Rocking drones with intentional sound noise on gyroscopic sensors Y Son, H Shin, D Kim, Y Park, J Noh, K Choi, J Choi, Y Kim 24th {USENIX} Security Symposium ({USENIX} Security 15), 881-896, 2015 | 197 | 2015 |
Breaking and fixing volte: Exploiting hidden data channels and mis-implementations H Kim, D Kim, M Kwon, H Han, Y Jang, D Han, T Kim, Y Kim Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 46 | 2015 |
Peeking over the cellular walled gardens-a method for closed network diagnosis B Hong, S Park, H Kim, D Kim, H Hong, H Choi, JP Seifert, SJ Lee, Y Kim IEEE Transactions on Mobile Computing 17 (10), 2366-2380, 2018 | 13 | 2018 |
BurnFit: Analyzing and exploiting wearable devices D Kim, S Park, K Choi, Y Kim International Workshop on Information Security Applications, 227-239, 2015 | 8 | 2015 |
Who spent my {EOS}? on the (in) security of resource management of eos. io S Lee, D Kim, D Kim, S Son, Y Kim 13th {USENIX} Workshop on Offensive Technologies ({WOOT} 19), 2019 | 7 | 2019 |
When cellular networks met IPv6: Security problems of middleboxes in IPv6 cellular networks H Hong, H Choi, D Kim, H Kim, B Hong, J Noh, Y Kim 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 595-609, 2017 | 7 | 2017 |
High-speed automatic segmentation of intravascular stent struts in optical coherence tomography images M Han, D Kim, WY Oh, S Ryu Photonic Therapeutics and Diagnostics IX 8565, 85653Z, 2013 | 3 | 2013 |
Pay As You Want: Bypassing Charging System in Operational Cellular Networks H Hong, H Kim, B Hong, D Kim, H Choi, E Lee, Y Kim International Workshop on Information Security Applications, 148-160, 2016 | 2 | 2016 |
Analyzing Security of Korean USIM-Based PKI Certificate Service S Park, S Park, I Yun, D Kim, Y Kim Information Security Applications: 15th International Workshop, WISA 2014 …, 2015 | 1 | 2015 |
FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis M Kim, D Kim, E Kim, S Kim, Y Jang, Y Kim Annual Computer Security Applications Conference, 733-745, 2020 | | 2020 |
Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned D Kim, E Kim, SK Cha, S Son, Y Kim arXiv preprint arXiv:2011.10749, 2020 | | 2020 |
Apparatus and method for diagnosing anomaly in mobile communication network Y Kim, B Do HONG, S Lee, P Shinjo, KIM Hongil, H HyunWook, D Kim, ... US Patent 10,111,120, 2018 | | 2018 |