Dongkwan Kim
Cited by
Cited by
Rocking drones with intentional sound noise on gyroscopic sensors
Y Son, H Shin, D Kim, Y Park, J Noh, K Choi, J Choi, Y Kim
24th {USENIX} Security Symposium ({USENIX} Security 15), 881-896, 2015
Breaking and fixing volte: Exploiting hidden data channels and mis-implementations
H Kim, D Kim, M Kwon, H Han, Y Jang, D Han, T Kim, Y Kim
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Peeking over the cellular walled gardens-a method for closed network diagnosis
B Hong, S Park, H Kim, D Kim, H Hong, H Choi, JP Seifert, SJ Lee, Y Kim
IEEE Transactions on Mobile Computing 17 (10), 2366-2380, 2018
When cellular networks met IPv6: Security problems of middleboxes in IPv6 cellular networks
H Hong, H Choi, D Kim, H Kim, B Hong, J Noh, Y Kim
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 595-609, 2017
BurnFit: Analyzing and exploiting wearable devices
D Kim, S Park, K Choi, Y Kim
International Workshop on Information Security Applications, 227-239, 2015
FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis
M Kim, D Kim, E Kim, S Kim, Y Jang, Y Kim
Annual Computer Security Applications Conference, 733-745, 2020
Who spent my {EOS}? on the (in) security of resource management of eos. io
S Lee, D Kim, D Kim, S Son, Y Kim
13th {USENIX} Workshop on Offensive Technologies ({WOOT} 19), 2019
High-speed automatic segmentation of intravascular stent struts in optical coherence tomography images
M Han, D Kim, WY Oh, S Ryu
Photonic Therapeutics and Diagnostics IX 8565, 85653Z, 2013
Pay As You Want: Bypassing Charging System in Operational Cellular Networks
H Hong, H Kim, B Hong, D Kim, H Choi, E Lee, Y Kim
International Workshop on Information Security Applications, 148-160, 2016
BASESPEC: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols
E Kim, D Kim, CJ Park, I Yun, Y Kim
Symposium on Network and Distributed System Security (NDSS)(San Diego, CA …, 2021
Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned
D Kim, E Kim, SK Cha, S Son, Y Kim
arXiv preprint arXiv:2011.10749, 2020
Analyzing Security of Korean USIM-Based PKI Certificate Service
S Park, S Park, I Yun, D Kim, Y Kim
Information Security Applications: 15th International Workshop, WISA 2014 …, 2015
Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds
D Kim, E Kim, M Kim, Y Jang, Y Kim
IEEE Security & Privacy, 2021
Apparatus and method for diagnosing anomaly in mobile communication network
Y Kim, B Do HONG, S Lee, P Shinjo, KIM Hongil, H HyunWook, D Kim, ...
US Patent 10,111,120, 2018
The system can't perform the operation now. Try again later.
Articles 1–14