Dongkwan Kim
Title
Cited by
Cited by
Year
Rocking drones with intentional sound noise on gyroscopic sensors
Y Son, H Shin, D Kim, Y Park, J Noh, K Choi, J Choi, Y Kim
24th {USENIX} Security Symposium ({USENIX} Security 15), 881-896, 2015
1972015
Breaking and fixing volte: Exploiting hidden data channels and mis-implementations
H Kim, D Kim, M Kwon, H Han, Y Jang, D Han, T Kim, Y Kim
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
462015
Peeking over the cellular walled gardens-a method for closed network diagnosis
B Hong, S Park, H Kim, D Kim, H Hong, H Choi, JP Seifert, SJ Lee, Y Kim
IEEE Transactions on Mobile Computing 17 (10), 2366-2380, 2018
132018
BurnFit: Analyzing and exploiting wearable devices
D Kim, S Park, K Choi, Y Kim
International Workshop on Information Security Applications, 227-239, 2015
82015
Who spent my {EOS}? on the (in) security of resource management of eos. io
S Lee, D Kim, D Kim, S Son, Y Kim
13th {USENIX} Workshop on Offensive Technologies ({WOOT} 19), 2019
72019
When cellular networks met IPv6: Security problems of middleboxes in IPv6 cellular networks
H Hong, H Choi, D Kim, H Kim, B Hong, J Noh, Y Kim
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 595-609, 2017
72017
High-speed automatic segmentation of intravascular stent struts in optical coherence tomography images
M Han, D Kim, WY Oh, S Ryu
Photonic Therapeutics and Diagnostics IX 8565, 85653Z, 2013
32013
Pay As You Want: Bypassing Charging System in Operational Cellular Networks
H Hong, H Kim, B Hong, D Kim, H Choi, E Lee, Y Kim
International Workshop on Information Security Applications, 148-160, 2016
22016
Analyzing Security of Korean USIM-Based PKI Certificate Service
S Park, S Park, I Yun, D Kim, Y Kim
Information Security Applications: 15th International Workshop, WISA 2014 …, 2015
12015
FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis
M Kim, D Kim, E Kim, S Kim, Y Jang, Y Kim
Annual Computer Security Applications Conference, 733-745, 2020
2020
Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned
D Kim, E Kim, SK Cha, S Son, Y Kim
arXiv preprint arXiv:2011.10749, 2020
2020
Apparatus and method for diagnosing anomaly in mobile communication network
Y Kim, B Do HONG, S Lee, P Shinjo, KIM Hongil, H HyunWook, D Kim, ...
US Patent 10,111,120, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–12