Showing results 1 to 5 of 5
Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations Kim, Hong Il; Kim, Dongkwan; Kwon, Min Hee; Han, Hyung Seok; Jang, Yeong Hin; Han, Dong Su; Kim, Tae Soo; et al, 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015, pp.328 - 339, Association for Computing Machinery, 2015-10-13 |
BurnFit: Analyzing and Exploiting Wearable Devices Kim, Dongkwan; Park, Su Wan; Choi, Ki Bum; Kim, Yong Dae, 16th International Workshop on Information Security Applications, WISA 2015, pp.227 - 239, Springer Verlag, 2015-08-21 |
Frying PAN: Dissecting Customized Protocol for Personal Area Network Choi, Ki Bum; Son, Yun Mok; Lee, Jang Jun; Kim, Su Ryeon; Kim, Yong Dae, 16th International Workshop on Information Security Applications, WISA 2015, pp.300 - 312, Springer Verlag, 2015-08-22 |
Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors Son, Yun Mok; Shin, Ho Cheol; Kim, Dongkwan; Park, Young Seok; Noh, Ju Hwan; Choi, Ki Bum; Choi, Jung Woo; et al, 24th USENIX Security Symposium, USENIX Association, 2015-08-14 |
Security Analysis of FHSS-type Drone Controller Shin, Ho Chul; Choi, Ki Bum; Park, Young Seok; Choi, Jae Yeong; Kim, Yong Dae, The 16th International Workshop on Information Security Applications, Korea Institute of Information Security and Cryptology, 2015-08-21 |
Discover