Yongdae Kim

Orcid: 0000-0003-4879-1262

According to our database1, Yongdae Kim authored at least 142 papers between 1996 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enabling Physical Localization of Uncooperative Cellular Devices.
CoRR, 2024

2023
Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting.
ACM Trans. Priv. Secur., November, 2023

Revisiting Binary Code Similarity Analysis Using Interpretable Feature Engineering and Lessons Learned.
IEEE Trans. Software Eng., April, 2023

LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software.
Proceedings of the 32nd USENIX Security Symposium, 2023

Preventing SIM Box Fraud Using Device Model Fingerprinting.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild.
CoRR, 2022

DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices.
Proceedings of the 31st USENIX Security Symposium, 2022

Watching the Watchers: Practical Video Identification Attack in LTE Networks.
Proceedings of the 31st USENIX Security Symposium, 2022

HearMeOut: detecting voice phishing activities in Android.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

Cellular Security: Why is it difficult?
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Are There Wireless Hidden Cameras Spying on Me?
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Amnesiac DRAM: A Proactive Defense Mechanism Against Cold Boot Attacks.
IEEE Trans. Computers, 2021

Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds.
IEEE Secur. Priv., 2021

BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure.
ACM Trans. Priv. Secur., 2020

Analysis of LFT2.
CoRR, 2020

SoK: A Minimalist Approach to Formalizing Analog Sensor Security.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing.
ACM Trans. Priv. Secur., 2019

Doppelgängers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services.
Proceedings of the World Wide Web Conference, 2019

Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO.
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019

Hidden Figures: Comparative Latency Analysis of Cellular Networks with Fine-grained State Machine Models.
Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, 2019

Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE.
Proceedings of the 28th USENIX Security Symposium, 2019

Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Is Stellar As Secure As You Think?
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

Impossibility of Full Decentralization in Permissionless Blockchains.
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019

An Eye for an Eye: Economics of Retaliation in Mining Pools.
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019

2018
Peeking Over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -.
IEEE Trans. Mob. Comput., 2018

GyrosFinger: Fingerprinting Drones for Location Tracking Based on the Outputs of MEMS Gyroscopes.
ACM Trans. Priv. Secur., 2018

Large-Scale Analysis of Remote Code Injection Attacks in Android Apps.
Secur. Commun. Networks, 2018

GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Crime Scene Reconstruction: Online Gold Farming Network Analysis.
IEEE Trans. Inf. Forensics Secur., 2017

Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications.
IACR Cryptol. ePrint Arch., 2017

When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Private Over-Threshold Aggregation Protocols over Distributed Datasets.
IEEE Trans. Knowl. Data Eng., 2016

Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction].
Computer, 2016

Sampling Race: Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital Systems.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Pay as You Want: Bypassing Charging System in Operational Cellular Networks.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

PIkit: A New Kernel-Independent Processor-Interconnect Rootkit.
Proceedings of the 25th USENIX Security Symposium, 2016

Decoder-Free Sino-Korean Shellcode.
Proceedings of the International Conference on Software Security and Assurance, 2016

Enabling Automatic Protocol Behavior Analysis for Android Applications.
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, 2016

2015
Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2015

Hijacking the Vuze BitTorrent network: all your hop are belong to us.
IET Inf. Secur., 2015

Security Analysis of FHSS-type Drone Controller.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

BurnFit: Analyzing and Exploiting Wearable Devices.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Frying PAN: Dissecting Customized Protocol for Personal Area Network.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors.
Proceedings of the 24th USENIX Security Symposium, 2015

Extractocol: Autoatic Extraction of Application-level Protocol Behaviors for Android Applications.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Bittersweet ADB: Attacks and Defenses.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Trustworthy Distributed Computing on Social Networks.
IEEE Trans. Serv. Comput., 2014

First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA.
IACR Cryptol. ePrint Arch., 2014

Revisiting security of proportional fair scheduler in wireless cellular networks.
Comput. Networks, 2014

Analyzing Security of Korean USIM-Based PKI Certificate Service.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

Successful Profiling Attacks with Different Measurement Environments for Each Phase.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs.
IEEE Trans. Dependable Secur. Comput., 2013

Attacking the kad network - real world evaluation and high fidelity simulation using DVN.
Secur. Commun. Networks, 2013

Private Over-threshold Aggregation Protocols over Distributed Databases.
IACR Cryptol. ePrint Arch., 2013

Towards accurate accounting of cellular data for TCP retransmission.
Proceedings of the 14th Workshop on Mobile Computing Systems and Applications, 2013

Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Using Principal Component Analysis for Practical Biasing of Power Traces to Improve Power Analysis Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

Peer Pressure: Exerting Malicious Influence on Routers at a Distance.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Dynamix: anonymity on dynamic social structures.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Private Top-k Aggregation Protocols.
IACR Cryptol. ePrint Arch., 2012

One-Way Indexing for Plausible Deniability in Censorship Resistant Storage.
Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012

Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Location leaks over the GSM air interface.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Measuring bias in the mixing time of social graphs due to graph sampling.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Private Over-Threshold Aggregation Protocols.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Security Evaluation of Cryptographic Modules against Profiling Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Protecting access privacy of cached contents in information centric networks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

On the mixing time of directed social graphs and security implications.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems.
ACM Trans. Inf. Syst. Secur., 2011

SocialCloud: Using Social Networks for Building Distributed Computing Services
CoRR, 2011

Keep your friends close: Incorporating trust into social network-based Sybil defenses.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

Understanding Social Networks Properties for Trustworthy Computing.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

2010
Exploring In-Situ Sensing Irregularity in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2010

On Homomorphic Signatures for Network Coding.
IEEE Trans. Computers, 2010

Balancing the shadows.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Measuring the mixing time of social graphs.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

Efficient Cryptographic Primitives for Private Data Mining.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

Losing control of the internet: using the data plane to attack the control plane.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Secure encounter-based social networks: requirements, challenges, and designs.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Designs to account for trust in social network-based sybil defenses.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Timing attacks on PIN input devices.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Recruiting new tor relays with BRAIDS.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Hashing it out in public: common failure modes of DHT-based anonymity schemes.
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009

The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems.
Proceedings of the Security and Privacy in Communication Networks, 2009

Why Kad Lookup Fails.
Proceedings of the Proceedings P2P 2009, 2009

On protecting integrity and confidentiality of cryptographic file system for outsourced storage.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

Membership-concealing overlay networks.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Scalable onion routing with torsk.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Towards complete node enumeration in a peer-to-peer botnet.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Provably Secure Timed-Release Public Key Encryption.
ACM Trans. Inf. Syst. Secur., 2008

Secure localization with phantom node detection.
Ad Hoc Networks, 2008

Attacking the Kad network.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Voice coil motor nano stage with an eddy current damper.
Proceedings of the 10th International Conference on Control, 2008

2007
Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007

Detecting Phantom Nodes in Wireless Sensor Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Realistic Sensing Area Modeling.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Combating Double-Spending Using Cooperative P2P Systems.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

2006
Privacy Protection in PKIs: A Separation-of-Authority Approach.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Achieving realistic sensing area modeling.
Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, 2006

Privacy Preserving Nearest Neighbor Search.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

Integrating an Eclipse-Based Scenario Modeling Environment with a Requirements Management System.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

2005
Securing distributed storage: challenges, techniques, and systems.
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005

Remote Software-Based Attestation for Wireless Sensors.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005

Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
Secure Group Communication Using Robust Contributory Key Agreement.
IEEE Trans. Parallel Distributed Syst., 2004

Tree-based group key agreement.
ACM Trans. Inf. Syst. Secur., 2004

On the performance of group key agreement protocols.
ACM Trans. Inf. Syst. Secur., 2004

Group Key Agreement Efficient in Communication.
IEEE Trans. Computers, 2004

A New ID-based Signature with Batch Verification.
IACR Cryptol. ePrint Arch., 2004

Timed-Release and Key-Insulated Public Key Encryption.
IACR Cryptol. ePrint Arch., 2004

Design and implementation of a secure multi-agent marketplace.
Electron. Commer. Res. Appl., 2004

Revisiting random key pre-distribution schemes for wireless sensor networks.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004

Batch Verifications with ID-Based Signatures.
Proceedings of the Information Security and Cryptology, 2004

2003
Secure group key management for storage area networks.
IEEE Commun. Mag., 2003

Decentralized Authentication Mechanisms for Object-based Storage Devices.
Proceedings of the 2nd International IEEE Security in Storage Workshop (SISW 2003), 2003

Admission Control in Peer Groups.
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 2003

An Efficient Tree-Based Group Key Agreement Using Bilinear Map.
Proceedings of the Applied Cryptography and Network Security, 2003

Security model for a multi-agent marketplace.
Proceedings of the 5th International Conference on Electronic Commerce, 2003

2002
Secure Group Services for Storage Area Networks.
Proceedings of the First International IEEE Security in Storage Workshop, 2002

2001
Communication-Efficient Group Key Agreement.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

Design and control of a two degree of freedom haptic device for the application of PC video games.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2001

Exploring Robustness in Group Key Agreement.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001

2000
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

Simple and fault-tolerant key agreement for dynamic collaborative groups.
Proceedings of the CCS 2000, 2000

1996
On the Design of a Stream Cipher and a Hash Function Suitable to Smart Card Applications.
Proceedings of the Second Smart Card Research and Advanced Application Conference, 1996


  Loading...