Browse "EE-Conference Papers(학술회의논문)" by Author Kim, Yongdae

Showing results 1 to 60 of 92

1
A Machine Learning Framework for Network Anomaly Detection using SVM and GA

Shon, T; Kim, Yongdae; Lee, C; Moon, J, 6th IEEE Information Assurance Workshop, 2005, IEEE, 2005-06

2
Admission Control in Collaborative Groups

Kim, Yongdae; Mazzocchi, Daniele; Tsudik, Gene, IEEE International Symposium on Network Computing and Applications (NCA 2003), IEEE, 2003-04

3
An analysis of a social network-based Sybil defense in mobile networks

Kim, Yongdae; Mohaisen, A.; AbuHmed, T.; Kang, H. J.; Nyang, D., 5th ACM International Conference on Ubiquitous Information Management and Communication (ICUIMC 2011), ACM, 2011-02

4
An Eye for an Eye: Economics of Retaliation in Mining Pools

Kwon, Yujin; Kim, Hyoungshick; Yi, Yung; Kim, Yongdae, ACM AFT 2019: 1st ACM Conference on Advances in Financial Technologies (AFT), pp.169 - 182, ACM, 2019-10-22

5
Attacking the Kad Network

Wang, P; Tyra, J; Chan-Tin, E; Malchow, T; Foo Kune, D; Hopper, N; Kim, Yongdae, SecureComm 2008. , ICST, 2008-09

6
Attacking the Kad Network - Real World Evaluation and High Fidelity Simulation using DVN -

Chan-Tin, Eric; Wang, Peng; Tyra, James; Malchow, Tyson; Kune, Denis Foo; Hopper, Nicholas; Kim, Yongdae, Wiley Security and Communication Networks, 2009 , IEEE, 2009-05

7
Authenticated Key-Insulated Public Key Encryption and Timed-Release Cryptography

Cheon, JH; Hopper, N; Kim, Yongdae; Osipkov, I, 10th Conference on Financial Cryptography and Data Security, International Financial Cryptography Association, 2006-03-01

8
Balancing the Shadows

Schuchard, M.; Dean, A.; Heorhiadi, V.; Kim, Yongdae; Hopper, N., Workshop on Privacy in the Electronic Society (WPES), 2010., ACM, 2010-10-04

9
BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software

Kim, Eunsoo; Baek, Minwoo; Park, CheolJun; Dongkwan Kim; Kim, Yongdae; Yun, Insu, 32nd USENIX Security Symposium (Security '23), USENIX, 2023-08-10

10
Batch Verifications with ID-Based Signatures

Yoon, HyoJin; Cheon, Jung Hee; Kim, Yongdae, Information Security and Cryptology (ICISC 2004) , KIISC, NSRI, 2004-12

11
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin

Kwon, Yujin; Dohyun, Kim; Yunmok, Son; Vasserman, Eugene; Kim, Yongdae, 24th ACM-SIGSAC Conference on Computer and Communications Security (ACM CCS), pp.195 - 209, ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2017-10-31

12
Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?

Kwon, Yujin; Kim, Hyoungshick; Shin, Jinwoo; Kim, Yongdae, IEEE Symposium on Security & Privacy, pp.935 - 951, IEEE, 2019-05-20

13
Bittersweet ADB: Attacks and Defenses

Hwang, SungJae; Lee, Sung-ho; Kim, Yongdae; Ryu, Sukyoung, ACM Symposium on Information, Computer and Communications Security, ACM, 2015-04-17

14
Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage,

Kher, V; Kim, Yongdae, IEEE International Symposium on Reliable Distributed Systems (SRDS), 2007 , IEEE, 2007-10

15
Cellular Security: Why is it difficult?

Kim, Yongdae, 17th ACM ASIA Conference on Computer and Communications Security 2022, ASIA CCS 2022, pp.392, Association for Computing Machinery, Inc, 2022-05-30

16
Combating doublespending using cooperative P2P systems

Osipkov, I; Vasserman, E; Hopper, N; Kim, Yongdae, 2007 IEEE Conference on Distributed Computing Systems (ICDCS), IEEE, 2007-06

17
Communication-Efficient Group Key Agreement

Kim, Yongdae; Perrig, Adrian; Tsudik, Gene, IFIP TC11 Sixteenth International Conference on Information Security (IFIP/SEC 2001), IFIP, 2001-06

18
Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web

Lee, Seunghyeon; Yoon, Changhoon; Kang, Heedo; Kim, Yeonkeun; Kim, Yongdae; Han, Dongsu; Son, Sooel; et al, 26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), pp.1 - 15, Internet Society, 2019-02-27

19
Decentralized Authentication Mechanism for Object-based Storage Devices

Kim, Yongdae; Kher, Vishal, Security in Storage Workshop 2003 (SISW), IEEE, 2003-10

20
Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials

Yoon, Daegeun; Chung, Taejoong; Kim, Yongdae, ACSAC '23: Annual Computer Security Applications Conference, Association for Computing Machinery, 2023-12-06

21
Detecting Phantom Nodes in Wireless Sensor Networks

Hwang, J; He, T; Kim, Yongdae, IEEE Infocom2007 Minisymposia, IEEE, 2007-05

22
Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4

Choi, Kibum; Son, Yunmok; Noh, Juhwan; Shin, Hocheol; Choi, Jaeyeong; Kim, Yongdae, 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, ACM, 2016-07-19

23
Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack

Kwon, Yujin; Kim, Dohyun; Son, Yunmok; Choi, Jaeyeong; Kim, Yongdae, 17th International Workshop on Information Security Applications (WISA), pp.124 - 135, Korea Institute of Information Security and Cryptology (KIISC), 2016-08-25

24
Dynamix: anonymity on dynamic social structures

Mohaisen, Abedelaziz; Kim, Yongdae, 8th ACM Symposium on Information, Computer and Communications Security, pp.167 - 172, ACM/SIGSAC, 2013-05

25
Efficient Cryptographic Primitives for Private Data Mining

Shaneck, M; Kim, Yongdae, HICSS, Koloa, Kauai, HI, USA, IEEE Computer Society,2010., IEEE, 2010-01

26
Enabling Automatic Protocol Behavior Analysis for Android Applications

Kim, Jeongmin; Choi, Hyunwoo; Hun, Namkung; Choi, WooHyun; Choi, ByungKweun; Hong, Hyunwook; Kim, Yongdae; et al, ACM CoNEXT 2016, ACM SIGCOMM, 2016-12-14

27
Experiences in Building an Object-Based Storage System based on the OSD T-10 Standard

Du, D; He, D; Hong, C; Jeong, J; Kher, V; Kim, Yongdae; Lu, Y; et al, NASA/IEEE Conference on Mass Storage Systems and Technologies 2006. , NASA/IEEE, 2006-05

28
Exploring Robustness in Group Key Agreement

Amir, Yair; Kim, Yongdae; Nita-Rotaru, Cristina; Schultz, John; Stanton, Jonathan, The 21st International Conference on Distributed Computing Systems (IEEE ICDCS 2001), IEEE, 2001-04

29
Extractocol: Automatic Extraction of Application-level Protocol Behaviors for Android Applications

Choi, Hyunwoo; Kim, Jeongmin; Hong, Hyunwook; Kim, Yongdae; Lee, Jonghyup; Han, Dongsu, ACM SIGCOMM 2015, ACM Special Interest Group on Data Communication (SIGCOMM), 2015-08-20

30
FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis

Kim, Mingeun; Kim, Dongkwan; Kim, Eunsoo; Kim, Suryeon; Jang, Yeongjin; Kim, Yongdae, Annual Computer Security Applications Conference 2020, pp.733 - 745, ACM, 2020-12-11

31
Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission

Go, Younghwan; Won, Jongil; Kune, Denis Foo; Jeong, EunYoung; Kim, Yongdae; Park, KyoungSoo, Network and Distributed System Security (NDSS) Symposium 2014, pp.1 - 15, Internet Society, 2014-02-24

32
Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors

Kune, Denis Foo; Backes, John; Clark, Shane; Xu, Wenyuan; Kramer, Dan; Reynolds, Matthew; Fu, Kevin; et al, IEEE Symposium on Security and Privacy, pp.145 - 159, IEEE Computer Society Technical Committee on Security and Privacy in cooperation with IACR, 2013-05-20

33
GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier

Hong, Byeongdo; Bae, Sangwook; Kim, Yongdae, 25th Annual Network and Distributed System Security Symposium (NDSS), NDSS, 2018-02

34
Hashing it out in public: Common failure modes of DHT-based anonymity schemes

Tran, A; Hopper, N; Kim, Yongdae, Workshop on Privacy in the Electronic Society (WPES), 2009 , ACM, 2009-11-09

35
HearMeOut: Detecting Voice Phishing Activities in Android

Kim, Joongyum; Kim, Jihwan; Wi, Seongil; Kim, Yongdae; Son, Sooel, 20th ACM International Conference on Mobile Systems, Applications and Services, MobiSys 2022, pp.422 - 435, Association for Computing Machinery, Inc, 2022-06-30

36
Hidden Figures: Comparative Latency Analysis of Cellular Networks with Fine-grained State Machine Models

Bae, Sangwook; Son, Mincheol; Son, Sooel; Kim, Yongdae, International Workshop on Mobile Computing Systems and Applications (HotMobile), pp.75 - 80, ACM, 2019-02-27

37
Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE

Yang, H; Bae, S; Son, M; Kim, H; Kim, SongMin; Kim, Yongdae, USENIX Security '19 , pp.55 - 72, USENIX, 2019-08-14

38
Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications

Shin, Hocheol; Kim, Dohyun; Kwon, Yujin; Kim, Yongdae, 19th International Conference on Cryptographic Hardware and Embedded Systems (CHES), pp.445 - 467, International Association for Cryptologic Research (IACR), 2017-09-27

39
Impact of Malicious TCP Retransmission on Cellular Traffic Accounting

Go, Younghwan; Kune, Denis Foo; Woo, Shinae; Park, KyoungSoo; Kim, Yongdae, 5th Annual Wireless of the Students, by the Students, for the Students Workshop (ACM S3 2013), pp.1 - 3, ACM, 2013-09-30

40
Impossibility of Full Decentralization in Permissionless Blockchains

Kwon, Yujin; Liu, Jian; Kim, Minjeong; Song, Dawn; Kim, Yongdae, 1st ACM Conference on Advances in Financial Technologies (AFT), pp.110 - 123, ACM, 2019-10-22

41
In-Situ Sensing Area Modeling for Wireless Sensor Networks

Hwang, J; He, T; Kim, Yongdae, ACM Conference on Embedded Networked Sensor Systems (SenSys), ACM, 2007-11

42
Incorporating trust into social network-based Sybil defenses

Mohaisen, A.; Hopper, N.; Kim, Yongdae, The 30th IEEE Conference on Computer Communications (INFOCOM'11), IEEE, 2011-04

43
Is Stellar as secure as you think?

Kim, M; Kwon, Y; Kim, Yongdae, 4th IEEE European Symposium on Security and Privacy (EUROS&P), pp.377 - 385, IEEE, 2019-06-17

44
Location leaks on the GSM air interface

Kune, Denis Foo; Koelndorfer, John; Hopper, Nicholas; Kim, Yongdae, ISOC Network & Distributed System Security Symposium (NDSS 2012), USENIX, 2012-02

45
Losing control of the Internet: Using the data plane to attack the control plane

Schuchard, Max; Vasserman, Eugene Y.; Mohaisen, Abedelaziz; Kune, Denis Foo; Hopper, Nicholas; Kim, Yongdae, ISOC Network and Distributed System Security Symposium (NDSS 2011), Internet Society, 2011-02

46
LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper

Hoang, Dinh Tuan; Park, CheolJun; Son, Mincheol; Oh, Taekkyung; Bae, Sangwook; Ahn, Junho; Oh, BeomSeok; et al, 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Association for Computing Machinery, 2023-05-29

47
Measuring Bias in the Mixing Time of Social Graphs due to Graph Sampling

Mohaisen, Abedelaziz; Luo, Pengkui; Li, Yanhua; Kim, Yongdae; Zhang, Zhi-Li, 2012 Military Communications Conference (MILCOM 2012), IEEE, 2012-10

48
Measuring the mixing time of social graphs

Mohaisen, Abedelaziz; Yun, Aaram; Kim, Yongdae, ACM Internet Measurement Conference (IMC 2010), ACM, 2010-11

49
Membership-concealing overlay networks

Vasserman, Eugene; Jansen, Rob; Tyra, James; Hopper, Nicholas; Kim, Yongdae, ACM Conference on Computer and Communications Security (CCS), 2009 , ACM, 2009-11

50
On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage,

Yun, A; Shi, C; Kim, Yongdae, The ACM Cloud Computing Security Workshop (CCSW), 2009 , ACM, 2009-11-13

51
On the Design of Stream Ciphers and a Hash Function Suitable to Smart Card Application

Kim, Yongdae; Lee, S.; Park, S., CARDIS, Smart Card Research and Advanced Application: Second International Conference, CARDIS, 1996-09

52
On the Mixing Time of Directed Social Graphs and Security Implications

Mohaisen, Abedelaziz; Tran, Huy; Hopper, Nicholas; Kim, Yongdae, ACM Symposium on Information, Computer and Communications Security (ASIACCS 2012), ACM/SIGSAC, 2012-10

53
One-way indexing for plausible deniability in censorship resistant storage

Vasserman, Eugene Y.; Heorhiadi, Victor; Hopper, Nicholas; Kim, Yongdae, USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012), USENIX, 2012-08-06

54
Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels

Jang, Joonha; Cho, Mangi; Kim, Jaehoon; Kim, Dongkwan; Kim, Yongdae, 2023 Network and Distributed System Security Symposium (NDSS), Internet Society, 2023-03-01

55
Pay As You Want: Bypassing Charging System in Operational Cellular Networks

Hong, Hyunwook; Kim, Hongil; Hong, Byeongdo; Kim, Dongkwan; Choi, Hyunwoo; Lee, Eunkyu; Kim, Yongdae, 17th International Workshop on Information Security Applications (WISA), pp.148 - 160, Korea Institute of Information Security and Cryptology (KIISC), 2016-08-26

56
Peer Pressure: Exerting Malicious Influence on Routers at a Distance

Schuchard, Max; Thompson, Christopher; Hopper, Nicholas; Kim, Yongdae, Distributed Computing Systems (ICDCS), 2013 IEEE 33rd International Conference on, IEEE, 2013-07-08

57
PIkit : A New Kernel-Independent Processor-Interconnect Rootkit

Song, Wonjun; Choi, Hyunwoo; Kim, Junhong; Kim, Eunsoo; Kim, Yongdae; Kim, John, 25th USENIX Security Symposium, pp.37 - 51, USENIX Association, 2016-08-10

58
Preventing SIM Box Fraud Using Device Fingerprinting

Oh, BeomSeok; Ahn, Junho; Bae, Sangwook; Son, Mincheol; Lee, Yonghwa; Kang, Min Suk; Kim, Yongdae, 2023 Network and Distributed System Security Symposium (NDSS), Internet Society, 2023-03-01

59
Privacy Preserving Nearest Neighbor Search

Shaneck, M; Kim, Yongdae; Kumar, V, IEEE International Workshop on Privacy Aspects of Data Mining, IEEE, 2006-12-18

60
Privacy Protection in PKIs: A Separation-of-Authority Approach

Kwon, T; Cheon, J; Kim, Yongdae; Lee, J, 7th International Workshop on Information Security Applications (WISA) 2006., Korea Institute of Information Security and cryptology(KIISC), 2006-08

rss_1.0 rss_2.0 atom_1.0