Publications.olds

LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers

Impact LLFuzz uncovered 11 previously unknown vulnerabilities across 15 commercial smartphones from major vendors including Qualcomm, MediaTek, Samsung, and Apple. Seven of these …

Tuan Dinh Hoang

CITesting: Systematic Testing of Context Integrity Violations in LTE Core Networks

🏆 Distinguished Paper Award Impact We uncovered 29, 22, 16, and 59 distinct CIVs in Open5GS, srsRAN, Amarisoft, and Nokia LTE cores, respectively. These allow remote detachment, …

Mincheol Son

A Systematic Study of Physical Sensor Attack Hardness

Hyungsub Kim

Preventing SIM Box Fraud Using Device Model Fingerprinting

Impact We are currently testing our solution with a major operator in Korea.

Beomseok Oh

LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper

Impact LTESniffer is open-sourced at https://github.com/SysSec-KAIST/LTESniffer). It is very popular in github, receiving 1,212 stars with 128 forked project. There are at least …

Tuan Dinh Hoang

Watching the Watchers: Practical Video Identification Attack in LTE Networks

Impact Although it is too early to determine the impact of the video identification work, it was discussed in 2022 August 3GPP meeting (S3-221922). We plan to exploit information …

Sangwook Bae

HearMeOut: detecting voice phishing activities in Android

Media Coverage IT Media

Joongyum Kim

DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices

Impact This paper was discussed in a 3GPP SA3 meeting. It is currently open-sourced at https://github.com/SysSec-KAIST/DoLTEst. We uncovered 26 implementation flaws from 43 devices …

CheolJun Park

Cellular Security: Why is it difficult?

Yongdae Kim

Are There Wireless Hidden Cameras Spying on Me?

Jeongyoon Heo

Analysis of LFT2

Geunwoo Lim

Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane

Impact Immediately after the paper is published online, we’ve received inquiries from many operators such as Deutche Telecom, Google Project Fi, Singtel, etc if we can visit their …

Hongil Kim

Is Stellar As Secure As You Think?

Media Coverage Cointelegraph: Stellar’s Blockchain Briefly Goes Offline Confirming the Project Lacks Decentralization Safety vs. Liveness in the Stellar Network David Mazi'eres

Minjeong Kim

Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE

Impact The initial response from GSMA was disappointing as they viewed this work as only academically interesting. However, it turned out to be important for both academia and …

Hojoon Yang

GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier

Impact Our first paperkune2012location in 2012 was discussed in three SA3 meetings held in 2017 across multiple documents: TSG3_086_SophiaSA3 meeting as part of 86th 3GPP meeting …

Byeongdo Hong

Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin

Media Coverage ACM The Morning Paper

Yujin Kwon

Decoder-Free Sino-Korean Shellcode

Ji-Hyeon Yoon

Security Analysis of FHSS-type Drone Controller

Hocheol Shin

BurnFit: Analyzing and Exploiting Wearable Devices

Dongkwan Kim

Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations

Impact At the time, only South Korea and the United States had widely deployed Voice over LTE (VoLTE) technology, so no other countries were affected. The vulnerabilities were …

Hongil Kim

Bittersweet ADB: Attacks and Defenses

Sungjae Hwang

Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission

Impact We discovered that Korean operators are more concerned with over-charging than charging bypass. This is because over-charging can result in penalties from the government. …

Younghwan Go

Trustworthy distributed computing on social networks

Abedelaziz Mohaisen

Towards accurate accounting of cellular data for TCP retransmission

Impact We discovered that Korean operators are more concerned with over-charging than charging bypass. This is because over-charging can result in penalties from the government. …

Younghwan Go

Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors

Media Coverage The Register

Denis Foo Kune

Dynamix: anonymity on dynamic social structures

Abedelaziz Mohaisen

Private Top-k Aggregation Protocols

Myungsun Kim

Private Over-Threshold Aggregation Protocols

Myungsun Kim

Location leaks over the GSM air interface

Impact Our first paperkune2012location in 2012 was discussed in three SA3 meetings held in 2017 across multiple documents: TSG3_086_SophiaSA3 meeting as part of 86th 3GPP meeting …

Denis Foo Kune

Timing attacks on PIN input devices

Denis Foo Kune

Recruiting new tor relays with BRAIDS

Rob Jansen

On Homomorphic Signatures for Network Coding

Aaram Yun

Measuring the mixing time of social graphs

Abedelaziz Mohaisen

Losing control of the internet: using the data plane to attack the control plane

Media Coverage New Scientist ZDNet The Register

Max Schuchard

Balancing the shadows

Max Schuchard

Why Kad Lookup Fails

Hun Jeong Kang

Towards complete node enumeration in a peer-to-peer botnet

Brent ByungHoon Kang

Scalable onion routing with torsk

Jon McLachlan

Membership-concealing overlay networks

Eugene y. vasserman

Secure localization with phantom node detection

Joengmin Hwang

Provably Secure Timed-Release Public Key Encryption

Jung Hee Cheon

Attacking the Kad network

Peng Wang

Realistic Sensing Area Modeling

Joengmin Hwang

Detecting Phantom Nodes in Wireless Sensor Networks

Joengmin Hwang

Privacy Preserving Nearest Neighbor Search

Mark Shaneck

Achieving realistic sensing area modeling

Joengmin Hwang

Timed-Release and Key-Insulated Public Key Encryption

Jung Hee Cheon

Group Key Agreement Efficient in Communication

Yongdae Kim

Batch Verifications with ID-Based Signatures

HyoJin Yoon

A New ID-based Signature with Batch Verification

Jung Hee Cheon

Security model for a multi-agent marketplace

Ashutosh Jaiswal

Admission Control in Peer Groups

Yongdae Kim

Tree-based Group Key Agreement

Yongdae Kim

Secure Group Services for Storage Area Networks

Yongdae Kim

Exploring Robustness in Group Key Agreement

Yair Amir

Communication-Efficient Group Key Agreement

Yongdae Kim