Wonsuk Choi

Orcid: 0000-0003-3253-4827

Affiliations:
  • Korea University, Graduate School of Information Security, Seoul, Korea (PhD 2018)


According to our database1, Wonsuk Choi authored at least 29 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
PE-Detector: Intrusion Detection of Periodic and Event Message Attacks on Controller Area Networks.
IEEE Trans. Veh. Technol., December, 2024

Securing Passive Keyless Entry and Start System in Modern Vehicles Based on LF-Band Signal Analysis.
IEEE Internet Things J., December, 2024

Enhancing Security of HRP UWB Ranging System Based on Channel Characteristic Analysis.
IEEE Internet Things J., December, 2024

In-Vehicle Network Intrusion Detection System Using CAN Frame-Aware Features.
IEEE Trans. Intell. Transp. Syst., May, 2024

ChatDEOB: An Effective Deobfuscation Method Based on Large Language Model.
Proceedings of the Information Security Applications - 25th International Conference, 2024

Leveraging Intensity as a New Feature to Detect Physical Adversarial Attacks Against LiDARs.
Proceedings of the Annual Computer Security Applications Conference, 2024

2023
ErrIDS: An Enhanced Cumulative Timing Error-Based Automotive Intrusion Detection System.
IEEE Trans. Intell. Transp. Syst., November, 2023

Protecting SOME/IP Communication via Authentication Ticket.
Sensors, July, 2023

The vibration knows who you are! A further analysis on usable authentication for smartwatch users.
Comput. Secur., 2023

RIDAS: Real-time identification of attack sources on controller area networks.
Proceedings of the 32nd USENIX Security Symposium, 2023

Poster: Unveiling the Impact of Patch Placement: Adversarial Patch Attacks on Monocular Depth Estimation.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Protecting HRP UWB Ranging System Against Distance Reduction Attacks.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
A Survey of Attacks on Controller Area Networks and Corresponding Countermeasures.
IEEE Trans. Intell. Transp. Syst., 2022

TTIDS: Transmission-Resuming Time-Based Intrusion Detection System for Controller Area Network (CAN).
IEEE Access, 2022

Efficient ECU Analysis Technology Through Structure-Aware CAN Fuzzing.
IEEE Access, 2022

Recovering Yaw Rate from Signal Injection Attack to Protect RV's Direction.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

2021
An Enhanced Method for Reverse Engineering CAN Data Payload.
IEEE Trans. Veh. Technol., 2021

Usable User Authentication on a Smartwatch using Vibration.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
MAuth-CAN: Masquerade-Attack-Proof Authentication for In-Vehicle Networks.
IEEE Trans. Veh. Technol., 2020

Fine-Grained Access Control-Enabled Logging Method on ARM TrustZone.
IEEE Access, 2020

Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
Securing Ultrasonic Sensors Against Signal Injection Attacks Based on a Mathematical Model.
IEEE Access, 2019

T-Box: A Forensics-Enabled Trusted Automotive Data Recording Method.
IEEE Access, 2019

How to Securely Record Logs based on ARM TrustZone.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks.
IEEE Trans. Veh. Technol., 2018

VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System.
IEEE Trans. Inf. Forensics Secur., 2018

Less Communication: Energy-Efficient Key Exchange for Securing Implantable Medical Devices.
Secur. Commun. Networks, 2018

2017
Vulnerabilities of Android OS-Based Telematics System.
Wirel. Pers. Commun., 2017

E2PKA: An Energy-Efficient and PV-Based Key Agreement Scheme for Body Area Networks.
Wirel. Pers. Commun., 2017


  Loading...