default search action
Yongdae Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c111]Hyungsub Kim, Rwitam Bandyopadhyay, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Yongdae Kim, Dongyan Xu:
A Systematic Study of Physical Sensor Attack Hardness. SP 2024: 2328-2347 - [e6]Yongdae Kim, Jong Kim, Farinaz Koushanfar, Kasper Rasmussen:
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024. ACM 2024 [contents] - [i18]Taekkyung Oh, Sangwook Bae, Junho Ahn, Yonghwa Lee, Dinh-Tuan Hoang, Min Suk Kang, Nils Ole Tippenhauer, Yongdae Kim:
Enabling Physical Localization of Uncooperative Cellular Devices. CoRR abs/2403.14963 (2024) - 2023
- [j29]Dohyun Kim, ManGi Cho, Hocheol Shin, Jaehoon Kim, Juhwan Noh, Yongdae Kim:
Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting. ACM Trans. Priv. Secur. 26(4): 46:1-46:30 (2023) - [j28]Dongkwan Kim, Eunsoo Kim, Sang Kil Cha, Sooel Son, Yongdae Kim:
Revisiting Binary Code Similarity Analysis Using Interpretable Feature Engineering and Lessons Learned. IEEE Trans. Software Eng. 49(4): 1661-1682 (2023) - [c110]DaeGeun Yoon, Taejoong Chung, Yongdae Kim:
Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials. ACSAC 2023: 113-123 - [c109]Joon-Ha Jang, ManGi Cho, Jaehoon Kim, Dongkwan Kim, Yongdae Kim:
Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels. NDSS 2023 - [c108]Jinseob Jeong, Dongkwan Kim, Joon-Ha Jang, Juhwan Noh, Changhun Song, Yongdae Kim:
Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof. NDSS 2023 - [c107]Beomseok Oh, Junho Ahn, Sangwook Bae, Mincheol Son, Yonghwa Lee, Min Suk Kang, Yongdae Kim:
Preventing SIM Box Fraud Using Device Model Fingerprinting. NDSS 2023 - [c106]Eunsoo Kim, Min Woo Baek, CheolJun Park, Dongkwan Kim, Yongdae Kim, Insu Yun:
BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software. USENIX Security Symposium 2023: 3547-3563 - [c105]Tuan Dinh Hoang, CheolJun Park, Mincheol Son, Taekkyung Oh, Sangwook Bae, Junho Ahn, Beomseok Oh, Yongdae Kim:
LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper. WISEC 2023: 43-48 - 2022
- [c104]Jeongyoon Heo, Sangwon Gil, Youngman Jung, Jinmok Kim, Donguk Kim, Woojin Park, Yongdae Kim, Kang G. Shin, Choong-Hoon Lee:
Are There Wireless Hidden Cameras Spying on Me? ACSAC 2022: 714-726 - [c103]Yongdae Kim:
Cellular Security: Why is it difficult? AsiaCCS 2022: 392 - [c102]Joongyum Kim, Jihwan Kim, Seongil Wi, Yongdae Kim, Sooel Son:
HearMeOut: detecting voice phishing activities in Android. MobiSys 2022: 422-435 - [c101]Sangwook Bae, Mincheol Son, Dongkwan Kim, CheolJun Park, Jiho Lee, Sooel Son, Yongdae Kim:
Watching the Watchers: Practical Video Identification Attack in LTE Networks. USENIX Security Symposium 2022: 1307-1324 - [c100]CheolJun Park, Sangwook Bae, Beomseok Oh, Jiho Lee, Eunkyu Lee, Insu Yun, Yongdae Kim:
DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices. USENIX Security Symposium 2022: 1325-1342 - [e5]Murtuza Jadliwala, Yongdae Kim, Alexandra Dmitrienko:
WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022. ACM 2022, ISBN 978-1-4503-9216-7 [contents] - [i17]Jusop Choi, Wonseok Choi, William Aiken, Hyoungshick Kim, Jun Ho Huh, Taesoo Kim, Yongdae Kim, Ross J. Anderson:
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild. CoRR abs/2201.08678 (2022) - 2021
- [j27]Dongkwan Kim, Eunsoo Kim, Mingeun Kim, Yeongjin Jang, Yongdae Kim:
Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds. IEEE Secur. Priv. 19(6): 26-35 (2021) - [j26]Hoseok Seol, Minhye Kim, Taesoo Kim, Yongdae Kim, Lee-Sup Kim:
Amnesiac DRAM: A Proactive Defense Mechanism Against Cold Boot Attacks. IEEE Trans. Computers 70(4): 539-551 (2021) - [c99]Eunsoo Kim, Dongkwan Kim, CheolJun Park, Insu Yun, Yongdae Kim:
BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols. NDSS 2021 - [e4]Yongdae Kim, Jong Kim, Giovanni Vigna, Elaine Shi:
CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021. ACM 2021, ISBN 978-1-4503-8454-4 [contents] - 2020
- [j25]Hocheol Shin, Juhwan Noh, Dohyun Kim, Yongdae Kim:
The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure. ACM Trans. Priv. Secur. 23(3): 15:1-15:32 (2020) - [c98]Mingeun Kim, Dongkwan Kim, Eunsoo Kim, Suryeon Kim, Yeongjin Jang, Yongdae Kim:
FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis. ACSAC 2020: 733-745 - [c97]Chen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, Kevin Fu:
SoK: A Minimalist Approach to Formalizing Analog Sensor Security. SP 2020: 233-248 - [i16]Geunwoo Lim, Yujin Kwon, Yongdae Kim:
Analysis of LFT2. CoRR abs/2004.04294 (2020) - [i15]Dongkwan Kim, Eunsoo Kim, Sang Kil Cha, Sooel Son, Yongdae Kim:
Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned. CoRR abs/2011.10749 (2020) - [i14]Hocheol Shin, Juhwan Noh, Dohyun Kim, Yongdae Kim:
The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure. IACR Cryptol. ePrint Arch. 2020: 562 (2020)
2010 – 2019
- 2019
- [j24]Juhwan Noh, Yujin Kwon, Yunmok Son, Hocheol Shin, Dohyun Kim, Jaeyeong Choi, Yongdae Kim:
Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing. ACM Trans. Priv. Secur. 22(2): 12:1-12:26 (2019) - [c96]Yujin Kwon, Jian Liu, Minjeong Kim, Dawn Song, Yongdae Kim:
Impossibility of Full Decentralization in Permissionless Blockchains. AFT 2019: 110-123 - [c95]Yujin Kwon, Hyoungshick Kim, Yung Yi, Yongdae Kim:
An Eye for an Eye: Economics of Retaliation in Mining Pools. AFT 2019: 169-182 - [c94]Minjeong Kim, Yujin Kwon, Yongdae Kim:
Is Stellar As Secure As You Think? EuroS&P Workshops 2019: 377-385 - [c93]Seunghyeon Lee, Changhoon Yoon, Heedo Kang, Yeonkeun Kim, Yongdae Kim, Dongsu Han, Sooel Son, Seungwon Shin:
Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web. NDSS 2019 - [c92]Yujin Kwon, Hyoungshick Kim, Jinwoo Shin, Yongdae Kim:
Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash? IEEE Symposium on Security and Privacy 2019: 935-951 - [c91]Hongil Kim, Jiho Lee, Eunkyu Lee, Yongdae Kim:
Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane. IEEE Symposium on Security and Privacy 2019: 1153-1168 - [c90]Hojoon Yang, Sangwook Bae, Mincheol Son, Hongil Kim, Song Min Kim, Yongdae Kim:
Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE. USENIX Security Symposium 2019: 55-72 - [c89]Sangwook Bae, Mincheol Son, Sooel Son, Yongdae Kim:
Hidden Figures: Comparative Latency Analysis of Cellular Networks with Fine-grained State Machine Models. HotMobile 2019: 75-80 - [c88]Sangsup Lee, Daejun Kim, Dongkwan Kim, Sooel Son, Yongdae Kim:
Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO. WOOT @ USENIX Security Symposium 2019 - [c87]Changhoon Yoon, Kwanwoo Kim, Yongdae Kim, Seungwon Shin, Sooel Son:
Doppelgängers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services. WWW 2019: 2225-2235 - [i13]Yujin Kwon, Hyoungshick Kim, Jinwoo Shin, Yongdae Kim:
Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash? CoRR abs/1902.11064 (2019) - [i12]Minjeong Kim, Yujin Kwon, Yongdae Kim:
Is Stellar As Secure As You Think? CoRR abs/1904.13302 (2019) - [i11]Yujin Kwon, Jian Liu, Minjeong Kim, Dawn Song, Yongdae Kim:
Impossibility of Full Decentralization in Permissionless Blockchains. CoRR abs/1905.05158 (2019) - [i10]Yujin Kwon, Hyoungshick Kim, Yung Yi, Yongdae Kim:
An Eye for an Eye: Economics of Retaliation in Mining Pools. CoRR abs/1908.10781 (2019) - 2018
- [j23]Hyunwoo Choi, Yongdae Kim:
Large-Scale Analysis of Remote Code Injection Attacks in Android Apps. Secur. Commun. Networks 2018: 2489214:1-2489214:17 (2018) - [j22]Yunmok Son, Juhwan Noh, Jaeyeong Choi, Yongdae Kim:
GyrosFinger: Fingerprinting Drones for Location Tracking Based on the Outputs of MEMS Gyroscopes. ACM Trans. Priv. Secur. 21(2): 10:1-10:25 (2018) - [j21]Byeongdo Hong, Shinjo Park, Hongil Kim, Dongkwan Kim, Hyunwook Hong, Hyunwoo Choi, Jean-Pierre Seifert, Sung-Ju Lee, Yongdae Kim:
Peeking Over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -. IEEE Trans. Mob. Comput. 17(10): 2366-2380 (2018) - [c86]Byeongdo Hong, Sangwook Bae, Yongdae Kim:
GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier. NDSS 2018 - [e3]Jong Kim, Gail-Joon Ahn, Seungjoo Kim, Yongdae Kim, Javier López, Taesoo Kim:
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018. ACM 2018 [contents] - 2017
- [j20]Hyukmin Kwon, Aziz Mohaisen, Jiyoung Woo, Yongdae Kim, Eunjo Lee, Huy Kang Kim:
Crime Scene Reconstruction: Online Gold Farming Network Analysis. IEEE Trans. Inf. Forensics Secur. 12(3): 544-556 (2017) - [c85]Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Y. Vasserman, Yongdae Kim:
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin. CCS 2017: 195-209 - [c84]Hocheol Shin, Dohyun Kim, Yujin Kwon, Yongdae Kim:
Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications. CHES 2017: 445-467 - [c83]Hyunwook Hong, Hyunwoo Choi, Dongkwan Kim, Hongil Kim, Byeongdo Hong, Jiseong Noh, Yongdae Kim:
When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks. EuroS&P 2017: 595-609 - [i9]Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Y. Vasserman, Yongdae Kim:
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin. CoRR abs/1708.09790 (2017) - [i8]Hocheol Shin, Dohyun Kim, Yujin Kwon, Yongdae Kim:
Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications. IACR Cryptol. ePrint Arch. 2017: 613 (2017) - 2016
- [j19]Domenic Forte, Ron Perez, Yongdae Kim, Swarup Bhunia:
Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]. Computer 49(8): 12-16 (2016) - [j18]Myungsun Kim, Aziz Mohaisen, Jung Hee Cheon, Yongdae Kim:
Private Over-Threshold Aggregation Protocols over Distributed Datasets. IEEE Trans. Knowl. Data Eng. 28(9): 2467-2479 (2016) - [c82]Jeongmin Kim, Hyunwoo Choi, Hun Namkung, Woohyun Choi, Byungkwon Choi, Hyunwook Hong, Yongdae Kim, Jonghyup Lee, Dongsu Han:
Enabling Automatic Protocol Behavior Analysis for Android Applications. CoNEXT 2016: 281-295 - [c81]Ji-Hyeon Yoon, Jeong Oh Kye, Yongdae Kim, Hae Young Lee:
Decoder-Free Sino-Korean Shellcode. ICSSA 2016: 75-78 - [c80]WonJun Song, Hyunwoo Choi, Junhong Kim, Eunsoo Kim, Yongdae Kim, John Kim:
PIkit: A New Kernel-Independent Processor-Interconnect Rootkit. USENIX Security Symposium 2016: 37-51 - [c79]Yujin Kwon, Dohyun Kim, Yunmok Son, Jaeyeong Choi, Yongdae Kim:
Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack. WISA 2016: 124-135 - [c78]Hyunwook Hong, Hongil Kim, Byeongdo Hong, Dongkwan Kim, Hyunwoo Choi, Eunkyu Lee, Yongdae Kim:
Pay as You Want: Bypassing Charging System in Operational Cellular Networks. WISA 2016: 148-160 - [c77]Kibum Choi, Yunmok Son, Juhwan Noh, Hocheol Shin, Jaeyeong Choi, Yongdae Kim:
Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4. WISEC 2016: 183-193 - [c76]Young-Seok Park, Yunmok Son, Hocheol Shin, Dohyun Kim, Yongdae Kim:
This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump. WOOT 2016 - [c75]Hocheol Shin, Yunmok Son, Young-Seok Park, Yujin Kwon, Yongdae Kim:
Sampling Race: Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital Systems. WOOT 2016 - 2015
- [j17]Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim:
Hijacking the Vuze BitTorrent network: all your hop are belong to us. IET Inf. Secur. 9(4): 203-208 (2015) - [j16]Aziz Mohaisen, Hesham Mekky, Xinwen Zhang, Haiyong Xie, Yongdae Kim:
Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures. IEEE Trans. Dependable Secur. Comput. 12(6): 675-687 (2015) - [c74]Hongil Kim, Dongkwan Kim, Minhee Kwon, HyungSeok Han, Yeongjin Jang, Dongsu Han, Taesoo Kim, Yongdae Kim:
Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations. CCS 2015: 328-339 - [c73]Sungjae Hwang, Sungho Lee, Yongdae Kim, Sukyoung Ryu:
Bittersweet ADB: Attacks and Defenses. AsiaCCS 2015: 579-584 - [c72]Hyunwoo Choi, Jeongmin Kim, Hyunwook Hong, Yongdae Kim, Jonghyup Lee, Dongsu Han:
Extractocol: Autoatic Extraction of Application-level Protocol Behaviors for Android Applications. SIGCOMM 2015: 593-594 - [c71]Yunmok Son, Hocheol Shin, Dongkwan Kim, Young-Seok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, Yongdae Kim:
Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors. USENIX Security Symposium 2015: 881-896 - [c70]Dongkwan Kim, Suwan Park, Kibum Choi, Yongdae Kim:
BurnFit: Analyzing and Exploiting Wearable Devices. WISA 2015: 227-239 - [c69]Hocheol Shin, Kibum Choi, Young-Seok Park, Jaeyeong Choi, Yongdae Kim:
Security Analysis of FHSS-type Drone Controller. WISA 2015: 240-253 - [c68]Kibum Choi, Yunmok Son, Jangjun Lee, Suryeon Kim, Yongdae Kim:
Frying PAN: Dissecting Customized Protocol for Personal Area Network. WISA 2015: 300-312 - 2014
- [j15]Hanjin Park, Yung Yi, Yongdae Kim:
Revisiting security of proportional fair scheduler in wireless cellular networks. Comput. Networks 75: 58-74 (2014) - [j14]Aziz Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim:
Trustworthy Distributed Computing on Social Networks. IEEE Trans. Serv. Comput. 7(3): 333-345 (2014) - [c67]Younghwan Go, Eunyoung Jeong, Jongil Won, Yongdae Kim, Denis Foo Kune, KyoungSoo Park:
Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission. NDSS 2014 - [c66]Il-Gu Lee, Hyunwoo Choi, Yongdae Kim, Seungwon Shin, Myungchul Kim:
Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks. RAID 2014: 362-383 - [c65]Shinjo Park, Suwan Park, Insu Yun, Dongkwan Kim, Yongdae Kim:
Analyzing Security of Korean USIM-Based PKI Certificate Service. WISA 2014: 95-106 - [c64]Yongdae Kim:
Successful Profiling Attacks with Different Measurement Environments for Each Phase. WISA 2014: 321-330 - [e2]Yongdae Kim, Heejo Lee, Adrian Perrig:
Information Security Applications - 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8267, Springer 2014, ISBN 978-3-319-05148-2 [contents] - [i7]Yongdae Kim, Hyunsoo Yoon:
First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA. IACR Cryptol. ePrint Arch. 2014: 999 (2014) - 2013
- [j13]Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim:
Attacking the kad network - real world evaluation and high fidelity simulation using DVN. Secur. Commun. Networks 6(12): 1556-1575 (2013) - [j12]Abedelaziz Mohaisen, Denis Foo Kune, Eugene Y. Vasserman, Myungsun Kim, Yongdae Kim:
Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs. IEEE Trans. Dependable Secur. Comput. 10(6): 380-393 (2013) - [c63]Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim:
Trustworthy distributed computing on social networks. AsiaCCS 2013: 155-160 - [c62]Abedelaziz Mohaisen, Yongdae Kim:
Dynamix: anonymity on dynamic social structures. AsiaCCS 2013: 167-172 - [c61]Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim:
Protecting access privacy of cached contents in information centric networks. AsiaCCS 2013: 173-178 - [c60]Max Schuchard, Christopher Thompson, Nicholas Hopper, Yongdae Kim:
Peer Pressure: Exerting Malicious Influence on Routers at a Distance. ICDCS 2013: 571-580 - [c59]Yongdae Kim, Haengseok Ko:
Using Principal Component Analysis for Practical Biasing of Power Traces to Improve Power Analysis Attacks. ICISC 2013: 109-120 - [c58]Denis Foo Kune, John D. Backes, Shane S. Clark, Daniel B. Kramer, Matthew R. Reynolds, Kevin Fu, Yongdae Kim, Wenyuan Xu:
Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors. IEEE Symposium on Security and Privacy 2013: 145-159 - [c57]Younghwan Go, Denis Foo Kune, Shinae Woo, KyoungSoo Park, Yongdae Kim:
Towards accurate accounting of cellular data for TCP retransmission. HotMobile 2013: 2 - [i6]Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim:
Private Over-threshold Aggregation Protocols over Distributed Databases. IACR Cryptol. ePrint Arch. 2013: 545 (2013) - 2012
- [c56]Abedelaziz Mohaisen, Huy Tran, Nicholas Hopper, Yongdae Kim:
On the mixing time of directed social graphs and security implications. AsiaCCS 2012: 36-37 - [c55]Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim:
Protecting access privacy of cached contents in information centric networks. CCS 2012: 1001-1003 - [c54]Yongdae Kim, Naofumi Homma, Takafumi Aoki, Heebong Choi:
Security Evaluation of Cryptographic Modules against Profiling Attacks. ICISC 2012: 383-394 - [c53]Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim:
Private Over-Threshold Aggregation Protocols. ICISC 2012: 472-486 - [c52]Abedelaziz Mohaisen, Pengkui Luo, Yanhua Li, Yongdae Kim, Zhi-Li Zhang:
Measuring bias in the mixing time of social graphs due to graph sampling. MILCOM 2012: 1-6 - [c51]Denis Foo Kune, John Kölndorfer, Nicholas Hopper, Yongdae Kim:
Location leaks over the GSM air interface. NDSS 2012 - [c50]Max Schuchard, Christopher Thompson, Nicholas Hopper, Yongdae Kim:
Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous. NDSS 2012 - [c49]Eugene Y. Vasserman, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim:
One-Way Indexing for Plausible Deniability in Censorship Resistant Storage. FOCI 2012 - [i5]Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim:
Private Top-k Aggregation Protocols. IACR Cryptol. ePrint Arch. 2012: 538 (2012) - 2011
- [j11]Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim:
The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems. ACM Trans. Inf. Syst. Secur. 14(3): 27:1-27:23 (2011) - [c48]Abedelaziz Mohaisen, Huy Tran, Nicholas Hopper, Yongdae Kim:
Understanding Social Networks Properties for Trustworthy Computing. ICDCS Workshops 2011: 154-159 - [c47]Abedelaziz Mohaisen, Tamer AbuHmed, Hun Jeong Kang, Yongdae Kim, DaeHun Nyang:
Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks. ICUIMC 2011: 28 - [c46]Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim:
Keep your friends close: Incorporating trust into social network-based Sybil defenses. INFOCOM 2011: 1943-1951 - [c45]Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim, Eugene Y. Vasserman:
Losing Control of the Internet: Using the Data Plane to Attack the Control Plane. NDSS 2011 - [i4]Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim:
SocialCloud: Using Social Networks for Building Distributed Computing Services. CoRR abs/1112.2254 (2011) - 2010
- [j10]Aaram Yun, Jung Hee Cheon, Yongdae Kim:
On Homomorphic Signatures for Network Coding. IEEE Trans. Computers 59(9): 1295-1296 (2010) - [j9]Joengmin Hwang, Tian He, Yongdae Kim:
Exploring In-Situ Sensing Irregularity in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 21(4): 547-561 (2010) - [c44]Rob Jansen, Nicholas Hopper, Yongdae Kim:
Recruiting new tor relays with BRAIDS. CCS 2010: 319-328 - [c43]Denis Foo Kune, Yongdae Kim:
Timing attacks on PIN input devices. CCS 2010: 678-680 - [c42]Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim:
Designs to account for trust in social network-based sybil defenses. CCS 2010: 714-716 - [c41]Abedelaziz Mohaisen, Eugene Y. Vasserman, Max Schuchard, Denis Foo Kune, Yongdae Kim:
Secure encounter-based social networks: requirements, challenges, and designs. CCS 2010: 717-719 - [c40]Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim, Eugene Y. Vasserman:
Losing control of the internet: using the data plane to attack the control plane. CCS 2010: 726-728 - [c39]Mark Shaneck, Yongdae Kim:
Efficient Cryptographic Primitives for Private Data Mining. HICSS 2010: 1-9 - [c38]Abedelaziz Mohaisen, Aaram Yun, Yongdae Kim:
Measuring the mixing time of social graphs. Internet Measurement Conference 2010: 383-389 - [c37]Max Schuchard, Alexander W. Dean, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim:
Balancing the shadows. WPES 2010: 1-10
2000 – 2009
- 2009
- [c36]Brent ByungHoon Kang, Eric Chan-Tin, Christopher P. Lee, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim:
Towards complete node enumeration in a peer-to-peer botnet. AsiaCCS 2009: 23-34 - [c35]Aaram Yun, Chunhui Shi, Yongdae Kim:
On protecting integrity and confidentiality of cryptographic file system for outsourced storage. CCSW 2009: 67-76 - [c34]Eugene Y. Vasserman, Rob Jansen, James Tyra, Nicholas Hopper, Yongdae Kim:
Membership-concealing overlay networks. CCS 2009: 390-399 - [c33]Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongdae Kim:
Scalable onion routing with torsk. CCS 2009: 590-599 - [c32]Hun Jeong Kang, Eric Chan-Tin, Nicholas Hopper, Yongdae Kim:
Why Kad Lookup Fails. Peer-to-Peer Computing 2009: 121-130 - [c31]Eric Chan-Tin, Daniel Feldman, Nicholas Hopper, Yongdae Kim:
The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems. SecureComm 2009: 448-458 - [c30]Andrew Tran, Nicholas Hopper, Yongdae Kim:
Hashing it out in public: common failure modes of DHT-based anonymity schemes. WPES 2009: 71-80 - 2008
- [j8]Joengmin Hwang, Tian He, Yongdae Kim:
Secure localization with phantom node detection. Ad Hoc Networks 6(7): 1031-1050 (2008) - [j7]Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov:
Provably Secure Timed-Release Public Key Encryption. ACM Trans. Inf. Syst. Secur. 11(2): 4:1-4:44 (2008) - [c29]Yongdae Kim, Byounguk Sohn, Woosub Youm, Jongkyu Jung, Jonghyun Lee, Kyihwan Park:
Voice coil motor nano stage with an eddy current damper. ICARCV 2008: 1714-1717 - [c28]Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim:
Attacking the Kad network. SecureComm 2008: 23 - [e1]Yongdae Kim, William Yurcik:
Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, StorageSS 2008, Alexandria, VA, USA, October 31, 2008. ACM 2008, ISBN 978-1-60558-299-3 [contents] - 2007
- [c27]Ivan Osipkov, Eugene Y. Vasserman, Nicholas Hopper, Yongdae Kim:
Combating Double-Spending Using Cooperative P2P Systems. ICDCS 2007: 41 - [c26]Joengmin Hwang, Tian He, Yongdae Kim:
Detecting Phantom Nodes in Wireless Sensor Networks. INFOCOM 2007: 2391-2395 - [c25]Joengmin Hwang, Yu Gu, Tian He, Yongdae Kim:
Realistic Sensing Area Modeling. INFOCOM 2007: 2421-2425 - [c24]Joengmin Hwang, Tian He, Yongdae Kim:
Exploring in-situ sensing irregularity in wireless sensor networks. SenSys 2007: 289-303 - [c23]Vishal Kher, Yongdae Kim:
Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage. SRDS 2007: 55-64 - 2006
- [c22]Jason Kealey, Yongdae Kim, Daniel Amyot, Gunter Mussbacher:
Integrating an Eclipse-Based Scenario Modeling Environment with a Requirements Management System. CCECE 2006: 2432-2435 - [c21]Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov:
Timed-Release and Key-Insulated Public Key Encryption. Financial Cryptography 2006: 191-205 - [c20]Mark Shaneck, Yongdae Kim, Vipin Kumar:
Privacy Preserving Nearest Neighbor Search. ICDM Workshops 2006: 541-545 - [c19]Joengmin Hwang, Tian He, Yongdae Kim:
Achieving realistic sensing area modeling. SenSys 2006: 415-416 - [c18]Taekyoung Kwon, Jung Hee Cheon, Yongdae Kim, Jaeil Lee:
Privacy Protection in PKIs: A Separation-of-Authority Approach. WISA 2006: 297-311 - 2005
- [c17]Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwon:
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks. ACNS 2005: 17-32 - [c16]Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, Yongdae Kim:
Remote Software-Based Attestation for Wireless Sensors. ESAS 2005: 27-41 - [c15]Vishal Kher, Yongdae Kim:
Securing distributed storage: challenges, techniques, and systems. StorageSS 2005: 9-25 - 2004
- [j6]Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini:
Design and implementation of a secure multi-agent marketplace. Electron. Commer. Res. Appl. 3(4): 355-368 (2004) - [j5]Yongdae Kim, Adrian Perrig, Gene Tsudik:
Group Key Agreement Efficient in Communication. IEEE Trans. Computers 53(7): 905-921 (2004) - [j4]Yongdae Kim, Adrian Perrig, Gene Tsudik:
Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. 7(1): 60-96 (2004) - [j3]Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik:
On the performance of group key agreement protocols. ACM Trans. Inf. Syst. Secur. 7(3): 457-488 (2004) - [j2]Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Gene Tsudik:
Secure Group Communication Using Robust Contributory Key Agreement. IEEE Trans. Parallel Distributed Syst. 15(5): 468-480 (2004) - [c14]HyoJin Yoon, Jung Hee Cheon, Yongdae Kim:
Batch Verifications with ID-Based Signatures. ICISC 2004: 233-248 - [c13]Joengmin Hwang, Yongdae Kim:
Revisiting random key pre-distribution schemes for wireless sensor networks. SASN 2004: 43-52 - [i3]Jung Hee Cheon, Yongdae Kim, HyoJin Yoon:
A New ID-based Signature with Batch Verification. IACR Cryptol. ePrint Arch. 2004: 131 (2004) - [i2]Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov:
Timed-Release and Key-Insulated Public Key Encryption. IACR Cryptol. ePrint Arch. 2004: 231 (2004) - 2003
- [j1]Yongdae Kim, Fabio Maino, Maithili Narasimha, Kyung Hyune Rhee, Gene Tsudik:
Secure group key management for storage area networks. IEEE Commun. Mag. 41(8): 92-99 (2003) - [c12]Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini:
Security model for a multi-agent marketplace. ICEC 2003: 119-124 - [c11]Sangwon Lee, Yongdae Kim, Kwangjo Kim, DaeHyun Ryu:
An Efficient Tree-Based Group Key Agreement Using Bilinear Map. ACNS 2003: 357-371 - [c10]Yongdae Kim, Daniele Mazzocchi, Gene Tsudik:
Admission Control in Peer Groups. NCA 2003: 131-139 - [c9]Vishal Kher, Yongdae Kim:
Decentralized Authentication Mechanisms for Object-based Storage Devices. IEEE Security in Storage Workshop 2003: 1-10 - 2002
- [c8]Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik:
On the Performance of Group Key Agreement Protocols. ICDCS 2002: 463-464 - [c7]Yongdae Kim, Maithili Narasimha, Fabio Maino, Gene Tsudik:
Secure Group Services for Storage Area Networks. IEEE Security in Storage Workshop 2002: 80-93 - [i1]Yongdae Kim, Adrian Perrig, Gene Tsudik:
Tree-based Group Key Agreement. IACR Cryptol. ePrint Arch. 2002: 9 (2002) - 2001
- [c6]Yair Amir, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Yongdae Kim, Gene Tsudik:
Exploring Robustness in Group Key Agreement. ICDCS 2001: 399-408 - [c5]Byunghoon Bae, Taeoh Koo, Kyihwan Park, Yongdae Kim:
Design and control of a two degree of freedom haptic device for the application of PC video games. IROS 2001: 1738-1743 - [c4]Yongdae Kim, Adrian Perrig, Gene Tsudik:
Communication-Efficient Group Key Agreement. SEC 2001: 229-244 - 2000
- [c3]Yongdae Kim, Adrian Perrig, Gene Tsudik:
Simple and fault-tolerant key agreement for dynamic collaborative groups. CCS 2000: 235-244 - [c2]Jonathan Robert Stanton, Yair Amir, Damian Hasse, Giuseppe Ateniese, Yongdae Kim, Cristina Nita-Rotaru, Theo Schlossnagle, John L. Schultz, Gene Tsudik:
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments. ICDCS 2000: 330-343
1990 – 1999
- 1996
- [c1]Yongdae Kim, Sangjin Lee, Choonsik Park:
On the Design of a Stream Cipher and a Hash Function Suitable to Smart Card Applications. CARDIS 1996
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint