Roman Lysecky is an Associate Professor of Electrical and Computer Engineering at the University of Arizona. He received his B.S., M.S., and Ph.D. in Computer Science from the University of California, Riverside in 1999, 2000, and 2005, respectively. His research interests focus on embedded systems, with emphasis on runtime optimization, non-intrusive system observation methods for in-situ analysis of complex hardware and software behavior, data-adaptable system, and embedded system security. He was awarded the Outstanding Ph.D. Dissertation Award from the European Design and Automation Association (EDAA) in 2006 for New Directions in Embedded Systems. He received a CAREER award from the National Science Foundation in 2009 and five Best Paper Awards at the ASEE Annual Conference, ACM/IEEE International Conference on Hardware-Software Codesign and System Synthesis (CODES+ISSS), the ACM/IEEE Design Automation and Test in Europe Conference (DATE), the IEEE International Conference on Engineering of Computer-Based Systems (ECBS), and the International Conference on Mobile Ubiquitous Computing, Systems, Services (UBICOMM). He is an inventor on one US patent. He has coauthored five textbooks on VHDL, Verilog, C, C++, and Java programming. His recent textbooks, published with Zyante, utilize a web-native, interactive, and animated approach that has shown notable increases in student learning and course grades. He has also received multiple awards for Excellence at the Student Interface from the College of Engineering at the University of Arizona.
- Army Research Office ARO has funded a new project on Theoretical Foundations, Modeling, and Exploration for Analyzing Power Obfuscation in Secure Embedded Systems with Co-PI Dr. Janet Wang.
Abstract: As embedded systems are at the heart of these mission-critical systems, verifying and maintaining the security and integrity of these devices is paramount. Side-channel attacks (SCAs) are a critical threat to the security of these systems. SCAs analyze variations in timing, power consumption, and electromagnetic radiation that can be exploited by attackers to extract critical information, e.g., cryptographic keys, from software operations. Although cryptography provides some level of security, SCAs demonstrate a critical weakness that must be properly addressed to secure embedded systems within mission critical systems. In this project, we aim at securing embedded systems by developing new mathematical models for precisely evaluating the susceptibility of embedded systems software and hardware to SCAs and the increased resilience to SCAs afforded by power obfuscation methods.
- UA News article on Reimagined Textbooks Adapt to Student Learning.
- Paper on Students Learn More with Less Text that Covers the Same Core Topics represented at Workshop on embedded Systems Security (2015) at ESWEEK.
- New zyBook on Data Structures Essentials covering search and sorting algorithm, complexity, lists, stacks, queues, hash tables, trees, and graphs.
- Paper on Student Performance Improvement using Interactive Textbooks: A Three-University Cross-Semester Analysis received Best Paper Award for Computers in Education at the ASEE Annual Conference, 2015.
Abstract: We conducted studies to determine whether introducing an interactive textbook into introductory STEM (science, technology, engineering, math) courses can improve student grades. An interactive textbook has substantially less text than a traditional textbook, instead having numerous embedded question sets designed for learning and not quizzing, numerous animations of key concepts, and some built-in tools. The studies included four introductory computer-programming courses at three research universities: C++ at Univ. of Michigan, C/C++ at Univ. of Arizona, and MATLAB at Univ. of California at Davis. For each, two course offerings were compared, the first using a static textbook or static web resources, and the second using an interactive textbook. Most other course features remained the same between offerings, including the teacher and the semester offering (e.g., Spring semester), or were very similar; differences are noted. We analyzed final course grades and performance on specific course items using nonparametric analysis with conservative Bonferroni adjustment for multiple tests. Across all courses involving 1,945 students, course grades improved by 0.28 points on a 0-4 point scale (p-value < 0.001), or 1/4 letter grade, from static to interactive textbook. More importantly, students in the lower quartile of the course improved by 0.38 points (p-value < 0.001), or 1/3 letter grade. Exam scores improved by 13.6% (p-value < 0.001) and project scores by 7.4% (p- value < 0.001) from static to interactive textbooks. 98% of the students subscribed to the interactive textbook and completed at least some activities on the interactive textbook. The average student completed 87% of the assigned activities in the interactive textbook.
- Air Force Office of Scientific Research (AFOSR) has funded a new project on Data-Adaptable Modeling and Optimization for Runtime Adaptable Systems with Co-PI Dr. Jonathan Sprinkle.
- Here's a great video showing the benefits of the "Less text, more action" approach for zyBooks.
- A. Lizarraga, J. Sprinkle, R. Lysecky. Model-driven Optimization of Data-Adaptable Embedded Systems. IEEE Computer Software and Applications Conference (COMPSAC), Accepted, 2016.
- Hyunsuk Nam, R. Lysecky. Latency, Power, and Security Optimization in Distributed Reconfigurable Embedded Systems. Reconfigurable Architecture Workshop (RAW), Accepted. 2016.
- J. C. Lee and R. Lysecky. System-Level Observation Framework for Non-Intrusive Runtime Monitoring of Embedded Systems. ACM Transactions on Design Automation of Electronic Systems (TODAES), Vol. 20, No. 3, pp. 1-27, 2015.
- A. Edgcomb, F. Vahid, R. Lysecky. Students Learn More with Less Text that Covers the Same Core Topics. IEEE Frontiers in Education, 2015.
- S. Lu, R. Lysecky. Analysis of Control Flow Events for Timing-based Runtime Anomaly Detection. Workshop on Embedded Systems Security (WESS), 2015.
- R. Lysecky, F. Vahid. Data Structures Essentials. zyBooks, 2015.
- A. Edgcomb, F. Vahid, R. Lysecky, A. Knoesen, R. Amirtharajah, M. L. Dorf. Student Performance Improvement using Interactive Textbooks: A Three-University Cross-Semester Analysis. ASEE Annual Conference, 2015. Received Best Paper Award
- S. Lu, M. Seo, and R. Lysecky. Timing-based Anomaly Detection in Embedded Systems. Asia South Pacific Design Automation Conference (ASP-DAC), pp. 809-814, 2015.
- J. Sametinger, J. Rozenblit, R. Lysecky, P. Ott. Security Challenges for Medical Devices. Communication of ACM (CACM), Vol. 58 No. 4, Pages 74-82, 2015.