Yongdae Kim

ORCID: 0000-0003-4879-1262
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Internet Traffic Analysis and Secure E-voting
  • Cryptography and Data Security
  • Caching and Content Delivery
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Security in Wireless Sensor Networks
  • Peer-to-Peer Network Technologies
  • Blockchain Technology Applications and Security
  • Cryptographic Implementations and Security
  • Opportunistic and Delay-Tolerant Networks
  • Advanced Data Storage Technologies
  • Advancements in Photolithography Techniques
  • High-Energy Particle Collisions Research
  • Spam and Phishing Detection
  • Particle physics theoretical and experimental studies
  • Privacy-Preserving Technologies in Data
  • Cloud Data Security Solutions
  • Mobile Ad Hoc Networks
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Chaos-based Image/Signal Encryption
  • User Authentication and Security Systems
  • Security and Verification in Computing
  • Energy Efficient Wireless Sensor Networks
  • Distributed systems and fault tolerance
  • Advanced MEMS and NEMS Technologies

Korea Advanced Institute of Science and Technology
2016-2025

Handong Global University
2025

Kootenay Association for Science & Technology
2013-2024

Defense Acquisition Program Administration
2023

Samsung SDS (South Korea)
2023

Samsung (South Korea)
2023

Korea Institute of Industrial Technology
2022-2023

Hyundai Motors (South Korea)
2023

Institute of Electrical and Electronics Engineers
2021

Regional Municipality of Niagara
2021

Secure group communication is an increasingly popular research area having received much attention in recent years. The fundamental challenge revolves around secure and efcient key management. While centralized methods are often appropriate for distribution large groups, many collaborative settings require distributed agreement techniques. This work investigates a novel approach to by blending binary trees with DiAEe-Hellman exchange. resultant protocol suite very simple, fault-tolerant....

10.1145/352600.352638 article EN 2000-11-01

Secure and reliable group communication is an active area of research. Its popularity fueled by the growing importance group-oriented collaborative applications. The central research challenge secure efficient key management. While centralized methods are often appropriate for distribution in large multicast-style groups, many settings require distributed agreement techniques. This work investigates a novel approach which blends trees with Diffie--Hellman exchange. It yields protocol suite...

10.1145/984334.984337 article EN ACM Transactions on Information and System Security 2004-02-01

Electromagnetic interference (EMI) affects circuits by inducing voltages on conductors. Analog sensing of signals the order a few millivolts is particularly sensitive to interference. This work (1) measures susceptibility analog sensor systems signal injection attacks intentional, low-power emission chosen electromagnetic waveforms, and (2) proposes defense mechanisms reduce risks. Our experiments use specially crafted EMI at varying power distance measure sensors in implantable medical...

10.1109/sp.2013.20 article EN IEEE Symposium on Security and Privacy 2013-05-01

Social networks provide interesting algorithmic properties that can be used to bootstrap the security of distributed systems. For example, it is widely believed social are fast mixing, and many recently proposed designs such systems make crucial use this property. However, whether real-world really mixing not verified before, could potentially affect performance based on To address problem, we measure time several graphs, takes a random walk graph approach stationary distribution graph,...

10.1145/1879141.1879191 article EN 2010-11-01

Key management is one of the fundamental building blocks security services. In a network with resource constrained nodes like sensor networks, traditional key techniques, such as public cryptography or distribution center (e.g., Kerberos), are often not effective. To solve this problem, several pre-distribution schemes have been proposed for networks based on random graph theory. these schemes, set randomly chosen keys secret information pre-distributed to each node and securely formed...

10.1145/1029102.1029111 article EN 2004-10-25

In today's world of computer security, Internet attacks such as Dos/DDos, worms, and spyware continue to evolve detection techniques improve. It is not easy, however, distinguish new using only knowledge pre-existing attacks. this paper the authors focused on machine learning for detecting from anomalies. The framework consists two major components: genetic algorithm (GA) feature selection support vector (SVM) packet classification. By experiment it also demonstrated that proposed...

10.1109/iaw.2005.1495950 article EN 2005-08-16

In the Bitcoin system, participants are rewarded for solving cryptographic puzzles. order to receive more consistent rewards over time, some organize mining pools and split from pool in proportion each participant's contribution. However, several attacks threaten ability participate pools. The block withholding (BWH) attack makes reward system unfair by letting malicious unearned wages while only pretending contribute work. When two launch BWH against other, they encounter miner's dilemma: a...

10.1145/3133956.3134019 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2017-10-27

Social network-based Sybil defenses exploit the algorithmic properties of social graphs to infer extent which an arbitrary node in such a graph should be trusted. However, these systems do not consider different amounts trust represented by graphs, and levels between nodes, though is being crucial requirement systems. For instance, co-authors academic collaboration are trusted manner than friends. Furthermore, some friends more others. previous designs for have considered inherent they use....

10.1109/infcom.2011.5934998 article EN 2011-04-01

This paper presents our extensive investigation of the security aspects control plane procedures based on dynamic testing components in operational Long Term Evolution (LTE) networks. For LTE networks, we implemented a semi-automated tool, named LTEFuzz, by using open-source software over which user has full control. We systematically generated test cases defining three basic properties closely analyzing standards. Based property, LTEFuzz generates and sends to target network, classifies...

10.1109/sp.2019.00038 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2019-05-01

The Dark Web is notorious for being a major distribution channel of harmful content as well unlawful goods.Perpetrators have also used cryptocurrencies to conduct illicit financial transactions while hiding their identities.The limited coverage and outdated data the in previous studies motivated us an in-depth investigative study understand how perpetrators abuse Web.We designed implemented MFScope, new framework which collects data, extracts cryptocurrency information, analyzes usage...

10.14722/ndss.2019.23055 article EN 2019-01-01

One approach to assess the security of embedded IoT devices is applying dynamic analysis such as fuzz testing their firmware in scale. To this end, existing approaches aim provide an emulation environment that mimics behavior real hardware/peripherals. Nonetheless, practice, can emulate only a small fraction images. For example, Firmadyne, state-of-the-art tool, run 183 (16.28%) 1,124 wireless router/IP-camera images we collected from top eight manufacturers. Such low success rate caused by...

10.1145/3427228.3427294 article EN Annual Computer Security Applications Conference 2020-12-07

Binary code similarity analysis (BCSA) is widely used for diverse security applications such as plagiarism detection, software license violation and vulnerability discovery. Despite the surging research interest in BCSA, it significantly challenging to perform new this field several reasons. First, most existing approaches focus only on end results, namely, increasing success rate of BCSA by adopting uninterpretable machine learning. Moreover, they utilize their own benchmark sharing neither...

10.1109/tse.2022.3187689 article EN cc-by IEEE Transactions on Software Engineering 2022-07-01

In recent years, collaborative and group-oriented applications protocols have gained popularity. These typically involve communication over open networks; security thus is naturally an important requirement. Group key management one of the basic building blocks in securing group communication. Most prior research focused on minimizing computation overhead, particular expensive cryptographic operations. However, continued advances computing power not been matched by a decrease network delay....

10.1109/tc.2004.31 article EN IEEE Transactions on Computers 2004-07-01

Contributory group key agreement protocols generate keys based on contributions of all members. Particularly appropriate for relatively small collaborative peer groups, these are resilient to many types attacks. Unlike most distribution protocols, contributory offer strong security properties such as independence and perfect forward secrecy. We present the first robust protocol any sequence changes. The protocol, Group Diffie-Hellman agreement, uses services a communication system supporting...

10.1109/tpds.2004.1278104 article EN IEEE Transactions on Parallel and Distributed Systems 2004-03-30

Group key agreement is a fundamental building block for secure peer group communication systems. Several management techniques were proposed in the last decade, all assuming existence of an underlying infrastructure to provide reliable and ordered message delivery as well membership information. Despite analysis, implementation, deployment some these techniques, actual costs associated with have been poorly understood so far. This resulted undesirable tendency: on one hand, adopting...

10.1145/1015040.1015045 article EN ACM Transactions on Information and System Security 2004-08-01

Serum pneumococcal antibody and opsonic activity were measured in normal splenectomized children before after vaccination with capsular polysaccharides of Streptococcus pneumoniae. Splenectomized showed a lower mean response to four polysaccharide types but had higher levels than for 10 the 12 antigen types. Two high serum low autologous activity, phagocytic test that employednormal human leukocytes. Thirteen (42%) 31 patients three (25%) subjects twofold increase failed show an response....

10.1093/infdis/141.3.404 article EN The Journal of Infectious Diseases 1980-03-01

We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of popular Tor network, that decreases bandwidth cost maintenance from quadratic to quasilinear while introducing no new attacks on provided by Tor, additional delay connections made via Tor. The resulting savings make modest-sized network significantly cheaper operate, allows low-bandwidth clients join network.Unlike...

10.1145/1653662.1653733 article EN 2009-11-09

The consumer drone market is booming. Consumer drones are predominantly used for aerial photography; however, their use has been expanding because of autopilot technology. Unfortunately, terrorists have also begun to kamikaze bombing and reconnaissance. To protect against such threats, several companies started “anti-drone” services that primarily focus on disrupting or incapacitating operations. However, the approaches employed inadequate, they make any intruded stop remain over protected...

10.1145/3309735 article EN ACM Transactions on Privacy and Security 2019-04-09
Coming Soon ...