Taisic Yun, Suhwan Jeong, Yonghwa Lee, Seungjoo Kim, Hyoungshick Kim, Insu Yun, Yongdae Kim
(2025).
Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South Korea.
34th USENIX Security Symposium, USENIX Security 2025, Seattle, WA, USA, August 13-15, 2025.
Tuan Dinh Hoang, Taekkyung Oh, CheolJun Park, Insu Yun, Yongdae Kim
(2025).
LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers.
34th USENIX Security Symposium, USENIX Security 2025, Seattle, WA, USA, August 13-15, 2025.
Impact: LLFuzz uncovered 11 previously unknown vulnerabilities across 15 commercial smartphones from major vendors including Qualcomm, MediaTek, Samsung, and Apple. Seven of these vulnerabilities have been assigned CVE identifiers and patched by vendors, while four remain undisclosed due to patch delays. The CVEs include: itemize Qualcomm: CVE-2025-21477, CVE-2024-23385 – affecting over 90 chipsets. MediaTek: CVE-2024-20076, CVE-2024-20077, CVE-2025-20659 – affecting over 80 chipsets. Samsung: CVE-2025-26780 – affecting Exynos 2400 series and Modem 5400. Apple: CVE-2024-27870 – equivalent to CVE-2025-21477 in Qualcomm modems. itemize LLFuzz revealed systemic flaws in how lower-layer baseband logic is implemented across vendors. In one test, a single malformed MAC-layer packet immediately disabled a device during data streaming. These results demonstrate that lower layers remain a blind spot in mobile security. LLFuzz is open-sourced at
https://github.com/SysSec-KAIST/LLFuzz.
Suhwan Jeong, Beomseok Oh, Kwangmin Kim, Insu Yun, Yongdae Kim, CheolJun Park
(2025).
FirmState: Bringing Cellular Protocol States to Shannon Baseband Emulation.
18th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2025, Arlington, VA, USA, 30 June 2025- 3 July 2025.
Mincheol Son, Kwangmin Kim, Beomseok Oh, CheolJun Park, Yongdae Kim
(2025).
CITesting: Systematic Testing of Context Integrity Violations in LTE Core Networks.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, CCS 2025, Taipei, Taiwan, October 13-17, 2025.
Impact: We uncovered 29, 22, 16, and 59 distinct CIVs in Open5GS, srsRAN, Amarisoft, and Nokia LTE cores, respectively. These allow remote detachment, IMSI exposure, and presence detection without requiring proximity. We contributed patches to Open5GS and Amarisoft. CITesting will be released as an open-source tool to support future uplink security research.
Taekkyung Oh, Sangwook Bae, Junho Ahn, Yonghwa Lee, Tuan Dinh Hoang, Min Suk Kang, Nils Ole Tippenhauer, Yongdae Kim
(2024).
Enabling Physical Localization of Uncooperative Cellular Devices.
Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, ACM MobiCom 2024, Washington D.C., DC, USA, November 18-22, 2024.
Hyungsub Kim, Rwitam Bandyopadhyay, Muslum Ozgur Ozmen, Z. berkay celik, Antonio Bianchi, Yongdae Kim, Dongyan Xu
(2024).
A Systematic Study of Physical Sensor Attack Hardness.
IEEE Symposium on Security and Privacy, SP 2024, San Francisco, CA, USA, May 19-23, 2024.
Jinseob Jeong, Dongkwan Kim, Joon-Ha Jang, Juhwan Noh, Changhun Song, Yongdae Kim
(2023).
Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof.
30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023.
Beomseok Oh, Junho Ahn, Sangwook Bae, Mincheol Son, Yonghwa Lee, Min Suk Kang, Yongdae Kim
(2023).
Preventing SIM Box Fraud Using Device Model Fingerprinting.
30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023.
Impact: We are currently testing our solution with a major operator in Korea.
Joon-Ha Jang, ManGi Cho, Jaehoon Kim, Dongkwan Kim, Yongdae Kim
(2023).
Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels.
30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023.
Tuan Dinh Hoang, CheolJun Park, Mincheol Son, Taekkyung Oh, Sangwook Bae, Junho Ahn, Beomseok Oh, Yongdae Kim
(2023).
LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023.
Impact: LTESniffer is open-sourced at
https://github.com/SysSec-KAIST/LTESniffer). It is very popular in github, receiving 1,212 stars with 128 forked project. There are at least five youtube videos explaining how to use LTESniffer with more than 2k views. As far as I know, there are three commercial counterparts (Wavejudge, ThinkRF and Airscope): The first one supporting uplink and downlink sniffing costing USD 25,000 and the last one only supports downlink sniffing.
Eunsoo Kim, Minwoo Baek, CheolJun Park, Dongkwan Kim, Yongdae Kim, Insu Yun
(2023).
BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software.
32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023.
Sangwook Bae, Mincheol Son, Dongkwan Kim, CheolJun Park, Jiho Lee, Sooel Son, Yongdae Kim
(2022).
Watching the Watchers: Practical Video Identification Attack in LTE Networks.
31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022.
Impact: Although it is too early to determine the impact of the video identification work, it was discussed in 2022 August 3GPP meeting (S3-221922). We plan to exploit information leakage in the uplink scheduling. If we can identify a victim’s uplink signal, an attacker may use this information to find a physical location of the victim, by combining with a directional antenna. We received funding from Korean police to find the physical location of the SIM Boxes used for voice phishing.
CheolJun Park, Sangwook Bae, Beomseok Oh, Jiho Lee, Eunkyu Lee, Insu Yun, Yongdae Kim
(2022).
DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices.
31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022.
Impact: This paper was discussed in a 3GPP SA3 meeting. It is currently open-sourced at
https://github.com/SysSec-KAIST/DoLTEst. We uncovered 26 implementation flaws from 43 devices from 5 different baseband manufacturers by using DoLTEst. We have received 3 CVEs (CVE-2019-2289 from Qualcomm, CVE-2021-25516 from Samsung, and CVE-2021-30826 from Apple.) The Qualcomm bug allows an authentication bypass in all baseband processors manufactured by Qualcomm, requiring almost one year to finish the patch process.
Jeongyoon Heo, Sangwon Gil, Youngman Jung, Jinmok Kim, Donguk Kim, Woojin Park, Yongdae Kim, Kang g. shin, Choong-Hoon Lee
(2022).
Are There Wireless Hidden Cameras Spying on Me?.
Annual Computer Security Applications Conference, ACSAC 2022, Austin, TX, USA, December 5-9, 2022.
Chen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, Kevin Fu
(2020).
SoK: A Minimalist Approach to Formalizing Analog Sensor Security.
2020 IEEE Symposium on Security and Privacy, SP 2020, San Francisco, CA, USA, May 18-21, 2020.
Mingeun Kim, Dongkwan Kim, Eunsoo Kim, Suryeon Kim, Yeongjin Jang, Yongdae Kim
(2020).
FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis.
ACSAC ‘20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020.
Sangsup Lee, Daejun Kim, Dongkwan Kim, Sooel Son, Yongdae Kim
(2019).
Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO.
13th USENIX Workshop on Offensive Technologies, WOOT 2019, Santa Clara, CA, USA, August 12-13, 2019.
Hongil Kim, Jiho Lee, Eunkyu Lee, Yongdae Kim
(2019).
Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane.
2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019.
Impact: Immediately after the paper is published online, we’ve received inquiries from many operators such as Deutche Telecom, Google Project Fi, Singtel, etc if we can visit their site to test their networks. Unfortunately, we could not provide service to commercial operators, as students did not want to provide commercial services. We’ve also communicated with device vendors such as Apple, Samsung, Qualcomm, LG, Huawei, and Ericsson helping their patching process. Cellular security companies such as P1Security and Positive Technologies now provide protocol security testing as we did in LTEFuzz. We have received two CVEs (CVE-2019-20783 from LG and CVE-2019-5307 from Huawei.) This was also featured in multple media outlets, such as ZDNet, SecurityWeek, Huawei, Engadget, Tech Xplore, Security Affairs, E-Crypto, Cybersecurity Insiders, Israel Defense, ITPro, UK, TGDaily, Gizmodo, and DailyMail, UK. LTEFuzz paper was discussed in three SA3 meetings: TSGS3_95_Reno (S3-191230), TSGS3_97_Reno (S3-194063). TSGS3_101e (S3-202878).
Minjeong Kim, Yujin Kwon, Yongdae Kim
(2019).
Is Stellar As Secure As You Think?.
2019 IEEE European Symposium on Security and Privacy Workshops, EuroS&P Workshops 2019, Stockholm, Sweden, June 17-19, 2019.
Hojoon Yang, Sangwook Bae, Mincheol Son, Hongil Kim, Song Min Kim, Yongdae Kim
(2019).
Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE.
28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019.
Impact: The initial response from GSMA was disappointing as they viewed this work as only academically interesting. However, it turned out to be important for both academia and standard bodies. After it was initially discussed in 2019 Reno 97th 3GPP meeting (S3-194063), a lot of documents (and probably discussions) tried to address this attack accross multiple 3GPP meetings: TSGS3_100Bis-e (S3-202556, S3-202738, S3-202740), TSGS3_100e (S3-202026, S3-202109, S3-202150), TSGS3_101e (S3-202983, S3-202984, S3-203158, S3-203160, S3-203364, S3-203447), TSGS3_102Bis-e (S3-211345), TSGS3_102e (S3-210131, S3-210778, S3-210783), TSGS3_103e (S3-212351), TSGS3_104e (S3-212748, S3-213244), TSGS3_105e (S3-214408), and TSGS3_107e (S3-221266). In addition, the attack is extended to sigover attack over unicast channel by us~bae2022watching, layer 2 messages by Tan et. al.~tan2021data and uplink channel by Erni et. al.~erni2022adaptover. In 5G, SA3 failed to secure these unauthenticated channels due to various technical problems. I hope to solve these problems before 6G design is complete, which will start in 2 years.
Changhoon Yoon, Kwanwoo Kim, Yongdae Kim, Seungwon Shin, Sooel Son
(2019).
Doppelg\"angers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services.
The World Wide Web Conference, WWW 2019, San Francisco, CA, USA, May 13-17, 2019.
Seunghyeon Lee, Changhoon Yoon, Heedo Kang, Yeonkeun Kim, Yongdae Kim, Dongsu Han, Sooel Son, Seungwon Shin
(2019).
Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web.
26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019.
Byeongdo Hong, Sangwook Bae, Yongdae Kim
(2018).
GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier.
25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018.
Impact: Our first paperkune2012location in 2012 was discussed in three SA3 meetings held in 2017 across multiple documents: TSG3_086_SophiaSA3 meeting as part of 86th 3GPP meeting held in Sophia (S3-170205, S3-170333, S3-170458). TSGS3_86b_Busan (S3-170758), and TSGS3_87_Ljubljana (S3-171294). GUTI reallocation paper~hong2018guti was the focal point to add unpredictability of GUTI in LTE, discussed in S3-220075. Now in 5G, unpredictability in GUTI after every exposure is mandatory. Unfortunately, a recent report about China and our measurement in Korea show that this is not the case.
Hyunwook Hong, Hyunwoo Choi, Dongkwan Kim, Hongil Kim, Byeongdo Hong, Jiseong Noh, Yongdae Kim
(2017).
When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks.
2017 IEEE European Symposium on Security and Privacy, EuroS&P 2017, Paris, France, April 26-28, 2017.
Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene y. vasserman, Yongdae Kim
(2017).
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017.
Young-Seok Park, Yunmok Son, Hocheol Shin, Dohyun Kim, Yongdae Kim
(2016).
This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump.
10th USENIX Workshop on Offensive Technologies, WOOT 16, Austin, TX, USA, August 8-9, 2016.
Hocheol Shin, Yunmok Son, Young-Seok Park, Yujin Kwon, Yongdae Kim
(2016).
Sampling Race: Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital Systems.
10th USENIX Workshop on Offensive Technologies, WOOT 16, Austin, TX, USA, August 8-9, 2016.
WonJun Song, Hyunwoo Choi, Junhong Kim, Eunsoo Kim, Yongdae Kim, John Kim
(2016).
PIkit: A New Kernel-Independent Processor-Interconnect Rootkit.
25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016.
Hyunwook Hong, Hongil Kim, Byeongdo Hong, Dongkwan Kim, Hyunwoo Choi, Eunkyu Lee, Yongdae Kim
(2016).
Pay as You Want: Bypassing Charging System in Operational Cellular Networks.
Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers.
Jeongmin Kim, Hyunwoo Choi, Hun Namkung, Woohyun Choi, Byungkwon Choi, Hyunwook Hong, Yongdae Kim, Jonghyup Lee, Dongsu Han
(2016).
Enabling Automatic Protocol Behavior Analysis for Android Applications.
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, CoNEXT 2016, Irvine, California, USA, December 12-15, 2016.
Yujin Kwon, Dohyun Kim, Yunmok Son, Jaeyeong Choi, Yongdae Kim
(2016).
Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack.
Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers.
Kibum Choi, Yunmok Son, Juhwan Noh, Hocheol Shin, Jaeyeong Choi, Yongdae Kim
(2016).
Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WISEC 2016, Darmstadt, Germany, July 18-22, 2016.
Ji-Hyeon Yoon, Jeong Oh Kye, Yongdae Kim, Hae Young Lee
(2016).
Decoder-Free Sino-Korean Shellcode.
International Conference on Software Security and Assurance, ICSSA 2016, St. P"olten, Austria, August 24-25, 2016.
Hocheol Shin, Kibum Choi, Young-Seok Park, Jaeyeong Choi, Yongdae Kim
(2015).
Security Analysis of FHSS-type Drone Controller.
Information Security Applications - 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers.
Yunmok Son, Hocheol Shin, Dongkwan Kim, Young-Seok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, Yongdae Kim
(2015).
Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors.
24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015.
Kibum Choi, Yunmok Son, Jangjun Lee, Suryeon Kim, Yongdae Kim
(2015).
Frying PAN: Dissecting Customized Protocol for Personal Area Network.
Information Security Applications - 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers.
Hyunwoo Choi, Jeongmin Kim, Hyunwook Hong, Yongdae Kim, Jonghyup Lee, Dongsu Han
(2015).
Extractocol: Autoatic Extraction of Application-level Protocol Behaviors for Android Applications.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, SIGCOMM 2015, London, United Kingdom, August 17-21, 2015.
Dongkwan Kim, Suwan Park, Kibum Choi, Yongdae Kim
(2015).
BurnFit: Analyzing and Exploiting Wearable Devices.
Information Security Applications - 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers.
Hongil Kim, Dongkwan Kim, Minhee Kwon, HyungSeok Han, Yeongjin Jang, Dongsu Han, Taesoo Kim, Yongdae Kim
(2015).
Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015.
Impact: At the time, only South Korea and the United States had widely deployed Voice over LTE (VoLTE) technology, so no other countries were affected. The vulnerabilities were jointly disclosed with the the US Cyber Emergency Response Team (US Cert) as VU#943167. At the time, none of the US operators acknowledged the vulnerabilities, but they later patched them silently. After this investigation, we received funding from SK Telecom to start investigating security of LTE networks. We were invited to make a presentation at GSMA, the organization of the operators. The findings were covered by multiple media outlets, such as IT World, Nexus Security Bulletin, DSLReports, Softpedia, tom’s guide, Pocketnow, FierceMobileIT, Techworm, Neowin, and Network World.
Sungjae Hwang, Sungho Lee, Yongdae Kim, Sukyoung Ryu
(2015).
Bittersweet ADB: Attacks and Defenses.
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS ‘15, Singapore, April 14-17, 2015.
Il-Gu Lee, Hyunwoo Choi, Yongdae Kim, Seungwon Shin, Myungchul Kim
(2014).
Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks.
Research in Attacks, Intrusions and Defenses - 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings.
Younghwan Go, Eunyoung Jeong, Jongil Won, Yongdae Kim, Denis Foo Kune, KyoungSoo Park
(2014).
Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission.
21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, February 23-26, 2014.
Impact: We discovered that Korean operators are more concerned with over-charging than charging bypass. This is because over-charging can result in penalties from the government. The bug has not been patched so far.
Younghwan Go, Denis Foo Kune, Shinae Woo, KyoungSoo Park, Yongdae Kim
(2013).
Towards accurate accounting of cellular data for TCP retransmission.
14th Workshop on Mobile Computing Systems and Applications, HotMobile ‘13, Jekyll Island, GA, USA, February 26-27, 2013.
Impact: We discovered that Korean operators are more concerned with over-charging than charging bypass. This is because over-charging can result in penalties from the government. The bug has not been patched so far.
Denis Foo Kune, John d. backes, Shane s. clark, Daniel b. kramer, Matthew r. reynolds, Kevin Fu, Yongdae Kim, Wenyuan Xu
(2013).
Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors.
2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013.
Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim
(2012).
Private Over-Threshold Aggregation Protocols.
Information Security and Cryptology - ICISC 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers.
Abedelaziz Mohaisen, Pengkui Luo, Yanhua Li, Yongdae Kim, Zhi-Li Zhang
(2012).
Measuring bias in the mixing time of social graphs due to graph sampling.
31st IEEE Military Communications Conference, MILCOM 2012, Orlando, FL, USA, October 29 - November 1, 2012.
Denis Foo Kune, John k%5colndorfer, Nicholas Hopper, Yongdae Kim
(2012).
Location leaks over the GSM air interface.
19th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, California, USA, February 5-8, 2012.
Impact: Our first paperkune2012location in 2012 was discussed in three SA3 meetings held in 2017 across multiple documents: TSG3_086_SophiaSA3 meeting as part of 86th 3GPP meeting held in Sophia (S3-170205, S3-170333, S3-170458). TSGS3_86b_Busan (S3-170758), and TSGS3_87_Ljubljana (S3-171294). GUTI reallocation paper~hong2018guti was the focal point to add unpredictability of GUTI in LTE, discussed in S3-220075. Now in 5G, unpredictability in GUTI after every exposure is mandatory. Unfortunately, a recent report about China and our measurement in Korea show that this is not the case.
Hee Bong Choi, Yongdae Kim, San Yun Han, Hyuk Joong Yoon
(2011).
Security Requirements of Certificate Validation in Web Security.
Grid and Distributed Computing - International Conference, GDC 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings.
Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim, Eugene y. vasserman
(2011).
Losing Control of the Internet: Using the Data Plane to Attack the Control Plane.
Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, 6th February - 9th February 2011.
Denis Foo Kune, Yongdae Kim
(2010).
Timing attacks on PIN input devices.
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010.
Abedelaziz Mohaisen, Eugene y. vasserman, Max Schuchard, Denis Foo Kune, Yongdae Kim
(2010).
Secure encounter-based social networks: requirements, challenges, and designs.
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010.
Rob Jansen, Nicholas Hopper, Yongdae Kim
(2010).
Recruiting new tor relays with BRAIDS.
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010.
Abedelaziz Mohaisen, Aaram Yun, Yongdae Kim
(2010).
Measuring the mixing time of social graphs.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, IMC 2010, Melbourne, Australia - November 1-3, 2010.
Max Schuchard, Alexander w. dean, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim
(2010).
Balancing the shadows.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, WPES 2010, Chicago, Illinois, USA, October 4, 2010.
Hun Jeong Kang, Eric Chan-Tin, Nicholas Hopper, Yongdae Kim
(2009).
Why Kad Lookup Fails.
Proceedings P2P 2009, Ninth International Conference on Peer-to-Peer Computing, 9-11 September 2009, Seattle, Washington, USA.
Brent ByungHoon Kang, Eric Chan-Tin, Christopher p. lee, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim
(2009).
Towards complete node enumeration in a peer-to-peer botnet.
Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009.
Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongdae Kim
(2009).
Scalable onion routing with torsk.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009.
Eugene y. vasserman, Rob Jansen, James Tyra, Nicholas Hopper, Yongdae Kim
(2009).
Membership-concealing overlay networks.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009.
Yongdae Kim, Byounguk Sohn, Woosub Youm, Jongkyu Jung, Jonghyun Lee, Kyihwan Park
(2008).
Voice coil motor nano stage with an eddy current damper.
10th International Conference on Control, Automation, Robotics and Vision, ICARCV 2008, Hanoi, Vietnam, 17-20 December 2008, Proceedings.
Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim
(2008).
Attacking the Kad network.
4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008.
Joengmin Hwang, Yu Gu, Tian He, Yongdae Kim
(2007).
Realistic Sensing Area Modeling.
INFOCOM 2007. 26th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 6-12 May 2007, Anchorage, Alaska, USA.
Joengmin Hwang, Tian He, Yongdae Kim
(2007).
Detecting Phantom Nodes in Wireless Sensor Networks.
INFOCOM 2007. 26th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 6-12 May 2007, Anchorage, Alaska, USA.
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov
(2006).
Timed-Release and Key-Insulated Public Key Encryption.
Financial Cryptography and Data Security, 10th International Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers.
Taekyoung Kwon, Jung Hee Cheon, Yongdae Kim, Jaeil Lee
(2006).
Privacy Protection in PKIs: A Separation-of-Authority Approach.
Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers.
Mark Shaneck, Yongdae Kim, Vipin Kumar
(2006).
Privacy Preserving Nearest Neighbor Search.
Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 18-22 December 2006, Hong Kong, China.
Joengmin Hwang, Tian He, Yongdae Kim
(2006).
Achieving realistic sensing area modeling.
Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, SenSys 2006, Boulder, Colorado, USA, October 31 - November 3, 2006.
Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwon
(2005).
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks.
Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings.
Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, Yongdae Kim
(2005).
Remote Software-Based Attestation for Wireless Sensors.
Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers.
HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
(2004).
Batch Verifications with ID-Based Signatures.
Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers.
Ashutosh Jaiswal, Yongdae Kim, Maria l. gini
(2003).
Security model for a multi-agent marketplace.
Proceedings of the 5th International Conference on Electronic Commerce, ICEC 2003, Pittsburgh, Pennsylvania, USA, September 30 - October 03, 2003.
Yongdae Kim, Daniele Mazzocchi, Gene Tsudik
(2003).
Admission Control in Peer Groups.
2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 16-18 April 2003, Cambridge, MA, USA.
Yongdae Kim, Maithili Narasimha, Fabio Maino, Gene Tsudik
(2002).
Secure Group Services for Storage Area Networks.
Proceedings of the First International IEEE Security in Storage Workshop, SISW 2002, Greenbelt, Maryland, USA, December 11, 2002.
Yair Amir, Cristina Nita-Rotaru, John l. schultz, Jonathan Robert Stanton, Yongdae Kim, Gene Tsudik
(2001).
Exploring Robustness in Group Key Agreement.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), Phoenix, Arizona, USA, April 16-19, 2001.
Yongdae Kim, Adrian Perrig, Gene Tsudik
(2001).
Communication-Efficient Group Key Agreement.
Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on Information Security (IFIP/Sec'01), June 11-13, 2001, Paris, France.
Jonathan Robert Stanton, Yair Amir, Damian Hasse, Giuseppe Ateniese, Yongdae Kim, Cristina Nita-Rotaru, Theo Schlossnagle, John l. schultz, Gene Tsudik
(2000).
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments.
Proceedings of the 20th International Conference on Distributed Computing Systems, Taipei, Taiwan, April 10-13, 2000.