Publications

Publications

2025

ATLANTIS: AI-driven Threat Localization, Analysis, and Triage Intelligence System
arXiv, Sep 2025
Media: DARPAARPA-HSamsung NewsroomGeorgia TechOpenSSFFortuneAir & Space ForcesThe RecordInfosecurity MagazineCybersecurity DiveHealthcare IT NewsNextgovMeriTalkExecutiveGovSecurity BoulevardSamMobileSammyGuruSSBCrackRSWebSolsOpen Tools

2023

BaseComp: A Comparative Analysis for Integrity Protection in Cellular Baseband Software
USENIX Security 2023
Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof
NDSS 2023
Media: Air Force Research Lab
Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels
NDSS 2023
Media: KyunghyangKyunghyangThe HankyorehMoneyTodayMunhwaHerald CorpHerald CorpKorea Economic DailyPopular Science KoreaAsia EconomicEKNDigital TimesATN NewsIT Biz NewsLecture NewsNew Free ZoneNoCut News

2022

Watching the Watchers: Practical Video Identification Attack in LTE Networks
USENIX Security 2022
Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned
IEEE Transactions on Software Engineering (TSE)
Improving Large-Scale Vulnerability Analysis of IoT Devices with Heuristics and Binary Code Similarity
Ph.D. Thesis

2021

Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds
IEEE Security & Privacy
BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols
NDSS 2021

2020

FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis
ACSAC 2020
Media: CVEs & PoC Exploits

2019

Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO
USENIX WOOT 2019

2018

Peeking over the Cellular Walled Gardens - A Method for Closed Network Diagnosis
IEEE Transactions on Mobile Computing (TMC)

2017

When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks
IEEE EuroS&P 2017

2016

Pay As You Want: Bypassing Charging System in Operational Cellular Networks
WISA 2016
Dissecting VoLTE: Exploiting Free Data Channels and Security Problems
M.S. Thesis

2015

Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations
ACM CCS 2015
Media: CVE-2015-6614CERT VU#943167Android Security BulletinThe RegisterTom's GuideZDNetSoftpediaTechwormNeowinDailySecu (interview)ZDNet Korea
BurnFit: Analyzing and Exploiting Wearable Devices Best Paper
WISA 2015
Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors
USENIX Security 2015
Media: Air Force Research LabDARPA FIRE Program ($70M)Los Alamos National LabNY Daily NewsDefense OneGizmodoSlashdotNetwork WorldComputerworldIBTimesSophosSputnikiRobot NewssUAS NewsTechworm

2014

Analyzing Security of Korean USIM-based PKI Certificate Service
WISA 2014