Taegyu Kim
Taegyu Kim
Pennsylvania State University, College of Information Sciences and Technology
Verified email at - Homepage
Cited by
Cited by
Securing Real-Time Microcontroller Systems through Customized Memory View Switching.
CH Kim, T Kim, H Choi, Z Gu, B Lee, X Zhang, D Xu
NDSS, 2018
Learning from the ones that got away: Detecting new forms of phishing attacks
CN Gutierrez, T Kim, R Della Corte, J Avery, D Goldwasser, M Cinque, ...
IEEE Transactions on Dependable and Secure Computing 15 (6), 988-1001, 2018
RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing
T Kim, CH Kim, J Rhee, F Fei, Z Tu, G Walkup, X Zhang, X Deng, D Xu
28th USENIX Security Symposium (USENIX Security 19), 425-442, 2019
Cross-layer retrofitting of UAVs against cyber-physical attacks
F Fei, Z Tu, R Yu, T Kim, X Zhang, D Xu, X Deng
2018 IEEE International Conference on Robotics and Automation (ICRA), 550-557, 2018
RevARM: A platform-agnostic ARM binary rewriter for security applications
T Kim, CH Kim, H Choi, Y Kwon, B Saltaformaggio, X Zhang, D Xu
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications
T Kim, V Kumar, J Rhee, J Chen, K Kim, CH Kim, D Xu, DJ Tian
30th USENIX Security Symposium (USENIX Security 21), 249-266, 2021
From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY
T Kim, CH Kim, A Ozen, F Fei, Z Tu, X Zhang, X Deng, DJ Tian, D Xu
29th USENIX Security Symposium (USENIX Security 20), 913-930, 2020
DnD: A Cross-Architecture Deep Neural Network Decompiler
R Wu, T Kim, DJ Tian, A Bianchi, D Xu
31st USENIX Security Symposium (USENIX Security 22), 2135-2152, 2022
Reverse engineering and retrofitting robotic aerial vehicle control firmware using dispatch
T Kim, A Ding, S Etigowni, P Sun, J Chen, L Garcia, S Zonouz, D Xu, ...
Proceedings of the 20th Annual International Conference on Mobile Systems …, 2022
FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks
K Kim, T Kim, E Warraich, B Lee, KRB Butler, A Bianchi, DJ Tian
2022 IEEE Symposium on Security and Privacy (SP), 632-649, 2022
Shadowauth: Backward-compatible automatic can authentication for legacy ecus
S Kim, G Yeo, T Kim, JJ Rhee, Y Jeon, A Bianchi, D Xu, D Tian
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
I-Filter: Identical Structured Control Flow String filter for accelerated malware variant classification
T Kim, W Hwang, KW Park, KH Park
2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014
Malfinder: Accelerated malware classification system through filtering on manycore system
T Kim, W Hwang, C Kim, DJ Shin, KW Park, KH Park
2015 International Conference on Information Systems Security and Privacy …, 2015
Cyber-Physical Analysis and Hardening of Robotic Aerial Vehicle Controllers
T Kim
Purdue University, 2021
MalCore: Toward a Practical Malware Identification System Enhanced with Manycore Technology
T Kim, KW Park
Information Systems Security and Privacy: First International Conference …, 2015
DnD: Decompiling Deep Neural Network Compiled Binary
R Wu, T Kim, DJ Tian, A Bianchi, D Xu
The system can't perform the operation now. Try again later.
Articles 1–16