Cellular baseband, VoLTE/IMS, LTE networks, protocol reversing, control-plane vulnerabilities, and mobile platform security.
Publications
All publicationsBaseComp: A Comparative Analysis for Integrity Protection in Cellular Baseband Software
Watching the Watchers: Practical Video Identification Attack in LTE Networks
BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols
Peeking over the Cellular Walled Gardens - A Method for Closed Network Diagnosis
When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks
Pay As You Want: Bypassing Charging System in Operational Cellular Networks
Dissecting VoLTE: Exploiting Free Data Channels and Security Problems
Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations
Analyzing Security of Korean USIM-based PKI Certificate Service
Talks
All talksBaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols
Network and Distributed System Security Symposium (NDSS) · USA (Virtual)
Breaking & Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations
GSMA VoLTE/RCS Security Workshop · Toronto, Canada
Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations
A3 Foresight Program Workshop · Okinawa, Japan
Dissecting VoLTE: Exploiting Free Data Channels and Security Problems
32nd Chaos Communication Congress (32C3) · Hamburg, Germany
Breaking VoLTE, not VoIP
Power of Community (PoC) · Seoul, South Korea
Breaking and Fixing VoLTE
National Security Research Institute (NSR) · Daejeon, South Korea
Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations
ACM Conference on Computer and Communications Security (CCS) · Denver, USA
Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations
Georgia Institute of Technology · Atlanta, USA
Mitigations for VoLTE Security Vulnerabilities
KT Corporation · Daejeon, South Korea