• home
  • login
  • join

타이틀

We are interested in security of emerging and current systems. Our research involves design/implementation of novel attacks, and developing countermeasures against such attacks. We currently focus on 1) security issues for Cyber Physical Systems (CPSs) such as medical devices, smart grid, and automobiles, 2) control plane security of mobile/ad hoc/sensor/cellular networks, Internet, P2P systems, 3) Penetration testing of Korean cyber infrastructure, and 4) other security issues such as cloud/storage security, anonymous communication systems and censorship-resistant systems.

bg

icon

Research

A. IoT/Embedded System/CPS Security

CPS is a system featuring a tight combination of, and coordination between, the system’s computational and physical elements.more

line

b. Control Plane Security

Most of the telecommunication systems carry data through data plane (for forwarding data) and control plane (for routing to..more

line

c. Penetration Testing of Korean Cyber Infrastructure

This is as a service to Korean community. We are helping 1) companies to find security problems of their products, 2) government to..more

line

d. Other Security Issues

Our research also consider security problems of other systems such as cloud/storage, anonymous communication system and..more

line

icon

Member

Faculty

Yongdae Kim

line

Ph.D. Students

Hyunwoo Choi
Byeongdo Hong
Hyunwook Hong
Yunmok Son

line

MS. Students

Minhee Kwon
Juhwan Noh
Hocheol Shin
Eunsoo Kim
Dongkwan Kim
Kibum Choi
Suwan Park
Youngseok Park

line

icon

Recent publication

dt all publication dt by area

line

Medical Devices and Cyber Physical Systems
EMI and Sensing [Oakland2013]
Safe Integrated Clinical Environment [Medcomm2012]

line

Social networks
Social Cloud [AsiaCCS2013](Media: MIT Technical Review, The Verge)
Graph Sampling for Social Networks [MilCom2012]
Social networks properties and their use for trustworthy and distributed systems. [ASIACCS2012] [ICUIMC2011] [ICDCSW2011] [INFOCOM2011] [IMC2010]

line

Control Plane Security
Privacy of ICN [AsiaCCS2013]
Stress-testing BGP Routers [TR2011]
Causing BGP control plane instability using data plane events [NDSS2011] (Media: New Scientist, Slashdot, ZDNet, CBS News, Minnesota Daily, Metro, Gizmodo, The Register)

line

Cellular Networks and Mobile DevicesRemote location tracking on GSM [NDSS2012] (Nominated for the best paper award, Media: Ars Technica, Slashdot, MPR, Fox Twin Cities, Physorg, TG Daily, Network World, e! Science News, Scientific Computing, gizmag, Crazy Engineers, PC Advisor, Mobile Magazine, The CyberJungle, Inquisitr)
Pin Input Device eavesdropping [CCSPoster2010]

line

Anonymous Communication SystemsSNS-based Anonymous Communication [AsiaCCS2013]
Censorship-resistant Systems [FOCI2012, TR2011, CCS2009a]
P2P Anonymous Communication Systems [WPES2010, CCS2009b, WPES2009]
Tor [CCS2010]

line

P2P Systems
Shutting down Kad [Wiley2009, SecureComm2008]
Network Coordinate Systems [TISSEC2011, SecureComm2009]
Botnets [AsiaCCS2009]
Kad routing failure [P2P2009]
Secure DHT routing [TR2006]
P2P ecash [ICDCS2007]
P2P Storage Accounting [ICDCS 2006]
P2P Simulation[TR2010]

line

Wireless Ad-hoc/Sensor Networks Sensing irregularity [TPDS2010, SenSys2007, Infocom2007]
Secure Localization [Elsevier2008, Infocom2007]
Software Attestation [ESAS2005]
Key Pre-distribution [SASN2004]

line

Cloud Computing/Storage Systems Network Coding [ToC2010, TR2011]
Cryptographic File Systems [CCSW2009]
Accouting for Storage Outsourcing [SRDS2007]
Object-based Storage [MSST2006, SISW2003]
Global File Sharing [MSST2006]
Storage Security Survey [StorageSS2005]
Group Key Management [Comm2003, SISW2002]

line

Group Key Agreement and its Application
Secure Group Communication Systems [TPDS2004, ICDCS 2001, ICDCS 2000]
Group Key Agreement [TISSEC2004, ToC2004, TISSEC2004, ACNS2003, ICDCS2002, SEC2001, CCS2000, DISCEX2000]
Admission Control [NCA2003, LNSW2003]

line

Applied Cryptography
Timed-release Public Key Encryption [TISSEC2008, FC2006]
Password-based Authentication [ACNS2005]
Batch Verification [ICISC2004]
Stream Ciphers [CARDIS 1996]
Exponent Permutation [ICCIS1996]
Public Key Crypto [WISA2006, KIISC1996]

line

Etc
Privacy Preserving Data Mining [HICSS2010, PADM2006]
Network Anomaly Detection [IAW2005, TR2006]
Multi-agent Marketplace [Elsevier2004, ICEC2003]

bg