Yongdae Kim
KAIST
H-index: 56
Asia-South Korea
Top articles of Yongdae Kim
Method for imei verification and unauthorized device detection using control plane message and the system thereof
2024/3/28
A Systematic Study of Physical Sensor Attack Hardness
2024/2/30
Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials
2023/12/4
Daegeun Yoon
H-Index: 1
Yongdae Kim
H-Index: 30
Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting
ACM Transactions on Privacy and Security
2023/10/14
Dohyun Kim
H-Index: 15
Hocheol Shin
H-Index: 3
Jaehoon Kim
H-Index: 1
Juhwan Noh
H-Index: 8
Yongdae Kim
H-Index: 30
Method for anti-drone using GPS spoofing signal and system therefore
2023/9/5
Security analysis system and method based on negative testing for protocol implementation of lte device
2023/4/13
{BASECOMP}: A Comparative Analysis for Integrity Protection in Cellular Baseband Software
2023
LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper
2023/5/29
Preventing SIM Box Fraud Using Device Model Fingerprinting
2023
Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels
2023
Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof
2023
Are There Wireless Hidden Cameras Spying on Me?
2022/12/5
Dynamic security analysis method for control plane and system therefore
2022/10/4
Cyber Physical Analysis of System Software Survivability by Stimulating Sensors on Drones
2022/9/29
Physical signal overshadowing attack method for LTE broadcast message and the system thereof
2022/8/2
Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned
IEEE Transactions on Software Engineering
2022/7/1
Dongkwan Kim
H-Index: 6
Eunsoo Kim
H-Index: 5
Sang Kil Cha
H-Index: 14
Sooel Son
H-Index: 10
Yongdae Kim
H-Index: 30
HearMeOut: detecting voice phishing activities in Android
2022/6/27
Joongyum Kim
H-Index: 2
Jihwan Kim
H-Index: 1
Seongil Wi
H-Index: 1
Yongdae Kim
H-Index: 30
Sooel Son
H-Index: 10
Cellular Security: Why is it difficult?
2022/5/30
Yongdae Kim
H-Index: 30
METHOD FOR VALIDATING MAN-IN-THE-MIDDLE ATTACK FOR CELLULAR CONTROL PLANE PROTOCOLS AND THE SYSTEM THEREOF
2022/4/21
FBS REDIRECTION ATTACK METHOD USING UNICAST MESSAGE INJECTION IN LTE AND THE SYSTEM THEREOF
2022/4/21