024 Spring
Course Number | Course Title |
---|---|
CSE 469 | Computer and Network Forensics |
CSE 580 | Practicum |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 543 | Info Assurance & Security |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
CSE 365 | Information Assurance |
2023 Fall
Course Number | Course Title |
---|---|
CSE 580 | Practicum |
CSE 598 | Special Topics |
CSE 365 | Information Assurance |
CSE 469 | Computer and Network Forensics |
CSE 365 | Information Assurance |
2023 Summer
Course Number | Course Title |
---|---|
CSE 365 | Information Assurance |
2023 Spring
Course Number | Course Title |
---|---|
CSE 469 | Computer and Network Forensics |
CSE 499 | Individualized Instruction |
CSE 580 | Practicum |
2022 Fall
Course Number | Course Title |
---|---|
CEN 580 | Practicum |
CSE 469 | Computer and Network Forensics |
2022 Spring
Course Number | Course Title |
---|---|
CSE 469 | Computer and Network Forensics |
CSE 499 | Individualized Instruction |
2021 Spring
Course Number | Course Title |
---|---|
CSE 469 | Computer and Network Forensics |
2020 Spring
Course Number | Course Title |
---|---|
CSE 469 | Computer and Network Forensics |
Lectures
CSE365
Information Assurance
This course serves as a platform for students to gain a solid understanding of the core aspects of cybersecurity. It presents an all-encompassing exploration of security, navigating from the intricate components of the Central Processing Unit (CPU) and kernel, through to userspace, network infrastructures, and cryptography, culminating in a detailed examination of both browser and HTTP server protocols. Each session will introduce a fresh topic, complemented by an assignment that facilitates hands-on exploration and comprehension of these fundamental cybersecurity concepts.
2023 SUMMER
2023 FALL
CSE469
Computer and Network Forensics
This course discusses the identification, extraction, documentation, interpretation, and preservation of computer media for evidentiary purposes and/or root cause analysis. Topics include techniques for discovering digital evidence; responding to electronic incidents; tracking communications through networks; understanding electronic media, crypto-literacy, data hiding, and system forensics; and the role of forensics in the digital environment.
2023 FALL
CSE598
Engineering Blockchain Applications
This course ensures that learners will be well-versed in blockchain fundamentals. This is designed to put learners on the leading edge by presenting the abstract nature of blockchain technology and emphasizing its broad applicability. Topics include the mathematical and cryptographic underpinnings of the technology, as well as mining, consensus protocols, networking, and decentralized governance.