Yongdae Kim
Orcid: 0000-0003-4879-1262
According to our database1,
Yongdae Kim
authored at least 144 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
2023
Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting.
ACM Trans. Priv. Secur., November, 2023
Revisiting Binary Code Similarity Analysis Using Interpretable Feature Engineering and Lessons Learned.
IEEE Trans. Software Eng., April, 2023
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023
BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild.
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
IEEE Trans. Computers, 2021
Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds.
IEEE Secur. Priv., 2021
BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
2020
The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure.
ACM Trans. Priv. Secur., 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
ACM Trans. Priv. Secur., 2019
Doppelgängers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services.
Proceedings of the World Wide Web Conference, 2019
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019
Hidden Figures: Comparative Latency Analysis of Cellular Networks with Fine-grained State Machine Models.
Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019
2018
IEEE Trans. Mob. Comput., 2018
GyrosFinger: Fingerprinting Drones for Location Tracking Based on the Outputs of MEMS Gyroscopes.
ACM Trans. Priv. Secur., 2018
Secur. Commun. Networks, 2018
GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications.
IACR Cryptol. ePrint Arch., 2017
When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
IEEE Trans. Knowl. Data Eng., 2016
Computer, 2016
Sampling Race: Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital Systems.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016
Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the International Conference on Software Security and Assurance, 2016
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, 2016
2015
Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2015
IET Inf. Secur., 2015
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Extractocol: Autoatic Extraction of Application-level Protocol Behaviors for Android Applications.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
IEEE Trans. Serv. Comput., 2014
IACR Cryptol. ePrint Arch., 2014
Comput. Networks, 2014
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
2013
IEEE Trans. Dependable Secur. Comput., 2013
Attacking the kad network - real world evaluation and high fidelity simulation using DVN.
Secur. Commun. Networks, 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 14th Workshop on Mobile Computing Systems and Applications, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Using Principal Component Analysis for Practical Biasing of Power Traces to Improve Power Analysis Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 31st IEEE Military Communications Conference, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
ACM Trans. Inf. Syst. Secur., 2011
CoRR, 2011
Keep your friends close: Incorporating trust into social network-based Sybil defenses.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011
Proceedings of the Grid and Distributed Computing, 2011
2010
IEEE Trans. Parallel Distributed Syst., 2010
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009
The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems.
Proceedings of the Security and Privacy in Communication Networks, 2009
On protecting integrity and confidentiality of cryptographic file system for outsourced storage.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
ACM Trans. Inf. Syst. Secur., 2008
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
Proceedings of the 10th International Conference on Control, 2008
2007
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007
2006
Proceedings of the Information Security Applications, 7th International Workshop, 2006
Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, 2006
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006
Integrating an Eclipse-Based Scenario Modeling Environment with a Requirements Management System.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006
2005
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks.
Proceedings of the Applied Cryptography and Network Security, 2005
2004
IEEE Trans. Parallel Distributed Syst., 2004
ACM Trans. Inf. Syst. Secur., 2004
IACR Cryptol. ePrint Arch., 2004
Electron. Commer. Res. Appl., 2004
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004
Proceedings of the Information Security and Cryptology, 2004
2003
Proceedings of the 2nd International IEEE Security in Storage Workshop (SISW 2003), 2003
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 2003
Proceedings of the Applied Cryptography and Network Security, 2003
Proceedings of the 5th International Conference on Electronic Commerce, 2003
2002
Proceedings of the First International IEEE Security in Storage Workshop, 2002
2001
Communication-Efficient Group Key Agreement.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
Design and control of a two degree of freedom haptic device for the application of PC video games.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2001
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001
2000
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000
Proceedings of the CCS 2000, 2000
1996
On the Design of a Stream Cipher and a Hash Function Suitable to Smart Card Applications.
Proceedings of the Second Smart Card Research and Advanced Application Conference, 1996