Jie-Ren (Jarron) Shih

Software Developer

As a 7-year experience developer, infrastructure builder, and security consultant, Jie-Ren Shih is experienced in building secure, scalability, and high availability enterprise product. With experience of hosting container-based and serverless web service on AWS, he is an expert in DevOps process from developing, testing, opertaion, and monitoring modern web service. Jie-Ren is also familiar with cloud related technologies including AWS, kubernetes, docker, and serverless architecture.

skills

Skill Keywords
Programing Python, Javascript, C/C++, HTML/CSS,
DevOps Docker, Jenkins, CI/CD, Monitor/Alert, Unittest,
Cloud Skills AWS, ECS, Kubernetes, Docker Swarm, SaaS sytem design, Scalable sytem design,
Linux System Boot process, Encryption driver, Network programming,

employment

Senior Software Engineer, Roblox

2019-10 — Present

Software Engineer, Google

2019-01 — 2019-09


Improve user and partner trust in Google and provide privacy aware infrastructure to serve Google Ads.

  • Privacy aware infrastructure for online serving, offline pipeline, and privacy policy validation.
  • Awarded 2 Spot Bonus in 2019Q2 and 2019Q3.

Staff Software Developer, Trend Micro

2017-01 — 2019-01


Design and implement SaaS service running in cloud platform with container orchestration. Targeting for automatically CI/CD and high test coverage.

  • As Full Cycle Developers doing design, develop and operate container-based services from company data center to AWS for SaaS.
  • Build up operation, monitor alert and dashboard report using automated script from scratch.
  • Introduce asynchronous on Python to enhance process and I/O usage with 60% improvement.
  • Legacy code remodeled: Python 2 to 3, built up unittest and integration test from scratch (0% to over 90%).
  • Separate data streaming part from monolithic application to embrace serviceless framework.

Senior Software Developer, Trend Micro

2015-01 — 2016-12


In network defense group, responsible for CI/CD, network traffic parsing and hosting a Sandbox SaaS service.

  • Introduce CI/CD best practice to the product, as the standard of the following project.
  • Enhance SaaS service to support multi-tenancy customers sharing resource in the cloud to reduce cost.
  • Parsing network traffic in packet level, work as data engineer in network analysis product.

Software Developer, Trend Micro

2012-09 — 2014-12


In Cloud Storage Encryption Product Team, responsible for development boot device encryption feature and Linux software agents on cloud service platform.

  • Implement boot disk encryption feature to prevent boot data leakage on Windows and variant Linux distributions, including Ubunto, CentOS, RHEL, AmazonLinux and SUSE.
  • Design software on major cloud service providers including Amazon EC2, Microsoft Azure and HP-Cloud.
  • Awarded 2013 Q2 Trend Engineer of Quarter.

education

National Taiwan University

2010-09 — 2012-07 Foundation of Cryptography, Artificial Intelligence, Parallel and Distribution Computing,

National Taiwan University

2006-09 — 2010-07

First Prize in NTUEE Undergraduate Outstanding Project.


writing

[Patent] Root Volume Encryption Mechanism in Para-virtualized Virtual Machine, Trend Micro

2015

The present invention is generally related to provide data protection. More particularly, the present invention is directed to achieve root volume encryption in a para-virtualized virtual machine.

MIFARE Classic: Practical Attacks and Defenses, Chinese Cryptology and Information Security Association

2013

This paper report a experience attacking a real MIFARE Classic system. We implement a brute-force search using NVIDIA graphics cards to verify the claims in the literature. This is the first report in the literature of a practical long-range attack and these attacks disarm all cryptographic protection of MIFARE Classic. Lastly, we take up the challenge and present our ideas how to defend against most attacks using practical mechanisms that do not require any hardware changes.

Securing M2M with Post-quantum Public-key Cryptography, Emerging and Selected Topics in Circuits and Systems / IEEE Journal

2013

This paper presents an ASIC implementation of two post-quantum public-key cryptosystems: NTRU-Encrypt and TTS. It represents a first step toward securing machine-to-machine systems using strong, hardware-assisted PKC. In contrast to the conventional wisdom that PKC is too expensive for M2M sensors, it lowers the total cost of ownership based on cost savings in provision, deployment, operation, maintenance, and general management.

A practical experience with RFID security, Mobile Data Management: Systems, Services and Middleware, 2009 / IEEE

2009

This paper shares the practical experiences with EasyCard security and provide insights into RFID security.


recognition

Certified ScrumMaster, Scrum Alliance

2015

2013 Q2 Engineer of Quarter, Trend Micro

2013