What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yongdae Kim
Google Scholar
ORCID:
0000-0003-4879-1262
69
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/wisec
FirmState: Bringing Cellular Protocol States to Shannon Baseband Emulation.
Suhwan Jeong
Beomseok Oh
Kwangmin Kim
Insu Yun
Yongdae Kim
CheolJun Park
2025
conf/uss
Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South Korea.
Taisic Yun
Suhwan Jeong
Yonghwa Lee
Seungjoo Kim
Hyoungshick Kim
Insu Yun
Yongdae Kim
2025
conf/uss
LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers.
Tuan Dinh Hoang
Taekkyung Oh
CheolJun Park
Insu Yun
Yongdae Kim
2024
conf/sp
A Systematic Study of Physical Sensor Attack Hardness.
Hyungsub Kim
Rwitam Bandyopadhyay
Muslum Ozgur Ozmen
Z. Berkay Celik
Antonio Bianchi
Yongdae Kim
Dongyan Xu
2023
conf/uss
BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software.
Eunsoo Kim
Min Woo Baek
CheolJun Park
Dongkwan Kim
Yongdae Kim
Insu Yun
2023
conf/ndss
Preventing SIM Box Fraud Using Device Model Fingerprinting.
Beomseok Oh
Junho Ahn
Sangwook Bae
Mincheol Son
Yonghwa Lee
Min Suk Kang
Yongdae Kim
2023
conf/ndss
Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof.
Jinseob Jeong
Dongkwan Kim
Joon-Ha Jang
Juhwan Noh
Changhun Song
Yongdae Kim
2023
conf/ndss
Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels.
Joon-Ha Jang
ManGi Cho
Jaehoon Kim
Dongkwan Kim
Yongdae Kim
2023
conf/acsac
Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials.
DaeGeun Yoon
Taejoong Chung
Yongdae Kim
2023
conf/wisec
LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper.
Tuan Dinh Hoang
CheolJun Park
Mincheol Son
Taekkyung Oh
Sangwook Bae
Junho Ahn
Beomseok Oh
Yongdae Kim
2022
conf/uss
Watching the Watchers: Practical Video Identification Attack in LTE Networks.
Sangwook Bae
Mincheol Son
Dongkwan Kim
CheolJun Park
Jiho Lee
Sooel Son
Yongdae Kim
2022
conf/uss
DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices.
CheolJun Park
Sangwook Bae
Beomseok Oh
Jiho Lee
Eunkyu Lee
Insu Yun
Yongdae Kim
2022
conf/asiaccs
Cellular Security: Why is it difficult?
Yongdae Kim
2022
conf/acsac
Are There Wireless Hidden Cameras Spying on Me?
Jeongyoon Heo
Sangwon Gil
Youngman Jung
Jinmok Kim
Donguk Kim
Woojin Park
Yongdae Kim
Kang G. Shin
Choong-Hoon Lee
2021
conf/ndss
BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols.
Eunsoo Kim
Dongkwan Kim
CheolJun Park
Insu Yun
Yongdae Kim
2020
conf/sp
SoK: A Minimalist Approach to Formalizing Analog Sensor Security.
Chen Yan
Hocheol Shin
Connor Bolton
Wenyuan Xu
Yongdae Kim
Kevin Fu
2020
conf/acsac
FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis.
Mingeun Kim
Dongkwan Kim
Eunsoo Kim
Suryeon Kim
Yeongjin Jang
Yongdae Kim
2019
conf/uss
Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE.
Hojoon Yang
Sangwook Bae
Mincheol Son
Hongil Kim
Song Min Kim
Yongdae Kim
2019
conf/sp
Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane.
Hongil Kim
Jiho Lee
Eunkyu Lee
Yongdae Kim
2019
conf/sp
Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?
Yujin Kwon
Hyoungshick Kim
Jinwoo Shin
Yongdae Kim
2019
conf/eurosp
Is Stellar As Secure As You Think?
Minjeong Kim
Yujin Kwon
Yongdae Kim
2019
conf/ndss
Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web.
Seunghyeon Lee
Changhoon Yoon
Heedo Kang
Yeonkeun Kim
Yongdae Kim
Dongsu Han
Sooel Son
Seungwon Shin
2018
conf/ndss
GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier.
Byeongdo Hong
Sangwook Bae
Yongdae Kim
2017
journals/tifs
Crime Scene Reconstruction: Online Gold Farming Network Analysis.
Hyukmin Kwon
Aziz Mohaisen
Jiyoung Woo
Yongdae Kim
Eunjo Lee
Huy Kang Kim
2017
conf/ccs
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin.
Yujin Kwon
Dohyun Kim
Yunmok Son
Eugene Y. Vasserman
Yongdae Kim
2017
conf/eurosp
When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks.
Hyunwook Hong
Hyunwoo Choi
Dongkwan Kim
Hongil Kim
Byeongdo Hong
Jiseong Noh
Yongdae Kim
2017
conf/ches
Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications.
Hocheol Shin
Dohyun Kim
Yujin Kwon
Yongdae Kim
2016
conf/uss
PIkit: A New Kernel-Independent Processor-Interconnect Rootkit.
WonJun Song
Hyunwoo Choi
Junhong Kim
Eunsoo Kim
Yongdae Kim
John Kim
2016
conf/wisa
Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack.
Yujin Kwon
Dohyun Kim
Yunmok Son
Jaeyeong Choi
Yongdae Kim
2016
conf/wisa
Pay as You Want: Bypassing Charging System in Operational Cellular Networks.
Hyunwook Hong
Hongil Kim
Byeongdo Hong
Dongkwan Kim
Hyunwoo Choi
Eunkyu Lee
Yongdae Kim
2016
conf/wisec
Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4.
Kibum Choi
Yunmok Son
Juhwan Noh
Hocheol Shin
Jaeyeong Choi
Yongdae Kim
2015
conf/ccs
Bittersweet ADB: Attacks and Defenses.
Sungjae Hwang
Sungho Lee
Yongdae Kim
Sukyoung Ryu
2015
conf/ccs
Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations.
Hongil Kim
Dongkwan Kim
Minhee Kwon
HyungSeok Han
Yeongjin Jang
Dongsu Han
Taesoo Kim
Yongdae Kim
2015
conf/uss
Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors.
Yunmok Son
Hocheol Shin
Dongkwan Kim
Young-Seok Park
Juhwan Noh
Kibum Choi
Jungwoo Choi
Yongdae Kim
2015
conf/wisa
BurnFit: Analyzing and Exploiting Wearable Devices.
Dongkwan Kim
Suwan Park
Kibum Choi
Yongdae Kim
2015
conf/wisa
Frying PAN: Dissecting Customized Protocol for Personal Area Network.
Kibum Choi
Yunmok Son
Jangjun Lee
Suryeon Kim
Yongdae Kim
2015
conf/wisa
Security Analysis of FHSS-type Drone Controller.
Hocheol Shin
Kibum Choi
Young-Seok Park
Jaeyeong Choi
Yongdae Kim
2014
conf/wisa
Analyzing Security of Korean USIM-Based PKI Certificate Service.
Shinjo Park
Suwan Park
Insu Yun
Dongkwan Kim
Yongdae Kim
2014
conf/wisa
Successful Profiling Attacks with Different Measurement Environments for Each Phase.
Yongdae Kim
2014
conf/ndss
Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission.
Younghwan Go
Eunyoung Jeong
Jongil Won
Yongdae Kim
Denis Foo Kune
KyoungSoo Park
2013
conf/ccs
Protecting access privacy of cached contents in information centric networks.
Abedelaziz Mohaisen
Xinwen Zhang
Max Schuchard
Haiyong Xie
Yongdae Kim
2013
conf/ccs
Trustworthy distributed computing on social networks.
Abedelaziz Mohaisen
Huy Tran
Abhishek Chandra
Yongdae Kim
2013
conf/ccs
Dynamix: anonymity on dynamic social structures.
Abedelaziz Mohaisen
Yongdae Kim
2013
conf/sp
Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors.
Denis Foo Kune
John D. Backes
Shane S. Clark
Daniel B. Kramer
Matthew R. Reynolds
Kevin Fu
Yongdae Kim
Wenyuan Xu
2013
conf/icisc
Using Principal Component Analysis for Practical Biasing of Power Traces to Improve Power Analysis Attacks.
Yongdae Kim
Haengseok Ko
2012
conf/ccs
Protecting access privacy of cached contents in information centric networks.
Abedelaziz Mohaisen
Xinwen Zhang
Max Schuchard
Haiyong Xie
Yongdae Kim
2012
conf/ccs
On the mixing time of directed social graphs and security implications.
Abedelaziz Mohaisen
Huy Tran
Nicholas Hopper
Yongdae Kim
2012
conf/uss
One-Way Indexing for Plausible Deniability in Censorship Resistant Storage.
Eugene Y. Vasserman
Victor Heorhiadi
Nicholas Hopper
Yongdae Kim
2012
conf/icisc
Private Over-Threshold Aggregation Protocols.
Myungsun Kim
Abedelaziz Mohaisen
Jung Hee Cheon
Yongdae Kim
2012
conf/icisc
Security Evaluation of Cryptographic Modules against Profiling Attacks.
Yongdae Kim
Naofumi Homma
Takafumi Aoki
Heebong Choi
2012
conf/ndss
Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous.
Max Schuchard
Christopher Thompson
Nicholas Hopper
Yongdae Kim
2012
conf/ndss
Location leaks over the GSM air interface.
Denis Foo Kune
John Kölndorfer
Nicholas Hopper
Yongdae Kim
2011
conf/ndss
Losing Control of the Internet: Using the Data Plane to Attack the Control Plane.
Max Schuchard
Abedelaziz Mohaisen
Denis Foo Kune
Nicholas Hopper
Yongdae Kim
Eugene Y. Vasserman
2010
conf/ccs
Losing control of the internet: using the data plane to attack the control plane.
Max Schuchard
Abedelaziz Mohaisen
Denis Foo Kune
Nicholas Hopper
Yongdae Kim
Eugene Y. Vasserman
2010
conf/ccs
Designs to account for trust in social network-based sybil defenses.
Abedelaziz Mohaisen
Nicholas Hopper
Yongdae Kim
2010
conf/ccs
Recruiting new tor relays with BRAIDS.
Rob Jansen
Nicholas Hopper
Yongdae Kim
2010
conf/ccs
Timing attacks on PIN input devices.
Denis Foo Kune
Yongdae Kim
2010
conf/ccs
Secure encounter-based social networks: requirements, challenges, and designs.
Abedelaziz Mohaisen
Eugene Y. Vasserman
Max Schuchard
Denis Foo Kune
Yongdae Kim
2009
conf/ccs
On protecting integrity and confidentiality of cryptographic file system for outsourced storage.
Aaram Yun
Chunhui Shi
Yongdae Kim
2009
conf/ccs
Towards complete node enumeration in a peer-to-peer botnet.
Brent ByungHoon Kang
Eric Chan-Tin
Christopher P. Lee
James Tyra
Hun Jeong Kang
Chris Nunnery
Zachariah Wadler
Greg Sinclair
Nicholas Hopper
David Dagon
Yongdae Kim
2009
conf/ccs
Scalable onion routing with torsk.
Jon McLachlan
Andrew Tran
Nicholas Hopper
Yongdae Kim
2009
conf/ccs
Membership-concealing overlay networks.
Eugene Y. Vasserman
Rob Jansen
James Tyra
Nicholas Hopper
Yongdae Kim
2006
conf/fc
Timed-Release and Key-Insulated Public Key Encryption.
Jung Hee Cheon
Nicholas Hopper
Yongdae Kim
Ivan Osipkov
2006
conf/wisa
Privacy Protection in PKIs: A Separation-of-Authority Approach.
Taekyoung Kwon
Jung Hee Cheon
Yongdae Kim
Jaeil Lee
2005
conf/acns
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks.
Peng Wang
Yongdae Kim
Vishal Kher
Taekyoung Kwon
2004
conf/icisc
Batch Verifications with ID-Based Signatures.
HyoJin Yoon
Jung Hee Cheon
Yongdae Kim
2003
conf/acns
An Efficient Tree-Based Group Key Agreement Using Bilinear Map.
Sangwon Lee
Yongdae Kim
Kwangjo Kim
DaeHyun Ryu
2001
conf/sec
Communication-Efficient Group Key Agreement.
Yongdae Kim
Adrian Perrig
Gene Tsudik
2000
conf/ccs
Simple and fault-tolerant key agreement for dynamic collaborative groups.
Yongdae Kim
Adrian Perrig
Gene Tsudik
Coauthors
Aaram Yun
(1)
Abedelaziz Mohaisen
(10)
Abhishek Chandra
(1)
Adrian Perrig
(2)
Andrew Tran
(1)
Antonio Bianchi
(1)
Aziz Mohaisen
(1)
Beomseok Oh
(4)
Brent ByungHoon Kang
(1)
Byeongdo Hong
(3)
Changhoon Yoon
(1)
Changhun Song
(1)
Chen Yan
(1)
CheolJun Park
(7)
Choong-Hoon Lee
(1)
Chris Nunnery
(1)
Christopher P. Lee
(1)
Christopher Thompson
(1)
Chunhui Shi
(1)
Connor Bolton
(1)
DaeGeun Yoon
(1)
DaeHyun Ryu
(1)
Daniel B. Kramer
(1)
David Dagon
(1)
Denis Foo Kune
(7)
Dohyun Kim
(3)
Dongkwan Kim
(12)
Dongsu Han
(2)
Donguk Kim
(1)
Dongyan Xu
(1)
Eric Chan-Tin
(1)
Eugene Y. Vasserman
(6)
Eunjo Lee
(1)
Eunkyu Lee
(3)
Eunsoo Kim
(4)
Eunyoung Jeong
(1)
Gene Tsudik
(2)
Greg Sinclair
(1)
Haengseok Ko
(1)
Haiyong Xie
(2)
Heebong Choi
(1)
Heedo Kang
(1)
Hocheol Shin
(5)
Hojoon Yang
(1)
Hongil Kim
(5)
Hun Jeong Kang
(1)
Huy Kang Kim
(1)
Huy Tran
(2)
Hyojin Yoon
(1)
Hyoungshick Kim
(2)
Hyukmin Kwon
(1)
HyungSeok Han
(1)
Hyungsub Kim
(1)
Hyunwoo Choi
(3)
Hyunwook Hong
(2)
Insu Yun
(7)
Ivan Osipkov
(1)
Jaehoon Kim
(1)
Jaeil Lee
(1)
Jaeyeong Choi
(3)
James Tyra
(2)
Jangjun Lee
(1)
Jeongyoon Heo
(1)
Jiho Lee
(3)
Jinmok Kim
(1)
Jinseob Jeong
(1)
Jinwoo Shin
(1)
Jiseong Noh
(1)
Jiyoung Woo
(1)
John D. Backes
(1)
John Kim
(1)
John Kölndorfer
(1)
Jon McLachlan
(1)
Jongil Won
(1)
Joon-Ha Jang
(2)
Juhwan Noh
(3)
Jung Hee Cheon
(4)
Jungwoo Choi
(1)
Junho Ahn
(2)
Junhong Kim
(1)
Kang G. Shin
(1)
Kevin Fu
(2)
Kibum Choi
(5)
Kwangjo Kim
(1)
Kwangmin Kim
(1)
KyoungSoo Park
(1)
ManGi Cho
(1)
Matthew R. Reynolds
(1)
Max Schuchard
(6)
Min Suk Kang
(1)
Min Woo Baek
(1)
Mincheol Son
(4)
Mingeun Kim
(1)
Minhee Kwon
(1)
Minjeong Kim
(1)
Muslum Ozgur Ozmen
(1)
Myungsun Kim
(1)
Naofumi Homma
(1)
Nicholas Hopper
(12)
Peng Wang
(1)
Rob Jansen
(2)
Rwitam Bandyopadhyay
(1)
Sangwon Gil
(1)
Sangwon Lee
(1)
Sangwook Bae
(6)
Seunghyeon Lee
(1)
Seungjoo Kim
(1)
Seungwon Shin
(1)
Shane S. Clark
(1)
Shinjo Park
(1)
Song Min Kim
(1)
Sooel Son
(2)
Suhwan Jeong
(2)
Sukyoung Ryu
(1)
Sungho Lee
(1)
Sungjae Hwang
(1)
Suryeon Kim
(2)
Suwan Park
(2)
Taejoong Chung
(1)
Taekkyung Oh
(2)
Taekyoung Kwon
(2)
Taesoo Kim
(1)
Taisic Yun
(1)
Takafumi Aoki
(1)
Tuan Dinh Hoang
(2)
Victor Heorhiadi
(1)
Vishal Kher
(1)
Wenyuan Xu
(2)
WonJun Song
(1)
Woojin Park
(1)
Xinwen Zhang
(2)
Yeongjin Jang
(2)
Yeonkeun Kim
(1)
Yongdae Kim
(69)
Yonghwa Lee
(2)
Young-Seok Park
(2)
Younghwan Go
(1)
Youngman Jung
(1)
Yujin Kwon
(5)
Yunmok Son
(5)
Z. Berkay Celik
(1)
Zachariah Wadler
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to