Dongkwan Kim
KAIST
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Dongkwan Kim.
computer and communications security | 2015
Hong-Il Kim; Dongkwan Kim; Minhee Kwon; Hyungseok Han; Yeongjin Jang; Dongsu Han; Taesoo Kim; Yongdae Kim
Long Term Evolution (LTE) is becoming the dominant cellular networking technology, shifting the cellular network away from its circuit-switched legacy towards a packet-switched network that resembles the Internet. To support voice calls over the LTE network, operators have introduced Voice-over-LTE (VoLTE), which dramatically changes how voice calls are handled, both from user equipment and infrastructure perspectives. We find that this dramatic shift opens up a number of new attack surfaces that have not been previously explored. To call attention to this matter, this paper presents a systematic security analysis. Unlike the traditional call setup, the VoLTE call setup is controlled and performed at the Application Processor (AP), using the SIP over IP. A legitimate user who has control over the AP can potentially control and exploit the call setup process to establish a VoLTE channel. This combined with the legacy accounting policy (e.g., unlimited voice and the separation of data and voice) leads to a number of free data channels. In the process of unveiling the free data channels, we identify a number of additional vulnerabilities of early VoLTE implementations, which lead to serious exploits, such as caller spoofing, over-billing, and denial-of-service attacks. We identify the nature of these vulnerabilities and concrete exploits that directly result from the adoption of VoLTE. We also propose immediate countermeasures that can be employed to alleviate the problems. However, we believe that the nature of the problem calls for a more comprehensive solution that eliminates the root causes at mobile devices, mobile platforms, and the core network.
workshop on information security applications | 2015
Dongkwan Kim; Suwan Park; Kibum Choi; Yongdae Kim
Wearable devices have recently become popular, and more and more people now buy and wear these devices to obtain health-related services. However, as wearable device technology quickly advances, its security cannot keep up with the speed of its development. As a result, it is highly likely for the devices to have severe vulnerabilities. Moreover, because these wearable devices are usually light-weight, they delegate a large portion of their operations as well as permissions to a software gateways on computers or smartphones, which put users at high risk if there are vulnerabilities in these gateways. In order to validate this claim, we analyzed three devices as a case study and found a total 17 vulnerabilities in them. We verified that an adversary can utilize these vulnerabilities to compromise the software gateway and take over a victims computers and smartphones. We also suggest possible mitigation to improve the security of wearable devices.
workshop on information security applications | 2014
Shinjo Park; Suwan Park; Insu Yun; Dongkwan Kim; Yongdae Kim
This paper analyzes security of Korean USIM-based PKI certificate service. Korean PKI certificate consists of public key and password encrypted private key on disk. Due to insufficient security provided by single password, Korean mobile operators introduced USIM-based PKI system. We found several vulnerabilities inside the system, including private key’s RSA prime number leakage during certificate installation. We also suggest possible improvments on designing secure authentication system (Preliminary work of this paper was published previously [1]. This work was responsibly disclosed to the vendor and associated government organizations.).
ieee european symposium on security and privacy | 2017
Hyunwook Hong; Hyunwoo Choi; Dongkwan Kim; Hong-Il Kim; Byeongdo Hong; Jiseong Noh; Yongdae Kim
Recently, cellular operators have started migrating to IPv6 in response to the increasing demand for IP addresses. With the introduction of IPv6, cellular middleboxes, such as firewalls for preventing malicious traffic from the Internet and stateful NAT64 boxes for providing backward compatibility with legacy IPv4 services, have become crucial to maintain stability of cellular networks. This paper presents security problems of the currently deployed IPv6 middleboxes of five major operators. To this end, we first investigate several key features of the current IPv6 deployment that can harm the safety of a cellular network as well as its customers. These features combined with the currently deployed IPv6 middlebox allow an adversary to launch six different attacks. First, firewalls in IPv6 cellular networks fail to block incoming packets properly. Thus, an adversary could fingerprint cellular devices with scanning, and further, she could launch denial-of-service or over-billing attacks. Second, vulnerabilities in the stateful NAT64 box, a middlebox that maps an IPv6 address to an IPv4 address (and vice versa), allow an adversary to launch three different attacks: 1) NAT overflow attack that allows an adversary to overflow the NAT resources, 2) NAT wiping attack that removes active NAT mappings by exploiting the lack of TCP sequence number verification of firewalls, and 3) NAT bricking attack that targets services adopting IP-based blacklisting by preventing the shared external IPv4 address from accessing the service. We confirmed the feasibility of these attacks with an empirical analysis. We also propose effective countermeasures for each attack.
workshop on information security applications | 2016
Hyunwook Hong; Hong-Il Kim; Byeongdo Hong; Dongkwan Kim; Hyunwoo Choi; Eunkyu Lee; Yongdae Kim
Accurate and fair data charging in cellular networks is an important issue because of its large impacts on profits of operators and bills for users. In this study, we analyze the data charging policies and mechanisms for protocols and applications. The analysis shows that all operators in South Korea did not charge the payload of Internet Control Message Protocol (ICMP) echo request/reply messages, as well as the payload attached to Transmission Control Protocol (TCP) SYN and TCP RST packets. In addition, the operators only utilize IP addresses to verify whether the traffic comes from the expected application. By misusing the findings with consideration of Network Address Translator (NAT) in IPv4 cellular networks, we validate with empirical experiments the feasibility of free-riding attack, which enables an adversary to use the cellular data service for free, and propose effective countermeasures.
Korean Journal of Breeding | 2016
Won-Young Han; Hyun-Tae Kim; Jong-Min Ko; Hong-Tae Yun; In-Youl Baek; Byung-Won Lee; Young-Hoon Lee; Tae-Jung Ha; Sang-Ouk Shin; Sj Lee; Chan-Sik Jung; Jae-Keun Choi; Jong-HyungLee; Seung-Soo Lee; Dongkwan Kim; Eun-Ja Lee; Hang-Won Kang
A new soybean variety, ‘Joongmo 3009’ (Milyang 222) was developed at the National Institute of Crop Science (NICS) in 2012. ‘Joongmo 3009’ was released by pedigree selection from the cross between ‘Cheongja 2(Milyang 121)’ and ‘Daemangkong’. It has determinate growth habit, white flower, brown pubescence, brown pod color, green seed coat, green cotyledon, spherical seed shape, oval leaf shape and large seed size (29.3 grams per 100 seeds). It was late 16 days in maturing date than the check cultivar ‘Cheongjakong’. The average yield of ‘Joongmo 3009’ was 2.91 ton per hectare, which was higher 36 percentage than the check variety, in the regional yield trials carried out in three adaptable locations of Korea from 2010 to 2012. The number of breeder’s right is ‘5474’
usenix security symposium | 2015
Yun Mok Son; Ho Cheol Shin; Dongkwan Kim; Young Seok Park; Ju Hwan Noh; Ki Bum Choi; Jung-Woo Choi; Yongdae Kim
Korean Journal of Breeding | 2014
Hyun-Tae Kim; In-Youl Baek; Won-Young Han; Jong-Min Ko; Young-Hoon Lee; Chan-Sik Jung; Young-Jin Oh; Sang-Kyun Cho; Keum-Yong Park; Byong Won Lee; Ha-Sik Sim; Meong-Ki Jeon; Min-Jung Seo; Dongkwan Kim; Sung-Taeg Kim; Yong-Duk Kim
Proceedings of SPIE | 2013
Myounghee Han; Dongkwan Kim; W. Y. Oh; Seung-Wook Ryu
Korean Journal of Breeding | 2013
Hyun-Tae Kim; In-Youl Baek; Young-Jin Oh; Sang-Kyun Cho; Won-Young Han; Jong-Min Ko; Myung-Gi Jeon; Keum-Yong Park; Kyong-Ho Kim; Young-Jin Kim; Tae-soo Kim; Byong Won Lee; Yeong-Hoon Lee; Ha-Sik Sim; Hong-Tae Yun; Dongkwan Kim; Sung-Taeg Kim