Shinjo Park

According to our database1, Shinjo Park authored at least 13 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Why we cannot win: on fake base stations and their detection methods.
PhD thesis, 2023

2022
A Post-Quantum Secure Subscription Concealed Identifier for 6G.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2020
BaseSAFE: baseband sanitized fuzzing through emulation.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

2019
New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Anatomy of Commercial IMSI Catchers and Detectors.
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019

2018
Peeking Over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -.
IEEE Trans. Mob. Comput., 2018

New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols.
IACR Cryptol. ePrint Arch., 2018

On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Networks.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

2017
White-Stingray: Evaluating IMSI Catchers Detection Applications.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

2016
White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphones.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

2014
Analyzing Security of Korean USIM-Based PKI Certificate Service.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

2013
Comparison of caching strategies in modern cellular backhaul networks.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013


  Loading...