Yongdae Kim
  • Home
  • Research
  • Publications
  • Teaching
  • Contact
ESC

Searching...

No results found

โ†‘โ†“ Navigate โ†ต Select
Powered by Hugo Blox
  • Teaching
  • Recent & Upcoming Talks
    • Create Beautiful Presentations with Markdown
  • Courses
    • Hugo Blox
      • Getting Started
      • Guide
        • Project Structure
        • Configuration
        • Formatting
          • Embed Media
          • Buttons
          • Callouts
          • Cards
          • Spoilers
          • Steps
      • Reference
        • Customization
        • Internationalization (i18n)
  • Researches
    • Cellular Security Research
    • Cyber-Physical Systems Security
  • Publications
    • CITesting: Systematic Testing of Context Integrity Violations in LTE Core Networks
    • FirmState: Bringing Cellular Protocol States to Shannon Baseband Emulation
    • LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers
    • Passive 3-D User Equipment Tracking Using Long-Term Evolution Uplink Signals
    • Revisiting GPS Spoofing in Phasor Measurement: Real-World Exploitation and Practical Detection in Power Grids
    • Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South Korea
    • XDAC: XAI-Driven Detection and Attribution of LLM-Generated News Comments in Korean
    • A Systematic Study of Physical Sensor Attack Hardness
    • Enabling Physical Localization of Uncooperative Cellular Devices
    • BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software
    • Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials
    • Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting
    • LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper
    • Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels
    • Preventing SIM Box Fraud Using Device Model Fingerprinting
    • Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof
    • Are There Wireless Hidden Cameras Spying on Me?
    • Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild
    • Cellular Security: Why is it difficult?
    • DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices
    • HearMeOut: detecting voice phishing activities in Android
    • Watching the Watchers: Practical Video Identification Attack in LTE Networks
    • Amnesiac DRAM: A Proactive Defense Mechanism Against Cold Boot Attacks
    • BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols
    • Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds
    • Analysis of LFT2
    • FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis
    • Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned
    • SoK: A Minimalist Approach to Formalizing Analog Sensor Security
    • The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure
    • An Eye for an Eye: Economics of Retaliation in Mining Pools
    • Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?
    • Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web
    • Doppelg\"angers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services
    • Hidden Figures: Comparative Latency Analysis of Cellular Networks with Fine-grained State Machine Models
    • Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE
    • Impossibility of Full Decentralization in Permissionless Blockchains
    • Is Stellar As Secure As You Think?
    • Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane
    • Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing
    • Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO
    • GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier
    • GyrosFinger: Fingerprinting Drones for Location Tracking Based on the Outputs of MEMS Gyroscopes
    • Large-Scale Analysis of Remote Code Injection Attacks in Android Apps
    • Peeking Over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -
    • Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
    • Crime Scene Reconstruction: Online Gold Farming Network Analysis
    • Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications
    • When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks
    • Decoder-Free Sino-Korean Shellcode
    • Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4
    • Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack
    • Enabling Automatic Protocol Behavior Analysis for Android Applications
    • Pay as You Want: Bypassing Charging System in Operational Cellular Networks
    • PIkit: A New Kernel-Independent Processor-Interconnect Rootkit
    • Private Over-Threshold Aggregation Protocols over Distributed Datasets
    • Sampling Race: Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital Systems
    • Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]
    • This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump
    • Bittersweet ADB: Attacks and Defenses
    • Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations
    • BurnFit: Analyzing and Exploiting Wearable Devices
    • Extractocol: Autoatic Extraction of Application-level Protocol Behaviors for Android Applications
    • Frying PAN: Dissecting Customized Protocol for Personal Area Network
    • Hijacking the Vuze BitTorrent network: all your hop are belong to us
    • Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors
    • Security Analysis of FHSS-type Drone Controller
    • Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures
    • Analyzing Security of Korean USIM-Based PKI Certificate Service
    • First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA
    • Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission
    • Revisiting security of proportional fair scheduler in wireless cellular networks
    • Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks
    • Successful Profiling Attacks with Different Measurement Environments for Each Phase
    • Attacking the kad network - real world evaluation and high fidelity simulation using DVN
    • Dynamix: anonymity on dynamic social structures
    • Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors
    • Peer Pressure: Exerting Malicious Influence on Routers at a Distance
    • Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs
    • Towards accurate accounting of cellular data for TCP retransmission
    • Trustworthy distributed computing on social networks
    • Using Principal Component Analysis for Practical Biasing of Power Traces to Improve Power Analysis Attacks
    • Location leaks over the GSM air interface
    • Measuring bias in the mixing time of social graphs due to graph sampling
    • On the mixing time of directed social graphs and security implications
    • One-Way Indexing for Plausible Deniability in Censorship Resistant Storage
    • Private Over-Threshold Aggregation Protocols
    • Private Top-k Aggregation Protocols
    • Protecting access privacy of cached contents in information centric networks
    • Security Evaluation of Cryptographic Modules against Profiling Attacks
    • Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous
    • Keep your friends close: Incorporating trust into social network-based Sybil defenses
    • Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks
    • Security Requirements of Certificate Validation in Web Security
    • SocialCloud: Using Social Networks for Building Distributed Computing Services
    • The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems
    • Understanding Social Networks Properties for Trustworthy Computing
    • Balancing the shadows
    • Designs to account for trust in social network-based sybil defenses
    • Efficient Cryptographic Primitives for Private Data Mining
    • Losing control of the internet: using the data plane to attack the control plane
    • Measuring the mixing time of social graphs
    • On Homomorphic Signatures for Network Coding
    • Recruiting new tor relays with BRAIDS
    • Secure encounter-based social networks: requirements, challenges, and designs
    • Timing attacks on PIN input devices
    • Hashing it out in public: common failure modes of DHT-based anonymity schemes
    • Membership-concealing overlay networks
    • On protecting integrity and confidentiality of cryptographic file system for outsourced storage
    • Scalable onion routing with torsk
    • The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems
    • Towards complete node enumeration in a peer-to-peer botnet
    • Why Kad Lookup Fails
    • Attacking the Kad network
    • Provably Secure Timed-Release Public Key Encryption
    • Secure localization with phantom node detection
    • Voice coil motor nano stage with an eddy current damper
    • Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage
    • Combating Double-Spending Using Cooperative P2P Systems
    • Detecting Phantom Nodes in Wireless Sensor Networks
    • Exploring in-situ sensing irregularity in wireless sensor networks
    • Realistic Sensing Area Modeling
    • Achieving realistic sensing area modeling
    • Integrating an Eclipse-Based Scenario Modeling Environment with a Requirements Management System
    • Privacy Preserving Nearest Neighbor Search
    • Privacy Protection in PKIs: A Separation-of-Authority Approach
    • Remote Software-Based Attestation for Wireless Sensors
    • Securing distributed storage: challenges, techniques, and systems
    • Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
    • A New ID-based Signature with Batch Verification
    • Batch Verifications with ID-Based Signatures
    • Design and implementation of a secure multi-agent marketplace
    • Group Key Agreement Efficient in Communication
    • Revisiting random key pre-distribution schemes for wireless sensor networks
    • Secure Group Communication Using Robust Contributory Key Agreement
    • Timed-Release and Key-Insulated Public Key Encryption
    • Admission Control in Peer Groups
    • An Efficient Tree-Based Group Key Agreement Using Bilinear Map
    • Decentralized Authentication Mechanisms for Object-based Storage Devices
    • Secure group key management for storage area networks
    • Security model for a multi-agent marketplace
    • On the Performance of Group Key Agreement Protocols
    • Secure Group Services for Storage Area Networks
    • Tree-based Group Key Agreement
    • Communication-Efficient Group Key Agreement
    • Design and control of a two degree of freedom haptic device for the application of PC video games
    • Exploring Robustness in Group Key Agreement
    • Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments
    • Simple and fault-tolerant key agreement for dynamic collaborative groups
    • On the Design of a Stream Cipher and a Hash Function Suitable to Smart Card Applications
  • Publications
    • CITesting: Systematic Testing of Context Integrity Violations in LTE Core Networks
    • FirmState: Bringing Cellular Protocol States to Shannon Baseband Emulation
    • LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers
    • Passive 3-D User Equipment Tracking Using Long-Term Evolution Uplink Signals
    • Revisiting GPS Spoofing in Phasor Measurement: Real-World Exploitation and Practical Detection in Power Grids
    • Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South Korea
    • XDAC: XAI-Driven Detection and Attribution of LLM-Generated News Comments in Korean
    • A Systematic Study of Physical Sensor Attack Hardness
    • Enabling Physical Localization of Uncooperative Cellular Devices
    • BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software
    • Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials
    • Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting
    • LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper
    • Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels
    • Preventing SIM Box Fraud Using Device Model Fingerprinting
    • Revisiting Binary Code Similarity Analysis Using Interpretable Feature Engineering and Lessons Learned
    • Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof
    • Are There Wireless Hidden Cameras Spying on Me?
    • Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild
    • Cellular Security: Why is it difficult?
    • DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices
    • HearMeOut: detecting voice phishing activities in Android
    • Watching the Watchers: Practical Video Identification Attack in LTE Networks
    • Amnesiac DRAM: A Proactive Defense Mechanism Against Cold Boot Attacks
    • BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols
    • Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds
    • Analysis of LFT2
    • FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis
    • SoK: A Minimalist Approach to Formalizing Analog Sensor Security
    • The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure
    • An Eye for an Eye: Economics of Retaliation in Mining Pools
    • Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?
    • Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web
    • Doppelg\"angers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services
    • Hidden Figures: Comparative Latency Analysis of Cellular Networks with Fine-grained State Machine Models
    • Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE
    • Impossibility of Full Decentralization in Permissionless Blockchains
    • Is Stellar As Secure As You Think?
    • Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane
    • Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing
    • Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO
    • GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier
    • GyrosFinger: Fingerprinting Drones for Location Tracking Based on the Outputs of MEMS Gyroscopes
    • Large-Scale Analysis of Remote Code Injection Attacks in Android Apps
    • Peeking Over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -
    • Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
    • Crime Scene Reconstruction: Online Gold Farming Network Analysis
    • Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications
    • When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks
    • Decoder-Free Sino-Korean Shellcode
    • Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4
    • Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack
    • Enabling Automatic Protocol Behavior Analysis for Android Applications
    • Pay as You Want: Bypassing Charging System in Operational Cellular Networks
    • PIkit: A New Kernel-Independent Processor-Interconnect Rootkit
    • Private Over-Threshold Aggregation Protocols over Distributed Datasets
    • Sampling Race: Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital Systems
    • Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]
    • This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump
    • Bittersweet ADB: Attacks and Defenses
    • Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations
    • BurnFit: Analyzing and Exploiting Wearable Devices
    • Extractocol: Autoatic Extraction of Application-level Protocol Behaviors for Android Applications
    • Frying PAN: Dissecting Customized Protocol for Personal Area Network
    • Hijacking the Vuze BitTorrent network: all your hop are belong to us
    • Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors
    • Security Analysis of FHSS-type Drone Controller
    • Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures
    • Analyzing Security of Korean USIM-Based PKI Certificate Service
    • First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA
    • Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission
    • Revisiting security of proportional fair scheduler in wireless cellular networks
    • Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks
    • Successful Profiling Attacks with Different Measurement Environments for Each Phase
    • Attacking the kad network - real world evaluation and high fidelity simulation using DVN
    • Dynamix: anonymity on dynamic social structures
    • Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors
    • Peer Pressure: Exerting Malicious Influence on Routers at a Distance
    • Protecting access privacy of cached contents in information centric networks
    • Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs
    • Towards accurate accounting of cellular data for TCP retransmission
    • Trustworthy distributed computing on social networks
    • Using Principal Component Analysis for Practical Biasing of Power Traces to Improve Power Analysis Attacks
    • Location leaks over the GSM air interface
    • Measuring bias in the mixing time of social graphs due to graph sampling
    • On the mixing time of directed social graphs and security implications
    • One-Way Indexing for Plausible Deniability in Censorship Resistant Storage
    • Private Over-Threshold Aggregation Protocols
    • Private Top-k Aggregation Protocols
    • Security Evaluation of Cryptographic Modules against Profiling Attacks
    • Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous
    • Keep your friends close: Incorporating trust into social network-based Sybil defenses
    • Losing Control of the Internet: Using the Data Plane to Attack the Control Plane
    • Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks
    • Security Requirements of Certificate Validation in Web Security
    • SocialCloud: Using Social Networks for Building Distributed Computing Services
    • The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems
    • Understanding Social Networks Properties for Trustworthy Computing
    • Balancing the shadows
    • Designs to account for trust in social network-based sybil defenses
    • Efficient Cryptographic Primitives for Private Data Mining
    • Measuring the mixing time of social graphs
    • On Homomorphic Signatures for Network Coding
    • Recruiting new tor relays with BRAIDS
    • Secure encounter-based social networks: requirements, challenges, and designs
    • Timing attacks on PIN input devices
    • Hashing it out in public: common failure modes of DHT-based anonymity schemes
    • Membership-concealing overlay networks
    • On protecting integrity and confidentiality of cryptographic file system for outsourced storage
    • Scalable onion routing with torsk
    • The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems
    • Towards complete node enumeration in a peer-to-peer botnet
    • Why Kad Lookup Fails
    • Attacking the Kad network
    • Provably Secure Timed-Release Public Key Encryption
    • Secure localization with phantom node detection
    • Voice coil motor nano stage with an eddy current damper
    • Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage
    • Combating Double-Spending Using Cooperative P2P Systems
    • Detecting Phantom Nodes in Wireless Sensor Networks
    • Exploring in-situ sensing irregularity in wireless sensor networks
    • Realistic Sensing Area Modeling
    • Achieving realistic sensing area modeling
    • Integrating an Eclipse-Based Scenario Modeling Environment with a Requirements Management System
    • Privacy Preserving Nearest Neighbor Search
    • Privacy Protection in PKIs: A Separation-of-Authority Approach
    • Timed-Release and Key-Insulated Public Key Encryption
    • Remote Software-Based Attestation for Wireless Sensors
    • Securing distributed storage: challenges, techniques, and systems
    • Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
    • A New ID-based Signature with Batch Verification
    • Batch Verifications with ID-Based Signatures
    • Design and implementation of a secure multi-agent marketplace
    • Group Key Agreement Efficient in Communication
    • Revisiting random key pre-distribution schemes for wireless sensor networks
    • Secure Group Communication Using Robust Contributory Key Agreement
    • Tree-based group key agreement
    • Admission Control in Peer Groups
    • An Efficient Tree-Based Group Key Agreement Using Bilinear Map
    • Decentralized Authentication Mechanisms for Object-based Storage Devices
    • Secure group key management for storage area networks
    • Security model for a multi-agent marketplace
    • On the Performance of Group Key Agreement Protocols
    • Secure Group Services for Storage Area Networks
    • Communication-Efficient Group Key Agreement
    • Design and control of a two degree of freedom haptic device for the application of PC video games
    • Exploring Robustness in Group Key Agreement
    • Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments
    • Simple and fault-tolerant key agreement for dynamic collaborative groups
    • On the Design of a Stream Cipher and a Hash Function Suitable to Smart Card Applications
  • Publications.olds
    • CITesting: Systematic Testing of Context Integrity Violations in LTE Core Networks
    • FirmState: Bringing Cellular Protocol States to Shannon Baseband Emulation
    • LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers
    • Passive 3-D User Equipment Tracking Using Long-Term Evolution Uplink Signals
    • Revisiting GPS Spoofing in Phasor Measurement: Real-World Exploitation and Practical Detection in Power Grids
    • Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South Korea
    • XDAC: XAI-Driven Detection and Attribution of LLM-Generated News Comments in Korean
    • A Systematic Study of Physical Sensor Attack Hardness
    • Enabling Physical Localization of Uncooperative Cellular Devices
    • BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software
    • Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials
    • Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting
    • LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper
    • Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels
    • Preventing SIM Box Fraud Using Device Model Fingerprinting
    • Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof
    • Are There Wireless Hidden Cameras Spying on Me?
    • Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild
    • Cellular Security: Why is it difficult?
    • DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices
    • HearMeOut: detecting voice phishing activities in Android
    • Watching the Watchers: Practical Video Identification Attack in LTE Networks
    • Amnesiac DRAM: A Proactive Defense Mechanism Against Cold Boot Attacks
    • BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols
    • Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds
    • Analysis of LFT2
    • FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis
    • Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned
    • SoK: A Minimalist Approach to Formalizing Analog Sensor Security
    • The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure
    • An Eye for an Eye: Economics of Retaliation in Mining Pools
    • Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?
    • Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web
    • Doppelg\"angers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services
    • Hidden Figures: Comparative Latency Analysis of Cellular Networks with Fine-grained State Machine Models
    • Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE
    • Impossibility of Full Decentralization in Permissionless Blockchains
    • Is Stellar As Secure As You Think?
    • Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane
    • Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing
    • Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO
    • GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier
    • GyrosFinger: Fingerprinting Drones for Location Tracking Based on the Outputs of MEMS Gyroscopes
    • Large-Scale Analysis of Remote Code Injection Attacks in Android Apps
    • Peeking Over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -
    • Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
    • Crime Scene Reconstruction: Online Gold Farming Network Analysis
    • Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications
    • When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks
    • Decoder-Free Sino-Korean Shellcode
    • Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4
    • Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack
    • Enabling Automatic Protocol Behavior Analysis for Android Applications
    • Pay as You Want: Bypassing Charging System in Operational Cellular Networks
    • PIkit: A New Kernel-Independent Processor-Interconnect Rootkit
    • Private Over-Threshold Aggregation Protocols over Distributed Datasets
    • Sampling Race: Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital Systems
    • Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]
    • This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump
    • Bittersweet ADB: Attacks and Defenses
    • Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations
    • BurnFit: Analyzing and Exploiting Wearable Devices
    • Extractocol: Autoatic Extraction of Application-level Protocol Behaviors for Android Applications
    • Frying PAN: Dissecting Customized Protocol for Personal Area Network
    • Hijacking the Vuze BitTorrent network: all your hop are belong to us
    • Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors
    • Security Analysis of FHSS-type Drone Controller
    • Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures
    • Analyzing Security of Korean USIM-Based PKI Certificate Service
    • First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA
    • Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission
    • Revisiting security of proportional fair scheduler in wireless cellular networks
    • Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks
    • Successful Profiling Attacks with Different Measurement Environments for Each Phase
    • Attacking the kad network - real world evaluation and high fidelity simulation using DVN
    • Dynamix: anonymity on dynamic social structures
    • Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors
    • Peer Pressure: Exerting Malicious Influence on Routers at a Distance
    • Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs
    • Towards accurate accounting of cellular data for TCP retransmission
    • Trustworthy distributed computing on social networks
    • Using Principal Component Analysis for Practical Biasing of Power Traces to Improve Power Analysis Attacks
    • Location leaks over the GSM air interface
    • Measuring bias in the mixing time of social graphs due to graph sampling
    • On the mixing time of directed social graphs and security implications
    • One-Way Indexing for Plausible Deniability in Censorship Resistant Storage
    • Private Over-Threshold Aggregation Protocols
    • Private Top-k Aggregation Protocols
    • Protecting access privacy of cached contents in information centric networks
    • Security Evaluation of Cryptographic Modules against Profiling Attacks
    • Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous
    • Keep your friends close: Incorporating trust into social network-based Sybil defenses
    • Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks
    • Security Requirements of Certificate Validation in Web Security
    • SocialCloud: Using Social Networks for Building Distributed Computing Services
    • The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems
    • Understanding Social Networks Properties for Trustworthy Computing
    • Balancing the shadows
    • Designs to account for trust in social network-based sybil defenses
    • Efficient Cryptographic Primitives for Private Data Mining
    • Losing control of the internet: using the data plane to attack the control plane
    • Measuring the mixing time of social graphs
    • On Homomorphic Signatures for Network Coding
    • Recruiting new tor relays with BRAIDS
    • Secure encounter-based social networks: requirements, challenges, and designs
    • Timing attacks on PIN input devices
    • Hashing it out in public: common failure modes of DHT-based anonymity schemes
    • Membership-concealing overlay networks
    • On protecting integrity and confidentiality of cryptographic file system for outsourced storage
    • Scalable onion routing with torsk
    • The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems
    • Towards complete node enumeration in a peer-to-peer botnet
    • Why Kad Lookup Fails
    • Attacking the Kad network
    • Provably Secure Timed-Release Public Key Encryption
    • Secure localization with phantom node detection
    • Voice coil motor nano stage with an eddy current damper
    • Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage
    • Combating Double-Spending Using Cooperative P2P Systems
    • Detecting Phantom Nodes in Wireless Sensor Networks
    • Exploring in-situ sensing irregularity in wireless sensor networks
    • Realistic Sensing Area Modeling
    • Achieving realistic sensing area modeling
    • Integrating an Eclipse-Based Scenario Modeling Environment with a Requirements Management System
    • Privacy Preserving Nearest Neighbor Search
    • Privacy Protection in PKIs: A Separation-of-Authority Approach
    • Remote Software-Based Attestation for Wireless Sensors
    • Securing distributed storage: challenges, techniques, and systems
    • Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
    • A New ID-based Signature with Batch Verification
    • Batch Verifications with ID-Based Signatures
    • Design and implementation of a secure multi-agent marketplace
    • Group Key Agreement Efficient in Communication
    • Revisiting random key pre-distribution schemes for wireless sensor networks
    • Secure Group Communication Using Robust Contributory Key Agreement
    • Timed-Release and Key-Insulated Public Key Encryption
    • Admission Control in Peer Groups
    • An Efficient Tree-Based Group Key Agreement Using Bilinear Map
    • Decentralized Authentication Mechanisms for Object-based Storage Devices
    • Secure group key management for storage area networks
    • Security model for a multi-agent marketplace
    • On the Performance of Group Key Agreement Protocols
    • Secure Group Services for Storage Area Networks
    • Tree-based Group Key Agreement
    • Communication-Efficient Group Key Agreement
    • Design and control of a two degree of freedom haptic device for the application of PC video games
    • Exploring Robustness in Group Key Agreement
    • Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments
    • Simple and fault-tolerant key agreement for dynamic collaborative groups
    • On the Design of a Stream Cipher and a Hash Function Suitable to Smart Card Applications
  • Blog
    • โšก๏ธ Turn Jupyter Notebooks into Blog Posts
    • ๐ŸŽ‰ Easily create your own simple yet highly customizable blog
    • ๐Ÿง  Sharpen your thinking with a second brain
    • ๐Ÿ“ˆ Communicate your results effectively with the best data visualizations
    • ๐Ÿ‘ฉ๐Ÿผโ€๐Ÿซ Teach academic courses
    • โœ… Manage your projects
  • Projects
    • Pandas
    • PyTorch
    • scikit-learn
  • Slides
    • Example Talk: Recent Work
  • Experience
  • Contact

Keep your friends close: Incorporating trust into social network-based Sybil defenses

Jan 1, 2011ยท
Abedelaziz Mohaisen
,
Nicholas Hopper
,
Yongdae Kim
ยท 0 min read
DOI
Last updated on Jan 1, 2011
Authors
Abedelaziz Mohaisen
Authors
Nicholas Hopper
Authors
Yongdae Kim

← Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous Jan 1, 2012
Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks Jan 1, 2011 →

ยฉ 2026 Yongdae Kim. This work is licensed under {license}

Made with Hugo Blox โ€” Open Source. Build yours โ†’