Rocking drones with intentional sound noise on gyroscopic sensors Y Son, H Shin, D Kim, Y Park, J Noh, K Choi, J Choi, Y Kim 24th USENIX security symposium (USENIX Security 15), 881-896, 2015 | 465 | 2015 |
Tractor beam: Safe-hijacking of consumer drones with adaptive GPS spoofing J Noh, Y Kwon, Y Son, H Shin, D Kim, J Choi, Y Kim ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-26, 2019 | 111 | 2019 |
Gyrosfinger: Fingerprinting drones for location tracking based on the outputs of mems gyroscopes Y Son, J Noh, J Choi, Y Kim ACM Transactions on Privacy and Security (TOPS) 21 (2), 1-25, 2018 | 29 | 2018 |
Dissecting customized protocols: automatic analysis for customized protocols based on IEEE 802.15. 4 K Choi, Y Son, J Noh, H Shin, J Choi, Y Kim Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016 | 21 | 2016 |
The system that cried wolf: sensor security analysis of wide-area smoke detectors for critical infrastructure H Shin, J Noh, D Kim, Y Kim ACM Transactions on Privacy and Security (TOPS) 23 (3), 1-32, 2020 | 14 | 2020 |
Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof. J Jeong, D Kim, JH Jang, J Noh, C Song, Y Kim NDSS, 2023 | 9 | 2023 |
Lightbox: Sensor attack detection for photoelectric sensors via spectrum fingerprinting D Kim, M Cho, H Shin, J Kim, J Noh, Y Kim ACM Transactions on Privacy and Security 26 (4), 1-30, 2023 | 2 | 2023 |
SIOT: Secure Gateway for Internet of Things 김연근, 고영환, 김민수, 장진수, 배상욱, 노주환, 강병훈, 박경수, ... 한국통신학회지 (정보와통신) 34 (3), 80-89, 2017 | | 2017 |