Yongdae Kim
  • Home
  • Research
  • Publications
  • Teaching
  • Contact
ESC

Searching...

No results found

โ†‘โ†“ Navigate โ†ต Select
Powered by Hugo Blox
  • Teaching
  • Recent & Upcoming Talks
    • Create Beautiful Presentations with Markdown
  • Courses
    • Hugo Blox
      • Getting Started
      • Guide
        • Project Structure
        • Configuration
        • Formatting
          • Embed Media
          • Buttons
          • Callouts
          • Cards
          • Spoilers
          • Steps
      • Reference
        • Customization
        • Internationalization (i18n)
  • Researches
    • Cellular Security Research
    • Cyber-Physical Systems Security
  • Publications
    • CITesting: Systematic Testing of Context Integrity Violations in LTE Core Networks
    • FirmState: Bringing Cellular Protocol States to Shannon Baseband Emulation
    • LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers
    • Passive 3-D User Equipment Tracking Using Long-Term Evolution Uplink Signals
    • Revisiting GPS Spoofing in Phasor Measurement: Real-World Exploitation and Practical Detection in Power Grids
    • Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South Korea
    • XDAC: XAI-Driven Detection and Attribution of LLM-Generated News Comments in Korean
    • A Systematic Study of Physical Sensor Attack Hardness
    • Enabling Physical Localization of Uncooperative Cellular Devices
    • BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software
    • Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials
    • Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting
    • LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper
    • Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels
    • Preventing SIM Box Fraud Using Device Model Fingerprinting
    • Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof
    • Are There Wireless Hidden Cameras Spying on Me?
    • Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild
    • Cellular Security: Why is it difficult?
    • DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices
    • HearMeOut: detecting voice phishing activities in Android
    • Watching the Watchers: Practical Video Identification Attack in LTE Networks
    • Amnesiac DRAM: A Proactive Defense Mechanism Against Cold Boot Attacks
    • BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols
    • Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds
    • Analysis of LFT2
    • FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis
    • Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned
    • SoK: A Minimalist Approach to Formalizing Analog Sensor Security
    • The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure
    • An Eye for an Eye: Economics of Retaliation in Mining Pools
    • Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?
    • Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web
    • Doppelg\"angers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services
    • Hidden Figures: Comparative Latency Analysis of Cellular Networks with Fine-grained State Machine Models
    • Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE
    • Impossibility of Full Decentralization in Permissionless Blockchains
    • Is Stellar As Secure As You Think?
    • Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane
    • Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing
    • Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO
    • GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier
    • GyrosFinger: Fingerprinting Drones for Location Tracking Based on the Outputs of MEMS Gyroscopes
    • Large-Scale Analysis of Remote Code Injection Attacks in Android Apps
    • Peeking Over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -
    • Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
    • Crime Scene Reconstruction: Online Gold Farming Network Analysis
    • Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications
    • When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks
    • Decoder-Free Sino-Korean Shellcode
    • Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4
    • Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack
    • Enabling Automatic Protocol Behavior Analysis for Android Applications
    • Pay as You Want: Bypassing Charging System in Operational Cellular Networks
    • PIkit: A New Kernel-Independent Processor-Interconnect Rootkit
    • Private Over-Threshold Aggregation Protocols over Distributed Datasets
    • Sampling Race: Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital Systems
    • Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]
    • This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump
    • Bittersweet ADB: Attacks and Defenses
    • Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations
    • BurnFit: Analyzing and Exploiting Wearable Devices
    • Extractocol: Autoatic Extraction of Application-level Protocol Behaviors for Android Applications
    • Frying PAN: Dissecting Customized Protocol for Personal Area Network
    • Hijacking the Vuze BitTorrent network: all your hop are belong to us
    • Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors
    • Security Analysis of FHSS-type Drone Controller
    • Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures
    • Analyzing Security of Korean USIM-Based PKI Certificate Service
    • First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA
    • Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission
    • Revisiting security of proportional fair scheduler in wireless cellular networks
    • Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks
    • Successful Profiling Attacks with Different Measurement Environments for Each Phase
    • Attacking the kad network - real world evaluation and high fidelity simulation using DVN
    • Dynamix: anonymity on dynamic social structures
    • Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors
    • Peer Pressure: Exerting Malicious Influence on Routers at a Distance
    • Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs
    • Towards accurate accounting of cellular data for TCP retransmission
    • Trustworthy distributed computing on social networks
    • Using Principal Component Analysis for Practical Biasing of Power Traces to Improve Power Analysis Attacks
    • Location leaks over the GSM air interface
    • Measuring bias in the mixing time of social graphs due to graph sampling
    • On the mixing time of directed social graphs and security implications
    • One-Way Indexing for Plausible Deniability in Censorship Resistant Storage
    • Private Over-Threshold Aggregation Protocols
    • Private Top-k Aggregation Protocols
    • Protecting access privacy of cached contents in information centric networks
    • Security Evaluation of Cryptographic Modules against Profiling Attacks
    • Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous
    • Keep your friends close: Incorporating trust into social network-based Sybil defenses
    • Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks
    • Security Requirements of Certificate Validation in Web Security
    • SocialCloud: Using Social Networks for Building Distributed Computing Services
    • The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems
    • Understanding Social Networks Properties for Trustworthy Computing
    • Balancing the shadows
    • Designs to account for trust in social network-based sybil defenses
    • Efficient Cryptographic Primitives for Private Data Mining
    • Losing control of the internet: using the data plane to attack the control plane
    • Measuring the mixing time of social graphs
    • On Homomorphic Signatures for Network Coding
    • Recruiting new tor relays with BRAIDS
    • Secure encounter-based social networks: requirements, challenges, and designs
    • Timing attacks on PIN input devices
    • Hashing it out in public: common failure modes of DHT-based anonymity schemes
    • Membership-concealing overlay networks
    • On protecting integrity and confidentiality of cryptographic file system for outsourced storage
    • Scalable onion routing with torsk
    • The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems
    • Towards complete node enumeration in a peer-to-peer botnet
    • Why Kad Lookup Fails
    • Attacking the Kad network
    • Provably Secure Timed-Release Public Key Encryption
    • Secure localization with phantom node detection
    • Voice coil motor nano stage with an eddy current damper
    • Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage
    • Combating Double-Spending Using Cooperative P2P Systems
    • Detecting Phantom Nodes in Wireless Sensor Networks
    • Exploring in-situ sensing irregularity in wireless sensor networks
    • Realistic Sensing Area Modeling
    • Achieving realistic sensing area modeling
    • Integrating an Eclipse-Based Scenario Modeling Environment with a Requirements Management System
    • Privacy Preserving Nearest Neighbor Search
    • Privacy Protection in PKIs: A Separation-of-Authority Approach
    • Remote Software-Based Attestation for Wireless Sensors
    • Securing distributed storage: challenges, techniques, and systems
    • Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
    • A New ID-based Signature with Batch Verification
    • Batch Verifications with ID-Based Signatures
    • Design and implementation of a secure multi-agent marketplace
    • Group Key Agreement Efficient in Communication
    • Revisiting random key pre-distribution schemes for wireless sensor networks
    • Secure Group Communication Using Robust Contributory Key Agreement
    • Timed-Release and Key-Insulated Public Key Encryption
    • Admission Control in Peer Groups
    • An Efficient Tree-Based Group Key Agreement Using Bilinear Map
    • Decentralized Authentication Mechanisms for Object-based Storage Devices
    • Secure group key management for storage area networks
    • Security model for a multi-agent marketplace
    • On the Performance of Group Key Agreement Protocols
    • Secure Group Services for Storage Area Networks
    • Tree-based Group Key Agreement
    • Communication-Efficient Group Key Agreement
    • Design and control of a two degree of freedom haptic device for the application of PC video games
    • Exploring Robustness in Group Key Agreement
    • Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments
    • Simple and fault-tolerant key agreement for dynamic collaborative groups
    • On the Design of a Stream Cipher and a Hash Function Suitable to Smart Card Applications
  • Publications
    • CITesting: Systematic Testing of Context Integrity Violations in LTE Core Networks
    • FirmState: Bringing Cellular Protocol States to Shannon Baseband Emulation
    • LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers
    • Passive 3-D User Equipment Tracking Using Long-Term Evolution Uplink Signals
    • Revisiting GPS Spoofing in Phasor Measurement: Real-World Exploitation and Practical Detection in Power Grids
    • Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South Korea
    • XDAC: XAI-Driven Detection and Attribution of LLM-Generated News Comments in Korean
    • A Systematic Study of Physical Sensor Attack Hardness
    • Enabling Physical Localization of Uncooperative Cellular Devices
    • BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software
    • Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials
    • Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting
    • LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper
    • Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels
    • Preventing SIM Box Fraud Using Device Model Fingerprinting
    • Revisiting Binary Code Similarity Analysis Using Interpretable Feature Engineering and Lessons Learned
    • Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof
    • Are There Wireless Hidden Cameras Spying on Me?
    • Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild
    • Cellular Security: Why is it difficult?
    • DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices
    • HearMeOut: detecting voice phishing activities in Android
    • Watching the Watchers: Practical Video Identification Attack in LTE Networks
    • Amnesiac DRAM: A Proactive Defense Mechanism Against Cold Boot Attacks
    • BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols
    • Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds
    • Analysis of LFT2
    • FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis
    • SoK: A Minimalist Approach to Formalizing Analog Sensor Security
    • The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure
    • An Eye for an Eye: Economics of Retaliation in Mining Pools
    • Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?
    • Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web
    • Doppelg\"angers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services
    • Hidden Figures: Comparative Latency Analysis of Cellular Networks with Fine-grained State Machine Models
    • Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE
    • Impossibility of Full Decentralization in Permissionless Blockchains
    • Is Stellar As Secure As You Think?
    • Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane
    • Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing
    • Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO
    • GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier
    • GyrosFinger: Fingerprinting Drones for Location Tracking Based on the Outputs of MEMS Gyroscopes
    • Large-Scale Analysis of Remote Code Injection Attacks in Android Apps
    • Peeking Over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -
    • Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
    • Crime Scene Reconstruction: Online Gold Farming Network Analysis
    • Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications
    • When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks
    • Decoder-Free Sino-Korean Shellcode
    • Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4
    • Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack
    • Enabling Automatic Protocol Behavior Analysis for Android Applications
    • Pay as You Want: Bypassing Charging System in Operational Cellular Networks
    • PIkit: A New Kernel-Independent Processor-Interconnect Rootkit
    • Private Over-Threshold Aggregation Protocols over Distributed Datasets
    • Sampling Race: Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital Systems
    • Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]
    • This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump
    • Bittersweet ADB: Attacks and Defenses
    • Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations
    • BurnFit: Analyzing and Exploiting Wearable Devices
    • Extractocol: Autoatic Extraction of Application-level Protocol Behaviors for Android Applications
    • Frying PAN: Dissecting Customized Protocol for Personal Area Network
    • Hijacking the Vuze BitTorrent network: all your hop are belong to us
    • Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors
    • Security Analysis of FHSS-type Drone Controller
    • Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures
    • Analyzing Security of Korean USIM-Based PKI Certificate Service
    • First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA
    • Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission
    • Revisiting security of proportional fair scheduler in wireless cellular networks
    • Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks
    • Successful Profiling Attacks with Different Measurement Environments for Each Phase
    • Attacking the kad network - real world evaluation and high fidelity simulation using DVN
    • Dynamix: anonymity on dynamic social structures
    • Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors
    • Peer Pressure: Exerting Malicious Influence on Routers at a Distance
    • Protecting access privacy of cached contents in information centric networks
    • Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs
    • Towards accurate accounting of cellular data for TCP retransmission
    • Trustworthy distributed computing on social networks
    • Using Principal Component Analysis for Practical Biasing of Power Traces to Improve Power Analysis Attacks
    • Location leaks over the GSM air interface
    • Measuring bias in the mixing time of social graphs due to graph sampling
    • On the mixing time of directed social graphs and security implications
    • One-Way Indexing for Plausible Deniability in Censorship Resistant Storage
    • Private Over-Threshold Aggregation Protocols
    • Private Top-k Aggregation Protocols
    • Security Evaluation of Cryptographic Modules against Profiling Attacks
    • Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous
    • Keep your friends close: Incorporating trust into social network-based Sybil defenses
    • Losing Control of the Internet: Using the Data Plane to Attack the Control Plane
    • Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks
    • Security Requirements of Certificate Validation in Web Security
    • SocialCloud: Using Social Networks for Building Distributed Computing Services
    • The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems
    • Understanding Social Networks Properties for Trustworthy Computing
    • Balancing the shadows
    • Designs to account for trust in social network-based sybil defenses
    • Efficient Cryptographic Primitives for Private Data Mining
    • Measuring the mixing time of social graphs
    • On Homomorphic Signatures for Network Coding
    • Recruiting new tor relays with BRAIDS
    • Secure encounter-based social networks: requirements, challenges, and designs
    • Timing attacks on PIN input devices
    • Hashing it out in public: common failure modes of DHT-based anonymity schemes
    • Membership-concealing overlay networks
    • On protecting integrity and confidentiality of cryptographic file system for outsourced storage
    • Scalable onion routing with torsk
    • The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems
    • Towards complete node enumeration in a peer-to-peer botnet
    • Why Kad Lookup Fails
    • Attacking the Kad network
    • Provably Secure Timed-Release Public Key Encryption
    • Secure localization with phantom node detection
    • Voice coil motor nano stage with an eddy current damper
    • Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage
    • Combating Double-Spending Using Cooperative P2P Systems
    • Detecting Phantom Nodes in Wireless Sensor Networks
    • Exploring in-situ sensing irregularity in wireless sensor networks
    • Realistic Sensing Area Modeling
    • Achieving realistic sensing area modeling
    • Integrating an Eclipse-Based Scenario Modeling Environment with a Requirements Management System
    • Privacy Preserving Nearest Neighbor Search
    • Privacy Protection in PKIs: A Separation-of-Authority Approach
    • Timed-Release and Key-Insulated Public Key Encryption
    • Remote Software-Based Attestation for Wireless Sensors
    • Securing distributed storage: challenges, techniques, and systems
    • Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
    • A New ID-based Signature with Batch Verification
    • Batch Verifications with ID-Based Signatures
    • Design and implementation of a secure multi-agent marketplace
    • Group Key Agreement Efficient in Communication
    • Revisiting random key pre-distribution schemes for wireless sensor networks
    • Secure Group Communication Using Robust Contributory Key Agreement
    • Tree-based group key agreement
    • Admission Control in Peer Groups
    • An Efficient Tree-Based Group Key Agreement Using Bilinear Map
    • Decentralized Authentication Mechanisms for Object-based Storage Devices
    • Secure group key management for storage area networks
    • Security model for a multi-agent marketplace
    • On the Performance of Group Key Agreement Protocols
    • Secure Group Services for Storage Area Networks
    • Communication-Efficient Group Key Agreement
    • Design and control of a two degree of freedom haptic device for the application of PC video games
    • Exploring Robustness in Group Key Agreement
    • Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments
    • Simple and fault-tolerant key agreement for dynamic collaborative groups
    • On the Design of a Stream Cipher and a Hash Function Suitable to Smart Card Applications
  • Publications.olds
    • CITesting: Systematic Testing of Context Integrity Violations in LTE Core Networks
    • FirmState: Bringing Cellular Protocol States to Shannon Baseband Emulation
    • LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers
    • Passive 3-D User Equipment Tracking Using Long-Term Evolution Uplink Signals
    • Revisiting GPS Spoofing in Phasor Measurement: Real-World Exploitation and Practical Detection in Power Grids
    • Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South Korea
    • XDAC: XAI-Driven Detection and Attribution of LLM-Generated News Comments in Korean
    • A Systematic Study of Physical Sensor Attack Hardness
    • Enabling Physical Localization of Uncooperative Cellular Devices
    • BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software
    • Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials
    • Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting
    • LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper
    • Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels
    • Preventing SIM Box Fraud Using Device Model Fingerprinting
    • Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof
    • Are There Wireless Hidden Cameras Spying on Me?
    • Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild
    • Cellular Security: Why is it difficult?
    • DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices
    • HearMeOut: detecting voice phishing activities in Android
    • Watching the Watchers: Practical Video Identification Attack in LTE Networks
    • Amnesiac DRAM: A Proactive Defense Mechanism Against Cold Boot Attacks
    • BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols
    • Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds
    • Analysis of LFT2
    • FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis
    • Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned
    • SoK: A Minimalist Approach to Formalizing Analog Sensor Security
    • The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure
    • An Eye for an Eye: Economics of Retaliation in Mining Pools
    • Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?
    • Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web
    • Doppelg\"angers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services
    • Hidden Figures: Comparative Latency Analysis of Cellular Networks with Fine-grained State Machine Models
    • Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE
    • Impossibility of Full Decentralization in Permissionless Blockchains
    • Is Stellar As Secure As You Think?
    • Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane
    • Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing
    • Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO
    • GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier
    • GyrosFinger: Fingerprinting Drones for Location Tracking Based on the Outputs of MEMS Gyroscopes
    • Large-Scale Analysis of Remote Code Injection Attacks in Android Apps
    • Peeking Over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -
    • Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
    • Crime Scene Reconstruction: Online Gold Farming Network Analysis
    • Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications
    • When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks
    • Decoder-Free Sino-Korean Shellcode
    • Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4
    • Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack
    • Enabling Automatic Protocol Behavior Analysis for Android Applications
    • Pay as You Want: Bypassing Charging System in Operational Cellular Networks
    • PIkit: A New Kernel-Independent Processor-Interconnect Rootkit
    • Private Over-Threshold Aggregation Protocols over Distributed Datasets
    • Sampling Race: Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital Systems
    • Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]
    • This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump
    • Bittersweet ADB: Attacks and Defenses
    • Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations
    • BurnFit: Analyzing and Exploiting Wearable Devices
    • Extractocol: Autoatic Extraction of Application-level Protocol Behaviors for Android Applications
    • Frying PAN: Dissecting Customized Protocol for Personal Area Network
    • Hijacking the Vuze BitTorrent network: all your hop are belong to us
    • Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors
    • Security Analysis of FHSS-type Drone Controller
    • Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures
    • Analyzing Security of Korean USIM-Based PKI Certificate Service
    • First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA
    • Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission
    • Revisiting security of proportional fair scheduler in wireless cellular networks
    • Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks
    • Successful Profiling Attacks with Different Measurement Environments for Each Phase
    • Attacking the kad network - real world evaluation and high fidelity simulation using DVN
    • Dynamix: anonymity on dynamic social structures
    • Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors
    • Peer Pressure: Exerting Malicious Influence on Routers at a Distance
    • Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs
    • Towards accurate accounting of cellular data for TCP retransmission
    • Trustworthy distributed computing on social networks
    • Using Principal Component Analysis for Practical Biasing of Power Traces to Improve Power Analysis Attacks
    • Location leaks over the GSM air interface
    • Measuring bias in the mixing time of social graphs due to graph sampling
    • On the mixing time of directed social graphs and security implications
    • One-Way Indexing for Plausible Deniability in Censorship Resistant Storage
    • Private Over-Threshold Aggregation Protocols
    • Private Top-k Aggregation Protocols
    • Protecting access privacy of cached contents in information centric networks
    • Security Evaluation of Cryptographic Modules against Profiling Attacks
    • Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous
    • Keep your friends close: Incorporating trust into social network-based Sybil defenses
    • Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks
    • Security Requirements of Certificate Validation in Web Security
    • SocialCloud: Using Social Networks for Building Distributed Computing Services
    • The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems
    • Understanding Social Networks Properties for Trustworthy Computing
    • Balancing the shadows
    • Designs to account for trust in social network-based sybil defenses
    • Efficient Cryptographic Primitives for Private Data Mining
    • Losing control of the internet: using the data plane to attack the control plane
    • Measuring the mixing time of social graphs
    • On Homomorphic Signatures for Network Coding
    • Recruiting new tor relays with BRAIDS
    • Secure encounter-based social networks: requirements, challenges, and designs
    • Timing attacks on PIN input devices
    • Hashing it out in public: common failure modes of DHT-based anonymity schemes
    • Membership-concealing overlay networks
    • On protecting integrity and confidentiality of cryptographic file system for outsourced storage
    • Scalable onion routing with torsk
    • The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems
    • Towards complete node enumeration in a peer-to-peer botnet
    • Why Kad Lookup Fails
    • Attacking the Kad network
    • Provably Secure Timed-Release Public Key Encryption
    • Secure localization with phantom node detection
    • Voice coil motor nano stage with an eddy current damper
    • Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage
    • Combating Double-Spending Using Cooperative P2P Systems
    • Detecting Phantom Nodes in Wireless Sensor Networks
    • Exploring in-situ sensing irregularity in wireless sensor networks
    • Realistic Sensing Area Modeling
    • Achieving realistic sensing area modeling
    • Integrating an Eclipse-Based Scenario Modeling Environment with a Requirements Management System
    • Privacy Preserving Nearest Neighbor Search
    • Privacy Protection in PKIs: A Separation-of-Authority Approach
    • Remote Software-Based Attestation for Wireless Sensors
    • Securing distributed storage: challenges, techniques, and systems
    • Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
    • A New ID-based Signature with Batch Verification
    • Batch Verifications with ID-Based Signatures
    • Design and implementation of a secure multi-agent marketplace
    • Group Key Agreement Efficient in Communication
    • Revisiting random key pre-distribution schemes for wireless sensor networks
    • Secure Group Communication Using Robust Contributory Key Agreement
    • Timed-Release and Key-Insulated Public Key Encryption
    • Admission Control in Peer Groups
    • An Efficient Tree-Based Group Key Agreement Using Bilinear Map
    • Decentralized Authentication Mechanisms for Object-based Storage Devices
    • Secure group key management for storage area networks
    • Security model for a multi-agent marketplace
    • On the Performance of Group Key Agreement Protocols
    • Secure Group Services for Storage Area Networks
    • Tree-based Group Key Agreement
    • Communication-Efficient Group Key Agreement
    • Design and control of a two degree of freedom haptic device for the application of PC video games
    • Exploring Robustness in Group Key Agreement
    • Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments
    • Simple and fault-tolerant key agreement for dynamic collaborative groups
    • On the Design of a Stream Cipher and a Hash Function Suitable to Smart Card Applications
  • Blog
    • โšก๏ธ Turn Jupyter Notebooks into Blog Posts
    • ๐ŸŽ‰ Easily create your own simple yet highly customizable blog
    • ๐Ÿง  Sharpen your thinking with a second brain
    • ๐Ÿ“ˆ Communicate your results effectively with the best data visualizations
    • ๐Ÿ‘ฉ๐Ÿผโ€๐Ÿซ Teach academic courses
    • โœ… Manage your projects
  • Projects
    • Pandas
    • PyTorch
    • scikit-learn
  • Slides
    • Example Talk: Recent Work
  • Experience
  • Contact

Revisiting random key pre-distribution schemes for wireless sensor networks

Jan 1, 2004ยท
Joengmin Hwang
,
Yongdae Kim
ยท 0 min read
DOI
Type
1
Publication
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2004, Washington, DC, USA, October 25, 2004
Last updated on Jan 1, 2004
Authors
Joengmin Hwang
Authors
Yongdae Kim

← Group Key Agreement Efficient in Communication Jan 1, 2004
Secure Group Communication Using Robust Contributory Key Agreement Jan 1, 2004 →

ยฉ 2026 Yongdae Kim. This work is licensed under {license}

Made with Hugo Blox โ€” Open Source. Build yours โ†’