- Internet Traffic Analysis and Secure E-voting
- Cryptography and Data Security
- Caching and Content Delivery
- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Security in Wireless Sensor Networks
- Peer-to-Peer Network Technologies
- Blockchain Technology Applications and Security
- Cryptographic Implementations and Security
- Opportunistic and Delay-Tolerant Networks
- Advanced Data Storage Technologies
- Advancements in Photolithography Techniques
- High-Energy Particle Collisions Research
- Spam and Phishing Detection
- Particle physics theoretical and experimental studies
- Privacy-Preserving Technologies in Data
- Cloud Data Security Solutions
- Mobile Ad Hoc Networks
- Physical Unclonable Functions (PUFs) and Hardware Security
- Chaos-based Image/Signal Encryption
- User Authentication and Security Systems
- Security and Verification in Computing
- Energy Efficient Wireless Sensor Networks
- Distributed systems and fault tolerance
- Advanced MEMS and NEMS Technologies
Korea Advanced Institute of Science and Technology
2016-2025
Handong Global University
2025
Kootenay Association for Science & Technology
2013-2024
Defense Acquisition Program Administration
2023
Samsung SDS (South Korea)
2023
Samsung (South Korea)
2023
Korea Institute of Industrial Technology
2022-2023
Hyundai Motors (South Korea)
2023
Institute of Electrical and Electronics Engineers
2021
Regional Municipality of Niagara
2021
Secure group communication is an increasingly popular research area having received much attention in recent years. The fundamental challenge revolves around secure and efcient key management. While centralized methods are often appropriate for distribution large groups, many collaborative settings require distributed agreement techniques. This work investigates a novel approach to by blending binary trees with DiAEe-Hellman exchange. resultant protocol suite very simple, fault-tolerant....
Secure and reliable group communication is an active area of research. Its popularity fueled by the growing importance group-oriented collaborative applications. The central research challenge secure efficient key management. While centralized methods are often appropriate for distribution in large multicast-style groups, many settings require distributed agreement techniques. This work investigates a novel approach which blends trees with Diffie--Hellman exchange. It yields protocol suite...
Electromagnetic interference (EMI) affects circuits by inducing voltages on conductors. Analog sensing of signals the order a few millivolts is particularly sensitive to interference. This work (1) measures susceptibility analog sensor systems signal injection attacks intentional, low-power emission chosen electromagnetic waveforms, and (2) proposes defense mechanisms reduce risks. Our experiments use specially crafted EMI at varying power distance measure sensors in implantable medical...
Social networks provide interesting algorithmic properties that can be used to bootstrap the security of distributed systems. For example, it is widely believed social are fast mixing, and many recently proposed designs such systems make crucial use this property. However, whether real-world really mixing not verified before, could potentially affect performance based on To address problem, we measure time several graphs, takes a random walk graph approach stationary distribution graph,...
Key management is one of the fundamental building blocks security services. In a network with resource constrained nodes like sensor networks, traditional key techniques, such as public cryptography or distribution center (e.g., Kerberos), are often not effective. To solve this problem, several pre-distribution schemes have been proposed for networks based on random graph theory. these schemes, set randomly chosen keys secret information pre-distributed to each node and securely formed...
In today's world of computer security, Internet attacks such as Dos/DDos, worms, and spyware continue to evolve detection techniques improve. It is not easy, however, distinguish new using only knowledge pre-existing attacks. this paper the authors focused on machine learning for detecting from anomalies. The framework consists two major components: genetic algorithm (GA) feature selection support vector (SVM) packet classification. By experiment it also demonstrated that proposed...
In the Bitcoin system, participants are rewarded for solving cryptographic puzzles. order to receive more consistent rewards over time, some organize mining pools and split from pool in proportion each participant's contribution. However, several attacks threaten ability participate pools. The block withholding (BWH) attack makes reward system unfair by letting malicious unearned wages while only pretending contribute work. When two launch BWH against other, they encounter miner's dilemma: a...
Social network-based Sybil defenses exploit the algorithmic properties of social graphs to infer extent which an arbitrary node in such a graph should be trusted. However, these systems do not consider different amounts trust represented by graphs, and levels between nodes, though is being crucial requirement systems. For instance, co-authors academic collaboration are trusted manner than friends. Furthermore, some friends more others. previous designs for have considered inherent they use....
This paper presents our extensive investigation of the security aspects control plane procedures based on dynamic testing components in operational Long Term Evolution (LTE) networks. For LTE networks, we implemented a semi-automated tool, named LTEFuzz, by using open-source software over which user has full control. We systematically generated test cases defining three basic properties closely analyzing standards. Based property, LTEFuzz generates and sends to target network, classifies...
The Dark Web is notorious for being a major distribution channel of harmful content as well unlawful goods.Perpetrators have also used cryptocurrencies to conduct illicit financial transactions while hiding their identities.The limited coverage and outdated data the in previous studies motivated us an in-depth investigative study understand how perpetrators abuse Web.We designed implemented MFScope, new framework which collects data, extracts cryptocurrency information, analyzes usage...
One approach to assess the security of embedded IoT devices is applying dynamic analysis such as fuzz testing their firmware in scale. To this end, existing approaches aim provide an emulation environment that mimics behavior real hardware/peripherals. Nonetheless, practice, can emulate only a small fraction images. For example, Firmadyne, state-of-the-art tool, run 183 (16.28%) 1,124 wireless router/IP-camera images we collected from top eight manufacturers. Such low success rate caused by...
Binary code similarity analysis (BCSA) is widely used for diverse security applications such as plagiarism detection, software license violation and vulnerability discovery. Despite the surging research interest in BCSA, it significantly challenging to perform new this field several reasons. First, most existing approaches focus only on end results, namely, increasing success rate of BCSA by adopting uninterpretable machine learning. Moreover, they utilize their own benchmark sharing neither...
In recent years, collaborative and group-oriented applications protocols have gained popularity. These typically involve communication over open networks; security thus is naturally an important requirement. Group key management one of the basic building blocks in securing group communication. Most prior research focused on minimizing computation overhead, particular expensive cryptographic operations. However, continued advances computing power not been matched by a decrease network delay....
Contributory group key agreement protocols generate keys based on contributions of all members. Particularly appropriate for relatively small collaborative peer groups, these are resilient to many types attacks. Unlike most distribution protocols, contributory offer strong security properties such as independence and perfect forward secrecy. We present the first robust protocol any sequence changes. The protocol, Group Diffie-Hellman agreement, uses services a communication system supporting...
Group key agreement is a fundamental building block for secure peer group communication systems. Several management techniques were proposed in the last decade, all assuming existence of an underlying infrastructure to provide reliable and ordered message delivery as well membership information. Despite analysis, implementation, deployment some these techniques, actual costs associated with have been poorly understood so far. This resulted undesirable tendency: on one hand, adopting...
Serum pneumococcal antibody and opsonic activity were measured in normal splenectomized children before after vaccination with capsular polysaccharides of Streptococcus pneumoniae. Splenectomized showed a lower mean response to four polysaccharide types but had higher levels than for 10 the 12 antigen types. Two high serum low autologous activity, phagocytic test that employednormal human leukocytes. Thirteen (42%) 31 patients three (25%) subjects twofold increase failed show an response....
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of popular Tor network, that decreases bandwidth cost maintenance from quadratic to quasilinear while introducing no new attacks on provided by Tor, additional delay connections made via Tor. The resulting savings make modest-sized network significantly cheaper operate, allows low-bandwidth clients join network.Unlike...
The consumer drone market is booming. Consumer drones are predominantly used for aerial photography; however, their use has been expanding because of autopilot technology. Unfortunately, terrorists have also begun to kamikaze bombing and reconnaissance. To protect against such threats, several companies started “anti-drone” services that primarily focus on disrupting or incapacitating operations. However, the approaches employed inadequate, they make any intruded stop remain over protected...