-
Notifications
You must be signed in to change notification settings - Fork 3
/
cv.tex
525 lines (434 loc) · 23.1 KB
/
cv.tex
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
% Name, phone, email, address
{\bf\huge Dongkwan Kim} \vspace{1em}\\
\noindent\begin{tabular}[t]{@{}l}
Ph.D Candidate \\
School of Electrical Engineering \\
Korea Advanced Institute of Science and Technology (KAIST)
\end{tabular}
\hfill
\begin{tabular}[t]{r@{}}
\\
Email: \email{[email protected]} \\
Homepage: \url{https://0xdkay.me} \\
\end{tabular}
% ========================================
% Summary
% ========================================
\sectiontitle{Summary}
I am a Ph.D candidate at the School of Electrical Engineering, KAIST.
%
My research goal is to secure the IoT ecosystem.
%
To achieve this,
I have been studying on
systematizing vulnerability analysis of IoT devices.
%
As a case study, I have analyzed
(1) smart home systems (\eg, wired/wireless routers, IP cameras, smart TVs),
(2) mobile systems (\eg, Android applications, baseband software, wearable devices),
(3) cellular infrastructures (\eg, specifications, charging policy, VoLTE, femtocells),
(4) smart infrastructure (\eg, automobiles, commercial drones), and
(5) blockchain systems (\eg, Bitcoin, Ethereum, EOS).
%
To expand my knowledge base,
I have participated in several hacking contests worldwide:
(1) U.S. (\eg, DEFCON, Plaid CTF),
(2) South Korea (\eg, Codegate, Whitehat Contest, and HDCON), and
(3) China (\eg, 0CTF).
%
Besides, I have been helping KAIST Computer Emergency Response Team (CERT)
in analyzing real-time/postmortem intrusion cases from 2010.
% ========================================
% Research Interest
% ========================================
\sectiontitle{Research Interest}
\begin{timeitemize}{Fundamental binary analysis}{}
\item Systematizing bug discovery with binary code similarity analysis
\item Applying natural language processing to assembly languages
\end{timeitemize}
\begin{timeitemize}{Cellular network as a target}{}
\item Analyzing security violations in specifications and actual implementations
\item Discovering inconsistencies between specifications and actual implementations
\item Investigating privacy-leaking side channels
\end{timeitemize}
\begin{timeitemize}{Cyber-physical system as a target}{}
\item Discovering security (or safety) violations under adversarial environments
\item Building an end-to-end fuzzer for sensing and actuation logic
\end{timeitemize}
% ========================================
% Education
% ========================================
\sectiontitle{Education}
\begin{timeitemize}[South Korea]{Korea Advanced Institute of Science and Technology (KAIST)}{}
\timeitem{Ph.D. in School of Electrical Engineering}{(expected) Mar. 2016 -- Feb. 2022}
\subitem{Thesis Title:
\textit{Improving Large-Scale Vulnerability Analysis of IoT Devices with
Heuristics and Binary Code Similarity}}
\subitem{Advisor: Prof. Yongdae Kim}
\timeitem{M.S. in School of Electrical Engineering}{Mar. 2014 -- Feb. 2016}
\subitem{Thesis Title: Dissecting VoLTE: Exploiting Free Data Channels and Security Problems}
\subitem{Advisor: Prof. Yongdae Kim}
\timeitem{B.S. in School of Computing}{Feb. 2010 -- Feb. 2014}
\end{timeitemize}
\begin{timeitemize}[France]{EURECOM}{}
\timeitem{Visiting Scholar in Software and System Security}{Jun. 2014 -- Jul. 2014}
\subitem{Learned embedded device analysis techniques, particularly for
debugging interfaces}
\subitem{Advisor: Prof. Aur\'elien Francillon}
\end{timeitemize}
\clearpage
% ========================================
% Work Experience
% ========================================
\sectiontitle{Work Experience}
\begin{timeitemize}[Research Intern, South Korea]{Pinion Industries}{Dec. 2013 -- Feb. 2014}
\item Analyzed CAN, infotainment systems, telematics, smartkey, and ECUs of automobiles
\item CEO: Woongjun Jang (VP at Hyundai Motor Company as of Jan. 2021)
\end{timeitemize}
\begin{timeitemize}[Consultant, South Korea]{KAIST Computer Emergency Response Team}{Sep. 2010 -- Aug. 2012}
\item Conducted periodic penetration testing on servers under the KAIST domain ($\ast$.kaist.ac.kr)
\item Performed real-time/postmortem analysis of intrusion cases on the servers
\end{timeitemize}
% ========================================
% Honors & Awards
% ========================================
\sectiontitle{Honors \& Awards}
\begin{timeitemize}{Hacking (\ie, Capture-the-flag, CTF) contests}{}
\timeitem{Finalist, DEFCON 27 CTF}{(Team KaisHack GoN) Aug. 2019}
\timeitem{Finalist, DEFCON 26 CTF}{(Team KaisHack+PLUS+GoN) Aug. 2018}
\timeitem{1st place (\$20,000), HDCON CTF}{(Team maxlen) Nov. 2017}
\timeitem{1st place (\$30,000), Whitehat Contest}{(Team Old GoatskiN) Nov. 2017}
\timeitem{3rd place (\$5,000), Codegate CTF}{(Team Old GoatskiN) Apr. 2017}
\timeitem{Finalist, DEFCON 24 CTF}{(Team KaisHack GoN) Aug. 2016}
\timeitem{1st place (\$20,000), Whitehat Contest}{(Team SysSec) Nov. 2014}
\timeitem{Finalist, DEFCON 22 CTF}{(Team KAIST GoN) Aug. 2014}
\timeitem{Silver prize (\$2,000), HDCON CTF}{(Team GoN) Dec. 2013}
\timeitem{1st place (\$20,000), Whitehat Contest}{(Team KAIST GoN) Oct. 2013}
\timeitem{Finalist, DEFCON 20 CTF}{(Team KAIST GoN) Jul. 2012}
\timeitem{Silver prize (\$2,000), HDCON CTF}{(Team KAIST GoN) Jul. 2012}
\timeitem{3rd place (\$5,000), Codegate CTF 2012}{(Team KAIST GoN) Apr. 2012}
\timeitem{1st place (\$10,000), ISEC CTF}{(Team GoN) Sep. 2011}
\timeitem{1st place (\$1,000), PADOCON CTF}{(Team GoN) Jan, 2011}
\end{timeitemize}
\begin{timeitemize}{Academic Awards}{}
\timeitem{Best Presentation Award, A3 Security Workshop}{Aug. 2015}
\subitem{Title: Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations}
\timeitem{Best Paper Award, WISA}{Aug. 2015}
\subitem{Title: BurnFit: Analyzing and Exploiting Wearable Devices}
\end{timeitemize}
\begin{timeitemize}{Reported Security Vulnerabilties}{}
\timeitem{CVE-2015-6614, Android telephony privilege escalation, Google}{Oct. 2015}
\end{timeitemize}
\begin{timeitemize}{Certificates}{}
\timeitem{Engineer Information Security (\ie, 정보보안기사), South Korea}{Jun. 2016}
\timeitem{Engineer Information Processing (\ie, 정보처리기사), South Korea}{May 2013}
\end{timeitemize}
\begin{timeitemize}{Scholarships}{}
\timeitem{National Scholarship (Science and Engineering), Korea Student Aid Foundation}{Feb. 2010 -- Feb. 2020}
\end{timeitemize}
\clearpage
% ========================================
% Patents
% ========================================
\sectiontitle{Patents}
\begin{timeitemize}{International Registrations}{}
\timeitem{US 10111120}{Oct. 2018}
\subitem{Method and Apparatus for Checking Problem in Mobile Communication Network}
\end{timeitemize}
\begin{timeitemize}[South Korea]{Domestic Registrations}{}
\timeitem{KR 10-1972825-0000}{Apr. 2019}
\subitem{Method and apparatus for automatically analyzing vulnerable point
of embedded appliance by using hybrid analysis technology, and computer
program for executing the method}
\timeitem{KR 10-1868836-0000}{Jun. 2018}
\subitem{A method to attack commercial drones using the resonance effect of
gyroscopes by sound waves}
\end{timeitemize}
\begin{timeitemize}{Applications}{}
\timeitem{KR 10-2021-0136352}{Oct. 2021}
\subitem{METHOD FOR PREVENTING MAPPING OF USER IDENTIFIERS IN MOBILE COMMUNICATION SYSTEM AND THE SYSTEM THEREOF}
\timeitem{KR 10-2021-0088806}{Jul. 2021}
\subitem{VIDEO IDENTIFICATION METHOD IN LTE NETWORKS AND THE SYSTEM THEREOF}
\timeitem{KR 10-2021-0040795}{Mar. 2021}
\subitem{ANALYSIS SYSTEM FOR DETECTION OF SIP IN VoLTE AND THE METHOD THEREOF}
\timeitem{KR 10-2020-0177062}{Dec. 2020}
\subitem{Analysis method for detection of SIP implementation vulnerability in VoLTE}
\timeitem{KR 10-2020-0133926}{Oct. 2020}
\subitem{Method to prevent mapping of user identifiers in mobile communication system}
\timeitem{KR 10-2020-0133925}{Oct. 2020}
\subitem{APPARATUS AND METHOD FOR VIDEO TITLE IDENTIFICATION OF MOBILE
COMMUNICATION NETWORK USING ENCRYPTED TRAFFIC MONITORING}
\timeitem{KR 10-2019-0005131}{Jan. 2019}
\subitem{Large-scale honeypot system IoT botnet analysis}
\timeitem{KR 10-2018-0036403}{Mar. 2018}
\subitem{Dynamic analysis method for malicious embedded firmware detection}
\timeitem{KR 10-2018-0036055}{Mar. 2018}
\subitem{Emulation based security analysis method for embedded devices}
\timeitem{KR 10-2018-0037291}{Mar. 2018}
\subitem{Binary-Level Virtual Function Call Protection Method by Saving Type Information}
\timeitem{KR 10-2018-0034616}{Mar. 2018}
\subitem{ARCHITECTURE-INDEPENDENT SIMILARITY MEASURING METHOD FOR PROGRAM FUNCTION}
\timeitem{KR 10-2017-0002925}{Jan. 2017}
\subitem{Method and Apparatus for Checking Problem in Mobile Communication Network}
\end{timeitemize}
\clearpage
% ========================================
% Publications
% ========================================
\sectiontitle{Publications}
($\ast$: co-first authors)
\begin{enumerate}[leftmargin=1.5em]
\item \textbf{Watching the Watchers: Practical Video Identification Attack
in LTE Networks} \\
{\small
Sangwook Bae, Mincheol Son, \iam{Dongkwan Kim}, CheolJun Park, Jiho Lee, Sooel Son, and Yongdae Kim \\
Proceedings of the 31st USENIX Security Symposium (Security'22) \\
Aug. 2022
}
\item \textbf{Enabling the Large-Scale Emulation of Internet of Things
Firmware With Heuristic Workarounds} \\
{\small
\iam{Dongkwan Kim}, Eunsoo Kim, Mingeun Kim, Yeongjin Jang, and Yongdae Kim \\
IEEE Security \& Privacy \\
May 2021
}
\item \textbf{Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned} \\
{\small
\iam{Dongkwan Kim}, Eunsoo Kim, Sang Kil Cha, Sooel Son, and Yongdae Kim \\
Under Major Revision to IEEE Transactions on Software Engineering
(TSE'21) \\
Apr. 2021
}
\item \textbf{BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols} \\
{\small
\iam{Dongkwan Kim$^\ast$}, Eunsoo Kim$^\ast$, CheolJun Park, Insu Yun, and Yongdae Kim \\
Proceedings of the 2021 Annual Network and Distributed System Security Symposium (NDSS'21) \\
Virtual, Feb. 2021 \\
Acceptance rate: 15.18\% (87 of 573)
}
\item \textbf{FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis} \\
{\small
Mingeun Kim, \iam{Dongkwan Kim}, Eunsoo Kim, Suryeon Kim, Yeongjin Jang, and Yongdae Kim \\
Proceedings of the 2020 Annual Computer Security Applications Conference (ACSAC'20)\\
Virtual, Dec. 2020 \\
Acceptance rate: 23.18\% (70 of 302)
}
\item \textbf{Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO} \\
{\small
Sangsup Lee, Daejun Kim, \iam{Dongkwan Kim}, Sooel Son, and Yongdae Kim \\
Proceedings of the 13th USENIX Workshop on Offensive Technologies (WOOT'19) \\
Santa Clara, CA, Aug. 2019
}
\item \textbf{Peeking over the Cellular Walled Gardens - A Method for Closed Network Diagnosis} \\
{\small
Byeongdo Hong, Shinjo Park, Hongil Kim, \iam{Dongkwan Kim}, Hyunwook Hong, Hyunwoo Choi, Jean-Pierre Seifert, Sung-Ju Lee, and Yongdae Kim \\
IEEE Transactions on Mobile Computing (TMC'18) \\
Feb. 2018
}
\item \textbf{When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks} \\
{\small
Hyunwook Hong, Hyunwoo Choi, \iam{Dongkwan Kim}, Hongil Kim, Byeongdo Hong, Jiseong Noh, and Yongdae Kim \\
Proceedings of the 2nd IEEE European Symposium on Security and Privacy (EuroS\&P'17)\\
Paris, France, Apr. 2017 \\
Acceptance rate: 19.58\% (38 of 194)
}
\item \textbf{Pay As You Want: Bypassing Charging System in Operational Cellular Networks} \\
{\small
Hyunwook Hong, Hongil Kim, Byeongdo Hong, \iam{Dongkwan Kim}, Hyunwoo Choi, Eunkyu Lee and Yongdae Kim \\
Proceedings of the 17th International Workshop on Information Security Applications (WISA'16)\\
Jeju, South Korea, Aug. 2016
}
\item \textbf{Dissecting VoLTE: Exploiting Free Data Channels and Security Problems} \\
{\small
\iam{Dongkwan Kim} \\
M.S. Thesis, KAIST \\
Daejeon, South Korea, Feb. 2016
}
\item \textbf{Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations} \\
{\small
\iam{Dongkwan Kim$^\ast$}, Hongil Kim$^\ast$, Minhee Kwon, Hyungseok Han, Yeongjin Jang, Dongsu Han, Taesoo Kim, and Yongdae Kim \\
Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS'15) \\
Denver, CO, Oct. 2015 \\
Acceptance rate: 19.81\% (128 of 646)
}
\item \textbf{BurnFit: Analyzing and Exploiting Wearable Devices} \\
{\small
\iam{Dongkwan Kim}, Suwan Park, Kibum Choi, Yongdae Kim \\
Proceedings of the 16th International Workshop on Information Security Applications (WISA'15) \\
Jeju, South Korea, Aug. 2015
}
\item \textbf{Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors} \\
{\small
Yunmok Son, Hocheol Shin, \iam{Dongkwan Kim}, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, and Yongdae Kim \\
Proceedings of the 24th USENIX Security Symposium (Security'15) \\
Austin, TX, Aug. 2015 \\
Acceptance rate: 15.73\% (67 of 426)
}
\item \textbf{Analyzing Security of Korean USIM-based PKI Certificate Service} \\
{\small
Shinjo Park, Suwan Park, Insu Yun, \iam{Dongkwan Kim}, Yongdae Kim \\
Proceedings of the 15th International Workshop on Information Security Applications (WISA'14) \\
Jeju, South Korea, Aug. 2014
}
\item \textbf{High-speed automatic segmentation of intravascular stent struts in optical coherence tomography images} \\
{\small
Proceedings of SPIE Biomedical Optics, Photonics West 2013 (BiOS'13) \\
Myounghee Han, \iam{Dongkwan Kim}, Wang-Yuhl Oh, and Sukyoung Ryu \\
San Francisco, CA, Feb. 2013
}
\end{enumerate}
\clearpage
% ========================================
% Invited Presentations
% ========================================
\sectiontitle{Invited Presentations}
\begin{timeitemize}{BaseSpec: Comparative Analysis of Baseband Software and
Cellular Specifications for L3 Protocols}{}
\timeitem{Annual Network and Distributed System Security Symposium}{Virtual, Feb. 2021}
\timeitem{KAIST-CISPA Workshop}{Virtual, Feb. 2021}
\end{timeitemize}
\subsectiontitle{Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations}{} \\
\begin{timeitemize}{A.k.a. Dissecting VoLTE: Exploiting Free Data Channels and Security Problems}{}
\timeitem{GSMA RCS/VoLTE Security Regulatory workshop}{Toronto, Canada, Sep. 2016}
\timeitem{A3 Foresight Program Annual Workshop}{Okinawa, Japan, Feb. 2016}
\timeitem{Chaos Communication Congress (CCC) Conference (32C3)}{Hamburg, Germany, Dec. 2015}
\timeitem{National Security Research}{Daejeon, South Korea, Nov. 2015}
\timeitem{Power of Community (PoC) Conference}{Seoul, South Korea, Nov. 2015}
\timeitem{ACM Conference on Computer and Communications Security (CCS)}{Denver, CO, Oct. 2015}
\timeitem{Seminar at the Georgia Institute of Technology}{Atlanta, GA, Oct. 2015}
\end{timeitemize}
\begin{timeitemize}{BurnFit: Analyzing and Exploiting Wearable Devices}{}
\timeitem{16th WISA}{Jeju, South Korea, Aug. 2015}
\end{timeitemize}
\begin{timeitemize}{International CTF Challenge Solving}{}
\timeitem{NetSec-KR}{Seoul, South Korea, Apr. 2013}
\end{timeitemize}
% ========================================
% Professional Activities
% ========================================
\sectiontitle{Professional Activities}
\begin{timeitemize}{Secondary Reviewer (Security)}{}
\timeitem{IEEE Symposium on Security and Privacy (Oakland)}{2021}
\timeitem{USENIX Security Symposium (Security)}{2019 -- 2021}
\timeitem{Network and Distributed System Security Symposium (NDSS)}{2017 -- 2018, 2020 -- 2021}
\timeitem{ACM Conference on Computer and Communications Security (CCS)}{2017, 2019 -- 2021}
\timeitem{IEEE European Symposium on Security and Privacy (EuroS\&P)}{2016, 2018, 2020}
\timeitem{ACM ASIA Conference on Computer and Communications Security (ASIACCS)}{2016 -- 2017, 2019 -- 2020}
\timeitem{The WEB Conference (WWW)}{2018, 2020}
\timeitem{International Symposium on Research in Attacks, Intrusions and Defenses (RAID)}{2017}
\timeitem{IEEE Symposium on Privacy-Aware Computing (PAC)}{2017}
\end{timeitemize}
\begin{timeitemize}{Secondary Reviewer (System)}{}
\timeitem{ACM Symposium on Operating Systems Principles (SOSP)}{2019}
\timeitem{Symposium on Operating Systems Design and Implementation (OSDI)}{2016}
\end{timeitemize}
\begin{timeitemize}{External Security Consultant}{}
\timeitem{KAIST Computer Emergency Response Team}{Sep. 2012 -- Feb. 2022}
\end{timeitemize}
\clearpage
% ========================================
% Projects
% ========================================
\sectiontitle{Participated Projects}
($\ast$: participated as a project leader)
\begin{timeitemize}{Industrial Projects}{}
\timeitem{An Industry-academia Task with Samsung Electronics Device Solutions Business}{Jun. 2020 -- Aug. 2020}
\subitem{Samsung Electronics}
\timeitem{$^\ast$Organizing 2018 Samsung Capture-the-flag (SCTF)}{Apr. 2018 -- Oct. 2018}
\subitem{Samsung Electronics}
\timeitem{$^\ast$Organizing 2017 Samsung Capture-the-flag (SCTF)}{Dec. 2016 -- Dec. 2017}
\subitem{Samsung Electronics}
\timeitem{A Study on the Security Vulnerability Analysis and Response Method of LTE \\ Networks}{Aug. 2016 -- Jul. 2017}
\subitem{SK Telecom}
\timeitem{A Security Vulnerability Analysis of Smartcar Core Modules}{Jul. 2016 -- Jun. 2017}
\subitem{Hyundai NGV}
\timeitem{A Study on the Security Analysis and Response Method of LTE Networks}{Aug. 2015 -- Apr. 2016}
\subitem{SK Telecom}
\timeitem{A Security Analysis of Samsung SmartTV 2014}{Feb. 2014 -- Dec. 2015}
\subitem{Samsung Electronics}
\end{timeitemize}
\begin{timeitemize}{International Projects}{}
\timeitem{$^\ast$Cyber Physical Analysis of System Software Survivability by Stimulating Sensors \\ on Drones}{Jun. 2020 -- May 2021}
\subitem{Air Force Office of Scientific Research (AFOSR), Air Force Research \\
Laboratory (AFRL)}
\end{timeitemize}
\begin{timeitemize}{Governmental Projects}{}
\timeitem{$^\ast$A Study on the Android-based Security Analysis Technology}{May 2020 -- Dec. 2020}
\subitem{National Security Research (NSR)}
\timeitem{A Study on the Security of Random Number Generator and Embedded Devices}{Jul. 2017 -- Jun. 2019}
\subitem{Institute for Information \& Communications Technology Planning \& \\ Evaluation (IITP)}
\timeitem{$^\ast$A Study on the Firmware Emulation Technology for Linux-based Routers}{May 2017 -- Oct. 2017}
\subitem{NSR}
\timeitem{A Development of Automated Reverse Engineering and Vulnerability Detection \\ Base Technology through Binary Code Analysis}{Apr. 2016 -- Dec. 2018}
\subitem{IITP}
\timeitem{$^\ast$A CAPTCHA Design based on Human Perception Characteristics}{Apr. 2016 -- Dec. 2016}
\subitem{KAIST}
\timeitem{$^\ast$A Study on the Vulnerability Analysis Method of Domestic/International \\ Smartcars}{Apr. 2015 -- Nov. 2015}
\subitem{NSR}
\timeitem{A Study on the Analysis of Technology and Security Threats in LTE Femtocell}{Sep. 2013 -- Jan. 2014}
\subitem{Korea Internet \& Security Agency (KISA)}
\timeitem{A Study on the Analysis and Response Method of Vulnerabilities in Network \\ Devices}{Mar. 2013 -- Dec. 2013}
\subitem{NSR}
\timeitem{A Study on the Vulnerability Analysis of Network Devices}{Apr. 2011 -- Oct. 2011}
\subitem{NSR}
\end{timeitemize}
\clearpage
% ========================================
% Other Activities
% ========================================
\sectiontitle{Other Activities}
\begin{timeitemize}{}{}
\vspace{-1.0em}
\timeitem{Student Representative of School of Computing, KAIST}{Feb. 2011 -- Dec. 2013}
\end{timeitemize}
% ========================================
% Teaching Experience
% ========================================
\sectiontitle{Teaching Experience}
\begin{timeitemize}{}{}
\vspace{-1.0em}
\timeitem{Teaching Assistant, Introduction to Electronics Design Lab. (EE305), KAIST}{Fall 2019}
\timeitem{Teaching Assistant, Discrete Methods for Electrical Engineering (EE213), KAIST}{Spring 2017}
\timeitem{Teaching Assistant, Network Programming (EE324), KAIST}{Fall 2016}
\timeitem{Teaching Assistant, Cryptography Engineering (EE817/IS893), KAIST}{Spring 2016}
\timeitem{Teaching Assistant, Security 101: Think Like an Adversary (EE515/IS523), KAIST}{Fall 2015}
\timeitem{Head Instructor, Information Security 101 for Freshmen (HSS062), KAIST}{Sep. 2011 -- Feb. 2013}
\timeitem{Teaching Assistant, Information Security 101 for Freshmen (HSS062), KAIST}{Sep. 2010 -- Aug. 2011}
\end{timeitemize}
% ========================================
% List of References
% ========================================
\sectiontitle{List of References}
\begin{timeitemize}{Dr. Yongdae Kim}{}
\item Chair Professor, KAIST
\item Professor, School of Electrical Engineering and Graduate School of Information Security, KAIST
\item Email: \email{[email protected]}
\item Homepage: \url{https://syssec.kaist.ac.kr/~yongdaek/}
\end{timeitemize}
\begin{timeitemize}{Dr. Sang Kil Cha}{}
\item Director, Cyber Sercurity Research Center (CSRC), KAIST
\item Associate Professor, School of Computing and Graduate School of Information Security, KAIST
\item Email: \email{[email protected]}
\item Homepage: \url{https://softsec.kaist.ac.kr/~sangkilc/}
\end{timeitemize}
\begin{timeitemize}{Dr. Sooel Son}{}
\item Associate Professor, School of Computing and Graduate School of Information Security, KAIST
\item Email: \email{[email protected]}
\item Homepage: \url{https://sites.google.com/site/ssonkaist/}
\end{timeitemize}
\begin{timeitemize}{Dr. Yeongjin Jang}{}
\item Assistant Professor, Computer Science, Oregon State University
\item Email: \email{[email protected]}
\item Homepage: \url{http://people.oregonstate.edu/~jangye}
\end{timeitemize}
\begin{timeitemize}{Dr. Insu Yun}{}
\item Assistant Professor, School of Electrical Engineering and Graduate School of Information Security, KAIST
\item Email: \email{[email protected]}
\item Homepage: \url{https://insuyun.github.io/}
\end{timeitemize}
\begin{timeitemize}{Dr. Sukyoung Ryu}{}
\item Head, School of Computing, KAIST
\item Professor, School of Computing, KAIST
\item Email: \email{[email protected]}
\item Homepage: \url{https://plrg.kaist.ac.kr/ryu}
\end{timeitemize}