- Vehicular Ad Hoc Networks (VANETs)
- User Authentication and Security Systems
- Advanced Malware Detection Techniques
- Autonomous Vehicle Technology and Safety
- Korean Urban and Social Studies
- Diverse Topics in Contemporary Research
- Urban and spatial planning
- Advanced Wireless Communication Techniques
- Advanced Adaptive Filtering Techniques
- Direction-of-Arrival Estimation Techniques
- Millimeter-Wave Propagation and Modeling
- Ecology and Conservation Studies
- Network Security and Intrusion Detection
- Microwave Engineering and Waveguides
- Chinese history and philosophy
- Gaze Tracking and Assistive Technology
- Anomaly Detection Techniques and Applications
- Advanced Authentication Protocols Security
- Wireless Body Area Networks
- Real-Time Systems Scheduling
- Antenna Design and Optimization
- Biometric Identification and Security
- Adversarial Robustness in Machine Learning
- Cultural and Historical Studies
- Bluetooth and Wireless Communication Technologies
Korea University
2016-2024
Chungbuk National University
2017-2024
Research!America (United States)
2023-2024
Samsung (United States)
2021-2024
National Technical University of Athens
2024
Hansung University
2020-2023
Samsung (South Korea)
2010-2022
STATS ChipPAC (Singapore)
2019
Syracuse University
2004-2012
Yonsei University
2007-2008
The proliferation of computerized functions aimed at enhancing drivers' safety and convenience has increased the number vehicular attack surfaces accordingly. fundamental vulnerability is caused by fact that controller area network protocol, a de facto standard for in-vehicle networks, does not support message origin authentication. Several methods to resolve this problem have been suggested. However, most them require modification CAN protocol their own vulnerabilities. In paper, we focus...
As the functions of vehicles are more computerized for safety and convenience drivers, attack surfaces vehicle accordingly increasing. Many results have shown that an attacker could intentionally control vehicles. Most them exploit vulnerability controller area network (CAN) protocol, a de-facto standard in-vehicle networks, does not support message origin authentication. Although number methods to resolve this security been suggested, they their each limitation be applied into current...
The development of vehicle technologies such as connected and autonomous environments provide drivers with functions for convenience safety that are highly capable remote diagnosis or lane-keeping assistance. Unfortunately, despite impressive advantages drivers, these also have various vulnerabilities could lead to cyber-physical attacks on automotive Controller Area Networks (i.e., CAN). To deal security issues, a multitude issue-specific countermeasures already been proposed. In this...
Numerous hacking attempts on modern vehicles have recently demonstrated that an adversary can remotely control a vehicle using vulnerable telematics services. In these attempts, masquerade attack impersonating some safety-critical electronic units (ECUs) is usually performed to vehicle. the last decade, several message authentication protocols for controller area network (CAN) been proposed protect from attacks. However, are not enough attacks by compromised ECUs. Other secure against fill...
It is projected that mobile traffic will increase by 80x year 2030. To meet this in demand, it inevitable to utilize the terahertz bands (0.1 THz 10 THz) for future 6G wireless systems. However, operating at such high frequency comes with several fundamental and technical challenges. In work, we present a proof-of-concept system demonstrate feasibility of establishing communication link 140 GHz carrier frequency. addition, work highlights techniques tackle challenges regime. authors...
Recently, the traditional way to unlock car doors has been replaced with a keyless entry system which proves more convenient for automobile owners. When driver key fob is in vicinity of vehicle, automatically on user command. However, unfortunately, it shown that these systems are vulnerable signal relaying attacks. While evident manufacturers incorporate preventative methods secure systems, they continue be range Relayed signals result valid packets verified as legitimate, and this makes...
Smartwatches have come into wide use in recent years, and a number of smartwatch applications that improve convenience user health are being developed introduced constantly. Moreover, the latest smartwatches now designed to operate without their paired smartphones, as such, it is necessary for independently authenticate users. In these current devices, personal identification numbers (PIN) or patterns entered users, but methods require inconvenient interaction not highly secure. Particularly...
Contemporary vehicles have undergone numerous transformations to become fully computerized machines. This computerizing process is intended provide safety and convenience for drivers; however, there been many studies demonstrating how remotely maneuver a vehicle by compromising its in-vehicle electronic control units (ECU). As countermeasure, automotive intrusion detection systems (IDSs) also extensively explored as potential remedies. The clock-based IDS was one of the most promising...
Joint phase-time arrays (JPTA) is a new mmWave radio frequency front-end architecture constructed with appending time-delay elements to phase shifters for analog beamforming. JPTA allows the base station (BS) form multiple frequency-dependent beams single RF chain, exploiting extra degrees of freedom offer. Without requiring power-hungry chains, BS can schedule users in different directions frequency-division multiplexing (FDM) manner. A achieves various advantages over traditional...
Passive keyless entry and start system has been widely used in modern cars. Car owners can open the door or engine merely by having key their pocket. PKES was originally designed to establish a communication channel between car its within approximately one meter. However, is vulnerable relay attacks which attackers unlock even if out of range. Even though have recognized as potential threat for over ten years, such were thought be impractical due highly expensive equipment; however, required...
Recently, numerous electronic components are installed in vehicles, providing drivers and passengers with increased safety convenience. The construct an in-vehicle network that internally shares relevant status information about the vehicle. As modern vehicles become more computerized, potential for automotive cyber-security threats also increases a fact has been illustrated clearly by various car-hacking demonstrations. Using controller area (CAN), de facto standard protocol industry...
Understanding the mammalian pathogenesis and interspecies transmission of HPAI H5N8 virus hinges on mapping its adaptive markers. We used deep sequencing to track these markers over five passages in murine lung tissue. Subsequently, we evaluated growth, selection, RNA load eight recombinant viruses with By leveraging an integrated non-linear regression model, quantitatively determined influence adaptation, expression hosts. Furthermore, our findings revealed that interplay can lead...
In traditional, adaptive signal processing algorithms one change both the amplitude and phase of weight vectors associated with an array at each antenna elements. The use complex weights offers greater control over response expense system complexity. However, it is easier if requires only variation a fixed for all Because uses real arithmetic operations to find connected antenna, computational complexity reduced considerably. Hence, this paper addresses in system. we describe new direct data...
Modern vehicles are equipped with numerous electric control units which exchange vehicular status data, providing drivers convenience, efficiency, and safety. In addition, the autonomous adopt various sensors that produce high volumes of high-speed data to process assess internal external situations. This is particularly useful automotive service providers such as car insurers, rental companies, manufacturers. One way understand how this used imagine scenario in an automobile insurer would...
Modern vehicles are becoming complex cyber-physical systems equipped with numerous electronic control units (ECUs). Over the controller area network (CAN), these ECUs communicate each other to share information related vehicle status as well commands efficiently vehicle. However, increasing complexity of modern has inadvertently expanded potential attack surfaces, making them vulnerable cyber attacks. In light this, researchers currently working demonstrate remote maneuvering by compromising...
A 140GHz 4-element RF beamforming phased-array receiver (RX) has been demonstrated in 22nm FDSOI CMOS. The proposed single-side-band architecture provides >25dB and >20dB measured image rejection ratio (IRR) across 4GHz 8GHz channel bandwidth centered at 7GHz intermediate frequency (IF). Each front-end element consists of a wideband low-noise amplifier (LNA) vector-modulator phase shifter. 4 elements are combined on chip through power combiners driver amplifiers before the double-balanced...
This paper presents a new technique for estimating parameters of damped sinusoids and impulse-like responses utilizing both early late time transient scattering responses. Transient are composed at times components times. Due to the components, it is difficult extract meaningful when analyzing complete data set. In this paper, entire time-domain response used signal interest The fractional Fourier transform (FrFT), especially half (HFT), analyze parameter identification. Impulse or...
Participatory sensing is gaining popularity as a method for collecting and sharing information from distributed local environments using sensor-rich mobile devices. There are number of participatory applications currently in wide use, such location-based service (e.g., Waze navigation). Usually, these collect tremendous amounts data containing personal information, including user identity current location. Due to the high sensitivity this need privacy-preserving mechanism, anonymity, secure...
With the advancement of connected and automated vehicles (CAVs), drivers now have access to convenient features such as lane-keeping, cruise control, more. The electronic control units (ECUs) equipped within communicate with each other through controller area network (CAN). However, since CAN does not possess any security mechanisms, it becomes a target for adversaries attack. In light this, significant amount research regarding intrusion detection systems (IDSs) has focused on detecting...
Ultrasonic sensors are used across a variety of industrial areas, as they measure distance simply via calculating the difference time between transmission and reception signals. However, recently, attackers have been targeting ultrasonic to inflict intentional malfunction regarding measurement an obstacle some researchers actually demonstrated such attacks using actual vehicle, Tesla Model S. In addition, these malicious signal injections into do not require sophisticated equipment, making...
Modern vehicles are equipped with a number of electronic control units (ECUs), which efficiently by communicating each other through the controller area network (CAN). However, CAN is known to be vulnerable cyber attacks because it does not have any security mechanisms. To find messages that can safety-critical functions in ECUs, researchers studied fuzzing methods. In existing methods, input values generally generated at random without considering structure messages, resulting...
Recently, automotive intrusion detection systems (IDSs) have emerged as promising defense approaches to counter attacks on in-vehicle networks (IVNs). However, the effectiveness of IDSs relies heavily quality datasets used for training and evaluation. Despite availability several IDSs, there has been a lack comprehensive analysis focusing assessing these datasets. This paper aims address need dataset assessment in context IDSs. It proposes qualitative quantitative metrics that are...
철도 지선 구간의 유지보수 비용을 최소화하기 위해 ICT 기반 차상제어시스템을 개발 중이다. 이 시스템은 기존의 열차제어방식과 달리 선로 주변 신호기와 고정폐색장치를 없애고 이동폐색방식을 적용하며 차상에서 선로전환기와 건널목을 제어하는 방식이다. 본 논문의 목적은 차상제어시스템 이전에 고려해야 할 주요 운영 이슈 사항을 분석하며 대상은 열차운행준비, 운전 편의성, 관제역할, 폐색방식, 그리고 운영비용을 고려하였다. 열차 출발 전에 기관사가 DMI를 통해 입력하여야 입력데이터를 정의하였고 관련 업무 프로세스를 UML 도구를 활용하여 설계하였다. 기관사의 편의성 측면에서는 역 진입 시의 제동시점 지원 필요성과 원활한 훈련을 위한 운전시뮬레이터가 필요하다. 직접 업무절차를 도구로 기존 방식과의 차이를 확인하기 고정폐색방식과 이동폐색방식 간에 비교 분석하였으며, 비용 기존방식과 방식의 신호설비에 따른 이점을 제시하였다. In order to minimize the...