• home
  • login
  • join

타이틀

bg




icon

Publications by Area


Publications by Area


For copyright of the versions available below, please see here.

Medical Device
Cellular Networks and Mobile Devices Social Networks
Internet Control Plane Privacy and Censorship-resistance Peer-to-Peer Systems
Cloud/Storage/File Systems Group Key Agreement and Admission Control Wireless Sensor/Ad-hoc Networks
Applied Cryptography Etc.

Medical Device



  • Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors
    Denis Foo Kune, John Backes, Shane Clark, Wenyuan Xu, Dan Kramer, Matthew Reynolds, Kevin Fu, and Yongdae Kim
    IEEE Symposium on Security & Privacy (Oakland 2013)
  • Towards a safe Integrated Clinical Environment: A communication security perspective
    Denis Foo Kune, Eugene Vasserman, Krishna Venkatasubramanian, Yongdae Kim, Insup Lee
    ACM Workshop on Medical Communication Systems (MedCOMM 2012)
  • line


  • Cellular Networks and Mobile Devices



  • Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations
    Hongil Kim, Dongkwan Kim, Minhee Kwon, Hyungseok Han, Yeongjin Jang, Dongsu Han, Taesoo Kim, and Yongdae Kim
    Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. (CCS 2015)
  • Bittersweet ADB: Attacks and Defenses
    Sungjae Hwang, Sungho Lee, Yongdae Kim, Sukyoung Ryu
    10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
  • Revisting Security of Proportional Fair Scheduler in Wireless Cellular Networks
    Hanjin Park, Yung Yi, Yongdae Kim
    Elsevier Computer Networks, vol. 75, Part A, pp. 55-74, 2014
  • Run Away If You Can: Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks
    Il-Gu Lee, Hyunwoo Choi, Yongdae Kim, Seungwon Shin, Myungchul Kim
    17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2014)
  • Analyzing Security of Korean USIM-based PKI Certificate Service
    Shinjo Park, Suwan Park, Insu Yun, Dongkwan Kim, Yongdae Kim
    15th International Workshop on Information Security Applications (WISA 2014)
  • Towards Accurate Accounting of Cellular Data for TCP Retransmission
    Younghwan Go, Denis Foo Kune, Shinae Woo, KyoungSoo Park, and Yongdae Kim
    ACM International Workshop on Mobile Computing Systems and Applications (HotMobile'13)
  • Location leaks on the GSM air interface
    D. F. Kune, J. Koelndorfer, N. Hopper, and Y. Kim
    ISOC Network & Distributed System Security Symposium (NDSS 2012)
    Nominated for the best paper award
    Media: Ars Technica, Slashdot, MPR, Fox Twin Cities, Physorg, TG Daily, Network World, e! Science News, Scientific Computing, gizmag, Crazy Engineers, PC Advisor, Mobile Magazine, The CyberJungle, Inquisitr
  • Timing attacks on PIN Input Devices
    D. Foo Kune, and Y. Kim
    ACM Conference on Computer and Communications Security (CCS/Posters), 2010.
  • line


  • Social Networks



  • SocialCloud: Using Social Networks for Building Distributed Computing Services
    A. Mohaisen, H. Tran, A. Chandra, and Y. Kim
    ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), Also available at Technical Report, CS Department, University of Minnesota 2011
    Media: MIT Technical Review, The Verge, MSN.COM, Data News
  • Measuring Bias in the Mixing Time of Social Graphs due to Graph Sampling
    Abedelaziz Mohaisen, Pengkui Luo, Yanhua Li, Yongdae Kim, Zhi-Li Zhang
    2012 Military Communications Conference (MILCOM 2012).
  • On the Mixing Time of Directed Social Graphs and Security Implications
    Abedalaziz Mohaisen, Huy Tran, Nicholas Hopper, and Yongdae Kim
    ACM Symposium on Information, Computer and Communications Security (ASIACCS 2012)
  • Mistaking friends for foes: An analysis of a social network-based Sybil defense in mobile networks
    A. Mohaisen, T. AbuHmed, H. J. Kang, D. Nyang, Y. Kim
    In 5th ACM International Conference on Ubiquitous Information Management and Communication (ICUIMC 2011)
  • Understanding social networks properties for trustworthy computing
    A. Mohaisen, H. Tran, N. Hopper, and Y. Kim
    The 31st IEEE ICDCS Workshops (SIMPLEX 2011), Minneapolis, MN, USA, IEEE (Invited Paper)
  • Keep your friends close: Incorporating trust into social network-based Sybil defenses
    A. Mohaisen, N. Hopper, Y. Kim
    The 30th IEEE Conference on Computer Communications (INFOCOM'11)
  • Measuring the mixing time of social graphs
    A. Mohaisen, A. Yun, and Y. Kim
    ACM Internet Measurement Conference (IMC), 2010.
  • Secure Encounter-based Social Networks: Requirements, Challenges, and Designs
    A. Mohaisen, E. Vasserman, M. Schuchard, D. F. Kune, and Y. Kim
    ACM Conference on Computer and Communications Security (CCS/Posters), 2010.
  • line


  • Internet Control Plane



  • Protecting Access Privacy of Cached Contents in Information Centric Networks
    Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim
    ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)
  • Taking Routers Off Their Meds: Unstable Routers and the Buggy BGP Implementations That Cause Them
    M. Schuchard, C. Thompson, N. Hopper, Y. Kim
    Technical Report, CS Department, University of Minnesota, 2011
  • Losing Control of the Internet: Using the data plane to attack the control plane
    M. Schuchard, E. Vasserman, A. Mohaisen, D. F. Kune, N. Hopper, and Y. Kim
    ISOC Network & Distributed System Security Symposium (NDSS 2011)
    Media: New Scientist, Slashdot, ZDNet, CBS News, Minnesota Daily, Metro, Gizmodo, The Register
  • Losing Control of the Internet: Using the Data Plane to Attack the Control Plane
    M. Schuchard, A. Mohaisen, E. Vasserman, D. F. Kune, Y. Kim, and N. Hopper
    ACM Conference on Computer and Communications Security (CCS/Posters), 2010.
  • line


  • Privacy and Censorship-resistance



  • Dynamix: Anonymity on Dynamic Social Structures
    Abedelaziz Mohaisen, Huy Tran, Ting Zhu, and Yongdae Kim
    8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)
  • One-way indexing for plausible deniability in censorship resistant storage
    Eugene Y. Vasserman, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim
    USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012)
  • Censorship resistant overlay publishing
    E. Y. Vasserman, V. Heorhiadi, Y. Kim, N. Hopper
    Technical Report, CS Department, University of Minnesota, 2011
  • Recruiting New Tor Relays with BRAIDS
    R. Jansen, N. Hopper, and Y. Kim
    ACM Conference on Computer and Communications Security (CCS), 2010.
  • Balancing the Shadows
    M. Schuchard, A. Dean, V. Heorhiadi, Y. Kim, and N. Hopper
    Workshop on Privacy in the Electronic Society (WPES), 2010.
  • Membership-concealing overlay networks
    E. Vasserman, R. Jansen, J. Tyra, N. Hopper, Y. Kim
    ACM Conference on Computer and Communications Security (CCS), 2009
  • Scalable onion routing with Torsk
    J. McLachlan, A. Tran, N. Hopper, Y. Kim
    ACM Conference on Computer and Communications Security (CCS), 2009
  • Hashing it out in public: Common failure modes of DHT-based anonymity schemes
    A. Tran, N. Hopper, Y. Kim
    Workshop on Privacy in the Electronic Society (WPES), 2009
  • line


  • Cloud Computing/Storage and File Systems



  • i-Code: A New Approach to Practical Network Coding for Content Distribution
    H. J. Kang, A. Yun, E. Y. Vasserman, Y. Kim
    Technical Report, CS Department, University of Minnesota 2011
  • On Homomorphic Signatures for Network Coding
    A. Yun, J. Cheon, Y. Kim
    Transactions on Computer (brief contribution), vol. 59, issue 9, 2010.
  • On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage
    A. Yun, C. Shi, Y. Kim
    The ACM Cloud Computing Security Workshop (CCSW), 2009
  • Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage
    V. Kher and Y. Kim
    IEEE International Symposium on Reliable Distributed Systems (SRDS), 2007
  • Experiences in Building an Object-Based Storage System based on the OSD T-10 Standard
    D. Du, D. He, C. Hong, J. Jeong, V. Kher, Y. Kim, Y. Lu, A. Raghuveer, S. Sharafkandi
    NASA/IEEE Conference on Mass Storage Systems and Technologies 2006.
  • SGFS: Secure, Efficient and Policy-based Global File Sharing (Short Paper)
    V. Kher, E. Seppanen, C. Leach, Y. Kim
    NASA/IEEE Conference on Mass Storage Systems and Technologies, 2006.
  • Securing Distributed Storage: Challenges, Techniques, and Systems
    V. Kher and Y. Kim
    StorageSS’05. (invited paper)
  • Secure Group Key Management for Storage Area Networks
    Y. Kim, F. Maino, M. Narasimha, K. Rhee, G. Tsudik
    IEEE Communications Magazine, Vol. 41, No. 8, Aug. 2003.
  • Decentralized Authentication Mechanism for Object-based Storage Devices
    V. Kher, Y. Kim
    Security in Storage Workshop 2003 (SISW), Washington D.C., Nov. 2003.
  • Secure Group Services for Storage Area Networks
    Y. Kim, F. Maino, M. Narasimha, G. Tsudik
    1st International IEEE Security in Storage Workshop (SISW 2002), Dec. 2002
  • line


  • Peer-to-Peer Systems and Network Coordinate Systems



  • The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems
    E. Chan-Tin, V. Heorhiadi, Y. Kim, and N. Hopper
    ACM Transactions on Information and System Security (TISSEC) 14(3), 2011
  • The Distributed Virtual Network for High Fidelity, Large Scale Peer to Peer Network Simulation
    Denis Foo Kune, Tyson Malchow, James Tyra, Nicholas J. Hopper, Yongdae Kim
    University of Minnesota, Technical report, 2010.
  • Attacking the Kad Network - Real World Evaluation and High Fidelity Simulation using DVN -
    E. Chan-Tin, P. Wang, J. Tyra, T. Malchow, D. Foo Kune, N. Hopper, Y. Kim
    Wiley Security and Communication Networks, 2009.
  • The Frogboiling attack: limitations of anomaly detection for secure network coordinates
    E. Chan-Tin, D. Feldman, N. Hopper, Y. Kim
    SecureComm, 2009
  • Why Kad Lookup Fails
    H. -J. Kang, E. Chan-Tin, N. Hopper, Y. Kim
    IEEE International Conference on Peer-to-Peer Computing (P2P), 2009
  • Towards Complete Node Enumeration in a Peer-to-Peer Botnet
    B. Kang, E. Chan-Tin, C. Lee, J. Tyra, H. Kang, C. Nunnery, Z. Wadler, G. Sinclair, N. Hopper, D. Dagon, and Y. Kim
    ACM Symposium on Information, Computer & Communication Security (ASIACCS 2009)
  • Attacking the Kad Network
    P. Wang, J. Tyra, E. Chan-Tin, T. Malchow, D. Foo Kune, N. Hopper, and Y. Kim.
    at SecureComm 2008.
  • Combating doublespending using cooperative P2P systems
    I. Osipkov, E. Vasserman, N. Hopper and Y. Kim.
    2007 IEEE Conference on Distributed Computing Systems (ICDCS), 2007.
  • Robust Accounting in Decentralized P2P Storage Systems.
    I. Osipkov, P. Wang, N. Hopper and Y. Kim.
    In Proceedings of the 26th IEEE Conference on Distributed Computing systems (ICDCS), 2006.
  • Myrmic: Secure and Robust DHT Routing
    P. Wang, N. Hopper, I. Osipkov, and Y. Kim
    UMN DTC Research Report 2006/20, November 2006.
  • line


  • Wireless Sensor/Ad-hoc Networks



  • Exploring In-Situ Sensing Irregularity in Wireless Sensor Networks.
    J. Hwang, T. He, and Y. Kim.
    IEEE Transactions on Parallel and Distributed Systems, vol. 21, issue 4, pp. 547-561 , 2010.
  • Secure Localization with Phantom Node Detection
    J. Hwang, T. He, Y. Kim
    Ad Hoc Networks, Volume 6, Issue 7 (September 2008) Elsevier.
  • Exploring In-Situ Sensing Area Modeling for Wireless Sensor Networks
    J. Hwang, T. He, Y. Kim.
    ACM Conference on Embedded Networked Sensor Systems (SenSys), 2007.
  • Realistic Sensing Area Modeling.
    J. Hwang, Y. Gu, T. He, and Y. Kim.
    IEEE Infocom 2007 Minisymposia, August 2007.
  • Detecting Phantom Nodes in Wireless Sensor Networks.
    J. Hwang, T. He, and Y. Kim.
    IEEE Infocom2007 Minisymposia, August 2007.
  • Remote Software-based Attestation for Wireless Sensors.
    M. Shaneck, K. Mahadevan, V. Kher, and Y. Kim.
    ESAS 2005.
  • Revisiting Random Key Pre-distribution Schemes for Wireless Sensor Networks
    J. Hwang, Y. Kim
    2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ’04).
  • line


  • Group Key Agreement and Admission Control



  • On the Performance of Group Key Agreement Protocols
    Y. Amir, Y. Kim, C. Nita-Rotaru, G. Tsudik
    ACM Transaction on Information and System Security, Vol. 7, No. 3, Aug. 2004.
  • Robust Contributory Key Agreement in Secure Spread
    Y. Amir, Y. Kim, C. Nita-Rotaru, J. Schultz, J. Stanton, G. Tsudik
    IEEE Transaction on Parallel and Distributed System, Vol. 15, No. 5, May 2004.
  • Communication-Efficient Group Key Agreement
    Y. Kim, A. Perrig, G. Tsudik
    IEEE Transaction on Computers, Vol. 53, No. 7, Jul. 2004.
  • Tree-based Group Key Agreement
    Y. Kim, A. Perrig, G. Tsudik
    in ACM Transaction on Information and System Security, Vol. 7, No. 1, Feb. 2004.
  • Admission Control in Collaborative Groups
    Y. Kim, D. Mazzochi, G. Tsudik
    2nd IEEE International Symposium on Network Computing and Applications (NCA-03), Massachusetts, USA, April, 2003.
  • An Efficient Tree-Based Group Key Agreement Using Bilinear Map.
    S. Lee, Y. Kim, K. Kim, D. Ryu
    ACNS 2003
  • Admission Control in Peer Groups
    Y. Kim, G. Tsudik
    Large-Scale Network Security Workshop ? New Directions in Scalable Cyber-Security in Large-Scale Networks: Deployment Obstacles, Virginia, Mar. 2003
  • On the Performance of Group Key Agreement Protocols
    Y. Amir, Y. Kim, C. Nita-Rotaru, G. Tsudik
    The 22nd International Conference on Distributed Computing Systems (IEEE ICDCS 2002)
  • Communication-Efficient Group Key Agreement
    Y. Kim, A. Perrig, G. Tsudik
    In Proceedings of IFIP TC11 Sixteenth International Conference on Information Security (IFIP/SEC 2001), Kluwer Academic Publishers, June 2001
  • Exploring Robustness in Group Key Agreement
    Y. Amir, Y. Kim, C. Nita-Rotaru, J. Schultz, J. Stanton and G. Tsudik
    In Proceedings of The 21st International Conference on Distributed Computing Systems (IEEE ICDCS 2001), IEEE Press, April 2001
    Nominated for the best paper award
  • Simple and Fault-tolerant Group Key Agreement Scheme
    Y. Kim, A. Perrig, G. Tsudik
    In Proceedings of the 7th ACM Conference on Computer and Communications Security (ACM CCS 2000), ACM Press, Nov. 2000
  • Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments
    Y. Amir, G. Ateniese, D. Hasse, Y. Kim, C. Nita-Rotaru, T. Schlossnagle, J. Schultz, J. Stanton and G. Tsudik
    In Proceedings of The 20th International Conference on Distributed Computing Systems (IEEE ICDCS 2000), IEEE Press, April 2000
  • The Design of a Group Key Agreement API
    G. Ateniese, O. Chevassut, D. Hasse, Y. Kim and G. Tsudik
    In Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX 2000), IEEE Computer Society Press, 2000
  • line


  • Applied Cryptography



  • Efficient Cryptographic Primitives for Private Data Mining
    M. Shaneck, and Y. Kim
    HICSS, Koloa, Kauai, HI, USA, IEEE Computer Society, pp. 1-9, 2010.
  • Provably Secure Timed-Release Public Key Encryption.
    J. Cheon, N. Hopper, Y. Kim, I. Osipkov,(alphabetical order. Main author of the paper is I. Osipkov.)
    ACM Transactions on Information Systems Security Volume 11 , Issue 2 (March 2008).
  • Authenticated Key-Insulated Public Key Encryption and Timed-Release Cryptography.
    J. -H. Cheon, N. Hopper, Y. Kim and I. Osipkov.
    In 10th Conference on Financial Cryptography and Data Security, February 2006.
  • Privacy Protection in PKIs: A Separation-of-Authority Approach.
    T. Kwon, J. Cheon, Y. Kim, J. Lee
    7th International Workshop on Information Security Applications (WISA) 2006.
  • Privacy Preserving Nearest Neighbor Search
    M. Shaneck, Y. Kim, V. Kumar
    IEEE International Workshop on Privacy Aspects of Data Mining, December 2006
  • Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
    P. Wang, Y. Kim, V. Kher, T. Kwon
    ACNS 2005.
  • Batch Verifications with ID-Based Signatures
    H. Yoon, J. Cheon, Y. Kim
    ICISC 2004.
  • line


  • Etc.



  • Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors
    Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, abd Yongdae Kim
    Proceedings of the 24th USENIX Conference on Security Symposium. (USENIX Security 2015)
  • A Machine Learning Framework for Network Anomaly Detection using SVM and GA
    T. Shon, Y. Kim, C. Lee, J. Moon
    6th IEEE Information Assurance Workshop, 2005
  • Design and implementation of a secure multi-agent marketplace
    A. Jaiswal, Y. Kim, M. Gini
    Electronic Commerce Research and Application, Volume 3, Issue 4, Winter, Elsevier Science, 2004
  • Security Model for a Multi-Agent Marketplace
    A. Jaiswal, Y. Kim, M. Gini
    The Fifth International Conference on Electronic Commerce (ICEC 03), Pennsylvania, Sep. 2003
  • On the Design of Stream Ciphers and a Hash Function Suitable to Smart Card Application
    Y. Kim, S. Lee, and S. Park
    In Proceedings of CARDIS, Smart Card Research and Advanced Application: Second International Conference, Amsterdam, September, 1996.
  • How to Use Exponent Permutations in Cryptography: Classifications and Applications
    S. Park, S. Chee, K. Kim, Y. Kim, and S. Lee
    In Proceedings of International Conference on Cryptology and Information Security, ROC, December, 1996.
  • On the Security of Lin-Chang-Lee Public Key Cryptosystem
    S. Park, Y. Kim, and K. Kim
    Journal of the Korean Institute of Information Security and Cryptography, 1996.
  • line


  • bg