Showing results 1 to 60 of 92
A Machine Learning Framework for Network Anomaly Detection using SVM and GA Shon, T; Kim, Yongdae; Lee, C; Moon, J, 6th IEEE Information Assurance Workshop, 2005, IEEE, 2005-06 |
Admission Control in Collaborative Groups Kim, Yongdae; Mazzocchi, Daniele; Tsudik, Gene, IEEE International Symposium on Network Computing and Applications (NCA 2003), IEEE, 2003-04 |
An analysis of a social network-based Sybil defense in mobile networks Kim, Yongdae; Mohaisen, A.; AbuHmed, T.; Kang, H. J.; Nyang, D., 5th ACM International Conference on Ubiquitous Information Management and Communication (ICUIMC 2011), ACM, 2011-02 |
An Eye for an Eye: Economics of Retaliation in Mining Pools Kwon, Yujin; Kim, Hyoungshick; Yi, Yung; Kim, Yongdae, ACM AFT 2019: 1st ACM Conference on Advances in Financial Technologies (AFT), pp.169 - 182, ACM, 2019-10-22 |
Attacking the Kad Network Wang, P; Tyra, J; Chan-Tin, E; Malchow, T; Foo Kune, D; Hopper, N; Kim, Yongdae, SecureComm 2008. , ICST, 2008-09 |
Attacking the Kad Network - Real World Evaluation and High Fidelity Simulation using DVN - Chan-Tin, Eric; Wang, Peng; Tyra, James; Malchow, Tyson; Kune, Denis Foo; Hopper, Nicholas; Kim, Yongdae, Wiley Security and Communication Networks, 2009 , IEEE, 2009-05 |
Authenticated Key-Insulated Public Key Encryption and Timed-Release Cryptography Cheon, JH; Hopper, N; Kim, Yongdae; Osipkov, I, 10th Conference on Financial Cryptography and Data Security, International Financial Cryptography Association, 2006-03-01 |
Balancing the Shadows Schuchard, M.; Dean, A.; Heorhiadi, V.; Kim, Yongdae; Hopper, N., Workshop on Privacy in the Electronic Society (WPES), 2010., ACM, 2010-10-04 |
BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software Kim, Eunsoo; Baek, Minwoo; Park, CheolJun; Dongkwan Kim; Kim, Yongdae; Yun, Insu, 32nd USENIX Security Symposium (Security '23), USENIX, 2023-08-10 |
Batch Verifications with ID-Based Signatures Yoon, HyoJin; Cheon, Jung Hee; Kim, Yongdae, Information Security and Cryptology (ICISC 2004) , KIISC, NSRI, 2004-12 |
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin Kwon, Yujin; Dohyun, Kim; Yunmok, Son; Vasserman, Eugene; Kim, Yongdae, 24th ACM-SIGSAC Conference on Computer and Communications Security (ACM CCS), pp.195 - 209, ACM Special Interest Group on Security, Audit and Control (SIGSAC), 2017-10-31 |
Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash? Kwon, Yujin; Kim, Hyoungshick; Shin, Jinwoo; Kim, Yongdae, IEEE Symposium on Security & Privacy, pp.935 - 951, IEEE, 2019-05-20 |
Bittersweet ADB: Attacks and Defenses Hwang, SungJae; Lee, Sung-ho; Kim, Yongdae; Ryu, Sukyoung, ACM Symposium on Information, Computer and Communications Security, ACM, 2015-04-17 |
Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage, Kher, V; Kim, Yongdae, IEEE International Symposium on Reliable Distributed Systems (SRDS), 2007 , IEEE, 2007-10 |
Cellular Security: Why is it difficult? Kim, Yongdae, 17th ACM ASIA Conference on Computer and Communications Security 2022, ASIA CCS 2022, pp.392, Association for Computing Machinery, Inc, 2022-05-30 |
Combating doublespending using cooperative P2P systems Osipkov, I; Vasserman, E; Hopper, N; Kim, Yongdae, 2007 IEEE Conference on Distributed Computing Systems (ICDCS), IEEE, 2007-06 |
Communication-Efficient Group Key Agreement Kim, Yongdae; Perrig, Adrian; Tsudik, Gene, IFIP TC11 Sixteenth International Conference on Information Security (IFIP/SEC 2001), IFIP, 2001-06 |
Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web Lee, Seunghyeon; Yoon, Changhoon; Kang, Heedo; Kim, Yeonkeun; Kim, Yongdae; Han, Dongsu; Son, Sooel; et al, 26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), pp.1 - 15, Internet Society, 2019-02-27 |
Decentralized Authentication Mechanism for Object-based Storage Devices Kim, Yongdae; Kher, Vishal, Security in Storage Workshop 2003 (SISW), IEEE, 2003-10 |
Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials Yoon, Daegeun; Chung, Taejoong; Kim, Yongdae, ACSAC '23: Annual Computer Security Applications Conference, Association for Computing Machinery, 2023-12-06 |
Detecting Phantom Nodes in Wireless Sensor Networks Hwang, J; He, T; Kim, Yongdae, IEEE Infocom2007 Minisymposia, IEEE, 2007-05 |
Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4 Choi, Kibum; Son, Yunmok; Noh, Juhwan; Shin, Hocheol; Choi, Jaeyeong; Kim, Yongdae, 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, ACM, 2016-07-19 |
Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack Kwon, Yujin; Kim, Dohyun; Son, Yunmok; Choi, Jaeyeong; Kim, Yongdae, 17th International Workshop on Information Security Applications (WISA), pp.124 - 135, Korea Institute of Information Security and Cryptology (KIISC), 2016-08-25 |
Dynamix: anonymity on dynamic social structures Mohaisen, Abedelaziz; Kim, Yongdae, 8th ACM Symposium on Information, Computer and Communications Security, pp.167 - 172, ACM/SIGSAC, 2013-05 |
Efficient Cryptographic Primitives for Private Data Mining Shaneck, M; Kim, Yongdae, HICSS, Koloa, Kauai, HI, USA, IEEE Computer Society,2010., IEEE, 2010-01 |
Enabling Automatic Protocol Behavior Analysis for Android Applications Kim, Jeongmin; Choi, Hyunwoo; Hun, Namkung; Choi, WooHyun; Choi, ByungKweun; Hong, Hyunwook; Kim, Yongdae; et al, ACM CoNEXT 2016, ACM SIGCOMM, 2016-12-14 |
Experiences in Building an Object-Based Storage System based on the OSD T-10 Standard Du, D; He, D; Hong, C; Jeong, J; Kher, V; Kim, Yongdae; Lu, Y; et al, NASA/IEEE Conference on Mass Storage Systems and Technologies 2006. , NASA/IEEE, 2006-05 |
Exploring Robustness in Group Key Agreement Amir, Yair; Kim, Yongdae; Nita-Rotaru, Cristina; Schultz, John; Stanton, Jonathan, The 21st International Conference on Distributed Computing Systems (IEEE ICDCS 2001), IEEE, 2001-04 |
Extractocol: Automatic Extraction of Application-level Protocol Behaviors for Android Applications Choi, Hyunwoo; Kim, Jeongmin; Hong, Hyunwook; Kim, Yongdae; Lee, Jonghyup; Han, Dongsu, ACM SIGCOMM 2015, ACM Special Interest Group on Data Communication (SIGCOMM), 2015-08-20 |
FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis Kim, Mingeun; Kim, Dongkwan; Kim, Eunsoo; Kim, Suryeon; Jang, Yeongjin; Kim, Yongdae, Annual Computer Security Applications Conference 2020, pp.733 - 745, ACM, 2020-12-11 |
Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission Go, Younghwan; Won, Jongil; Kune, Denis Foo; Jeong, EunYoung; Kim, Yongdae; Park, KyoungSoo, Network and Distributed System Security (NDSS) Symposium 2014, pp.1 - 15, Internet Society, 2014-02-24 |
Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors Kune, Denis Foo; Backes, John; Clark, Shane; Xu, Wenyuan; Kramer, Dan; Reynolds, Matthew; Fu, Kevin; et al, IEEE Symposium on Security and Privacy, pp.145 - 159, IEEE Computer Society Technical Committee on Security and Privacy in cooperation with IACR, 2013-05-20 |
GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier Hong, Byeongdo; Bae, Sangwook; Kim, Yongdae, 25th Annual Network and Distributed System Security Symposium (NDSS), NDSS, 2018-02 |
Hashing it out in public: Common failure modes of DHT-based anonymity schemes Tran, A; Hopper, N; Kim, Yongdae, Workshop on Privacy in the Electronic Society (WPES), 2009 , ACM, 2009-11-09 |
HearMeOut: Detecting Voice Phishing Activities in Android Kim, Joongyum; Kim, Jihwan; Wi, Seongil; Kim, Yongdae; Son, Sooel, 20th ACM International Conference on Mobile Systems, Applications and Services, MobiSys 2022, pp.422 - 435, Association for Computing Machinery, Inc, 2022-06-30 |
Hidden Figures: Comparative Latency Analysis of Cellular Networks with Fine-grained State Machine Models Bae, Sangwook; Son, Mincheol; Son, Sooel; Kim, Yongdae, International Workshop on Mobile Computing Systems and Applications (HotMobile), pp.75 - 80, ACM, 2019-02-27 |
Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE Yang, H; Bae, S; Son, M; Kim, H; Kim, SongMin; Kim, Yongdae, USENIX Security '19 , pp.55 - 72, USENIX, 2019-08-14 |
Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications Shin, Hocheol; Kim, Dohyun; Kwon, Yujin; Kim, Yongdae, 19th International Conference on Cryptographic Hardware and Embedded Systems (CHES), pp.445 - 467, International Association for Cryptologic Research (IACR), 2017-09-27 |
Impact of Malicious TCP Retransmission on Cellular Traffic Accounting Go, Younghwan; Kune, Denis Foo; Woo, Shinae; Park, KyoungSoo; Kim, Yongdae, 5th Annual Wireless of the Students, by the Students, for the Students Workshop (ACM S3 2013), pp.1 - 3, ACM, 2013-09-30 |
Impossibility of Full Decentralization in Permissionless Blockchains Kwon, Yujin; Liu, Jian; Kim, Minjeong; Song, Dawn; Kim, Yongdae, 1st ACM Conference on Advances in Financial Technologies (AFT), pp.110 - 123, ACM, 2019-10-22 |
In-Situ Sensing Area Modeling for Wireless Sensor Networks Hwang, J; He, T; Kim, Yongdae, ACM Conference on Embedded Networked Sensor Systems (SenSys), ACM, 2007-11 |
Incorporating trust into social network-based Sybil defenses Mohaisen, A.; Hopper, N.; Kim, Yongdae, The 30th IEEE Conference on Computer Communications (INFOCOM'11), IEEE, 2011-04 |
Is Stellar as secure as you think? Kim, M; Kwon, Y; Kim, Yongdae, 4th IEEE European Symposium on Security and Privacy (EUROS&P), pp.377 - 385, IEEE, 2019-06-17 |
Location leaks on the GSM air interface Kune, Denis Foo; Koelndorfer, John; Hopper, Nicholas; Kim, Yongdae, ISOC Network & Distributed System Security Symposium (NDSS 2012), USENIX, 2012-02 |
Losing control of the Internet: Using the data plane to attack the control plane Schuchard, Max; Vasserman, Eugene Y.; Mohaisen, Abedelaziz; Kune, Denis Foo; Hopper, Nicholas; Kim, Yongdae, ISOC Network and Distributed System Security Symposium (NDSS 2011), Internet Society, 2011-02 |
LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper Hoang, Dinh Tuan; Park, CheolJun; Son, Mincheol; Oh, Taekkyung; Bae, Sangwook; Ahn, Junho; Oh, BeomSeok; et al, 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Association for Computing Machinery, 2023-05-29 |
Measuring Bias in the Mixing Time of Social Graphs due to Graph Sampling Mohaisen, Abedelaziz; Luo, Pengkui; Li, Yanhua; Kim, Yongdae; Zhang, Zhi-Li, 2012 Military Communications Conference (MILCOM 2012), IEEE, 2012-10 |
Measuring the mixing time of social graphs Mohaisen, Abedelaziz; Yun, Aaram; Kim, Yongdae, ACM Internet Measurement Conference (IMC 2010), ACM, 2010-11 |
Membership-concealing overlay networks Vasserman, Eugene; Jansen, Rob; Tyra, James; Hopper, Nicholas; Kim, Yongdae, ACM Conference on Computer and Communications Security (CCS), 2009 , ACM, 2009-11 |
On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage, Yun, A; Shi, C; Kim, Yongdae, The ACM Cloud Computing Security Workshop (CCSW), 2009 , ACM, 2009-11-13 |
On the Design of Stream Ciphers and a Hash Function Suitable to Smart Card Application Kim, Yongdae; Lee, S.; Park, S., CARDIS, Smart Card Research and Advanced Application: Second International Conference, CARDIS, 1996-09 |
On the Mixing Time of Directed Social Graphs and Security Implications Mohaisen, Abedelaziz; Tran, Huy; Hopper, Nicholas; Kim, Yongdae, ACM Symposium on Information, Computer and Communications Security (ASIACCS 2012), ACM/SIGSAC, 2012-10 |
One-way indexing for plausible deniability in censorship resistant storage Vasserman, Eugene Y.; Heorhiadi, Victor; Hopper, Nicholas; Kim, Yongdae, USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012), USENIX, 2012-08-06 |
Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels Jang, Joonha; Cho, Mangi; Kim, Jaehoon; Kim, Dongkwan; Kim, Yongdae, 2023 Network and Distributed System Security Symposium (NDSS), Internet Society, 2023-03-01 |
Pay As You Want: Bypassing Charging System in Operational Cellular Networks Hong, Hyunwook; Kim, Hongil; Hong, Byeongdo; Kim, Dongkwan; Choi, Hyunwoo; Lee, Eunkyu; Kim, Yongdae, 17th International Workshop on Information Security Applications (WISA), pp.148 - 160, Korea Institute of Information Security and Cryptology (KIISC), 2016-08-26 |
Peer Pressure: Exerting Malicious Influence on Routers at a Distance Schuchard, Max; Thompson, Christopher; Hopper, Nicholas; Kim, Yongdae, Distributed Computing Systems (ICDCS), 2013 IEEE 33rd International Conference on, IEEE, 2013-07-08 |
PIkit : A New Kernel-Independent Processor-Interconnect Rootkit Song, Wonjun; Choi, Hyunwoo; Kim, Junhong; Kim, Eunsoo; Kim, Yongdae; Kim, John, 25th USENIX Security Symposium, pp.37 - 51, USENIX Association, 2016-08-10 |
Preventing SIM Box Fraud Using Device Fingerprinting Oh, BeomSeok; Ahn, Junho; Bae, Sangwook; Son, Mincheol; Lee, Yonghwa; Kang, Min Suk; Kim, Yongdae, 2023 Network and Distributed System Security Symposium (NDSS), Internet Society, 2023-03-01 |
Privacy Preserving Nearest Neighbor Search Shaneck, M; Kim, Yongdae; Kumar, V, IEEE International Workshop on Privacy Aspects of Data Mining, IEEE, 2006-12-18 |
Privacy Protection in PKIs: A Separation-of-Authority Approach Kwon, T; Cheon, J; Kim, Yongdae; Lee, J, 7th International Workshop on Information Security Applications (WISA) 2006., Korea Institute of Information Security and cryptology(KIISC), 2006-08 |
Discover