Yongdae Kim

Yongdae Kim

KAIST

H-index: 56

Asia-South Korea

About Yongdae Kim

Yongdae Kim, With an exceptional h-index of 56 and a recent h-index of 32 (since 2020), a distinguished researcher at KAIST, specializes in the field of Security, Distributed Systems, Networks, Privacy.

His recent articles reflect a diverse array of research interests and contributions to the field:

Method for imei verification and unauthorized device detection using control plane message and the system thereof

A Systematic Study of Physical Sensor Attack Hardness

Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials

Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting

Method for anti-drone using GPS spoofing signal and system therefore

Security analysis system and method based on negative testing for protocol implementation of lte device

{BASECOMP}: A Comparative Analysis for Integrity Protection in Cellular Baseband Software

LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper

Yongdae Kim Information

University

Position

Professor of Electrical Engineering Korea

Citations(all)

10333

Citations(since 2020)

3660

Cited By

8009

hIndex(all)

56

hIndex(since 2020)

32

i10Index(all)

106

i10Index(since 2020)

67

Email

University Profile Page

Google Scholar

Yongdae Kim Skills & Research Interests

Security

Distributed Systems

Networks

Privacy

Top articles of Yongdae Kim

Method for imei verification and unauthorized device detection using control plane message and the system thereof

2024/3/28

A Systematic Study of Physical Sensor Attack Hardness

2024/2/30

Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials

2023/12/4

Daegeun Yoon
Daegeun Yoon

H-Index: 1

Yongdae Kim
Yongdae Kim

H-Index: 30

Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting

ACM Transactions on Privacy and Security

2023/10/14

Method for anti-drone using GPS spoofing signal and system therefore

2023/9/5

Security analysis system and method based on negative testing for protocol implementation of lte device

2023/4/13

{BASECOMP}: A Comparative Analysis for Integrity Protection in Cellular Baseband Software

2023

LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper

2023/5/29

Preventing SIM Box Fraud Using Device Model Fingerprinting

2023

Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels

2023

Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof

2023

Are There Wireless Hidden Cameras Spying on Me?

2022/12/5

Dynamic security analysis method for control plane and system therefore

2022/10/4

Cyber Physical Analysis of System Software Survivability by Stimulating Sensors on Drones

2022/9/29

Physical signal overshadowing attack method for LTE broadcast message and the system thereof

2022/8/2

Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned

IEEE Transactions on Software Engineering

2022/7/1

HearMeOut: detecting voice phishing activities in Android

2022/6/27

Cellular Security: Why is it difficult?

2022/5/30

Yongdae Kim
Yongdae Kim

H-Index: 30

METHOD FOR VALIDATING MAN-IN-THE-MIDDLE ATTACK FOR CELLULAR CONTROL PLANE PROTOCOLS AND THE SYSTEM THEREOF

2022/4/21

FBS REDIRECTION ATTACK METHOD USING UNICAST MESSAGE INJECTION IN LTE AND THE SYSTEM THEREOF

2022/4/21

See List of Professors in Yongdae Kim University(KAIST)

Co-Authors

academic-engine