Publications

(2025). XDAC: XAI-Driven Detection and Attribution of LLM-Generated News Comments in Korean. Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), ACL 2025, Vienna, Austria, July 27 - August 1, 2025.
(2025). Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South Korea. 34th USENIX Security Symposium, USENIX Security 2025, Seattle, WA, USA, August 13-15, 2025.
(2025). Revisiting GPS Spoofing in Phasor Measurement: Real-World Exploitation and Practical Detection in Power Grids. ACM Trans. Priv. Secur..
(2025). Passive 3-D User Equipment Tracking Using Long-Term Evolution Uplink Signals. IEEE Trans. Instrum. Meas..
(2025). LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers. 34th USENIX Security Symposium, USENIX Security 2025, Seattle, WA, USA, August 13-15, 2025.
Impact: LLFuzz uncovered 11 previously unknown vulnerabilities across 15 commercial smartphones from major vendors including Qualcomm, MediaTek, Samsung, and Apple. Seven of these vulnerabilities have been assigned CVE identifiers and patched by vendors, while four remain undisclosed due to patch delays. The CVEs include: itemize Qualcomm: CVE-2025-21477, CVE-2024-23385 – affecting over 90 chipsets. MediaTek: CVE-2024-20076, CVE-2024-20077, CVE-2025-20659 – affecting over 80 chipsets. Samsung: CVE-2025-26780 – affecting Exynos 2400 series and Modem 5400. Apple: CVE-2024-27870 – equivalent to CVE-2025-21477 in Qualcomm modems. itemize LLFuzz revealed systemic flaws in how lower-layer baseband logic is implemented across vendors. In one test, a single malformed MAC-layer packet immediately disabled a device during data streaming. These results demonstrate that lower layers remain a blind spot in mobile security. LLFuzz is open-sourced at https://github.com/SysSec-KAIST/LLFuzz.
(2025). FirmState: Bringing Cellular Protocol States to Shannon Baseband Emulation. 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2025, Arlington, VA, USA, 30 June 2025- 3 July 2025.
(2025). CITesting: Systematic Testing of Context Integrity Violations in LTE Core Networks. Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, CCS 2025, Taipei, Taiwan, October 13-17, 2025.
Impact: We uncovered 29, 22, 16, and 59 distinct CIVs in Open5GS, srsRAN, Amarisoft, and Nokia LTE cores, respectively. These allow remote detachment, IMSI exposure, and presence detection without requiring proximity. We contributed patches to Open5GS and Amarisoft. CITesting will be released as an open-source tool to support future uplink security research.
(2024). Enabling Physical Localization of Uncooperative Cellular Devices. CoRR.
(2024). A Systematic Study of Physical Sensor Attack Hardness. IEEE Symposium on Security and Privacy, SP 2024, San Francisco, CA, USA, May 19-23, 2024.
(2023). Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof. 30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023.
(2023). Preventing SIM Box Fraud Using Device Model Fingerprinting. 30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023.
Impact: We are currently testing our solution with a major operator in Korea.
(2023). Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels. 30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023.
(2023). LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper. Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023.
Impact: LTESniffer is open-sourced at https://github.com/SysSec-KAIST/LTESniffer). It is very popular in github, receiving 1,212 stars with 128 forked project. There are at least five youtube videos explaining how to use LTESniffer with more than 2k views. As far as I know, there are three commercial counterparts (Wavejudge, ThinkRF and Airscope): The first one supporting uplink and downlink sniffing costing USD 25,000 and the last one only supports downlink sniffing.
(2023). Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting. ACM Trans. Priv. Secur..
(2023). Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials. Annual Computer Security Applications Conference, ACSAC 2023, Austin, TX, USA, December 4-8, 2023.
(2023). BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software. 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023.
(2022). Watching the Watchers: Practical Video Identification Attack in LTE Networks. 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022.
Impact: Although it is too early to determine the impact of the video identification work, it was discussed in 2022 August 3GPP meeting (S3-221922). We plan to exploit information leakage in the uplink scheduling. If we can identify a victim’s uplink signal, an attacker may use this information to find a physical location of the victim, by combining with a directional antenna. We received funding from Korean police to find the physical location of the SIM Boxes used for voice phishing.
(2022). HearMeOut: detecting voice phishing activities in Android. MobiSys ‘22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022 - 1 July 2022.
(2022). DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices. 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022.
Impact: This paper was discussed in a 3GPP SA3 meeting. It is currently open-sourced at https://github.com/SysSec-KAIST/DoLTEst. We uncovered 26 implementation flaws from 43 devices from 5 different baseband manufacturers by using DoLTEst. We have received 3 CVEs (CVE-2019-2289 from Qualcomm, CVE-2021-25516 from Samsung, and CVE-2021-30826 from Apple.) The Qualcomm bug allows an authentication bypass in all baseband processors manufactured by Qualcomm, requiring almost one year to finish the patch process.
(2022). Cellular Security: Why is it difficult?. ASIA CCS ‘22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022.
(2022). Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild. CoRR.
(2022). Are There Wireless Hidden Cameras Spying on Me?. Annual Computer Security Applications Conference, ACSAC 2022, Austin, TX, USA, December 5-9, 2022.
(2021). Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds. IEEE Secur. Priv..
(2021). BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols. 28th Annual Network and Distributed System Security Symposium, NDSS 2021, virtually, February 21-25, 2021.
(2021). Amnesiac DRAM: A Proactive Defense Mechanism Against Cold Boot Attacks. IEEE Trans. Computers.
(2020). The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure. IACR Cryptol. ePrint Arch..
(2020). SoK: A Minimalist Approach to Formalizing Analog Sensor Security. 2020 IEEE Symposium on Security and Privacy, SP 2020, San Francisco, CA, USA, May 18-21, 2020.
(2020). Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned. CoRR.
(2020). FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis. ACSAC ‘20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020.
(2020). Analysis of LFT2. CoRR.
(2019). Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO. 13th USENIX Workshop on Offensive Technologies, WOOT 2019, Santa Clara, CA, USA, August 12-13, 2019.
(2019). Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing. ACM Trans. Priv. Secur..
(2019). Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane. 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019.
Impact: Immediately after the paper is published online, we’ve received inquiries from many operators such as Deutche Telecom, Google Project Fi, Singtel, etc if we can visit their site to test their networks. Unfortunately, we could not provide service to commercial operators, as students did not want to provide commercial services. We’ve also communicated with device vendors such as Apple, Samsung, Qualcomm, LG, Huawei, and Ericsson helping their patching process. Cellular security companies such as P1Security and Positive Technologies now provide protocol security testing as we did in LTEFuzz. We have received two CVEs (CVE-2019-20783 from LG and CVE-2019-5307 from Huawei.) This was also featured in multple media outlets, such as ZDNet, SecurityWeek, Huawei, Engadget, Tech Xplore, Security Affairs, E-Crypto, Cybersecurity Insiders, Israel Defense, ITPro, UK, TGDaily, Gizmodo, and DailyMail, UK. LTEFuzz paper was discussed in three SA3 meetings: TSGS3_95_Reno (S3-191230), TSGS3_97_Reno (S3-194063). TSGS3_101e (S3-202878).
(2019). Is Stellar As Secure As You Think?. CoRR.
(2019). Impossibility of Full Decentralization in Permissionless Blockchains. CoRR.
(2019). Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE. 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019.
Impact: The initial response from GSMA was disappointing as they viewed this work as only academically interesting. However, it turned out to be important for both academia and standard bodies. After it was initially discussed in 2019 Reno 97th 3GPP meeting (S3-194063), a lot of documents (and probably discussions) tried to address this attack accross multiple 3GPP meetings: TSGS3_100Bis-e (S3-202556, S3-202738, S3-202740), TSGS3_100e (S3-202026, S3-202109, S3-202150), TSGS3_101e (S3-202983, S3-202984, S3-203158, S3-203160, S3-203364, S3-203447), TSGS3_102Bis-e (S3-211345), TSGS3_102e (S3-210131, S3-210778, S3-210783), TSGS3_103e (S3-212351), TSGS3_104e (S3-212748, S3-213244), TSGS3_105e (S3-214408), and TSGS3_107e (S3-221266). In addition, the attack is extended to sigover attack over unicast channel by us~bae2022watching, layer 2 messages by Tan et. al.~tan2021data and uplink channel by Erni et. al.~erni2022adaptover. In 5G, SA3 failed to secure these unauthenticated channels due to various technical problems. I hope to solve these problems before 6G design is complete, which will start in 2 years.
(2019). Hidden Figures: Comparative Latency Analysis of Cellular Networks with Fine-grained State Machine Models. Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, HotMobile 2019, Santa Cruz, CA, USA, February 27-28, 2019.
(2019). Doppelg\"angers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services. The World Wide Web Conference, WWW 2019, San Francisco, CA, USA, May 13-17, 2019.
(2019). Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web. 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019.
(2019). Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?. CoRR.
(2019). An Eye for an Eye: Economics of Retaliation in Mining Pools. CoRR.
(2018). Peeking Over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -. IEEE Trans. Mob. Comput..
(2018). Large-Scale Analysis of Remote Code Injection Attacks in Android Apps. Secur. Commun. Networks.
(2018). GyrosFinger: Fingerprinting Drones for Location Tracking Based on the Outputs of MEMS Gyroscopes. ACM Trans. Priv. Secur..
(2018). GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier. 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018.
Impact: Our first paperkune2012location in 2012 was discussed in three SA3 meetings held in 2017 across multiple documents: TSG3_086_SophiaSA3 meeting as part of 86th 3GPP meeting held in Sophia (S3-170205, S3-170333, S3-170458). TSGS3_86b_Busan (S3-170758), and TSGS3_87_Ljubljana (S3-171294). GUTI reallocation paper~hong2018guti was the focal point to add unpredictability of GUTI in LTE, discussed in S3-220075. Now in 5G, unpredictability in GUTI after every exposure is mandatory. Unfortunately, a recent report about China and our measurement in Korea show that this is not the case.
(2017). When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks. 2017 IEEE European Symposium on Security and Privacy, EuroS&P 2017, Paris, France, April 26-28, 2017.
(2017). Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications. IACR Cryptol. ePrint Arch..
(2017). Crime Scene Reconstruction: Online Gold Farming Network Analysis. IEEE Trans. Inf. Forensics Secur..
(2017). Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin. CoRR.
(2016). This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump. 10th USENIX Workshop on Offensive Technologies, WOOT 16, Austin, TX, USA, August 8-9, 2016.
(2016). Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]. Computer.
(2016). Sampling Race: Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital Systems. 10th USENIX Workshop on Offensive Technologies, WOOT 16, Austin, TX, USA, August 8-9, 2016.
(2016). Private Over-Threshold Aggregation Protocols over Distributed Datasets. IEEE Trans. Knowl. Data Eng..
(2016). PIkit: A New Kernel-Independent Processor-Interconnect Rootkit. 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016.
(2016). Pay as You Want: Bypassing Charging System in Operational Cellular Networks. Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers.
(2016). Enabling Automatic Protocol Behavior Analysis for Android Applications. Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, CoNEXT 2016, Irvine, California, USA, December 12-15, 2016.
(2016). Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack. Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers.
(2016). Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4. Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WISEC 2016, Darmstadt, Germany, July 18-22, 2016.
(2016). Decoder-Free Sino-Korean Shellcode. International Conference on Software Security and Assurance, ICSSA 2016, St. P"olten, Austria, August 24-25, 2016.
(2015). Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures. IEEE Trans. Dependable Secur. Comput..
(2015). Security Analysis of FHSS-type Drone Controller. Information Security Applications - 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers.
(2015). Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors. 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015.
(2015). Hijacking the Vuze BitTorrent network: all your hop are belong to us. IET Inf. Secur..
(2015). Frying PAN: Dissecting Customized Protocol for Personal Area Network. Information Security Applications - 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers.
(2015). Extractocol: Autoatic Extraction of Application-level Protocol Behaviors for Android Applications. Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, SIGCOMM 2015, London, United Kingdom, August 17-21, 2015.
(2015). BurnFit: Analyzing and Exploiting Wearable Devices. Information Security Applications - 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers.
(2015). Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015.
Impact: At the time, only South Korea and the United States had widely deployed Voice over LTE (VoLTE) technology, so no other countries were affected. The vulnerabilities were jointly disclosed with the the US Cyber Emergency Response Team (US Cert) as VU#943167. At the time, none of the US operators acknowledged the vulnerabilities, but they later patched them silently. After this investigation, we received funding from SK Telecom to start investigating security of LTE networks. We were invited to make a presentation at GSMA, the organization of the operators. The findings were covered by multiple media outlets, such as IT World, Nexus Security Bulletin, DSLReports, Softpedia, tom’s guide, Pocketnow, FierceMobileIT, Techworm, Neowin, and Network World.
(2015). Bittersweet ADB: Attacks and Defenses. Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS ‘15, Singapore, April 14-17, 2015.
(2014). Successful Profiling Attacks with Different Measurement Environments for Each Phase. Information Security Applications - 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers.
(2014). Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks. Research in Attacks, Intrusions and Defenses - 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings.
(2014). Revisiting security of proportional fair scheduler in wireless cellular networks. Comput. Networks.
(2014). Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission. 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, February 23-26, 2014.
Impact: We discovered that Korean operators are more concerned with over-charging than charging bypass. This is because over-charging can result in penalties from the government. The bug has not been patched so far.
(2014). First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA. IACR Cryptol. ePrint Arch..
(2014). Analyzing Security of Korean USIM-Based PKI Certificate Service. Information Security Applications - 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers.
(2013). Using Principal Component Analysis for Practical Biasing of Power Traces to Improve Power Analysis Attacks. Information Security and Cryptology - ICISC 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers.
(2013). Trustworthy distributed computing on social networks. 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS ‘13, Hangzhou, China - May 08 - 10, 2013.
(2013). Towards accurate accounting of cellular data for TCP retransmission. 14th Workshop on Mobile Computing Systems and Applications, HotMobile ‘13, Jekyll Island, GA, USA, February 26-27, 2013.
Impact: We discovered that Korean operators are more concerned with over-charging than charging bypass. This is because over-charging can result in penalties from the government. The bug has not been patched so far.
(2013). Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs. IEEE Trans. Dependable Secur. Comput..
(2013). Peer Pressure: Exerting Malicious Influence on Routers at a Distance. IEEE 33rd International Conference on Distributed Computing Systems, ICDCS 2013, 8-11 July, 2013, Philadelphia, Pennsylvania, USA.
(2013). Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors. 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013.
(2013). Dynamix: anonymity on dynamic social structures. 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS ‘13, Hangzhou, China - May 08 - 10, 2013.
(2013). Attacking the kad network - real world evaluation and high fidelity simulation using DVN. Secur. Commun. Networks.
(2012). Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous. 19th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, California, USA, February 5-8, 2012.
(2012). Security Evaluation of Cryptographic Modules against Profiling Attacks. Information Security and Cryptology - ICISC 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers.
(2012). Protecting access privacy of cached contents in information centric networks. the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012.
(2012). Private Top-k Aggregation Protocols. IACR Cryptol. ePrint Arch..
(2012). Private Over-Threshold Aggregation Protocols. Information Security and Cryptology - ICISC 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers.
(2012). One-Way Indexing for Plausible Deniability in Censorship Resistant Storage. 2nd USENIX Workshop on Free and Open Communications on the Internet, FOCI ‘12, Bellevue, WA, USA, August 6, 2012.
(2012). On the mixing time of directed social graphs and security implications. 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS ‘12, Seoul, Korea, May 2-4, 2012.
(2012). Measuring bias in the mixing time of social graphs due to graph sampling. 31st IEEE Military Communications Conference, MILCOM 2012, Orlando, FL, USA, October 29 - November 1, 2012.
(2012). Location leaks over the GSM air interface. 19th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, California, USA, February 5-8, 2012.
Impact: Our first paperkune2012location in 2012 was discussed in three SA3 meetings held in 2017 across multiple documents: TSG3_086_SophiaSA3 meeting as part of 86th 3GPP meeting held in Sophia (S3-170205, S3-170333, S3-170458). TSGS3_86b_Busan (S3-170758), and TSGS3_87_Ljubljana (S3-171294). GUTI reallocation paper~hong2018guti was the focal point to add unpredictability of GUTI in LTE, discussed in S3-220075. Now in 5G, unpredictability in GUTI after every exposure is mandatory. Unfortunately, a recent report about China and our measurement in Korea show that this is not the case.
(2011). Understanding Social Networks Properties for Trustworthy Computing. 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 20-24 June 2011, Minneapolis, Minnesota, USA.
(2011). The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems. ACM Trans. Inf. Syst. Secur..
(2011). SocialCloud: Using Social Networks for Building Distributed Computing Services. CoRR.
(2011). Security Requirements of Certificate Validation in Web Security. Grid and Distributed Computing - International Conference, GDC 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings.
(2011). Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks. Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011, Seoul, Republic of Korea, February 21 - 23, 2011.
(2011). Keep your friends close: Incorporating trust into social network-based Sybil defenses. INFOCOM 2011. 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 10-15 April 2011, Shanghai, China.
(2010). Timing attacks on PIN input devices. Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010.
(2010). Secure encounter-based social networks: requirements, challenges, and designs. Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010.
(2010). Recruiting new tor relays with BRAIDS. Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010.
(2010). On Homomorphic Signatures for Network Coding. IEEE Trans. Computers.
(2010). Measuring the mixing time of social graphs. Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, IMC 2010, Melbourne, Australia - November 1-3, 2010.
(2010). Losing control of the internet: using the data plane to attack the control plane. Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010.
(2010). Efficient Cryptographic Primitives for Private Data Mining. 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), Proceedings, 5-8 January 2010, Koloa, Kauai, HI, USA.
(2010). Designs to account for trust in social network-based sybil defenses. Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010.
(2010). Balancing the shadows. Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, WPES 2010, Chicago, Illinois, USA, October 4, 2010.
(2009). Why Kad Lookup Fails. Proceedings P2P 2009, Ninth International Conference on Peer-to-Peer Computing, 9-11 September 2009, Seattle, Washington, USA.
(2009). Towards complete node enumeration in a peer-to-peer botnet. Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009.
(2009). The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems. Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers.
(2009). Scalable onion routing with torsk. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009.
(2009). On protecting integrity and confidentiality of cryptographic file system for outsourced storage. Proceedings of the first ACM Cloud Computing Security Workshop, CCSW 2009, Chicago, IL, USA, November 13, 2009.
(2009). Membership-concealing overlay networks. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009.
(2009). Hashing it out in public: common failure modes of DHT-based anonymity schemes. Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, WPES 2009, Chicago, Illinois, USA, November 9, 2009.
(2008). Voice coil motor nano stage with an eddy current damper. 10th International Conference on Control, Automation, Robotics and Vision, ICARCV 2008, Hanoi, Vietnam, 17-20 December 2008, Proceedings.
(2008). Secure localization with phantom node detection. Ad Hoc Networks.
(2008). Provably Secure Timed-Release Public Key Encryption. ACM Trans. Inf. Syst. Secur..
(2008). Attacking the Kad network. 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008.
(2007). Realistic Sensing Area Modeling. INFOCOM 2007. 26th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 6-12 May 2007, Anchorage, Alaska, USA.
(2007). Exploring in-situ sensing irregularity in wireless sensor networks. Proceedings of the 5th International Conference on Embedded Networked Sensor Systems, SenSys 2007, Sydney, NSW, Australia, November 6-9, 2007.
(2007). Detecting Phantom Nodes in Wireless Sensor Networks. INFOCOM 2007. 26th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 6-12 May 2007, Anchorage, Alaska, USA.
(2007). Combating Double-Spending Using Cooperative P2P Systems. 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), June 25-29, 2007, Toronto, Ontario, Canada.
(2007). Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage. 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), Beijing, China, October 10-12, 2007.
(2006). Privacy Protection in PKIs: A Separation-of-Authority Approach. Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers.
(2006). Privacy Preserving Nearest Neighbor Search. Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 18-22 December 2006, Hong Kong, China.
(2006). Integrating an Eclipse-Based Scenario Modeling Environment with a Requirements Management System. Proceedings of the Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada.
(2006). Achieving realistic sensing area modeling. Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, SenSys 2006, Boulder, Colorado, USA, October 31 - November 3, 2006.
(2005). Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks. Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings.
(2005). Securing distributed storage: challenges, techniques, and systems. Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005.
(2005). Remote Software-Based Attestation for Wireless Sensors. Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers.
(2004). Timed-Release and Key-Insulated Public Key Encryption. IACR Cryptol. ePrint Arch..
(2004). Secure Group Communication Using Robust Contributory Key Agreement. IEEE Trans. Parallel Distributed Syst..
(2004). Revisiting random key pre-distribution schemes for wireless sensor networks. Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2004, Washington, DC, USA, October 25, 2004.
(2004). Group Key Agreement Efficient in Communication. IEEE Trans. Computers.
(2004). Design and implementation of a secure multi-agent marketplace. Electron. Commer. Res. Appl..
(2004). Batch Verifications with ID-Based Signatures. Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers.
(2004). A New ID-based Signature with Batch Verification. IACR Cryptol. ePrint Arch..
(2003). Security model for a multi-agent marketplace. Proceedings of the 5th International Conference on Electronic Commerce, ICEC 2003, Pittsburgh, Pennsylvania, USA, September 30 - October 03, 2003.
(2003). Secure group key management for storage area networks. IEEE Commun. Mag..
(2003). Decentralized Authentication Mechanisms for Object-based Storage Devices. 2nd International IEEE Security in Storage Workshop (SISW 2003), Information Assurance, The Storage Security Perspective, 31 October 2003, Washington, DC, USA.
(2003). An Efficient Tree-Based Group Key Agreement Using Bilinear Map. Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings.
(2003). Admission Control in Peer Groups. 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 16-18 April 2003, Cambridge, MA, USA.
(2002). Tree-based Group Key Agreement. IACR Cryptol. ePrint Arch..
(2002). Secure Group Services for Storage Area Networks. Proceedings of the First International IEEE Security in Storage Workshop, SISW 2002, Greenbelt, Maryland, USA, December 11, 2002.
(2002). On the Performance of Group Key Agreement Protocols. Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), Vienna, Austria, July 2-5, 2002.
(2001). Exploring Robustness in Group Key Agreement. Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), Phoenix, Arizona, USA, April 16-19, 2001.
(2001). Design and control of a two degree of freedom haptic device for the application of PC video games. IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2001: Expanding the Societal Role of Robotics in the the Next Millennium, Maui, HI, USA, October 29 - November 3, 2001.
(2001). Communication-Efficient Group Key Agreement. Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on Information Security (IFIP/Sec'01), June 11-13, 2001, Paris, France.
(2000). Simple and fault-tolerant key agreement for dynamic collaborative groups. CCS 2000, Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000.
(2000). Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments. Proceedings of the 20th International Conference on Distributed Computing Systems, Taipei, Taiwan, April 10-13, 2000.
(1996). On the Design of a Stream Cipher and a Hash Function Suitable to Smart Card Applications. Proceedings of the Second Smart Card Research and Advanced Application Conference, CARDIS 1996, September 18-20, 1996, CWI, Amsterdam, The Netherlands.