Showing results 1 to 7 of 7
Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4 Choi, Kibum; Son, Yunmok; Noh, Juhwan; Shin, Hocheol; Choi, Jaeyeong; Kim, Yongdae, 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, ACM, 2016-07-19 |
Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack Kwon, Yujin; Kim, Dohyun; Son, Yunmok; Choi, Jaeyeong; Kim, Yongdae, 17th International Workshop on Information Security Applications (WISA), pp.124 - 135, Korea Institute of Information Security and Cryptology (KIISC), 2016-08-25 |
Exploiting embedded devices through sensing channel = 센싱 채널을 통한 임베디드 기기 공격 기법에 관한 연구link Son, Yunmok; 손윤목; et al, 한국과학기술원, 2017 |
GyrosFinger: Fingerprinting Drones for Location Tracking based on the Outputs of MEMS Gyroscopes Son, Yunmok; Noh, Juhwan; Choi, Jaeyoung; Kim, Yongdae, ACM Transactions on Privacy and Security, v.21, no.2, 2018-02 |
Sampling Race: Bypassing Timing-based Analog Active Sensor Spoofing Detection on Analog-digital Systems Shin, Hocheol; Son, Yunmok; Park, Youngseok; Kwon, Yujin; Kim, Yongdae, 10th USENIX Workshop on Offensive Technologies, USENIX, 2016-08-09 |
This ain't your dose: Sensor Spoofing Attack on Medical Infusion Pump Park, Youngseok; Son, Yunmok; Shin, Hocheol; Kim, Dohyun; Kim, Yongdae, 10th USENIX Workshop on Offensive Technologies, USENIX, 2016-08-09 |
Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing Noh, Juhwan; Kwon, Yujin; Son, Yunmok; Shin, Hocheol; Kim, Dohyun; Choi, Jaeyeong; Kim, Yongdae, ACM TRANSACTIONS ON PRIVACY AND SECURITY, v.22, no.2, 2019-04 |
Discover