Resume available in PDF and Word formats
Short bio (less 100 words) available in plain text format
Long bio available in plain text format
You can also take a look at my work
Service : Talks : Publications : Patents : Education
And also check my Google Scholar page
Organizer of the Internet of Things Sandbox at the 2016 RSA Conference
Co-chair for security at the Industrial Internet Consortium
Contributor to the OASIS TOSCA for cloud orchestration
Contributor to the Big Data Working Group at the Cloud Security Alliance
Contributor and evaluator of the open source DeltaCloud project
Guest editor for the IEEE Security and privacy special issue Development of Authentication Technologies (January/February 2012)
National Science Foundation Panelist
Contributor at DMTF Cloud Management Working group
Contributor at the Cyber Security Coordination Task Force (Now SGIP-CSWW)
Formed board member and chair at the Trusted Computing Group
Speaker at RSA USA 2017: Safety First! Strategic Solutions to Protect the Industrial Internet of Things
Speaker at IIC Security Forum, Sunnyvale VA, October 2016 : Managing and Monitoring the Industrial Internet of Things
Panelist at IIC Security Forum, Reston VA, 2016 : Security in the Industrial Internet
Speaker at RSA USA 2016: When Good Devices Go Bad: Live Hacking at the IoT Sandbox
Moderator at Fujitsu Forum: Securing the Industrial Internet in the Age of IoT: Video
Panelist at Iot Wold Congress 2015: IoT Security
Panelist at COREnet 2014: Securing the Smart Building
Speaker at BLACKHAT 2014: Learn how to control every room at a luxury hotel remotely: the dangers of insecure home automation deployment
Speaker at DEFCON 2014: Learn how to control every room at a luxury hotel remotely: the dangers of insecure home automation deployment
Panelist at DAC 2011: Hackers and Attackers: How Safe is Your Embedded Design? Presented attacks to smart meters
Speaker at Cloud Security Alliance congress 2010 Leveraging Trusted Technologies to Secure the Cloud
Speaker at Secure Cloud 2010 Practical Applications of Trusted Computing in the Cloud
Multiple Authors. Industrial Internet Security Framework. Industrial Internet Consortium . September 2016 pdfAmazon
Multiple Authors. Industrial Internet Reference Architecture. Industrial Internet Consortium . April 2015 pdf
Multiple Authors. Top 10 Big Data Security and Privacy Challenges. Cloud Security Alliance. November 2012 pdf
Multiple Authors. Cloud Infrastructure Management Interface (CIMI) Model and REST Interface over HTTP Specification. Distributed Management Task Force. October 2012 pdf
Z. Song, J. Molina, and C. Strong. Trusted Anonymous Execution: A Model to Raise Trust in Cloud. In Proceedings of the 2010 Ninth International Conference on Grid and Cloud Computing (GCC '10) pdf bibtex
S. Hanna, J. Molina. Cloud Security Questions? . In sys-con
Chow, R.; Jakobsson, M.; Niu, Y.; Shi, E.; Molina, J.; Masuoka, R.; Song, Z. Authentication in the clouds: a framework and its application to mobile users. ACM Cloud Computing Security Workshop (CCSW); 2010 pdf bibtex
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina. 2009. Controlling data in the cloud: outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW '09) pdf bibtex
J. Molina and M. Cukier. 2009. Evaluating Files to Audit for Detecting Intrusions in FileSystem Data. In Proceedings of the 2009 Eighth IEEE International Symposium on Network Computing and Applications (NCA '09) pdf bibtex
J. Molina, and M. Cukier. Evaluating Attack Resiliency for Host Intrusion Detection Systems. Journal of Information Assurance and Security, vol. 4, no. 1, March 2009, pp. 1-9 pdf bibtex
Z. Song, J. Molina, S. Lee, H. Lee, S. Kotani, R. Masuoka. TrustCube: An Infrastructure that Builds Trust in Client. Future of Trust in Computing, Berlin, June 2008 pdf bibtex
J. Molina, Xavier Chorin, M. Cukier. Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences. ICISC 2007: 144-155)
Jesus Molina, Houcheng Li, Sung Lee, Zhexuan Song. A Mobile Trusted Platform Module (mTPM) Architecture, Workshop on Advances in Trusted Computing, Tokyo, November 2006) pdf bibtex
J. Molina. 2007. Evaluating Host Intrusion Detection Systems. Ph.D. Dissertation. University of Maryland at College Park, College Park, MD, USA. Advisor(s) Michel Cukier pdf bibtex
Y. Labrou, J. Agre, Lusheng Ji, J. Molina, W. Chen. Wireless Wallet. Mobile and Ubiquitous Systems, Annual International Conference on, pp. 32-41, First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous'04), 2004) pdf bibtex
N. L. Petroni, J. Molina, T. Fraser, W. A. Arbaugh. Copilot: A Coprocessor Based Runtime Integrity Monitor. 13th Usenix Security Symposium 2004) pdf bibtex
J. Molina, W. Arbaugh. Using Independent Auditors as Intrusion Detection Systems. ICICS 2002: 291-302, December 9-12, 2002 Springer) pdf
J. Molina. Using Independent Auditors for Intrusion Detection Systems, Master's Thesis. 2001. Advisor William A. Arbaugh pdf bibtex
J. Molina Hardware Implementation of an Authentication Protocol Using Kerberos. Senior's Thesis. 1999) pdf bibtex
Method for Checking the Integrity of Large Data Items Rapidly
METHOD AND APPARATUS FOR SECURE INFORMATION TRANSFER TO SUPPORT MIGRATION
Method and System for Implementing an External Trusted Platform Module
Method and System for Implementing a Mobile Trusted Platform Module
Method, apparatus, and computer program product for enhancing computer network security
University of Maryland, College Park, MD. Ph.D. in Electrical Engineering, 2007.
Dissertation: Evaluating Host Intrusion Detection Systems
Advisor: Michel Cukier
University of Maryland, College Park, MD. M.S. in Electrical Engineering, 2001.
Dissertation: Using Independent Auditors for Intrusion Detection Systems
Advisor: William A. Arbaugh
Universitat Politecnica de Catalunya, Spain. Bachelor in Ingenieria de Telecomunicaciones, 1999.
Dissertation: Hardware Implementation of an Authentication Protocol Using Kerberos
Advisor: I forgot but a really nice guy
Dr. Jesus Molina is a leading security expert in the industrial IoT, and develops new market penetration strategy at Waterfall Security solutions. He co-leads the Security Working Group at the Industrial Internet Consortium, the biggest consortia in the space. His recent work includes the first security framework for augmented reality devices, in collaboration with Brainwaive, and securing industrial IoT projects in different verticals for Fujitsu Ltd. Jesus has presented on offensive and defensive security technologies at the top security conferences, including RSA, Blackhat, DEFCON, Usenix Security, and IEEE Security, and his research has been featured in Wired and The Register. He authored several patents covering a wide range of security technologies. Jesus holds a M.S. and a Ph.D from the University of Maryland.