Yongdae Kim (김용대)
Director, KAIST Cyber Security Research Center
Professor, Department of Electrical Engineering
Professor, Graduate School of Information Security
Korea Advanced Institute of Science and Technology (KAIST)
Lab Homepage: SysSec
(System Security) Lab
Postal address: EE department, 291 Daehak-ro, Yuseong-gu,
Daejeon, 305-701, Republic of Korea
Office Location: 201 (N-26 Building)
email: yongdaek(at)kaist.ac.kr, yongdaek(at)gmail.com office
phone: +82-42-350-7430
twitter, facebook, DBLP,
Google
scholar, Microsoft
Academic
I am a professor in the Department
of Electrical Engineering at KAIST and hold an affiliated faculty position at the Graduate School of Information Security at KAIST. I also direct Cyber Security Research Center at KAIST. I
received PhD degree from the computer
science department at the University
of Southern California under the guidance of Gene Tsudik. I received my
MS and BS
degrees in Mathematics
from Yonsei
University in 1993 and 1991. Between 2002 and 2012, I was an
associate/assistant professor in the Department
of Computer Science
and Engineering at the University
of Minnesota - Twin Cities.
Before joining U of Minnesota, I
worked as a research staff for two years in Sconce Group in
UC Irvine. Before coming to the US, I worked 6 years in ETRI
for securing Korean cyberinfrastructure. I served as a KAIST Chair Professor between 2013 and 2016, and received NSF career award on
storage security and McKnight Land-Grant Professorship Award from
University of Minnesota in 2005. Currently, I am serving as a steering
committee member of NDSS
(Network and Distributed System Security Symposium) and as an associate editor for ACM TOPS.
My current
research interests include security
issues for various systems such as Internet of Things, Cyber Physical
Systems, Blockchain and Cryptocurrencies, Cellular Networks, P2P
systems, Medical Devices, Mobile/Ad
hoc/Sensor Networks, and Anonymous Communication Systems.
Advertisement: I am looking for graduate
and undergraduate students as well as posdoctoral staffs, who are interested in working on security
issues for various systems. I am *NOT* looking for international students at this point.
Research Interests and Publication by Area
I am interested in security of emerging and current
systems. My research (almost always) involves
design/implementation of attacks, design/implementation/analysis of
secure systems. Over the past 15 years as a faculty member, I've been
working on security of various systems, which are going to expand more
in the future. List below was impossible without many bright and
hardworking students.
All publications by year. Or from public
source such as DBLP,
Google
scholar, and Microsoft
Academic.
- System: Android Automatic Protocol Analysis [CoNext2016], Processor-Interconnect Rootkit [UsenixSec2016]
- Blockchain and Cryptocurrency: Fork After Withholding Attack [CCS2017] (Media: ACM The Morning Paper) Duplication Share Attack [WISA2016]
- IoT (Internet of Things): LIDAR Spoofing and Jamming [CHES2017] (Media:
The Register), Sampling Race [WOOT2016], Rocking Drones [UsenixSec2015] (Media:
PCWorld, Slashdot, Popular Science, New York Daily, Network World, Gizmodo, Discover Magazine), Drone Controller [WISA2015] Breaking Smart Watches [WISA2015] (Best Paper Award)
- Medical Devices and Cyber Physical Systems: Sensor Spoofing Attack on Infusion Pump [WOOT2016], EMI and Sensing [Oakland2013], Safe
Integrated Clinical Environment [Medcomm2012]
- Cellular
Networks and Mobile Devices: GUTI Reallocation Vulnerabilities [NDSS2018], Cellular IPv6 Security [EuroS&P2017], Cellular Accounting [WISA2016], VoLTE Security [CCS2015] (Media:
CVE-2015-6614, Nexus Security Bulletin, CERT, DSLReports, IT World, Softpedia, tom's guide, Pocketnow, FierceMobileIT, Techworm, Neowin, Network World) Korean USIM [WISA2014] Android ADB [AsiaCCS2014] Proportional Fair Scheduling [ComputerNetworks 2014] Remote location
tracking on GSM [NDSS2012]
(Nominated
for the best paper
award, Media: Ars
Technica, Slashdot,
MPR,
Fox
Twin Cities, Physorg,
TG
Daily, Network
World, e!
Science News, Scientific
Computing, gizmag,
Crazy
Engineers, PC
Advisor, Mobile
Magazine, The
CyberJungle, Inquisitr),
Pin Input Device eavesdropping [CCSPoster2010]
- Control Plane Security:
Privacy of ICN [TDSC2015, AsiaCCS2013] Stress-testing BGP Routers [ICDCS2013]
Causing BGP control plane
instability using data plane events [NDSS2011]
(Media:
New
Scientist,
Slashdot,
ZDNet,
CBS News,
Minnesota Daily, Metro,
Gizmodo,
The
Register)
- Social networks: Gold-farming Networks [TIFS2017], Encounter-based Social Networks [TDSN2013] Social Cloud [TSC2013, AsiaCCS2013] (Media:
MIT
Technical Review, The Verge) Graph Sampling for Social Networks
[MilCom2012] Social networks
properties and
their use for trustworthy and distributed systems. [ASIACCS2012] [ICUIMC2011]
[ICDCSW2011] [INFOCOM2011] [IMC2010]
- Anonymous
Communication Systems: SNS-based Anonymous Communication [AsiaCCS2013] Censorship-resistant Systems [FOCI2012, TR2011,
CCS2009a],
P2P Anonymous Communication Systems [WPES2010,
CCS2009b, WPES2009],
Tor [CCS2010],
- P2P
Systems: Hijacking BitTorrent [IETInformationSecurity2014] Shutting down Kad [Wiley2009, SecureComm2008],
Network Coordinate Systems [TISSEC2011,
SecureComm2009],
Botnets [AsiaCCS2009],
Kad routing failure [P2P2009],
Secure DHT routing [TR2006],
P2P ecash [ICDCS2007],
P2P Storage Accounting [ICDCS
2006],
P2P Simulation [TR2010]
- Wireless
Ad-hoc/Sensor Networks: Analyzing Customized Protocols [Wisec2016] (Best Paper Award), Breaking Personal Area Network [WISA2015], 802.15.ac Jamming [RAID2014] Sensing irregularity [TPDS2010, SenSys2007,
Infocom2007], Secure
Localization [Elsevier2008, Infocom2007],
Software Attestation [ESAS2005],
Key Pre-distribution [SASN2004]
- Cloud
Computing/Storage Systems: Network Coding [ToC2010, TR2011],
Cryptographic File Systems [CCSW2009],
Accouting for Storage Outsourcing [SRDS2007],
Object-based Storage [MSST2006, SISW2003],
Global File Sharing [MSST2006],
Storage Security Survey [StorageSS2005],
Group Key Management [Comm2003, SISW2002]
- Group
Key Agreement and its Application: Secure Group
Communication Systems [TPDS2004, ICDCS 2001, ICDCS
2000],
Group Key Agreement [TISSEC2004, ToC2004, TISSEC2004,
ACNS2003, ICDCS2002, SEC2001, CCS2000,
DISCEX2000], Admission
Control [NCA2003,
LNSW2003]
- Applied
Cryptography: Timed-release Public Key Encryption [TISSEC2008, FC2006],
Password-based Authentication [ACNS2005],
Batch Verification [ICISC2004],
Stream Ciphers [CARDIS
1996], Exponent Permutation [ICCIS1996], Public Key Crypto [WISA2006, KIISC1996]
- Etc: Privacy
Preserving Data Mining [HICSS2010, PADM2006], Network Anomaly
Detection [IAW2005, TR2006],
Multi-agent Marketplace [Elsevier2004,
ICEC2003]
- 2018 Spring, EE817/IS893, Cryptography Engineering and Cryptocurrency
- 2018 Spring, IS511, Introduction to Information Security
- 2017 Fall, EE515/IS523, Security
101: Think Like an Adversary
- 2017 Spring, EE488, Discrete Methods for EE
- 2016 Spring, IS511, Introduction to Information Security
- 2016 Fall, EE515/IS523, Security
101: Think Like an Adversary
- 2016 Spring, EE817/IS893, Cryptography Engineering
- 2016 Spring, IS511, Introduction to Information Security
- 2015 Fall, EE515/IS523, Security
101: Think Like an Adversary
- 2015 Spring, IS511, Introduction to Information Security
- 2014 Fall, EE515/IS523, Security
101: Think Like an Adversary
- 2014 Spring, IS511, Introduction to Information Security
- 2013 Fall, EE515/IS523, Security
101: Think Like an Adversary
- 2013 Spring, EE488, Discrete Methods for EE
- 2012 Fall, EE515/IS523, Security
101: Think Like an Adversary
- Teaching in Minnesota
Conferences and Journals I am involved in (all
services)
- Program Committee Co-Chair (with Javier Lopez, Taesoo Kim), ACM AsiaCCS 2018
- Editorial Board Member, ACM Transactions on Information and System Security (TISSEC), 2013 - current
- Steering Committee Member, ISOC Network
and Distributed System Security
Symposium (NDSS) 2013 - current
- Area Chair for WWW Conference, Area Chair for Security, privacy, trust, and abuse
- Program Committee Co-Chair (with Adrian Perrig, Heejo Lee), International Workshop on Information Security Applications 2013
|