- Advanced Malware Detection Techniques
- Fire Detection and Safety Systems
- Smart Grid Security and Resilience
- Cryptographic Implementations and Security
- Adversarial Robustness in Machine Learning
- Network Time Synchronization Technologies
- Robotics and Sensor-Based Localization
- Advanced Computational Techniques and Applications
- UAV Applications and Optimization
- Robotic Path Planning Algorithms
- User Authentication and Security Systems
- Power System Optimization and Stability
- Bacillus and Francisella bacterial research
- Security and Verification in Computing
- Computational Physics and Python Applications
- Vehicular Ad Hoc Networks (VANETs)
- Physical Unclonable Functions (PUFs) and Hardware Security
- Network Security and Intrusion Detection
- Evacuation and Crowd Dynamics
- Inertial Sensor and Navigation
- Fault Detection and Control Systems
- Autonomous Vehicle Technology and Safety
- GNSS positioning and interference
- Power Systems Fault Detection
Korea Advanced Institute of Science and Technology
2015-2025
The consumer drone market is booming. Consumer drones are predominantly used for aerial photography; however, their use has been expanding because of autopilot technology. Unfortunately, terrorists have also begun to kamikaze bombing and reconnaissance. To protect against such threats, several companies started “anti-drone” services that primarily focus on disrupting or incapacitating operations. However, the approaches employed inadequate, they make any intruded stop remain over protected...
Accurate timing services are important for effectively operating power grids. Traditionally, supervisory control and data acquisition (SCADA) systems make use of time stamps to quickly identify respond faults in the event incidents. However, with increasing penetration renewable energy sources such as solar wind, grid has become more susceptible even minor disturbances. In response, utilities have begun deploying wide-area monitoring (WAMS) monitor real-time voltage frequency oscillations,...
Phasor Measurement Units (PMUs) are critical devices in modern power grids, providing precise voltage and current phasor measurements (synchrophasors) for real-time monitoring, fault detection, stability assessment. While previous research suggested that arbitrary time manipulation through GPS spoofing could disrupt grid operations, our study reveals successful attacks require specific conditions, contrary to earlier assumptions. Through careful analysis of the synchrophasor data...
Drones are widely used for various purposes such as delivery, aerial photography, and surveillance. Considering the increasing drone-related services, tracking locations of drones can cause security threats escaping from drone surveillance, disturbing capturing drones. For wirelessly monitoring status drones, telemetry is used, this information contains data latitude longitude, calibrated sensor outputs, offsets. Because most implementation supports neither authentication nor encryption, an...
IEEE 802.15.4 is widely used as lower layers for not only wellknown wireless communication standards such ZigBee, 6LoWPAN, and WirelessHART, but also customized protocols developed by manufacturers, particularly various Internet of Things (IoT) devices. Customized are usually publicly disclosed nor standardized. Moreover, unlike textual (e.g., HTTP, SMTP, POP3.), IoT devices provide no clues strings or keywords that useful analysis. Instead, they use bits bytes to represent header body...
Fire alarm and signaling systems are a networked system of fire detectors, control units, automated extinguishers, notification appliances. Malfunction these safety-critical cyber-physical may lead to chaotic evacuations, property damage, even loss human life. Therefore, reliability is one the most crucial factors for detectors. Indeed, single report cannot be ignored, considering importance early detection suppression. In this article, we show that wide-area smoke which globally installed...
Photoelectric sensors are utilized in a range of safety-critical applications, such as medical devices and autonomous vehicles. However, the public exposure input channel photoelectric sensor makes it vulnerable to malicious inputs. Several studies have suggested possible attacks on by injecting signals. While few defense techniques been proposed against attacks, they could be either bypassed or used for limited purposes. In this study, we propose Lightbox, novel system detect based signal...