EE515: Security of Emerging Systems
Calendar (subject to change depending on schdule)
Useful Links for Reading Papers
9/17/2025
- Topic: How to Think about Security of New (Emerging) Systems?
- Presenter: Yongdae Kim
- Slides: 02.pdf
- Videos: class_0917.mp4
9/22/2025
- Topic: Software Engineering Failures and Malpractices
- Assignment: Reading Report
- Presenter: Yongdae Kim
- Slides: VotingAutomobile.pdf
- Videos: class_0922.mp4
- Reading List:
-
Yongdae Kim
A. Feldman, J. Halderman, and E. Felten,
"Security Analysis of the Diebold AccuVote-TS Voting Machine",
EVT'07
-
R1/R2 Yongdae Kim
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno,
"Comprehensive Experimental Analyses of Automotive Attack Surfaces",
USENIX Sec'11
9/24/2025
- Topic: Medical Devices
- Assignment: Reading Report
- Presenter: Yongdae Kim
- Slides: Medical.pdf
- Videos: class_0924.mp4
- Reading List:
-
Yongdae Kim
D. Halperin, T. Heydt-Benjamin, B. Ransford, S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W.Maisel,
"Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses",
IEEE SP'08
-
R1/R2 Yongdae Kim
D. Foo Kune, J. Backes, S. Clark, D. Kramer, M. Reynolds, K. Fu, Y. Kim, and W. Xu,
"Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors"
, IEEE SP'13
9/29/2025
- Topic: Cellular (1)
- Assignment: Reading Report
- Slides:
- Videos:
- Reading List:
10/1/2025
- Topic: Special Topic (Cellular Security)
- Slides:
- Videos:
- Reading List:
10/8/2025 (No class: 대체공휴일)
10/13/2025
- Topic: Cellular (2)
- Assignment: Reading Report
- Slides:
- Videos:
- Reading List:
-
Hoang Dinh Tuan@Syssec
T. Hoang, C. Park, M. Son, T. Oh, S. Bae, J. Ahn, B. Oh, and Y. Kim,
"LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper",
WISEC'23
-
Hoang Dinh Tuan@Syssec
T. Hoang, T. Oh, C. Park, I Yun, and Y. Kim,
"LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers",
USENIX Sec'25
10/15/2025
- Topic: Special Topic (How to write top-tier security conference papers?)
- Slides:
- Videos:
- Reading List:
10/20/2025 (Midterm Exam Period)
10/22/2025 (Midterm Exam Period)
10/27/2025
- Topic: Cellular (3)
- Assignment: Reading Report
- Slides:
- Videos:
- Reading List:
-
R1 DE SOUSA Raphaël
H. Yang, S. Bae, M. Son, H. Kim, S. Kim, and Y. Kim,
"Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE",
USENIX Sec'19
-
R2 Dongmin Lee
T. Oh, S. Bae, J. Ahn, Y. Lee, D. T. Hoang, M. Kang, N. Tippenhauer, and Y. Kim,
"Enabling Physical Localization of Uncooperative Cellular Devices",
MobiCom'24
10/29/2025
- Topic: Cellular (4)
- Assignment: Reading Report
- Slides:
- Videos:
- Reading List:
11/3/2025
- Topic: cellular (5) + LLM
- Slides:
- Assignment: Reading Report
- Videos:
- Reading List:
-
R1 Hazem Issa
Ali Ranjbar, Tianchang Yang, Kai Tu, Saaman Khalilollahi, and Syed Rafiul Hussain,
"Stateful Analysis and Fuzzing of Commercial Baseband Firmware",
IEEE SP'25
-
R2 Ziho Shin
W. Go, H. Kim, A. Oh, and Y. Kim,
"XDAC: XAI-Driven Detection and Attribution of LLM-Generated News Comments in Korean",
ACL'25
11/5/2025
- Topic: LLM Jailbreaking
- Slides:
- Videos:
- Reading List:
-
R1 Yongbi Son
Z. Yu, X. Liu, S. Liang, Z. Cameron, C. Xiao, and N. Zhang,
"Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models",
USENIX Sec'24
-
R2 Jihye Lee
A. Zou, Z. Wang, N Carlini, M. Nasr, J. Kolter, and M. Fredrikson,
"Universal and Transferable Adversarial Attackson Aligned Language Models"
11/10/2025
- Topic: LLM-based Testing (1)
- Assignment: Reading Report
- Slides:
- Videos:
- Reading List:
11/12/2025
- Topic: LLM-based Testing (2)
- Assignment: Reading Report
- Slides:
- Videos:
- Reading List:
11/17/2025
- Topic: Automated Driving System (1)
- Slides:
- Videos:
- Reading List:
11/24/2025
- Topic: Drone (1)
- Slides:
- Videos:
- Reading List:
11/26/2025
- Topic: Drone (2)
- Slides:
- Videos:
- Assignment: Reading Report
- Reading List:
-
R1 Alexander Taniel Vieres
J. Jang*, M. Cho*, J. Kim, D. Kim, and Y. Kim,
"Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels",
NDSS '23
-
R2 Minwoo Jeong
N. Schiller, M. Chlosta, M. Schloegel, N. Bars, T. Eisenhofer, T. Scharnowski, F. Domke, L. Schönherr, and T. Holz,
"Drone Security and the Mysterious Case of DJI's DroneID.",
NDSS '23
12/1/2025
- Topic: Drone (3)
- Slides:
- Videos:
- Assignment: Reading Report
- Reading List:
-
R1 Dongjin Seo
J. Noh, Y. Kwon, Y. Son, H. Shin, D. Kim, J. Choi, and Y. Kim,
"Tractor beam: Safe-hijacking of consumer drones with adaptive GPS spoofing",
TOPS'19
-
R2 Zwe Myint Mo
T. Kim, C. H. Kim, J. Rhee, F. Fei, Z. Tu, G. Walkup, and D. Xu,
"RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing",
USENIX Sec'19
12/3/2025
- Topic: Machine Learning
- Slides:
- Videos:
- Assignment: Reading Report
- Reading List:
-
R1 Antoni Tenreiro López
Y. Chen, X. Yuan, J. Zhang, Y. Zhao, S. Zhang, K. Chen, and X. Wang,
"Devil's whisper: A general approach for physical adversarial attacks against commercial black-box speech recognition devices.",
USENIX Sec'20
-
R2 Doyeon Jeon
F. Tramèr, F. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart,
"Stealing machine learning models via prediction APIs",
USENIX Sec'16
12/8/2025
- Topic: Satellite
- Slides:
- Assignment: Reading Report
- Reading List:
-
R1 Pham Quang Huy
W. Liu, Y. Li, H. Li, Y. Chen, Y. Wang, J. Lan, J. Wu, Q. Wu, J. Liu, and Z. Lai,
"The Dark Side of Scale: Insecurity of Direct-to-Cell Satellite Mega-Constellations",
IEEE SP'24
-
R2 Andrei George-Matei
E. Jedermann, M. Strohmeier, V. Lenders, and J. Schmitt,
"Record: A Reception-Only Region Determination Attack on LEO Satellite Users",
USENIX Sec'24
12/10/2025
- Topic: VR/AR
- Assignment: Reading Report
- Reading List:
-
R1 Jehong Jang
I. Martinovic, D. Davies, M. Frank, D. Perito, T. Ros, and D. Song,
"On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces",
USENIX Sec'12
-
R2 Adrian Wireklint
Y. Zhang, C. Slocum, J. Chen, and N. Abu-Ghazaleh,
"It's all in your head (set): Side-channel attacks on ar/vr systems.",
USENIX Sec'23
12/15/2025 (Final Exam Period)
12/17/2025 (Final Exam Period)
Useful
Links (Borrowed from Zhi-Li Zhang's 8211 web page)
- "Effective
Reading of
Papers in Science and Technology", by Michael Hanson and
Dylan McNameee
- "An
Evaluation of
the Ninth SOSP Submissions or How (and How Not) to Write a Good Systems
Paper", R. Levin, and D. D. Redell, ACM Operating Systems
Review, 17
(3), July 1983, pp 35-40.
- "How
to Increase the Chances Your Paper is Accepted at ACM SIGCOMM",
by Craig Partridge
- "How
to write a good research paper and give a good research talk",
S. L. Peyton Jones, J. Hughes, and J. Launchbury, ACM
SIGPLAN Notices 28 (11) Nov 1993.
- "The art of
Speaking",
by Mike Dahlin
- "Should
Computer
Scientists Experiment More?", by Walter Tichy
- "A
guide for new referees in theoretical computer science", by
Ian Parberry
- "How
to have a bad career in research/academia", by David Patterson
- "A Ph.D
is
Not Enough: A Guide to Survival in Science", by Peter J.
Feibelman (every science/engineer Ph.D student who is serious about a
research career should read this book!)
You
can also explore the CMU's
Advice on Research and Writing webpage and Armando Fox's webpage
on paper writing and presentations. Computer Research Association (CRA)
also has a
site for students with a lot of useful information.
|