Last updated: Jun 15, 2021

Avatar
Insu Jang
I am a Ph.D. student in Computer Science and Engineering at the University of Michigan, advised by Prof. Mosharaf Chowdhury. I am interested in system architecture, distributed computing, heterogeneous computing (GPU, FPGA, SmartNIC, etc), non-volatile memory, and serverless computing.

Education

Publication

  1. [ASPLOS ‘19] Heterogeneous Isolated Execution for Commodity GPUs [paper] [slides]
    Insu Jang, Adrian Tang, Taehoon Kim, Simha Sethumadhavan, and Jaehyuk Huh

Experience

Honors and Awards

  • University Ph.D. Fellowship, from Department of Electrical Engineering and Computer Science, the University of Michigan, 2021 - 2024
  • Korea National Scholarship, from KAIST and Korea Ministry of Science and ICT, 2016 - 2018
  • National Scholarship for Science and Engineering, from Korea Student Aid Foundation (KOSAF), 2014 - 2016
  • 2nd Prize, 2015 Convergence App Contest. from College of Software, Sungkyunkwan University, Dec 2015
  • Deans’ List Award, from Department of Computer Engineering, Sungkyunkwan University, Apr 2015
  • Deans' List Award, from Department of Computer Engineering, Sungkyunkwan University, Oct 2014
  • 1st Prize, 2013 Smart TV and Peripherals Contest. from Korea Ministry of Trade, Industry and Energy, Nov 2013
  • 1st Prize, 2013 Mobile E-learning App Idea Contest. From Korea Ministry of Education, Sep 2013

Research Projects

  • Reimplementing Hyperloop - A research project as a research assistant at KAIST
    Due to a copyright issue, the implementation of Hyperloop is not opened. To perform a research regarding distributed file system based on Hyperloop, we had no choice but to reimplement it by our own way.
    During implementing Hyperloop, we studied Infiniband and RoCE RDMA. Unfortunately, it was not able to reproduce properly in implementing remote-work request manipulation, a key idea of Hyperloop.

  • Heterogeneous Trusted Execution Environment - A research project as a graduate research assistant at KAIST
    HIX extends the protection scope of hardware-based trusted execution environment (TEE) technology to heterogenoues computing devices, e.g. GPUs or FPGAs. Based on the insight that Intel SGX protects the data in address translation (TLB entries are not inserted into the TLB for unauthorized accesses) and modern high performance device access is done through memory-mapped I/O (MMIO), we extended the protection mechanism for accessing device access through MMIO.
    Based on this SGX extension, only an authorized trusted process called the GPU enclave can access the GPU and trusted process use the GPU service through the GPU enclave via encrypted communication.
    A paper has been published to ASPLOS ‘19.