Dr. J. Sukarno Mertoguno manages basic and applied science research in cyber security and complex software for The Office of Naval Research (ONR). Before joining ONR he worked as a system & chip architect and an entrepreneur in the Silicon Valley, where he has worked on various chips and systems, such as embedded processors, switching fabric, network processors, and various other hardware accelerators, including TCP/IP, NFS, mobile anti-malware, etc. He received a Ph.D. In electrical engineering from SUNY-Binghamton. He also has background in Theoretical Physics.
The Office of Naval Research Software and Computer Systems program focuses on developing the fundamental principles and models for the design and construction of complex software systems that meet required assurances for security, safety, reliability and performance. It builds upon foundations of mathematical logics and computational complexity but takes into account the uncertainties and constraints of the operational environment. The overall goal is to measurably improve the ability of complex software-intensive systems to meet the information-processing challenges of future naval systems.
Cyber Security sub-program investigates and develops wide-ranging principles and techniques for continuously maintaining confidentiality, integrity, and availability of information and information infrastructures, focusing on the software, the hardware and the network. The program heavily emphasizes on automation and autonomy in the cyber environment, preferring human-on-the-loop paradigm over as human-in-the-loop, whenever possible. The program seeks to establish an autonomic, secure and dependable informational infrastructure toward achieving Information Dominance.
Complex Software sub-program investigates principles, algorithms and methods, and develops software engineering tools for achieving efficient, timely, robust and secure software executables, focusing on science for software construction, correctness and efficiency by revisiting software development and deployment methodology. Efficient, timely, robust and secure software is a requirement for secure information infrastructure toward achieving Information Dominance.