Showing results 1 to 4 of 4
Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4 Choi, Kibum; Son, Yunmok; Noh, Juhwan; Shin, Hocheol; Choi, Jaeyeong; Kim, Yongdae, 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, ACM, 2016-07-19 |
Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack Kwon, Yujin; Kim, Dohyun; Son, Yunmok; Choi, Jaeyeong; Kim, Yongdae, 17th International Workshop on Information Security Applications (WISA), pp.124 - 135, Korea Institute of Information Security and Cryptology (KIISC), 2016-08-25 |
Sampling Race: Bypassing Timing-based Analog Active Sensor Spoofing Detection on Analog-digital Systems Shin, Hocheol; Son, Yunmok; Park, Youngseok; Kwon, Yujin; Kim, Yongdae, 10th USENIX Workshop on Offensive Technologies, USENIX, 2016-08-09 |
This ain't your dose: Sensor Spoofing Attack on Medical Infusion Pump Park, Youngseok; Son, Yunmok; Shin, Hocheol; Kim, Dohyun; Kim, Yongdae, 10th USENIX Workshop on Offensive Technologies, USENIX, 2016-08-09 |
Discover