Publications
2025
ATLANTIS: AI-driven Threat Localization, Analysis, and Triage Intelligence System
arXiv, Sep 2025
2023
BaseComp: A Comparative Analysis for Integrity Protection in Cellular Baseband Software
USENIX Security 2023
Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof
NDSS 2023
Media: Air Force Research Lab
Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels
NDSS 2023
2022
Watching the Watchers: Practical Video Identification Attack in LTE Networks
USENIX Security 2022
Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned
IEEE Transactions on Software Engineering (TSE)
Improving Large-Scale Vulnerability Analysis of IoT Devices with Heuristics and Binary Code Similarity
Ph.D. Thesis
2021
Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds
IEEE Security & Privacy
BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols
NDSS 2021
2020
FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis
ACSAC 2020
Media: CVEs & PoC Exploits
2019
Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO
USENIX WOOT 2019
2018
Peeking over the Cellular Walled Gardens - A Method for Closed Network Diagnosis
IEEE Transactions on Mobile Computing (TMC)
2017
When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks
IEEE EuroS&P 2017
2016
Pay As You Want: Bypassing Charging System in Operational Cellular Networks
WISA 2016
Dissecting VoLTE: Exploiting Free Data Channels and Security Problems
M.S. Thesis
2015
Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations
ACM CCS 2015
BurnFit: Analyzing and Exploiting Wearable Devices Best Paper
WISA 2015
Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors
USENIX Security 2015
2014
Analyzing Security of Korean USIM-based PKI Certificate Service
WISA 2014