Medical Device
- Ghost Talk: Mitigating EMI Signal Injection Attacks against
Analog Sensors
Denis Foo Kune, John Backes, Shane Clark, Wenyuan Xu, Dan Kramer,
Matthew Reynolds, Kevin Fu, and Yongdae Kim
IEEE Symposium on Security & Privacy (Oakland 2013) (To appear)
-
Towards a safe Integrated Clinical Environment: A communication
security perspective
Denis Foo Kune, Eugene Vasserman, Krishna Venkatasubramanian, Yongdae
Kim, Insup Lee
ACM Workshop on Medical Communication Systems (MedCOMM 2012)
Cellular
Networks and Mobile Devices
- Towards
Accurate Accounting of Cellular Data for TCP Retransmission
Younghwan Go, Denis Foo Kune, Shinae Woo, KyoungSoo Park, and Yongdae
Kim
ACM International Workshop on Mobile Computing Systems and Applications
(HotMobile'13)
- Location leaks on the GSM air
interface,
D.
F.
Kune, J. Koelndorfer, N. Hopper, and Y. Kim,
ISOC Network & Distributed System
Security Symposium (NDSS 2012)
Nominated for the best
paper
award
Media:
Ars
Technica, Slashdot,
MPR,
Fox
Twin Cities, Physorg,
TG
Daily, Network
World, e!
Science News, Scientific
Computing, gizmag,
Crazy
Engineers, PC
Advisor, Mobile
Magazine, The
CyberJungle, Inquisitr
- Timing attacks on PIN
Input Devices,
D. Foo Kune, and Y. Kim,
ACM
Conference on Computer and Communications Security (CCS/Posters),
2010.
Social Networks
- SocialCloud:
Using Social Networks for Building Distributed Computing Services,
A. Mohaisen, H. Tran, A. Chandra, and Y. Kim,
ACM Symposium on Information, Computer
and Communications Security (ASIACCS 2013), Also available at Technical
Report, CS
Department, University of Minnesota 2011
Media:
MIT
Technical Review, The Verge,
MSN.COM,
Data News
- Measuring
Bias in the Mixing Time of Social Graphs due to Graph Sampling
Abedelaziz Mohaisen, Pengkui Luo, Yanhua Li, Yongdae Kim, Zhi-Li Zhang
2012 Military Communications Conference (MILCOM 2012).
- On the Mixing Time of
Directed Social Graphs and Security Implications
Abedalaziz Mohaisen, Huy Tran, Nicholas Hopper, and Yongdae Kim
ACM Symposium on Information, Computer and Communications Security
(ASIACCS 2012)
- An analysis of a social
network-based Sybil defense in mobile networks,
A. Mohaisen, T. AbuHmed, H. J. Kang, D. Nyang, Y. Kim,
In 5th ACM
International Conference on Ubiquitous Information Management and
Communication (ICUIMC 2011)
- Understanding
social networks
properties for trustworthy computing,
A. Mohaisen, H. Tran, N. Hopper, and Y. Kim,
The 31st IEEE ICDCS Workshops (SIMPLEX 2011),
Minneapolis, MN, USA, IEEE (Invited Paper)
- Incorporating
trust into social
network-based Sybil defenses,
A. Mohaisen, N. Hopper, Y. Kim,
The 30th IEEE Conference on Computer Communications
(INFOCOM'11)
- Measuring
the mixing time of social graphs,
A. Mohaisen, A. Yun, and Y. Kim,
ACM Internet Measurement Conference
(IMC),
2010.
- Secure Encounter-based Social
Networks: Requirements, Challenges, and Designs,
A. Mohaisen, E. Vasserman,
M. Schuchard, D. F. Kune, and Y. Kim,
ACM Conference on
Computer and Communications Security (CCS/Posters), 2010.
Internet
Control Plane
- Protecting Access Privacy of Cached Contents in Information
Centric Networks
Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae
Kim
ACM Symposium on Information, Computer and Communications Security
(ASIACCS 2013)
- Taking
Routers Off
Their Meds: Unstable Routers and the Buggy BGP Implementations That
Cause Them,
M. Schuchard, C. Thompson, N. Hopper, Y. Kim,
Technical Report, CS Department, University of Minnesota, 2011
- Losing
control of the Internet: Using the data plane to attack the control
plane,
M. Schuchard, E. Vasserman, A. Mohaisen, D. F. Kune, N. Hopper, and
Y. Kim,
ISOC Network & Distributed System
Security Symposium (NDSS 2011)
Media:
New
Scientist,
Slashdot,
ZDNet,
CBS News,
Minnesota Daily,
Metro,
Gizmodo,
The Register
- Losing Control of the Internet: Using the Data Plane
to
Attack
the Control Plane,
M. Schuchard, A. Mohaisen, E. Vasserman, D. F. Kune, Y. Kim, and N.
Hopper,
ACM Conference on Computer and Communications
Security (CCS/Posters), 2010.
Privacy and
Censorship-resistance
- Dynamix: Anonymity on Dynamic Social Structures
Abedelaziz Mohaisen, Huy Tran, Ting Zhu, and Yongdae Kim
8th ACM Symposium on Information, Computer and Communications Security
(ASIACCS 2013)
- One-way
indexing for plausible deniability in censorship resistant storage
Eugene Y. Vasserman, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim
USENIX Workshop on Free and Open Communications on the Internet (FOCI
2012)
- Censorship
resistant overlay publishing,
E. Y. Vasserman, V. Heorhiadi, Y. Kim, N. Hopper,
Technical Report, CS Department, University of Minnesota, 2011
- Recruiting
New Tor Relays with
BRAIDS,
R. Jansen, N. Hopper, and Y. Kim,
ACM Conference on Computer and Communications
Security
(CCS),
2010.
- Balancing
the Shadows,
M. Schuchard, A. Dean, V. Heorhiadi, Y. Kim, and N. Hopper,
Workshop on Privacy in the Electronic Society
(WPES), 2010.
- Membership-concealing
overlay
networks,
E. Vasserman, R. Jansen, J. Tyra, N. Hopper, Y. Kim,
ACM Conference on Computer and Communications
Security
(CCS), 2009
- Scalable
onion routing with Torsk,
J. McLachlan, A. Tran, N. Hopper, Y. Kim,
ACM Conference on Computer and Communications
Security
(CCS), 2009
- Hashing
it out in public:
Common failure modes of DHT-based anonymity schemes,
A. Tran, N. Hopper, Y. Kim,
Workshop on Privacy in the Electronic Society
(WPES),
2009
Cloud
Computing/Storage and File Systems
- i-Code:
A New Approach to Practical Network Coding for Content Distribution,
H. J. Kang, A. Yun, E. Y. Vasserman, Y. Kim,
Technical Report, CS Department, University of Minnesota 2011
- On
Homomorphic Signatures for
Network Coding,
A.
Yun, J. Cheon, Y. Kim,
Transactions on Computer (brief contribution), vol.
59,
issue 9, 2010.
- On
Protecting Integrity and Confidentiality of Cryptographic File System
for Outsourced Storage,
A. Yun, C. Shi, Y. Kim,
The ACM Cloud Computing Security Workshop (CCSW),
2009
- Building
Trust in Storage
Outsourcing: Secure Accounting of Utility Storage,
V. Kher and Y. Kim,
IEEE International Symposium on Reliable
Distributed
Systems (SRDS), 2007
- Experiences
in Building an
Object-Based Storage System based on the OSD T-10 Standard,
D. Du, D. He, C. Hong, J. Jeong, V. Kher, Y. Kim, Y. Lu, A. Raghuveer,
S. Sharafkandi,
NASA/IEEE Conference on Mass Storage Systems and
Technologies 2006.
- SGFS:
Secure, Efficient and
Policy-based Global File Sharing (Short Paper),
V. Kher, E. Seppanen, C. Leach, Y. Kim,
NASA/IEEE Conference on Mass Storage Systems and
Technologies, 2006.
- Securing
Distributed Storage: Challenges, Techniques, and Systems,
V. Kher and Y. Kim,
StorageSS’05. (invited paper)
- Secure
Group
Key Management for Storage Area Networks,
Y. Kim, F. Maino, M. Narasimha, K. Rhee, G. Tsudik,
IEEE Communications Magazine,
Vol. 41, No. 8, Aug. 2003.
- Decentralized
Authentication
Mechanism for
Object-based Storage Devices,
V. Kher, Y. Kim,
Security in Storage Workshop 2003 (SISW),
Washington D.C., Nov. 2003.
- Secure
Group Services
for Storage Area Networks,
Y. Kim, F. Maino, M. Narasimha, G. Tsudik,
1st International IEEE Security in Storage
Workshop (SISW 2002), Dec. 2002
Peer-to-Peer
Systems and Network Coordinate Systems
- The
FrogBoiling Attack: Limitations of Secure Network Coordinate
Systems,
E. Chan-Tin, V.
Heorhiadi, Y. Kim, and N. Hopper,
ACM
Transactions on Information and System Security
(TISSEC) 14(3), 2011
- The
Distributed Virtual Network for High Fidelity, Large Scale Peer to Peer
Network Simulation,
Denis Foo Kune, Tyson Malchow, James Tyra, Nicholas J. Hopper, Yongdae
Kim,
University of Minnesota, Technical report, 2010.
- Attacking the Kad Network
- Real World Evaluation and High
Fidelity Simulation using DVN -,
E. Chan-Tin, P. Wang, J. Tyra, T. Malchow, D. Foo Kune, N. Hopper,
Y. Kim,
Wiley Security and Communication
Networks, 2009.
- The
Frogboiling attack:
limitations of anomaly detection for secure network coordinates,
E. Chan-Tin, D. Feldman, N. Hopper, Y. Kim,
SecureComm, 2009
- Why
Kad Lookup Fails,
H. -J. Kang, E. Chan-Tin, N. Hopper, Y. Kim,
IEEE International Conference on Peer-to-Peer
Computing
(P2P), 2009
- Towards
Complete Node Enumeration
in a Peer-to-Peer Botnet,
B. Kang, E. Chan-Tin, C. Lee, J. Tyra, H. Kang, C. Nunnery, Z. Wadler,
G. Sinclair, N. Hopper, D. Dagon, and Y. Kim,
ACM Symposium on Information, Computer &
Communication Security (ASIACCS 2009)
- Attacking the Kad
Network,
P. Wang, J. Tyra, E. Chan-Tin, T. Malchow, D. Foo Kune, N. Hopper, and
Y. Kim.
at SecureComm 2008.
- Combating
doublespending using
cooperative P2P systems,
I. Osipkov, E. Vasserman, N. Hopper and Y. Kim.
2007 IEEE Conference on Distributed Computing
Systems
(ICDCS), 2007.
- Robust
Accounting in Decentralized P2P Storage Systems.
I. Osipkov, P. Wang, N. Hopper and Y. Kim.
In Proceedings of the 26th IEEE Conference on
Distributed
Computing systems (ICDCS), 2006.
- Myrmic:
Secure and Robust DHT Routing,
P. Wang, N. Hopper, I. Osipkov, and Y. Kim,
UMN DTC Research Report 2006/20, November
2006.
Wireless
Sensor/Ad-hoc Networks
- Exploring
In-Situ Sensing
Irregularity
in Wireless Sensor Networks.
J. Hwang, T. He, and Y. Kim.
IEEE Transactions on Parallel and
Distributed Systems, vol. 21, issue 4, pp. 547-561 , 2010.
- Secure
Localization with
Phantom Node
Detection,
J. Hwang, T. He, Y. Kim,
Ad Hoc Networks, Volume 6, Issue 7 (September 2008)
Elsevier.
- In-Situ
Sensing Area Modeling
for Wireless Sensor Networks,
J. Hwang, T. He, Y. Kim.
ACM Conference on Embedded Networked Sensor Systems
(SenSys), 2007.
- Realistic
Sensing Area Modeling.
J. Hwang, Y. Gu, T. He, and Y. Kim.
IEEE Infocom 2007 Minisymposia, August
2007.
- Detecting
Phantom Nodes in Wireless
Sensor Networks.
J. Hwang, T. He, and Y. Kim.
IEEE Infocom2007 Minisymposia, August
2007.
- Remote
Software-based Attestation for
Wireless Sensors.
M. Shaneck, K. Mahadevan, V. Kher, and Y. Kim.
ESAS 2005.
- Revisiting
Random Key
Pre-distribution Schemes for Wireless Sensor Networks,
J. Hwang, Y. Kim,
2004 ACM Workshop on Security of Ad Hoc and Sensor
Networks (SASN ’04).
Group Key
Agreement and Admission Control
- On the
Performance of
Group Key Agreement Protocols,
Y. Amir, Y. Kim, C. Nita-Rotaru, G. Tsudik,
ACM Transaction on Information and
System Security, Vol. 7, No. 3, Aug. 2004.
- Robust
Contributory
Key Agreement in Secure Spread,
Y. Amir, Y. Kim,
C. Nita-Rotaru, J. Schultz, J. Stanton, G. Tsudik,
IEEE Transaction on Parallel and
Distributed System, Vol. 15, No. 5, May 2004.
- Communication-Efficient
Group Key
Agreement,
Y. Kim, A.
Perrig, G. Tsudik,
IEEE
Transaction on Computers, Vol. 53, No. 7, Jul. 2004.
- Tree-based
Group Key Agreement,
Y.
Kim, A. Perrig, G. Tsudik,
in ACM
Transaction on Information and System Security, Vol. 7, No. 1, Feb.
2004.
- Admission
Control in Collaborative
Groups,
Y. Kim, D. Mazzochi, G. Tsudik,
2nd IEEE International Symposium on Network
Computing and
Applications (NCA-03), Massachusetts, USA, April, 2003.
- An
Efficient Tree-Based Group Key Agreement Using Bilinear Map.
S. Lee, Y. Kim, K. Kim, D. Ryu,
ACNS 2003
- Admission Control in Peer Groups,
Y.
Kim, G. Tsudik,
Large-Scale Network
Security Workshop – New Directions in Scalable Cyber-Security in
Large-Scale Networks: Deployment Obstacles, Virginia, Mar. 2003
- On the performance of
Group Key Agreement Protocols,
Y. Amir, Y. Kim, C. Nita-Rotaru, G. Tsudik,
The 22nd International Conference on Distributed Computing Systems
(IEEE ICDCS 2002)
- Communication-Efficient
Group
Key Agreement,
Y. Kim, A. Perrig, G. Tsudik,
In
Proceedings of IFIP TC11 Sixteenth International Conference on
Information Security (IFIP/SEC 2001), Kluwer Academic Publishers, June
2001
- Exploring
Robustness in Group Key
Agreement,
Y. Amir, Y. Kim, C. Nita-Rotaru, J. Schultz, J. Stanton and G. Tsudik,
In Proceedings of The 21st International Conference
on
Distributed Computing Systems (IEEE ICDCS 2001), IEEE Press, April
2001, Nominated best paper award
- Simple
and Fault-tolerant Group Key Agreement Scheme,
Y. Kim, A. Perrig, G. Tsudik,
In Proceedings of the 7th ACM Conference on Computer and Communications
Security (ACM CCS 2000), ACM Press, Nov. 2000
- Secure
Group Communication in
Asynchronous Networks with Failures: Integration and Experiments,
Y. Amir, G. Ateniese, D. Hasse, Y. Kim, C. Nita-Rotaru, T.
Schlossnagle, J. Schultz, J. Stanton and G. Tsudik,
In
Proceedings of The 20th International Conference on Distributed
Computing Systems (IEEE ICDCS 2000), IEEE Press, April 2000
- The
Design of a Group Key Agreement API,
G. Ateniese, O. Chevassut, D. Hasse, Y. Kim and G. Tsudik,
In Proceedings of DARPA
Information Survivability Conference and Exposition (DISCEX 2000), IEEE
Computer Society Press, 2000
Applied
Cryptography
- Efficient
Cryptographic
Primitives for Private
Data Mining,
M. Shaneck, and Y. Kim,
HICSS, Koloa, Kauai, HI, USA, IEEE Computer
Society, pp.
1-9, 2010.
- Provably Secure
Timed-Release Public Key
Encryption.
J.
Cheon, N. Hopper, Y. Kim, I. Osipkov,(alphabetical order. Main author
of the paper is I. Osipkov.)
ACM Transactions on Information Systems Security
Volume
11
, Issue 2 (March 2008).
- Authenticated
Key-Insulated
Public Key Encryption and Timed-Release Cryptography.
J. -H. Cheon, N. Hopper, Y. Kim and I. Osipkov.
In 10th Conference on Financial Cryptography and
Data
Security, February 2006.
- Privacy
Protection in PKIs: A
Separation-of-Authority Approach.
T. Kwon, J. Cheon, Y. Kim, J. Lee,
7th International Workshop on
Information Security Applications (WISA) 2006.
- Privacy
Preserving Nearest Neighbor
Search,
M.
Shaneck, Y. Kim, V. Kumar,
IEEE International Workshop on Privacy Aspects of
Data
Mining, December
2006
- Strengthening
Password-Based
Authentication Protocols Against Online Dictionary Attacks,
P. Wang, Y. Kim, V. Kher, T. Kwon,
ACNS 2005.
- Batch Verifications with
ID-Based Signatures,
H. Yoon, J. Cheon, Y. Kim,
ICISC 2004.
Etc.
- A
Machine Learning Framework for
Network
Anomaly Detection using SVM and GA,
T.
Shon, Y. Kim, C. Lee, J. Moon,
6th IEEE Information Assurance
Workshop, 2005
- Design
and implementation of a
secure
multi-agent marketplace,
A. Jaiswal, Y. Kim, M. Gini,
Electronic Commerce Research and Application,
Volume 3, Issue 4, Winter, Elsevier Science, 2004
- Security
Model for a
Multi-Agent Marketplace,
A.
Jaiswal, Y. Kim, M. Gini,
The Fifth International Conference on Electronic Commerce (ICEC 03),
Pennsylvania, Sep. 2003
- On the Design of Stream Ciphers and a Hash Function
Suitable to Smart Card Application,
Y. Kim, S. Lee, and S. Park,
In
Proceedings of CARDIS, Smart Card Research and Advanced Application:
Second International Conference, Amsterdam, September, 1996.
- How to Use Exponent
Permutations in Cryptography: Classifications and Applications,
S. Park, S. Chee, K. Kim, Y. Kim, and S. Lee,
In
Proceedings of International Conference on Cryptology and Information
Security, ROC, December, 1996.
- On the Security of Lin-Chang-Lee Public
Key Cryptosystem,
S. Park, Y. Kim, and K. Kim,
Journal of the Korean Institute of Information
Security and Cryptography, 1996.
|