Advertisement: This web site is no longer maintained, as I have moved to the Department of Electrical Engineering at KAIST, Korea, as a full professor. In 10 seconds, you will be automatically redirected to my new home page at KAIST.


Yongdae Kim (김용대)

Computer Science and Engineering Department
University of Minnesota - Twin Cities
Postal address: 4-192 Keller Hall, 200 Union St. SE, Minneapolis, Minnesota 55455
Office Location: 4-225E Keller Hall
email: kyd(at)cs.umn.edu phone: 612-626-7526
twitter, facebook, DBLP, Google scholar, Microsoft Academic


I am an associate professor in the Department of Computer Science and Engineering at the University of Minnesota, Twin Cities - Twin Cities and an adjunct professor in the Department of Electrical Engineering at KAIST. I received PhD degree from the computer science department at the University of Southern California under the guidance of Gene Tsudik and joined University of Minnesota in 2002. I received his MS and BS degrees in Mathematics from Yonsei University in 1993 and 1991. Before joining U of Minnesota, I worked as a research staff for two years in Sconce Group in UC Irvine. Before coming to the US, I worked 6 years in ETRI for securing Korean cyberinfrastructure. I received NSF career award on storage security and McKnight Land-Grant Professorship Award from University of Minnesota in 2005. My research interests include security issues for networked systems such as social networks, cellular networks, P2P systems, medical devices, storage systems, sensor and ad hoc networks, and anonymous communication systems.

Advertisement: I will join the Department of Electrical Engineering at KAIST, Korea, as a full professor starting from Fall 2012. If you are interested in graduate studies at KAIST, please send me email with your full resume.

Research Interests and Publication by Area

I am interested in security of emerging and current networked systems. My research (almost always) involves design/implementation of attacks, design/implementation/analysis of secure systems. Over the past 10 years as a faculty member, I've been working on security of various systems, which are going to expand more in the future. List below was impossible without many bright and hardworking students.


Recent Teaching (all previous)


Upcoming Conferences I am involved (all services)

Selected Recent Publications 

All publications by year, or by area. Or from public source such as DBLP, Google scholar, and Microsoft Academic.

  1. Towards a safe Integrated Clinical Environment: A communication security perspective
    Denis Foo Kune, Eugene Vasserman, Krishna Venkatasubramanian, Yongdae Kim, Insup Lee
    ACM Workshop on Medical Communication Systems (MedCOMM 2012)
  2. Measuring Bias in the Mixing Time of Social Graphs due to Graph Sampling
    Abedelaziz Mohaisen, Pengkui Luo, Yanhua Li, Yongdae Kim, Zhi-Li Zhang
    2012 Military Communications Conference (MILCOM 2012).
  3. One-way indexing for plausible deniability in censorship resistant storage
    Eugene Y. Vasserman, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim
    USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012)
  4. On the Mixing Time of Directed Social Graphs and Security Implications
    Abedalaziz Mohaisen, Huy Tran, Nicholas Hopper, and Yongdae Kim
    ACM Symposium on Information, Computer and Communications Security (ASIACCS 2012)
  5. SocialCloud: Using Social Networks for Building Distributed Computing Services
    Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, and Yongdae Kim
    Technical Report, CS Department, University of Minnesota (extended version in arXiv:1112.2254)
    Media: MIT Technical Review, The Verge
  6. Taking Routers Off Their Meds: Unstable Routers and the Buggy BGP Implementations That Cause Them
    Max Schuchard, Chris Thompson, Nicholas Hopper, Yongdae Kim
    Technical Report, CS Department, University of Minnesota
  7. Location leaks on the GSM air interface
    Denis Foo Kune, John Koelndorfer, Nicholas Hopper and Yongdae Kim
    ISOC Network & Distributed System Security Symposium (NDSS 2012)
    Nominated for the best paper award
    Media: Ars Technica, Slashdot, MPR, Fox Twin Cities, Physorg, TG Daily, Network World, e! Science News, Scientific Computing, gizmag, Crazy Engineers, PC Advisor, Mobile Magazine, The CyberJungle, Inquisitr
  8. The FrogBoiling Attack: Limitations of Secure Network Coordinate Systems, 
    Eric ChanTin, Victor Heorhiadi, Yongdae Kim, and Nicholas Hopper
    ACM Transactions on Information and System Security (TISSEC) 14(3),  2011
  9. Losing control of the Internet: Using the data plane to attack the control plane
    Max Schuchard, Eugene Y. Vasserman, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim
    ISOC Network and Distributed System Security Symposium (NDSS 2011)
    Media: New Scientist , Slashdot, ZDNet, CBS News, Minnesota Daily, Metro, Gizmodo, The Register
  10. Measuring the mixing time of social graphs
    Abedelaziz Mohaisen, Aaram Yun, Yongdae Kim
    ACM Internet Measurement Conference (IMC 2010)
  11. Recruiting New Tor Relays with BRAIDS
    Rob Jansen, Nicholas Hopper, and Yongdae Kim
    ACM Conference on Computer and Communications Security (CCS) 2010. 
  12. Membership-concealing overlay networks, 
    Eugene Vasserman, Rob Jansen, James Tyra, Nicholas Hopper, Yongdae Kim
    ACM Conference on Computer and Communications Security (CCS), 2009 
  13. Scalable onion routing with Torsk
    Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongdae Kim, 
    ACM Conference on Computer and Communications Security (CCS), 2009
  14. Why Kad Lookup Fails,
    Hun J. Kang, Eric Chan-Tin, Nicholas Hopper, Yongdae Kim,
    IEEE International Conference on Peer-to-Peer Computing (P2P), 2009
  15. Attacking the Kad Network - Real World Evaluation and High Fidelity Simulation using DVN -
    Eric Chan-Tin, Peng Wang, James Tyra, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim,
    Wiley Security and Communication Networks, 2009

Clicky


The views and opinions expressed in this page are strictly those of the page author.
The contents of this page have not been reviewed or approved by the University of Minnesota.