EE Logo
Yongdae Kim (김용대)

Department of Electrical Engineering
Korea Advanced Institute of Science and Technology (KAIST)

Lab Homepage: SysSec (System Security) Lab

Postal address: EE department, 291 Daehangno, Yuseong-gu, Daejeon, 305-701, Republic of Korea
Office Location: 201 (N-26 Building)
email: yongdaek(at), yongdaek(at)  office phone: +82-42-350-7430
twitter, facebook, DBLP, Google scholar, Microsoft Academic

I am a professor in the Department of Electrical Engineering at KAIST. I am also serving as a KAIST Chair Professor and hold an affiliated faculty position at the Graduate School of Information Security at KAISTI received PhD degree from the computer science department at the University of Southern California under the guidance of Gene Tsudik. I received my MS and BS degrees in Mathematics from Yonsei University in 1993 and 1991. Between 2002 and 2012, I was an associate/assistant professor in the Department of Computer Science and Engineering at the University of Minnesota - Twin Cities.  Before joining U of Minnesota, I worked as a research staff for two years in Sconce Group in UC Irvine. Before coming to the US, I worked 6 years in ETRI for securing Korean cyberinfrastructure. I received NSF career award on storage security and McKnight Land-Grant Professorship Award from University of Minnesota in 2005. Currently, I am serving as a steering committee member of NDSS (Network and Distributed System Security Symposium). My current research interests include security issues for various systems such as social networks, cellular networks, P2P systems, medical devices, storage systems, mobile/ad hoc/sensor/cellular networks, and anonymous communication systems.

Advertisement: I am looking for graduate and undergraduate students, who are interested in working on security issues for various systems. I am *NOT* looking for international students at this point.

Research Interests and Publication by Area

I am interested in security of emerging and current systems. My research (almost always) involves design/implementation of attacks, design/implementation/analysis of secure systems. Over the past 10 years as a faculty member, I've been working on security of various systems, which are going to expand more in the future. List below was impossible without many bright and hardworking students.

Recent Teaching (all previous)

Conferences and Journals I am involved in (all services)

Selected Recent Publications 

All publications by year, or by area. Or from public source such as DBLP, Google scholar, and Microsoft Academic.

  1. Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations (To Appear)
    Hongil Kim, Dongkwan Kim, Minhee Kwon, Hyungseok Han, Yeongjin Jang, Dongsu Han, Taesoo Kim, and Yongdae Kim.
    ACM CCS 2015
  2. Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors
    Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, and Yongdae Kim
    Usenix Security 2015
    Media: PCWorld, Slashdot, Popular Science, New York Daily, Network World, Gizmodo, Discover Magazine
  3. Bittersweet ADB: Attacks and Defenses
    Sungjae Hwang, Sungho Lee, Yongdae Kim, and Sukyoung Ryu
  4. Run Away If You Can: Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks
    Il-Gu Lee, Hyunwoo Choi, Yongdae Kim, Seungwon Shin, and Myungchul Kim,
    RAID 2014
  5. Peer Pressure: Exerting Malicious Influence on Routers at a Distance
    Max Schuchard, Christopher Thompson, Nick Hopper, Yongdae Kim
    Distributed Computing Systems (ICDCS), 2013
  6. Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors
    Denis Foo Kune, John Backes, Shane Clark, Wenyuan Xu, Dan Kramer, Matthew Reynolds, Kevin Fu, and Yongdae Kim
    IEEE Symposium on Security & Privacy (Oakland 2013)
    Media: The Register, Science Daily, Medical Daily, Security Ledger,
  7. SocialCloud: Using Social Networks for Building Distributed Computing Services,
    A. Mohaisen, H. Tran, A. Chandra, and Y. Kim, 
    ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), Also available at Technical Report, CS Department, University of Minnesota 2011
    Media: MIT Technical Review, The Verge, MSN.COM, Data News
  8. Towards Accurate Accounting of Cellular Data for TCP Retransmission
    Younghwan Go, Denis Foo Kune, Shinae Woo, KyoungSoo Park, and Yongdae Kim
    ACM International Workshop on Mobile Computing Systems and Applications (HotMobile'13)
  9. One-way indexing for plausible deniability in censorship resistant storage
    Eugene Y. Vasserman, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim
    USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012)
  10. Taking Routers Off Their Meds: Unstable Routers and the Buggy BGP Implementations That Cause Them
    Max Schuchard, Chris Thompson, Nicholas Hopper, Yongdae Kim
    Technical Report, CS Department, University of Minnesota
  11. Location leaks on the GSM air interface
    Denis Foo Kune, John Koelndorfer, Nicholas Hopper and Yongdae Kim
    ISOC Network & Distributed System Security Symposium (NDSS 2012)
    Nominated for the best paper award
    Media: Ars Technica, Slashdot, MPR, Fox Twin Cities, Physorg, TG Daily, Network World, e! Science News, Scientific Computing, gizmag, Crazy Engineers, PC Advisor, Mobile Magazine, The CyberJungle, Inquisitr
  12. The FrogBoiling Attack: Limitations of Secure Network Coordinate Systems, 
    Eric ChanTin, Victor Heorhiadi, Yongdae Kim, and Nicholas Hopper
    ACM Transactions on Information and System Security (TISSEC) 14(3),  2011
  13. Losing control of the Internet: Using the data plane to attack the control plane
    Max Schuchard, Eugene Y. Vasserman, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim
    ISOC Network and Distributed System Security Symposium (NDSS 2011)
    Media: New Scientist , Slashdot, ZDNet, CBS News, Minnesota Daily, Metro, Gizmodo, The Register
  14. Measuring the mixing time of social graphs
    Abedelaziz Mohaisen, Aaram Yun, Yongdae Kim
    ACM Internet Measurement Conference (IMC 2010)
  15. Recruiting New Tor Relays with BRAIDS
    Rob Jansen, Nicholas Hopper, and Yongdae Kim
    ACM Conference on Computer and Communications Security (CCS) 2010. 
  16. Membership-concealing overlay networks, 
    Eugene Vasserman, Rob Jansen, James Tyra, Nicholas Hopper, Yongdae Kim
    ACM Conference on Computer and Communications Security (CCS), 2009 
  17. Scalable onion routing with Torsk
    Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongdae Kim, 
    ACM Conference on Computer and Communications Security (CCS), 2009
  18. Why Kad Lookup Fails,
    Hun J. Kang, Eric Chan-Tin, Nicholas Hopper, Yongdae Kim,
    IEEE International Conference on Peer-to-Peer Computing (P2P), 2009
  19. Attacking the Kad Network - Real World Evaluation and High Fidelity Simulation using DVN -
    Eric Chan-Tin, Peng Wang, James Tyra, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim,
    Wiley Security and Communication Networks, 2009