Kevin Fu

Last updated
Kevin Fu
Professor Kevin Fu (professor of computer science at UMich) testifying to the House Committee on Energy and Commerce.png
Occupation Professor
Academic work
Discipline Computer Science

Kevin Fu is a professor of computer science in the Khoury College of Computer Sciences at Northeastern University [1] known for his contributions to computer security [2] and security for medical devices. [3] [4] [5] Previously, he was a professor at the University of Michigan. [6] [7]

Contents

Education

Fu received his SB in Computer Science in 1998 and MEng in Electrical Engineering and Computer Science in 1999, both from Massachusetts Institute of Technology. [8] [9] Fu completed his PhD as well at MIT in 2005 with a thesis titled "Integrity and access control in untrusted content distribution networks" advised by Ron Rivest and Frans Kaashoek. [10] [8]

Awards

Related Research Articles

<span class="mw-page-title-main">Andrew S. Tanenbaum</span> American-Dutch computer scientist (born 1944)

Andrew Stuart Tanenbaum, sometimes referred to by the handle ast, is an American–Dutch computer scientist and professor emeritus of computer science at the Vrije Universiteit Amsterdam in the Netherlands.

<span class="mw-page-title-main">Shafi Goldwasser</span> Israeli American computer scientist

Shafrira Goldwasser is an Israeli-American computer scientist and winner of the Turing Award in 2012. She is the RSA Professor of Electrical Engineering and Computer Science at Massachusetts Institute of Technology; a professor of mathematical sciences at the Weizmann Institute of Science, Israel; the director of the Simons Institute for the Theory of Computing at the University of California, Berkeley; and co-founder and chief scientist of Duality Technologies.

<span class="mw-page-title-main">Barbara Liskov</span> American computer scientist

Barbara Liskov is an American computer scientist who has made pioneering contributions to programming languages and distributed computing. Her notable work includes the introduction of abstract data types and the accompanying principle of data abstraction, along with the Liskov substitution principle, which applies these ideas to object-oriented programming, subtyping, and inheritance. Her work was recognized with the 2008 Turing Award, the highest distinction in computer science.

Michael Irwin Jordan is an American scientist, professor at the University of California, Berkeley, research scientist at the Inria Paris, and researcher in machine learning, statistics, and artificial intelligence.

<span class="mw-page-title-main">Radia Perlman</span> American software designer and network engineer

Radia Joy Perlman is an American computer programmer and network engineer. She is a major figure in assembling the networks and technology to enable what we now know as the internet. She is most famous for her invention of the Spanning Tree Protocol (STP), which is fundamental to the operation of network bridges, while working for Digital Equipment Corporation, thus earning her nickname "Mother of the Internet". Her innovations have made a huge impact on how networks self-organize and move data. She also made large contributions to many other areas of network design and standardization: for example, enabling today's link-state routing protocols, to be more robust, scalable, and easy to manage.

George Varghese is a Principal Researcher at Microsoft Research. Before joining MSR's lab in Silicon Valley in 2013, he was a Professor of Computer Science at the University of California San Diego, where he led the Internet Algorithms Lab and also worked with the Center for Network Systems and the Center for Internet Epidemiology. He is the author of the textbook Network Algorithmics, published by Morgan Kaufmann in 2004.

Randy Howard Katz is a distinguished professor emeritus at University of California, Berkeley of the electrical engineering and computer science department.

<span class="mw-page-title-main">Gernot Heiser</span> Australian computer scientist

Gernot Heiser is a Scientia Professor and the John Lions Chair for operating systems at UNSW Sydney, where he leads the Trustworthy Systems group (TS).

Dr. Alan Jay Smith is a computer scientist and researcher in the field of development and applications of caching strategies and the measurement and analysis of computer storage systems with many important contributions to the field. He currently is professor emeritus at the EECS faculty of the University of California, Berkeley.

Hari Balakrishnan is the Fujitsu Professor of Computer Science and Artificial Intelligence in the Department of Electrical Engineering and Computer Science at MIT, and the Co-founder and CTO at Cambridge Mobile Telematics.

<span class="mw-page-title-main">Jitendra Malik</span> Indian-American academic (born 1960)

Jitendra Malik is an Indian-American academic who is the Arthur J. Chick Professor of Electrical Engineering and Computer Sciences at the University of California, Berkeley. He is known for his research in computer vision.

Dawn Song is a Chinese American academic and is a professor at the University of California, Berkeley, in the Electrical Engineering and Computer Science Department.

Carl E. Landwehr is an American computer scientist whose research focus is cybersecurity and trustworthy computing. His work has addressed the identification of software vulnerabilities toward high assurance software development, architectures for intrusion-tolerant and multilevel security systems, token-based authentication, and system evaluation and certification methods. In an invited essay for ACSAC 2013, he proposed the idea of developing building codes for building software that is used in critical infrastructures. He has organized an NSF funded workshop to develop a building code and research agenda for medical device software security. The final committee report is available through the Cyber Security and Policy Institute of the George Washington University, and the building code through the IEEE.

Stephanie Forrest is an American computer scientist and director of the Biodesign Center for Biocomputing, Security and Society at the Biodesign Institute at Arizona State University. She was previously Distinguished Professor of Computer Science at the University of New Mexico in Albuquerque. She is best known for her work in adaptive systems, including genetic algorithms, computational immunology, biological modeling, automated software repair, and computer security.

Yunhao Liu is a Chinese computer scientist. He is the Dean of Global Innovation Exchange (GIX) at Tsinghua University.

Anand Sivasubramaniam is Distinguished Professor of Computer Science and Engineering at The Pennsylvania State University. He is well known for his work in computer architecture, computer systems, data centers and computer systems power management.

Latifur Khan joined the University of Texas at Dallas in 2000, where he has been conducting research and teaching as a Professor in the Department of Computer Science.

<span class="mw-page-title-main">Anantha P. Chandrakasan</span> American engineer

Anantha P. Chandrakasan is the Chief Innovation and Strategy Officer, the dean of the School of Engineering, and Vannevar Bush Professor of Electrical Engineering and Computer Science at Massachusetts Institute of Technology. He is chair of the MIT Climate and Sustainability Consortium and MIT AI Hardware Program, and co-chair the MIT–IBM Watson AI Lab, the MIT–Takeda Program, and the MIT and Accenture Convergence Initiative for Industry and Technology.

Jessica Hullman is a computer scientist and the Ginni Rometty associate professor of Computer Science at Northwestern University. She is known for her research in Information visualization.

Luca P. Carloni is a professor and chair of the Department of Computer Science at Columbia University in the City of New York.. He has been on the faculty at Columbia since 2004. He is an international expert on electronic computer-aided design.

References

  1. "Kevin Fu". Northeastern University College of Engineering. Retrieved 2024-01-14.
  2. 1 2 "Kevin Fu". awards.acm.org. Retrieved 2024-01-14.
  3. Gollakota, Shyamnath; Hassanieh, Haitham; Ransford, Benjamin; Katabi, Dina; Fu, Kevin (2011-08-15). "They can hear your heartbeats: non-invasive security for implantable medical devices". ACM SIGCOMM Computer Communication Review. 41 (4): 2–13. doi:10.1145/2043164.2018438. ISSN   0146-4833.
  4. Halperin, Daniel; Heydt-Benjamin, Thomas S.; Ransford, Benjamin; Clark, Shane S.; Defend, Benessa; Morgan, Will; Fu, Kevin; Kohno, Tadayoshi; Maisel, William H. (2008). "Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses". 2008 IEEE Symposium on Security and Privacy (Sp 2008). pp. 129–142. doi:10.1109/SP.2008.31. ISBN   978-0-7695-3168-7 . Retrieved 2024-01-14.
  5. "Award Papers of IEEE Symposium on Security and Privacy". www.ieee-security.org. Retrieved 2024-01-14.
  6. "Kevin Fu". web.eecs.umich.edu. Retrieved 2024-01-14.
  7. "Kevin Fu | USENIX". www.usenix.org. Retrieved 2024-01-14.
  8. 1 2 "Six With Ties to MIT Honored as ACM Fellows – MIT EECS". www.eecs.mit.edu. Retrieved 2024-01-14.
  9. Fu, Kevin. "Kevin Fu CV" (PDF).
  10. Fu, Kevin (2005-09-06). Integrity and access control in untrusted content distribution networks. Massachusetts Institute of Technology. hdl:1721.1/34464.
  11. "Kevin Fu and Raymond Fu Elected AAAS Fellows". Northeastern University College of Engineering. Retrieved 2024-01-14.
  12. "2022 AAAS Fellows". American Association for the Advancement of Science. Retrieved 2024-01-15.
  13. "Kevin Fu Elected IEEE Fellow for Contributions to Embedded and Medical Device Security". Computer Science and Engineering. Retrieved 2024-01-14.
  14. Mansfield, Kathy (2018-04-12). "IEEE Computer Society Members Elevated to Fellow for 2018". IEEE Computer Society. Retrieved 2024-01-14.
  15. "NSF Award Search: Award # 1331652 - CAREER: Computational RFID for Securing Zero-Power Pervasive Devices". www.nsf.gov. Retrieved 2024-01-14.
  16. "NSF Award Search: Award # 0845874 - CAREER: Computational RFID for Securing Zero-Power Pervasive Devices". www.nsf.gov. Retrieved 2024-01-14.