{"id":2,"date":"2025-03-31T10:33:08","date_gmt":"2025-03-31T17:33:08","guid":{"rendered":"https:\/\/faculty.engineering.asu.edu\/gahn\/?page_id=2"},"modified":"2026-02-20T14:11:01","modified_gmt":"2026-02-20T21:11:01","slug":"welcome","status":"publish","type":"page","link":"https:\/\/faculty.engineering.asu.edu\/gahn\/","title":{"rendered":""},"content":{"rendered":"<div class=\"uds-hero-sm alignfull has-btn-row \" style=\"margin-bottom:var(--wp--preset--spacing--uds-size-6);\"><div class=\"hero-overlay\"><\/div><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/faculty.engineering.asu.edu\/gahn\/wp-content\/uploads\/sites\/238\/2025\/03\/philipp-katzenberger-iIJrUoeRoCQ-unsplash-scaled.jpg\" class=\"hero\" alt=\"Closeup photo of a turned on laptop. Blue keys, dark background.\" srcset=\"https:\/\/faculty.engineering.asu.edu\/gahn\/wp-content\/uploads\/sites\/238\/2025\/03\/philipp-katzenberger-iIJrUoeRoCQ-unsplash-scaled.jpg 2560w, https:\/\/faculty.engineering.asu.edu\/gahn\/wp-content\/uploads\/sites\/238\/2025\/03\/philipp-katzenberger-iIJrUoeRoCQ-unsplash-500x333.jpg 500w, https:\/\/faculty.engineering.asu.edu\/gahn\/wp-content\/uploads\/sites\/238\/2025\/03\/philipp-katzenberger-iIJrUoeRoCQ-unsplash-1500x1000.jpg 1500w, https:\/\/faculty.engineering.asu.edu\/gahn\/wp-content\/uploads\/sites\/238\/2025\/03\/philipp-katzenberger-iIJrUoeRoCQ-unsplash-1000x667.jpg 1000w, https:\/\/faculty.engineering.asu.edu\/gahn\/wp-content\/uploads\/sites\/238\/2025\/03\/philipp-katzenberger-iIJrUoeRoCQ-unsplash-1536x1024.jpg 1536w, https:\/\/faculty.engineering.asu.edu\/gahn\/wp-content\/uploads\/sites\/238\/2025\/03\/philipp-katzenberger-iIJrUoeRoCQ-unsplash-2048x1365.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><div class=\"acf-innerblocks-container\">\n\n\n\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n<h1 class=\"wp-block-heading has-white-color has-text-color\">Gail-Joon Ahn<\/h1>\n\n<\/div><\/div>\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:70%\">\n<p>Prof. Ahn is Founding Director of Laboratory of Security Engineering for Future Computing (<a href=\"http:\/\/sefcom.asu.edu\/\">SEFCOM<\/a>) and Center for Cybersecurity and Trusted Foundations (<a href=\"https:\/\/ctf.asu.edu\">CTF<\/a>). His principal research and teaching interests are in information and systems security. His research foci include security analytics and big data driven security intelligence, vulnerability and risk management, access control and security architecture for distributed systems, identity and privacy management, cyber crime analysis, security-enhanced computing platforms, and formal models for computer security. His research has been supported by National Science Foundation (NSF), National Security Agency (NSA), Department of Defense (DoD), Office of Naval Research (ONR), Army Research Office (ARO), Department of Justice (DoJ), Department of Energy (DoE), Bank of America, CISCO, GoDaddy, Hewlett Packard, Freeport McMoRan Copper &amp; Gold, Google, Samsung, Intel, Microsoft and Robert Wood Johnson Foundation. In addition, he has received 10 U.S. patents and is a Certified Information Systems Security Professional (CISSP). He is also a Fellow of IEEE and ACM.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li> Visit <a href=\"https:\/\/scholar.google.com\/citations?hl=en&amp;user=_dzO69sAAAAJ\">Google Scholar<\/a> and <a href=\"https:\/\/www.linkedin.com\/in\/gail-joon-ahn-3a59b411\/\">LinkedIn<\/a> profiles for more details.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">News and Highlights<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>How ASU&#8217;s SEFCOM is changing&#8230;, <a href=\"https:\/\/www.statepress.com\/article\/2025\/12\/security-engineering-future-computing\" data-type=\"link\" data-id=\"https:\/\/news.asu.edu\/20250527-science-and-technology-keys-clues-and-crypto-how-asu-researchers-are-building-smarter-tech\">The State Press,<\/a> December 2025.<\/li>\n\n\n\n<li>Keys, clues and crypto &#8230;, <a href=\"https:\/\/news.asu.edu\/20250527-science-and-technology-keys-clues-and-crypto-how-asu-researchers-are-building-smarter-tech\" data-type=\"link\" data-id=\"https:\/\/news.asu.edu\/20250527-science-and-technology-keys-clues-and-crypto-how-asu-researchers-are-building-smarter-tech\">ASU News,<\/a> May 2025.<\/li>\n\n\n\n<li>Cybersecurity trailblazer honored &#8230;,&nbsp;<a href=\"https:\/\/fullcircle.asu.edu\/faculty\/cybersecurity-trailblazer-honored-with-prestigious-award\/\">ASU Full Circle<\/a>, Nov 1, 2024.<\/li>\n\n\n\n<li>Research achievements earn &#8230;,&nbsp;<a href=\"https:\/\/fullcircle.asu.edu\/faculty\/gail-joon-ahn-named-ieee-fellow\/\">ASU Full Circle<\/a>, Jan 10, 2023.<\/li>\n\n\n\n<li>ASU center, Samsung Electronics announce &#8230;,&nbsp;<a href=\"https:\/\/news.asu.edu\/20170103-asu-center-samsung-electronics-announce-cybersecurity-partnership\">ASU News<\/a>, Jan 3, 2017.<\/li>\n\n\n\n<li>ASU research center, Allstate partner to &#8230;,&nbsp;<a href=\"http:\/\/fullcircle.asu.edu\/research\/asu-center-allstate-partner-to-address-cybersecurity-challenges\/\">ASU Full Circle<\/a>, July 12, 2016.<\/li>\n\n\n\n<li>Allstate Pledges $1.5M for ASU&#8217;s CDF&#8230;,&nbsp;<a href=\"http:\/\/www.infosecurity-magazine.com\/news\/allstate-pledges-15mn-for-arizona\">Infosecurity Magazine<\/a>, June 21, 2016.<\/li>\n\n\n\n<li>ASU center, Allstate partner to address cybersecurity&#8230;,&nbsp;<a href=\"https:\/\/asunow.asu.edu\/20160608-asu-center-allstate-partner-address-cybersecurity-challenges\">ASU Now<\/a>, June 17, 2016.<\/li>\n\n\n\n<li>Clark County Water Reclamanation District computer&#8230;,&nbsp;<a href=\"http:\/\/www.reviewjournal.com\/news\/las-vegas\/clark-county-water-reclamation-district-computer-system-hacked\">Las Vegas Review Journal<\/a>, March 8, 2016.<\/li>\n\n\n\n<li>The State of US Cybersecurity,&nbsp;<a href=\"https:\/\/asunow.asu.edu\/20160209-state-us-cybersecurity\">ASU Now<\/a>, February 9, 2016.<\/li>\n\n\n\n<li>Cybersecurity expert recognized &#8230;,&nbsp;<a href=\"http:\/\/fullcircle.asu.edu\/faculty\/cybersecurity-expert-recognized-among-worlds-top-computing-professionals\/\">ASU Full Circle<\/a>, December 17, 2015.<\/li>\n\n\n\n<li>ASU engineers working &#8230; nation&#8217;s energy delivery systems &#8230;,&nbsp;<a href=\"http:\/\/fullcircle.asu.edu\/research\/asu-engineers-working-to-protect-nations-energy-delivery-systems-from-cyber-at\/tacks\/\">ASU Full <\/a><a href=\"https:\/\/news.asu.edu\/20151125-asu-engineers-working-protect-nation\u2019s-energy-delivery-systems-cyber-attacks\">Circle<\/a>, November 20, 2015.<\/li>\n\n\n\n<li>&#8230; university is approaching the &#8216;wicked problem&#8217; &#8230;&nbsp;<a href=\"http:\/\/www.csmonitor.com\/World\/Passcode\/2015\/0930\/How-one-university-is-approaching-the-wicked-problem-of-cyberse\/curity\">T<\/a><a href=\"https:\/\/www.csmonitor.com\/World\/Passcode\/2015\/0930\/How-one-university-is-approaching-the-wicked-problem-of-cybersecurity\">he Christian Science Monitor<\/a>, September 30, 2015.<\/li>\n\n\n\n<li>New ASU Cybercurity Center &#8230;&nbsp;<a href=\"https:\/\/asunow.asu.edu\/content\/new-asu-cybersecurity-center-proactively-look-protecting-data\">ASU Now<\/a>, September 22, 2015.<\/li>\n\n\n\n<li>Team FLOWGUARD wins third place in national &#8230;,&nbsp;<a href=\"http:\/\/fullcircle.asu.edu\/alumni\/team-flowguard-wins-third-place-in-national-innovation-challenge\/\">ASU Full Circle<\/a>, August 19, 2015.<\/li>\n\n\n\n<li>Working to make mobile payment more secure,&nbsp;<a href=\"https:\/\/asunews.asu.edu\/20141219-making-mobile-payment-secure\">ASU Now<\/a>, December 19, 2014.<\/li>\n\n\n\n<li>Website live streaming unsecured webcams,&nbsp;<a href=\"http:\/\/www.usatoday.com\/story\/news\/nation\/2014\/11\/19\/live-stream-unsecured-webcams\/19289821\/\">USA Today<\/a>, November 13, 2014.<\/li>\n\n\n\n<li>Highlighted ACM CCS 2014,&nbsp;<a href=\"http:\/\/fullcircle.asu.edu\/faculty\/organizing-conferences-worth-the-effort\/\">ASU Full Clrcle<\/a>, Octobre 23, 2014.<\/li>\n\n\n\n<li>Google Fiber expansion chang..,<a href=\"http:\/\/www.statepress.com\/2014\/03\/04\/google-fiber-expansion-changes-outlook-on-computer-technology\/\">&nbsp;The State Press<\/a>, March 4, 2014.<\/li>\n\n\n\n<li>Windows 8 picture passwords &#8230;,&nbsp;<a href=\"http:\/\/www.informationweek.com\/security\/vulnerabilities\/windows-8-picture-passwords-easily-crack\/240160625\">InformationWeek<\/a>&nbsp;and&nbsp;<a href=\"http:\/\/www.welivesecurity.com\/2013\/08\/30\/windows-8-picture-passwords-\/can-be-cracked-researchers-warn\/\">WeLiveSecurity<\/a>, August 30, 2013.<\/li>\n\n\n\n<li>Picture password system promising &#8230;,&nbsp;<a href=\"http:\/\/fullcircle.asu.edu\/faculty\/picture-password-system-promising-to-strengthen-online-security\/\">ASU Full Circle<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/asunews.asu.edu\/20130807-ahn-password-protection\">ASU NSU No<\/a>w, August 7, 2013.<\/li>\n\n\n\n<li>ASU scientist patents security process,&nbsp;<a href=\"http:\/\/www.bizjournals.com\/phoenix\/print-edition\/2013\/06\/14\/technology-asu-scientist-patents.html\">Phoenix Business Journal<\/a>, June 14, 2013.<\/li>\n\n\n\n<li>Patented system bolsters security &#8230;,&nbsp;<a href=\"http:\/\/fullcircle.asu.edu\/faculty\/patented-system-bolsters-security-of-information-stored-on-electronic-devices\/\">ASU Full Circle<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/asunews.asu.edu\/20130520_Ahn_digital_security\">ASU Now<\/a>, May 20, 2013<\/li>\n\n\n\n<li>Homeland security must &#8230;,<a href=\"http:\/\/www.tucsonsentinel.com\/nationworld\/report\/022613_homeland_defense\/napolitano-homeland-security-must\/-include-cyberspace\/629\/\">&nbsp;Tucson Sentinel<\/a>, Feb 26, 2013<\/li>\n\n\n\n<li>Making mobile computing more secure,&nbsp;<a href=\"http:\/\/fullcircle.asu.edu\/faculty\/making-mobile-computing-more-secure\/\">ASU Full Circle<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/asunews.asu.edu\/20100818_gailjoonahnsecurity\">ASU Now<\/a>, August 18, 2010.<\/li>\n\n\n\n<li>Greeting unwanted visitors,&nbsp;<a href=\"http:\/\/www.bizjournals.com\/charlotte\/stories\/2007\/04\/16\/focus1.html?page=all\">Charlotte Business Journal<\/a>, April 16, 2007.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\"><div class=\"uds-person-profile is-style-small\" style=\"\"><div class=\"profile-img-container\"><div class=\"profile-img-placeholder\"><img src=\"https:\/\/webapp4.asu.edu\/photo-ws\/directory_photo\/1258895?blankImage2=1\" class=\"profile-img\" alt=\"Portrait of Gail-Joon Ahn\" decoding=\"async\" loading=\"lazy\"><\/div><\/div><div class=\"person\"><h3 class=\"person-name\">Gail-Joon Ahn<\/h3><div class=\"person-profession\"><h4><span>Professor<\/span><\/h4><h4><span>School of Computing and Augmented Intelligence<\/span><\/h4><\/div><ul class=\"person-contact-info\"><li><a href=\"mailto:gahn@asu.edu\" aria-label=\"Mail to: gahn@asu.edu\" data-ga-event=\"link\" data-ga-action=\"click\" data-ga-name=\"onclick\" data-ga-type=\"internal link\" data-ga-region=\"main content\" data-ga-section=\"gahn1\" data-ga=\"gahn@asu.edu\">gahn@asu.edu<\/a><\/li><li><a href=\"tel:480-965-9007\" aria-label=\"User phone number: 480-965-9007\" data-ga-event=\"link\" data-ga-action=\"click\" data-ga-name=\"onclick\" data-ga-type=\"internal link\" data-ga-region=\"main content\" data-ga-section=\"gahn1\" data-ga=\"480-965-9007\">480-965-9007<\/a><\/li><li>BYENG 446<\/li><\/ul><a href=\"https:\/\/search.asu.edu\/profile\/1258895\" class=\"btn btn-maroon btn-md\">View profile<\/a><\/div><\/div><\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p class=\"mb-2\">Prof. Ahn is Founding Director of Laboratory of Security Engineering for Future Computing (SEFCOM) and Center for Cybersecurity and Trusted Foundations (CTF). His principal research and teaching interests are in information and systems security. His research foci include security analytics and big data driven security intelligence, vulnerability and risk management, access control and security architecture&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-2","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/faculty.engineering.asu.edu\/gahn\/wp-json\/wp\/v2\/pages\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/faculty.engineering.asu.edu\/gahn\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/faculty.engineering.asu.edu\/gahn\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/faculty.engineering.asu.edu\/gahn\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/faculty.engineering.asu.edu\/gahn\/wp-json\/wp\/v2\/comments?post=2"}],"version-history":[{"count":1,"href":"https:\/\/faculty.engineering.asu.edu\/gahn\/wp-json\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":48,"href":"https:\/\/faculty.engineering.asu.edu\/gahn\/wp-json\/wp\/v2\/pages\/2\/revisions\/48"}],"wp:attachment":[{"href":"https:\/\/faculty.engineering.asu.edu\/gahn\/wp-json\/wp\/v2\/media?parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}