Kibum Choi
Kibum Choi
Unknown affiliation
Verified email at kaist.ac.kr
Title
Cited by
Cited by
Year
Rocking drones with intentional sound noise on gyroscopic sensors
Y Son, H Shin, D Kim, Y Park, J Noh, K Choi, J Choi, Y Kim
24th {USENIX} Security Symposium ({USENIX} Security 15), 881-896, 2015
2252015
Security analysis of FHSS-type drone controller
H Shin, K Choi, Y Park, J Choi, Y Kim
International Workshop on Information Security Applications, 240-253, 2015
242015
Dissecting customized protocols: automatic analysis for customized protocols based on IEEE 802.15. 4
K Choi, Y Son, J Noh, H Shin, J Choi, Y Kim
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
152016
BurnFit: Analyzing and exploiting wearable devices
D Kim, S Park, K Choi, Y Kim
International Workshop on Information Security Applications, 227-239, 2015
92015
Information security applications
S Kim, M Yung, HW Lee
Springer, 2014
42014
Information security applications
S Kim, M Yung, HW Lee
Springer, 2014
42014
Frying PAN: Dissecting Customized Protocol for Personal Area Network
K Choi, Y Son, J Lee, S Kim, Y Kim
International Workshop on Information Security Applications, 300-312, 2015
2015
Original Text
Y Park, J Noh, K Choi, J Choi, Y Kim
The system can't perform the operation now. Try again later.
Articles 1–8