


Остановите войну!
for scientists:
Yongdae Kim
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [c101]Yongdae Kim:
Cellular Security: Why is it difficult? AsiaCCS 2022: 392 - [c100]Joongyum Kim, Jihwan Kim, Seongil Wi, Yongdae Kim, Sooel Son:
HearMeOut: detecting voice phishing activities in Android. MobiSys 2022: 422-435 - [e5]Murtuza Jadliwala, Yongdae Kim, Alexandra Dmitrienko:
WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022. ACM 2022, ISBN 978-1-4503-9216-7 [contents] - [i17]Jusop Choi, Wonseok Choi, William Aiken, Hyoungshick Kim, Jun Ho Huh, Taesoo Kim, Yongdae Kim, Ross J. Anderson:
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin 'Forks' in the Wild. CoRR abs/2201.08678 (2022) - 2021
- [j27]Dongkwan Kim, Eunsoo Kim, Mingeun Kim, Yeongjin Jang, Yongdae Kim:
Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds. IEEE Secur. Priv. 19(6): 26-35 (2021) - [j26]Hoseok Seol
, Minhye Kim, Taesoo Kim
, Yongdae Kim
, Lee-Sup Kim
:
Amnesiac DRAM: A Proactive Defense Mechanism Against Cold Boot Attacks. IEEE Trans. Computers 70(4): 539-551 (2021) - [c99]Eunsoo Kim, Dongkwan Kim, CheolJun Park, Insu Yun, Yongdae Kim:
BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols. NDSS 2021 - [e4]Yongdae Kim, Jong Kim, Giovanni Vigna, Elaine Shi:
CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021. ACM 2021, ISBN 978-1-4503-8454-4 [contents] - 2020
- [j25]Hocheol Shin
, Juhwan Noh
, Dohyun Kim, Yongdae Kim:
The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure. ACM Trans. Priv. Secur. 23(3): 15:1-15:32 (2020) - [c98]Mingeun Kim, Dongkwan Kim, Eunsoo Kim, Suryeon Kim, Yeongjin Jang, Yongdae Kim:
FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis. ACSAC 2020: 733-745 - [c97]Chen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, Kevin Fu:
SoK: A Minimalist Approach to Formalizing Analog Sensor Security. IEEE Symposium on Security and Privacy 2020: 233-248 - [i16]Geunwoo Lim, Yujin Kwon, Yongdae Kim:
Analysis of LFT2. CoRR abs/2004.04294 (2020) - [i15]Dongkwan Kim, Eunsoo Kim, Sang Kil Cha, Sooel Son, Yongdae Kim:
Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned. CoRR abs/2011.10749 (2020) - [i14]Hocheol Shin, Juhwan Noh, Dohyun Kim, Yongdae Kim:
The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure. IACR Cryptol. ePrint Arch. 2020: 562 (2020)
2010 – 2019
- 2019
- [j24]Juhwan Noh
, Yujin Kwon, Yunmok Son, Hocheol Shin
, Dohyun Kim, Jaeyeong Choi, Yongdae Kim:
Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing. ACM Trans. Priv. Secur. 22(2): 12:1-12:26 (2019) - [c96]Yujin Kwon, Jian Liu, Minjeong Kim, Dawn Song, Yongdae Kim:
Impossibility of Full Decentralization in Permissionless Blockchains. AFT 2019: 110-123 - [c95]Yujin Kwon, Hyoungshick Kim, Yung Yi, Yongdae Kim:
An Eye for an Eye: Economics of Retaliation in Mining Pools. AFT 2019: 169-182 - [c94]Minjeong Kim, Yujin Kwon, Yongdae Kim:
Is Stellar As Secure As You Think? EuroS&P Workshops 2019: 377-385 - [c93]Seunghyeon Lee, Changhoon Yoon, Heedo Kang, Yeonkeun Kim, Yongdae Kim, Dongsu Han, Sooel Son, Seungwon Shin:
Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web. NDSS 2019 - [c92]Yujin Kwon, Hyoungshick Kim, Jinwoo Shin, Yongdae Kim:
Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash? IEEE Symposium on Security and Privacy 2019: 935-951 - [c91]Hongil Kim, Jiho Lee, Eunkyu Lee, Yongdae Kim:
Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane. IEEE Symposium on Security and Privacy 2019: 1153-1168 - [c90]Hojoon Yang, Sangwook Bae, Mincheol Son, Hongil Kim, Song Min Kim, Yongdae Kim:
Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE. USENIX Security Symposium 2019: 55-72 - [c89]Sangwook Bae, Mincheol Son, Sooel Son
, Yongdae Kim:
Hidden Figures: Comparative Latency Analysis of Cellular Networks with Fine-grained State Machine Models. HotMobile 2019: 75-80 - [c88]Sangsup Lee, Daejun Kim, Dongkwan Kim, Sooel Son, Yongdae Kim:
Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO. WOOT @ USENIX Security Symposium 2019 - [c87]Changhoon Yoon, Kwanwoo Kim, Yongdae Kim, Seungwon Shin, Sooel Son
:
Doppelgängers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services. WWW 2019: 2225-2235 - [i13]Yujin Kwon, Hyoungshick Kim, Jinwoo Shin, Yongdae Kim:
Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash? CoRR abs/1902.11064 (2019) - [i12]Minjeong Kim, Yujin Kwon, Yongdae Kim:
Is Stellar As Secure As You Think? CoRR abs/1904.13302 (2019) - [i11]Yujin Kwon, Jian Liu, Minjeong Kim, Dawn Song, Yongdae Kim:
Impossibility of Full Decentralization in Permissionless Blockchains. CoRR abs/1905.05158 (2019) - [i10]Yujin Kwon, Hyoungshick Kim, Yung Yi, Yongdae Kim:
An Eye for an Eye: Economics of Retaliation in Mining Pools. CoRR abs/1908.10781 (2019) - 2018
- [j23]Hyunwoo Choi
, Yongdae Kim
:
Large-Scale Analysis of Remote Code Injection Attacks in Android Apps. Secur. Commun. Networks 2018: 2489214:1-2489214:17 (2018) - [j22]Yunmok Son
, Juhwan Noh, Jaeyeong Choi, Yongdae Kim:
GyrosFinger: Fingerprinting Drones for Location Tracking Based on the Outputs of MEMS Gyroscopes. ACM Trans. Priv. Secur. 21(2): 10:1-10:25 (2018) - [j21]Byeongdo Hong, Shinjo Park, Hongil Kim, Dongkwan Kim, Hyunwook Hong, Hyunwoo Choi, Jean-Pierre Seifert, Sung-Ju Lee, Yongdae Kim:
Peeking Over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -. IEEE Trans. Mob. Comput. 17(10): 2366-2380 (2018) - [c86]Byeongdo Hong, Sangwook Bae, Yongdae Kim:
GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier. NDSS 2018 - [e3]Jong Kim, Gail-Joon Ahn, Seungjoo Kim, Yongdae Kim, Javier López, Taesoo Kim:
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018. ACM 2018 [contents] - 2017
- [j20]Hyukmin Kwon, Aziz Mohaisen, Jiyoung Woo
, Yongdae Kim, Eunjo Lee, Huy Kang Kim
:
Crime Scene Reconstruction: Online Gold Farming Network Analysis. IEEE Trans. Inf. Forensics Secur. 12(3): 544-556 (2017) - [c85]Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Y. Vasserman
, Yongdae Kim:
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin. CCS 2017: 195-209 - [c84]Hocheol Shin, Dohyun Kim, Yujin Kwon, Yongdae Kim:
Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications. CHES 2017: 445-467 - [c83]Hyunwook Hong, Hyunwoo Choi, Dongkwan Kim, Hongil Kim, Byeongdo Hong, Jiseong Noh, Yongdae Kim:
When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks. EuroS&P 2017: 595-609 - [i9]Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Y. Vasserman, Yongdae Kim:
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin. CoRR abs/1708.09790 (2017) - [i8]Hocheol Shin, Dohyun Kim, Yujin Kwon, Yongdae Kim:
Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications. IACR Cryptol. ePrint Arch. 2017: 613 (2017) - 2016
- [j19]Domenic Forte, Ron Perez, Yongdae Kim, Swarup Bhunia:
Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]. Computer 49(8): 12-16 (2016) - [j18]Myungsun Kim
, Aziz Mohaisen, Jung Hee Cheon, Yongdae Kim:
Private Over-Threshold Aggregation Protocols over Distributed Datasets. IEEE Trans. Knowl. Data Eng. 28(9): 2467-2479 (2016) - [c82]Jeongmin Kim, Hyunwoo Choi, Hun Namkung, Woohyun Choi, Byungkwon Choi, Hyunwook Hong, Yongdae Kim, Jonghyup Lee, Dongsu Han
:
Enabling Automatic Protocol Behavior Analysis for Android Applications. CoNEXT 2016: 281-295 - [c81]Ji-Hyeon Yoon, Jeong Oh Kye, Yongdae Kim, Hae Young Lee:
Decoder-Free Sino-Korean Shellcode. ICSSA 2016: 75-78 - [c80]WonJun Song, Hyunwoo Choi, Junhong Kim, Eunsoo Kim, Yongdae Kim, John Kim:
PIkit: A New Kernel-Independent Processor-Interconnect Rootkit. USENIX Security Symposium 2016: 37-51 - [c79]Yujin Kwon, Dohyun Kim, Yunmok Son, Jaeyeong Choi, Yongdae Kim:
Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack. WISA 2016: 124-135 - [c78]Hyunwook Hong, Hongil Kim, Byeongdo Hong, Dongkwan Kim, Hyunwoo Choi, Eunkyu Lee, Yongdae Kim:
Pay as You Want: Bypassing Charging System in Operational Cellular Networks. WISA 2016: 148-160 - [c77]Kibum Choi, Yunmok Son, Juhwan Noh, Hocheol Shin, Jaeyeong Choi, Yongdae Kim:
Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4. WISEC 2016: 183-193 - [c76]Young-Seok Park, Yunmok Son, Hocheol Shin, Dohyun Kim, Yongdae Kim:
This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump. WOOT 2016 - [c75]Hocheol Shin, Yunmok Son, Young-Seok Park, Yujin Kwon, Yongdae Kim:
Sampling Race: Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital Systems. WOOT 2016 - 2015
- [j17]Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim:
Hijacking the Vuze BitTorrent network: all your hop are belong to us. IET Inf. Secur. 9(4): 203-208 (2015) - [j16]Aziz Mohaisen, Hesham Mekky, Xinwen Zhang, Haiyong Xie, Yongdae Kim:
Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures. IEEE Trans. Dependable Secur. Comput. 12(6): 675-687 (2015) - [c74]Hongil Kim, Dongkwan Kim, Minhee Kwon, HyungSeok Han, Yeongjin Jang, Dongsu Han
, Taesoo Kim, Yongdae Kim:
Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations. CCS 2015: 328-339 - [c73]Sungjae Hwang, Sungho Lee, Yongdae Kim, Sukyoung Ryu
:
Bittersweet ADB: Attacks and Defenses. AsiaCCS 2015: 579-584 - [c72]Hyunwoo Choi, Jeongmin Kim, Hyunwook Hong, Yongdae Kim, Jonghyup Lee, Dongsu Han
:
Extractocol: Autoatic Extraction of Application-level Protocol Behaviors for Android Applications. SIGCOMM 2015: 593-594 - [c71]Yunmok Son, Hocheol Shin, Dongkwan Kim, Young-Seok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, Yongdae Kim:
Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors. USENIX Security Symposium 2015: 881-896 - [c70]Dongkwan Kim, Suwan Park, Kibum Choi, Yongdae Kim:
BurnFit: Analyzing and Exploiting Wearable Devices. WISA 2015: 227-239 - [c69]Hocheol Shin, Kibum Choi, Young-Seok Park, Jaeyeong Choi, Yongdae Kim:
Security Analysis of FHSS-type Drone Controller. WISA 2015: 240-253 - [c68]Kibum Choi, Yunmok Son, Jangjun Lee, Suryeon Kim, Yongdae Kim:
Frying PAN: Dissecting Customized Protocol for Personal Area Network. WISA 2015: 300-312 - 2014
- [j15]Hanjin Park, Yung Yi, Yongdae Kim:
Revisiting security of proportional fair scheduler in wireless cellular networks. Comput. Networks 75: 58-74 (2014) - [j14]Aziz Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim:
Trustworthy Distributed Computing on Social Networks. IEEE Trans. Serv. Comput. 7(3): 333-345 (2014) - [c67]Younghwan Go, Eunyoung Jeong, Jongil Won, Yongdae Kim, Denis Foo Kune, KyoungSoo Park:
Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission. NDSS 2014 - [c66]Il-Gu Lee, Hyunwoo Choi, Yongdae Kim, Seungwon Shin, Myungchul Kim:
Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks. RAID 2014: 362-383 - [c65]Shinjo Park, Suwan Park, Insu Yun, Dongkwan Kim, Yongdae Kim:
Analyzing Security of Korean USIM-Based PKI Certificate Service. WISA 2014: 95-106 - [c64]Yongdae Kim:
Successful Profiling Attacks with Different Measurement Environments for Each Phase. WISA 2014: 321-330 - [e2]Yongdae Kim, Heejo Lee, Adrian Perrig:
Information Security Applications - 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8267, Springer 2014, ISBN 978-3-319-05148-2 [contents] - [i7]Yongdae Kim, Hyunsoo Yoon:
First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA. IACR Cryptol. ePrint Arch. 2014: 999 (2014) - 2013
- [j13]Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim:
Attacking the kad network - real world evaluation and high fidelity simulation using DVN. Secur. Commun. Networks 6(12): 1556-1575 (2013) - [j12]Abedelaziz Mohaisen, Denis Foo Kune, Eugene Y. Vasserman
, Myungsun Kim, Yongdae Kim:
Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs. IEEE Trans. Dependable Secur. Comput. 10(6): 380-393 (2013) - [c63]Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim:
Trustworthy distributed computing on social networks. AsiaCCS 2013: 155-160 - [c62]Abedelaziz Mohaisen, Yongdae Kim:
Dynamix: anonymity on dynamic social structures. AsiaCCS 2013: 167-172 - [c61]Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim:
Protecting access privacy of cached contents in information centric networks. AsiaCCS 2013: 173-178 - [c60]Max Schuchard, Christopher Thompson, Nicholas Hopper, Yongdae Kim:
Peer Pressure: Exerting Malicious Influence on Routers at a Distance. ICDCS 2013: 571-580 - [c59]Yongdae Kim, Haengseok Ko:
Using Principal Component Analysis for Practical Biasing of Power Traces to Improve Power Analysis Attacks. ICISC 2013: 109-120 - [c58]Denis Foo Kune, John D. Backes, Shane S. Clark, Daniel B. Kramer, Matthew R. Reynolds, Kevin Fu, Yongdae Kim, Wenyuan Xu:
Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors. IEEE Symposium on Security and Privacy 2013: 145-159 - [c57]Younghwan Go, Denis Foo Kune, Shinae Woo, KyoungSoo Park, Yongdae Kim:
Towards accurate accounting of cellular data for TCP retransmission. HotMobile 2013: 2 - [i6]Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim:
Private Over-threshold Aggregation Protocols over Distributed Databases. IACR Cryptol. ePrint Arch. 2013: 545 (2013) - 2012
- [c56]Abedelaziz Mohaisen, Huy Tran, Nicholas Hopper, Yongdae Kim:
On the mixing time of directed social graphs and security implications. AsiaCCS 2012: 36-37 - [c55]Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim:
Protecting access privacy of cached contents in information centric networks. CCS 2012: 1001-1003 - [c54]Yongdae Kim, Naofumi Homma, Takafumi Aoki, Heebong Choi:
Security Evaluation of Cryptographic Modules against Profiling Attacks. ICISC 2012: 383-394 - [c53]Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim:
Private Over-Threshold Aggregation Protocols. ICISC 2012: 472-486 - [c52]Abedelaziz Mohaisen, Pengkui Luo, Yanhua Li, Yongdae Kim, Zhi-Li Zhang:
Measuring bias in the mixing time of social graphs due to graph sampling. MILCOM 2012: 1-6 - [c51]Denis Foo Kune, John Kölndorfer, Nicholas Hopper, Yongdae Kim:
Location leaks over the GSM air interface. NDSS 2012 - [c50]Max Schuchard, Christopher Thompson, Nicholas Hopper, Yongdae Kim:
Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous. NDSS 2012 - [c49]Eugene Y. Vasserman, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim:
One-Way Indexing for Plausible Deniability in Censorship Resistant Storage. FOCI 2012 - [i5]Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim:
Private Top-k Aggregation Protocols. IACR Cryptol. ePrint Arch. 2012: 538 (2012) - 2011
- [j11]Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim:
The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems. ACM Trans. Inf. Syst. Secur. 14(3): 27:1-27:23 (2011) - [c48]Abedelaziz Mohaisen, Huy Tran, Nicholas Hopper, Yongdae Kim:
Understanding Social Networks Properties for Trustworthy Computing. ICDCS Workshops 2011: 154-159 - [c47]Abedelaziz Mohaisen, Tamer AbuHmed, Hun Jeong Kang, Yongdae Kim, DaeHun Nyang:
Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks. ICUIMC 2011: 28 - [c46]Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim:
Keep your friends close: Incorporating trust into social network-based Sybil defenses. INFOCOM 2011: 1943-1951 - [c45]Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim, Eugene Y. Vasserman:
Losing Control of the Internet: Using the Data Plane to Attack the Control Plane. NDSS 2011 - [i4]Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim:
SocialCloud: Using Social Networks for Building Distributed Computing Services. CoRR abs/1112.2254 (2011) - 2010
- [j10]Aaram Yun, Jung Hee Cheon, Yongdae Kim:
On Homomorphic Signatures for Network Coding. IEEE Trans. Computers 59(9): 1295-1296 (2010) - [j9]Joengmin Hwang, Tian He, Yongdae Kim:
Exploring In-Situ Sensing Irregularity in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 21(4): 547-561 (2010) - [c44]Rob Jansen, Nicholas Hopper, Yongdae Kim:
Recruiting new tor relays with BRAIDS. CCS 2010: 319-328 - [c43]Denis Foo Kune, Yongdae Kim:
Timing attacks on PIN input devices. CCS 2010: 678-680 - [c42]Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim:
Designs to account for trust in social network-based sybil defenses. CCS 2010: 714-716 - [c41]Abedelaziz Mohaisen, Eugene Y. Vasserman
, Max Schuchard, Denis Foo Kune, Yongdae Kim:
Secure encounter-based social networks: requirements, challenges, and designs. CCS 2010: 717-719 - [c40]Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim, Eugene Y. Vasserman
:
Losing control of the internet: using the data plane to attack the control plane. CCS 2010: 726-728 - [c39]Mark Shaneck, Yongdae Kim:
Efficient Cryptographic Primitives for Private Data Mining. HICSS 2010: 1-9 - [c38]Abedelaziz Mohaisen, Aaram Yun, Yongdae Kim:
Measuring the mixing time of social graphs. Internet Measurement Conference 2010: 383-389 - [c37]Max Schuchard, Alexander W. Dean, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim:
Balancing the shadows. WPES 2010: 1-10
2000 – 2009
- 2009
- [c36]Brent ByungHoon Kang, Eric Chan-Tin, Christopher P. Lee, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim:
Towards complete node enumeration in a peer-to-peer botnet. AsiaCCS 2009: 23-34 - [c35]Aaram Yun, Chunhui Shi, Yongdae Kim:
On protecting integrity and confidentiality of cryptographic file system for outsourced storage. CCSW 2009: 67-76 - [c34]Eugene Y. Vasserman
, Rob Jansen, James Tyra, Nicholas Hopper, Yongdae Kim:
Membership-concealing overlay networks. CCS 2009: 390-399 - [c33]Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongdae Kim:
Scalable onion routing with torsk. CCS 2009: 590-599 - [c32]Hun Jeong Kang, Eric Chan-Tin, Nicholas Hopper, Yongdae Kim:
Why Kad Lookup Fails. Peer-to-Peer Computing 2009: 121-130 - [c31]Eric Chan-Tin, Daniel Feldman, Nicholas Hopper, Yongdae Kim:
The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems. SecureComm 2009: 448-458 - [c30]Andrew Tran, Nicholas Hopper, Yongdae Kim:
Hashing it out in public: common failure modes of DHT-based anonymity schemes. WPES 2009: 71-80 - 2008
- [j8]Joengmin Hwang, Tian He, Yongdae Kim:
Secure localization with phantom node detection. Ad Hoc Networks 6(7): 1031-1050 (2008) - [j7]Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov:
Provably Secure Timed-Release Public Key Encryption. ACM Trans. Inf. Syst. Secur. 11(2): 4:1-4:44 (2008) - [c29]Yongdae Kim, Byounguk Sohn, Woosub Youm, Jongkyu Jung, Jonghyun Lee, Kyihwan Park:
Voice coil motor nano stage with an eddy current damper. ICARCV 2008: 1714-1717 - [c28]Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim:
Attacking the Kad network. SecureComm 2008: 23 - [e1]Yongdae Kim, William Yurcik:
Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, StorageSS 2008, Alexandria, VA, USA, October 31, 2008. ACM 2008, ISBN 978-1-60558-299-3 [contents] - 2007
- [c27]Ivan Osipkov, Eugene Y. Vasserman
, Nicholas Hopper, Yongdae Kim:
Combating Double-Spending Using Cooperative P2P Systems. ICDCS 2007: 41 - [c26]Joengmin Hwang, Tian He, Yongdae Kim:
Detecting Phantom Nodes in Wireless Sensor Networks. INFOCOM 2007: 2391-2395 - [c25]Joengmin Hwang, Yu Gu, Tian He, Yongdae Kim:
Realistic Sensing Area Modeling. INFOCOM 2007: 2421-2425 - [c24]