Jie-Ren (Jarron) Shih
Software Developerskills
Skill | Keywords |
---|---|
Programing | Python, Javascript, C/C++, HTML/CSS, |
DevOps | Docker, Jenkins, CI/CD, Monitor/Alert, Unittest, |
Cloud Skills | AWS, ECS, Kubernetes, Docker Swarm, SaaS sytem design, Scalable sytem design, |
Linux System | Boot process, Encryption driver, Network programming, |
employment
Software Engineer, Google
2019-01 — 2019-09
Improve user and partner trust in Google and provide privacy aware infrastructure
to serve Google Ads.
- Privacy aware infrastructure for online serving, offline pipeline, and privacy policy validation.
- Awarded 2 Spot Bonus in 2019Q2 and 2019Q3.
Staff Software Developer, Trend Micro
2017-01 — 2019-01
Design and implement SaaS service running in cloud platform with container
orchestration. Targeting for automatically CI/CD and high test coverage.
- As Full Cycle Developers doing design, develop and operate container-based services from company data center to AWS for SaaS.
- Build up operation, monitor alert and dashboard report using automated script from scratch.
- Introduce asynchronous on Python to enhance process and I/O usage with 60% improvement.
- Legacy code remodeled: Python 2 to 3, built up unittest and integration test from scratch (0% to over 90%).
- Separate data streaming part from monolithic application to embrace serviceless framework.
Senior Software Developer, Trend Micro
2015-01 — 2016-12
In network defense group, responsible for CI/CD, network traffic parsing
and hosting a Sandbox SaaS service.
- Introduce CI/CD best practice to the product, as the standard of the following project.
- Enhance SaaS service to support multi-tenancy customers sharing resource in the cloud to reduce cost.
- Parsing network traffic in packet level, work as data engineer in network analysis product.
Software Developer, Trend Micro
2012-09 — 2014-12
In Cloud Storage Encryption Product Team, responsible for development
boot device encryption feature and Linux software agents on cloud service
platform.
- Implement boot disk encryption feature to prevent boot data leakage on Windows and variant Linux distributions, including Ubunto, CentOS, RHEL, AmazonLinux and SUSE.
- Design software on major cloud service providers including Amazon EC2, Microsoft Azure and HP-Cloud.
- Awarded 2013 Q2 Trend Engineer of Quarter.
education
National Taiwan University
2010-09 — 2012-07 Foundation of Cryptography, Artificial Intelligence, Parallel and Distribution Computing,National Taiwan University
2006-09 — 2010-07First Prize in NTUEE Undergraduate Outstanding Project.
writing
[Patent] Root Volume Encryption Mechanism in Para-virtualized Virtual Machine, Trend Micro
2015The present invention is generally related to provide data protection. More particularly, the present invention is directed to achieve root volume encryption in a para-virtualized virtual machine.
MIFARE Classic: Practical Attacks and Defenses, Chinese Cryptology and Information Security Association
2013This paper report a experience attacking a real MIFARE Classic system. We implement a brute-force search using NVIDIA graphics cards to verify the claims in the literature. This is the first report in the literature of a practical long-range attack and these attacks disarm all cryptographic protection of MIFARE Classic. Lastly, we take up the challenge and present our ideas how to defend against most attacks using practical mechanisms that do not require any hardware changes.
Securing M2M with Post-quantum Public-key Cryptography, Emerging and Selected Topics in Circuits and Systems / IEEE Journal
2013This paper presents an ASIC implementation of two post-quantum public-key cryptosystems: NTRU-Encrypt and TTS. It represents a first step toward securing machine-to-machine systems using strong, hardware-assisted PKC. In contrast to the conventional wisdom that PKC is too expensive for M2M sensors, it lowers the total cost of ownership based on cost savings in provision, deployment, operation, maintenance, and general management.
A practical experience with RFID security, Mobile Data Management: Systems, Services and Middleware, 2009 / IEEE
2009This paper shares the practical experiences with EasyCard security and provide insights into RFID security.