{"id":1228,"date":"2019-08-05T08:00:18","date_gmt":"2019-08-05T12:00:18","guid":{"rendered":"https:\/\/research.ece.ncsu.edu\/aaysu-dev\/?page_id=1228"},"modified":"2025-09-03T10:16:28","modified_gmt":"2025-09-03T14:16:28","slug":"about-dr-aysu","status":"publish","type":"page","link":"https:\/\/research.ece.ncsu.edu\/aaysu\/about\/about-dr-aysu\/","title":{"rendered":"Dr. Aydin Aysu"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1228\" class=\"elementor elementor-1228\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1f62ee3a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1f62ee3a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4b613268\" data-id=\"4b613268\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-372cf6ee elementor-widget elementor-widget-text-editor\" data-id=\"372cf6ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p>\u00a0<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-519\" src=\"https:\/\/research.ece.ncsu.edu\/aaysu\/wp-content\/uploads\/sites\/8\/aaysu_rgb_10th_june-e1718048883543.jpg\" alt=\"\" width=\"300\" height=\"300\" \/><\/figure>\n<\/div>\n<p><\/p>\n<p><\/p>\n<div id=\"main\">\n<div id=\"biography\" class=\"page home\" data-pos=\"home\">\n<div class=\"pageheader\">\n<div class=\"headercontent\">\n<div class=\"section-container\">\n<div class=\"row\" style=\"margin-top: -59px\">\n<p style=\"font-size: larger\">\u00a0<\/p>\n<div class=\"col-md-10\">\n<p>\u00a0<\/p>\n<p style=\"text-align: justify\">\u00a0<\/p>\n<p style=\"text-align: justify\">I seek multiple PhD students and post-docs in the field of hardware and embedded security. <a rel=\"noopener noreferrer\"> Here is a description<\/a> of the positions, interested applicants can email me.<\/p>\n<p><strong style=\"font-size: larger\">Bio<\/strong><\/p>\n<p style=\"text-align: justify\">Dr. Aysu is an associate professor and University Faculty Fellow at the Electrical and Computer Engineering Department of North Carolina State University, where he leads HECTOR: Hardware Cybersecurity Research Lab. He got his M.S. from Sabanci University, his Ph.D. from Virginia Tech, and before joining NC State, he was a post-doctoral researcher at the University of Texas at Austin.\u00a0 Dr. Aysu&#8217;s interests are broadly in hardware security research and cybersecurity education.\u00a0 His hardware security research has won NSF CAREER, NSF CRII, Google RSP, and Goodnight Innovation Fellow awards, six best paper nominations, two best paper awards, two hardware security top picks, and one publicity paper award.\u00a0 He is also the president of mithrilAI, an early-stage start-up developing secure AI hardware. <a rel=\"noopener noreferrer\">Here is his CV.<\/a><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"pagecontents\">\n<div class=\"section color-1\">\n<div class=\"section-container\">\n<div class=\"row\">\n<div class=\"col-md-5 col-md-offset-1\">\n<div class=\"title text-center\">\n<h3>Academic &amp; Industry Positions<\/h3>\n<\/div>\n<ul class=\"ul-dates\">\n<li>\n<div class=\"dates\">Present-2018<\/div>\n<div class=\"content\">\n<h4>Assistant Professor<\/h4>\n<p><em>North Carolina State University<\/em>, ECE Dept.<br \/>Adjunct Professor at CS<br \/>Hardware-Based Cybersecurity<\/p>\n<\/div>\n<\/li>\n<li>\n<div class=\"dates\">2018-2016<\/div>\n<div class=\"content\">\n<h4>Post-Doctoral Researcher<\/h4>\n<p><em>The University of Texas at Austin<\/em>, ECE Dept.<br \/>Security, Privacy, and Computer Architecture<\/p>\n<\/div>\n<\/li>\n<li>\n<div class=\"dates\">2016-2012<\/div>\n<div class=\"content\">\n<h4>Graduate Research Assistant<\/h4>\n<p><em>Virginia Tech<\/em>, ECE Department<br \/>Secure Embedded Systems Lab<\/p>\n<\/div>\n<\/li>\n<li>\n<div class=\"dates\">2014-2014<\/div>\n<div class=\"content\">\n<h4>Summer Research Intern<\/h4>\n<p><em>Qualcomm Inc.<\/em><br \/>Product Security Initiative<\/p>\n<\/div>\n<\/li>\n<li>\n<div class=\"dates\">2012-2010<\/div>\n<div class=\"content\">\n<h4>Digital Design Engineer<\/h4>\n<p><em>Vestek R&amp;D Corp.<\/em><br \/>Pixellence Design Group<\/p>\n<\/div>\n<\/li>\n<li>\n<div class=\"dates\">2010-2008<\/div>\n<div class=\"content\">\n<h4>Research Assistant<\/h4>\n<p><em>Sabanci University<\/em>, Faculty of Engineering<br \/>System-on-Chip Design &amp; Test Lab<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<\/div>\n<div class=\"col-md-5\">\n<div class=\"title text-center\">\n<h3>Education<\/h3>\n<\/div>\n<ul class=\"ul-card\">\n<li>\n<div class=\"dy\"><span class=\"degree\">Ph.D.<\/span> <span class=\"year\">2016<\/span><\/div>\n<div class=\"description\">\n<p class=\"waht\">PhD in Computer Engineering<\/p>\n<p class=\"where\">Virginia Tech<\/p>\n<\/div>\n<\/li>\n<li>\n<div class=\"dy\"><span class=\"degree\">M.S. <\/span><span class=\"year\">2010<\/span><\/div>\n<div class=\"description\">\n<p class=\"waht\">MS in Electronics Engineering<\/p>\n<p class=\"where\">Sabanci University<\/p>\n<\/div>\n<\/li>\n<li>\n<div class=\"dy\"><span class=\"degree\">B.S. <\/span><span class=\"year\">2008<\/span><\/div>\n<div class=\"description\">\n<p class=\"waht\">BS in Microelectronics<br \/>Mathematics Minor<\/p>\n<p class=\"where\">Sabanci University<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"section color-2\">\n<div class=\"section-container\">\n<div class=\"row\">\n<div class=\"col-md-10 col-md-offset-1\">\n<div class=\"title text-center\">\u00a0<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u00a0 \u00a0 \u00a0 \u00a0 I seek multiple PhD students and post-docs in the field of hardware and embedded security. Here is a description of the&#8230;<\/p>\n","protected":false},"author":39,"featured_media":0,"parent":1216,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1228","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/research.ece.ncsu.edu\/aaysu\/wp-json\/wp\/v2\/pages\/1228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/research.ece.ncsu.edu\/aaysu\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/research.ece.ncsu.edu\/aaysu\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/research.ece.ncsu.edu\/aaysu\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/research.ece.ncsu.edu\/aaysu\/wp-json\/wp\/v2\/comments?post=1228"}],"version-history":[{"count":227,"href":"https:\/\/research.ece.ncsu.edu\/aaysu\/wp-json\/wp\/v2\/pages\/1228\/revisions"}],"predecessor-version":[{"id":4700,"href":"https:\/\/research.ece.ncsu.edu\/aaysu\/wp-json\/wp\/v2\/pages\/1228\/revisions\/4700"}],"up":[{"embeddable":true,"href":"https:\/\/research.ece.ncsu.edu\/aaysu\/wp-json\/wp\/v2\/pages\/1216"}],"wp:attachment":[{"href":"https:\/\/research.ece.ncsu.edu\/aaysu\/wp-json\/wp\/v2\/media?parent=1228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}