{"id":11,"date":"2017-06-23T03:56:19","date_gmt":"2017-06-23T03:56:19","guid":{"rendered":"http:\/\/mooney.gatech.edu\/security\/?page_id=11"},"modified":"2025-08-25T17:13:05","modified_gmt":"2025-08-25T21:13:05","slug":"people","status":"publish","type":"page","link":"https:\/\/mooney.gatech.edu\/security\/people\/","title":{"rendered":"People"},"content":{"rendered":"<h1><span style=\"font-size: 24pt;\">People<\/span><\/h1>\n<h2>Professor<\/h2>\n<p><a href=\"http:\/\/mooney.gatech.edu\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium alignnone\" src=\"http:\/\/mooney.gatech.edu\/131023AR041.jpg\" alt=\"Photo of Dr. Vincent J. Mooney\" width=\"133\" height=\"200\" \/><br \/>\n<\/a><a href=\"http:\/\/mooney.gatech.edu\" target=\"_blank\" rel=\"noopener\">Vincent J. Mooney<\/a><\/p>\n<h2>Graduate Students<\/h2>\n<table style=\"width: 91.8965%; height: 572px;\" border=\"0\">\n<tbody>\n<tr style=\"height: 459px;\">\n<td style=\"width: 548.9px; height: 459px;\"><a href=\"http:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2022\/11\/Image.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-308 alignright\" src=\"http:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2022\/11\/Image-300x271.jpeg\" alt=\"\" width=\"278\" height=\"251\" srcset=\"https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2022\/11\/Image-300x271.jpeg 300w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2022\/11\/Image.jpeg 581w\" sizes=\"auto, (max-width: 278px) 100vw, 278px\" \/><\/a><\/p>\n<p>Allahverdi, Arman<\/td>\n<\/tr>\n<tr style=\"height: 41px;\">\n<td style=\"width: 548.9px; height: 41px;\">&nbsp;<\/p>\n<p>Ahmad, Kareem<a href=\"http:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2025\/08\/kareem.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-687 alignright\" src=\"http:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2025\/08\/kareem-298x300.jpg\" alt=\"\" width=\"298\" height=\"300\" srcset=\"https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2025\/08\/kareem-298x300.jpg 298w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2025\/08\/kareem-150x150.jpg 150w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2025\/08\/kareem-100x100.jpg 100w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2025\/08\/kareem.jpg 540w\" sizes=\"auto, (max-width: 298px) 100vw, 298px\" \/><\/a><\/td>\n<\/tr>\n<tr style=\"height: 10px;\">\n<td style=\"width: 548.9px; height: 10px;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Alumni<\/h2>\n<h3>Ph.D.<\/h3>\n<table style=\"width: 100%;\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 20.1724%;\"><\/td>\n<td style=\"width: 45.5172%;\"><strong>Thesis Title<\/strong><\/td>\n<td style=\"width: 34.1379%;\"><strong>Contact<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20.1724%;\"><a href=\"http:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2025\/08\/kevin.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-689\" src=\"http:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2025\/08\/kevin-300x200.jpg\" alt=\"\" width=\"119\" height=\"79\" srcset=\"https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2025\/08\/kevin-300x200.jpg 300w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2025\/08\/kevin-1024x683.jpg 1024w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2025\/08\/kevin-768x512.jpg 768w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2025\/08\/kevin-1536x1024.jpg 1536w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2025\/08\/kevin.jpg 1920w\" sizes=\"auto, (max-width: 119px) 100vw, 119px\" \/><\/a><\/p>\n<p>Hutto, Kevin<\/td>\n<td style=\"width: 45.5172%;\"><a href=\"https:\/\/repository.gatech.edu\/entities\/publication\/436fda5f-29ac-45fd-ae6b-4ce849281073\"> Remote Sensor Security Through Encoded Computation and Cryptographic Signatures<\/a><\/td>\n<td style=\"width: 34.1379%;\"><strong>\u00a0<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20.1724%;\"><a href=\"http:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2017\/06\/IMG_2925.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-182\" src=\"http:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2017\/06\/IMG_2925-225x300.jpeg\" alt=\"\" width=\"150\" height=\"200\" srcset=\"https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2017\/06\/IMG_2925-225x300.jpeg 225w, https:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2017\/06\/IMG_2925-768x1024.jpeg 768w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p>Chen, Yu-Cheng<\/td>\n<td style=\"width: 45.5172%;\"><a href=\"http:\/\/hdl.handle.net\/1853\/66586\">Cyber Threat Propagation Modeling In Cyber Physical Systems<\/a><\/td>\n<td style=\"width: 34.1379%;\"><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20.1724%;\">Webhe, Taimour<\/td>\n<td style=\"width: 45.5172%;\"><span style=\"font-size: medium;\"><a href=\"http:\/\/hdl.handle.net\/1853\/60798\">Medical Device Security Through Hardware Signatures<\/a><br \/>\n<\/span><\/td>\n<td style=\"width: 34.1379%;\"><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20.1724%;\">Akgul, Tankut<\/td>\n<td style=\"width: 45.5172%;\"><span style=\"font-size: medium;\"><a href=\"http:\/\/mooney.gatech.edu\/codesign\/publications\/tankut\/publications.html\">Assembly Instruction Level Reverse Execution for Debugging<\/a><\/span><\/td>\n<td style=\"width: 34.1379%;\"><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20.1724%;\">Akgul, Bilge Ebru Saglam<\/td>\n<td style=\"width: 45.5172%;\"><a href=\"https:\/\/smartech.gatech.edu\/xmlui\/handle\/1853\/5253\">The System-on-a-Chip Lock Cache<\/a><\/td>\n<td style=\"width: 34.1379%;\">bilge[-]tabitek.com<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20.1724%;\"><a href=\"http:\/\/as.nida.ac.th\/~pramote\">Kuacharoen, Pramote<\/a><\/td>\n<td style=\"width: 45.5172%;\"><a href=\"https:\/\/smartech.gatech.edu\/xmlui\/handle\/1853\/5252\">Embedded Software Streaming via Block Streaming<\/a><\/td>\n<td style=\"width: 34.1379%;\">pramote[-]as.nida.ac.th<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20.1724%;\"><a href=\"http:\/\/www.ece.iupui.edu\/~johnlee\">Lee, Jaehwan (John)<\/a><\/td>\n<td style=\"width: 45.5172%;\"><a href=\"https:\/\/smartech.gatech.edu\/xmlui\/handle\/1853\/4938\">Hardware\/Software Deadlock Avoidance for Multiprocessor Multiresource System-on-a-Chip<\/a><\/td>\n<td style=\"width: 34.1379%;\">\u00a0johnlee[-]iupui.edu<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20.1724%;\">Park, Jun Cheo<\/td>\n<td style=\"width: 45.5172%;\"><a href=\"https:\/\/smartech.gatech.edu\/xmlui\/handle\/1853\/7283\">Sleepy Stack: a New Approach to Low Power VLSI and Memory\u00a0<\/a><\/td>\n<td style=\"width: 34.1379%;\">\u00a0juncheol.park[-]intel.com<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20.1724%;\">Ryu, Kyeong-Keol<\/td>\n<td style=\"width: 45.5172%;\"><span style=\"font-size: medium;\"><a href=\"https:\/\/smartech.gatech.edu\/xmlui\/handle\/1853\/6556\">Automated Bus Generation for Multiprocessor SoC Design <\/a><\/span><\/td>\n<td style=\"width: 34.1379%;\">\u00a0kkryu[-]telecis.com<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20.1724%;\">Shalan, Mohamed<\/td>\n<td style=\"width: 45.5172%;\"><span style=\"font-size: medium;\"><a href=\"https:\/\/smartech.gatech.edu\/xmlui\/handle\/1853\/5304\">Dynamic Memory Management for Embedded Real-Time Multiprocessor System-on-a-Chip<\/a><br \/>\n<\/span><\/td>\n<td style=\"width: 34.1379%;\">mshalan[-]aucegypt.edu<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20.1724%;\">Shin, Eung<\/td>\n<td style=\"width: 45.5172%;\"><span style=\"font-size: medium;\"><a href=\"https:\/\/smartech.gatech.edu\/xmlui\/handle\/1853\/5280\">Automated Generation of Round-robin Arbitration and Crossbar Switch Logic<\/a><\/span><\/td>\n<td style=\"width: 34.1379%;\">eung.shin[-]samsung.com<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 20.1724%;\">Tan, Yudong<\/td>\n<td style=\"width: 45.5172%;\"><span style=\"font-size: medium;\"><a href=\"https:\/\/smartech.gatech.edu\/xmlui\/handle\/1853\/6919\">Cache Design and Timing Analysis for Preemptive Multi-tasking Real-Time Uniprocessor Systems<\/a><\/span><\/td>\n<td style=\"width: 34.1379%;\">\u00a0ytan[-]nvidia.com<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>M.S.<\/h3>\n<table border=\"0\">\n<tbody>\n<tr>\n<td><strong>Name<\/strong><\/td>\n<td><strong>Year Graduated<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Boyapati, Vishnu<\/td>\n<td>2023<\/td>\n<\/tr>\n<tr>\n<td>Vunnam, Yathiendra<\/td>\n<td>2023<\/td>\n<\/tr>\n<tr>\n<td><a href=\"http:\/\/assil.me\">Ksiksi, Assil<\/a><\/td>\n<td>2018<\/td>\n<\/tr>\n<tr>\n<td>Parham, Nicholas B.<\/td>\n<td>2015<\/td>\n<\/tr>\n<tr>\n<td>Divekar, Kshitij<\/td>\n<td>2014<\/td>\n<\/tr>\n<tr>\n<td>Gbade-Alabi, Aderinola<\/td>\n<td>2014<\/td>\n<\/tr>\n<tr>\n<td>Dhoot, Charvi<\/td>\n<td>2012, IIIT-Hyderabad<\/td>\n<\/tr>\n<tr>\n<td>Singh, Anshul<\/td>\n<td>2011, IIIT-Hyderabad<\/td>\n<\/tr>\n<tr>\n<td>Gupta, Aman<\/td>\n<td>2011, IIIT-Hyderabad<\/td>\n<\/tr>\n<tr>\n<td>Zhao, Lei<\/td>\n<td>2008<\/td>\n<\/tr>\n<tr>\n<td>Heard, Michael<\/td>\n<td>2006<\/td>\n<\/tr>\n<tr>\n<td>Balasundaram, Arunkumar<\/td>\n<td>2003<\/td>\n<\/tr>\n<tr>\n<td>Jordan, Jeremiah<\/td>\n<td>2002<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>People Professor Vincent J. Mooney Graduate Students Allahverdi, Arman &nbsp; Ahmad, Kareem Alumni Ph.D. Thesis Title Contact Hutto, Kevin Remote Sensor Security Through Encoded Computation and Cryptographic Signatures \u00a0 Chen, Yu-Cheng Cyber Threat Propagation Modeling In Cyber Physical Systems Webhe, Taimour Medical Device Security Through Hardware Signatures Akgul, Tankut Assembly Instruction Level Reverse Execution for &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/mooney.gatech.edu\/security\/people\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;People&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"folder":[],"class_list":["post-11","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/pages\/11","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/comments?post=11"}],"version-history":[{"count":56,"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/pages\/11\/revisions"}],"predecessor-version":[{"id":690,"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/pages\/11\/revisions\/690"}],"wp:attachment":[{"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/media?parent=11"}],"wp:term":[{"taxonomy":"folder","embeddable":true,"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/folder?post=11"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}