Shinjo Park

According to our database1, Shinjo Park authored at least 13 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Why we cannot win: on fake base stations and their detection methods.
PhD thesis, 2023

2022
A Post-Quantum Secure Subscription Concealed Identifier for 6G.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2020
BaseSAFE: baseband sanitized fuzzing through emulation.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

2019
New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols.
Proc. Priv. Enhancing Technol., 2019

New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Anatomy of Commercial IMSI Catchers and Detectors.
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019

2018
Peeking Over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -.
IEEE Trans. Mob. Comput., 2018

On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Networks.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

2017
White-Stingray: Evaluating IMSI Catchers Detection Applications.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

2016
White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphones.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

2014
Analyzing Security of Korean USIM-Based PKI Certificate Service.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

2013
Comparison of caching strategies in modern cellular backhaul networks.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013


  Loading...