Dongkwan Kim

Orcid: 0000-0003-3642-0253

Affiliations:
  • KAIST, Daejeon, South Korea


According to our database1, Dongkwan Kim authored at least 21 papers between 2014 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Revisiting Binary Code Similarity Analysis Using Interpretable Feature Engineering and Lessons Learned.
IEEE Trans. Software Eng., April, 2023

BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software.
Proceedings of the 32nd USENIX Security Symposium, 2023

Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
Efficient Representation Learning of Subgraphs by Subgraph-To-Node Translation.
CoRR, 2022

Watching the Watchers: Practical Video Identification Attack in LTE Networks.
Proceedings of the 31st USENIX Security Symposium, 2022

Models and Benchmarks for Representation Learning of Partially Observed Subgraphs.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

2021
Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds.
IEEE Secur. Priv., 2021

BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

How to Find Your Friendly Neighborhood: Graph Attention Design with Self-Supervision.
Proceedings of the 9th International Conference on Learning Representations, 2021

2020
FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Homogeneity-Based Transmissive Process to Model True and False News in Social Networks.
Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, 2019

Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO.
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019

Additive Compositionality of Word Vectors.
Proceedings of the 5th Workshop on Noisy User-generated Text, 2019

2018
Peeking Over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -.
IEEE Trans. Mob. Comput., 2018

2017
When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

2016
Pay as You Want: Bypassing Charging System in Operational Cellular Networks.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

2015
BurnFit: Analyzing and Exploiting Wearable Devices.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors.
Proceedings of the 24th USENIX Security Symposium, 2015

Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Analyzing Security of Korean USIM-Based PKI Certificate Service.
Proceedings of the Information Security Applications - 15th International Workshop, 2014


  Loading...