Kangbin Yim
YOU?
Author Swipe
View article: Enhancing Automotive Security with a Hybrid Approach towards Universal Intrusion Detection System
Enhancing Automotive Security with a Hybrid Approach towards Universal Intrusion Detection System Open
Security measures are essential in the automotive industry to detect intrusions in-vehicle networks. However, developing a one-size-fits-all Intrusion Detection System (IDS) is challenging because each vehicle has unique data profiles. Thi…
View article: Advancements in Vehicle Intrusion Detection Systems: Enhancing Cybersecurity in Intelligent Transportation
Advancements in Vehicle Intrusion Detection Systems: Enhancing Cybersecurity in Intelligent Transportation Open
Advancements in in-vehicle Intrusion Detection Systems (IDS) are critical to addressing cybersecurity challenges in modern intelligent transportation. This chapter explores vulnerabilities inherent in Controller Area Network (CAN) protocol…
View article: Threat Classification and Vulnerability Analysis on 5G Firmware Over-the-Air Updates for Mobile and Automotive Platforms
Threat Classification and Vulnerability Analysis on 5G Firmware Over-the-Air Updates for Mobile and Automotive Platforms Open
The integration of 5G technology with existing LTE architectures has facilitated the widespread adoption of firmware over-the-air (FOTA) updates across Android-based devices, including mobile and automotive infotainment systems. While 5G e…
View article: Adaptive RNN Hyperparameter Tuning for Optimized IDS Across Platforms
Adaptive RNN Hyperparameter Tuning for Optimized IDS Across Platforms Open
Modern vehicles are increasingly vulnerable to cyber-attacks due to the lack of encryption and authentication in the Controller Area Network, which coordinates communication between Electronic Control Units. This study investigates the use…
View article: Security Assessment of in-Vehicle Network Intrusion Detection in Real-Life Scenarios
Security Assessment of in-Vehicle Network Intrusion Detection in Real-Life Scenarios Open
This research focuses on evaluating the security of an intrusion detection system in a CAN bus-based vehicle control network. A series of studies were conducted to evaluate the performance of models proposed by previous researchers, testin…
View article: LPMSAEF: Lightweight process mining-based software architecture evaluation framework for security and performance analysis
LPMSAEF: Lightweight process mining-based software architecture evaluation framework for security and performance analysis Open
The article discusses the need for a lightweight software architecture evaluation framework that can address practitioners' concerns. Specifically, the proposed framework uses process mining and Petri nets to analyze security and performan…
View article: Security of 6G-Enabled Vehicle-to-Everything Communication in Emerging Federated Learning and Blockchain Technologies
Security of 6G-Enabled Vehicle-to-Everything Communication in Emerging Federated Learning and Blockchain Technologies Open
Sixth-generation (6G) communication is emerging as a seamless and massive connection of almost all digital devices. Vehicles, which are extensively linked with human mobility, must keep up with a certain technological pace to maintain comp…
View article: CF-AIDS: Comprehensive Frequency-Agnostic Intrusion Detection System on In-Vehicle Network
CF-AIDS: Comprehensive Frequency-Agnostic Intrusion Detection System on In-Vehicle Network Open
Many studies have focused on obtaining high accuracy in the design of Intrusion Detection Systems (IDS) for in-vehicle networks, neglecting the significance of different intensive packet injection techniques. Because of their reliance on s…
View article: Analysis of Key Storage Mechanism of Asymmetric Key-Related Functions in CNG Crypto Library
Analysis of Key Storage Mechanism of Asymmetric Key-Related Functions in CNG Crypto Library Open
During the implementation of a crypto system, distributed cryptographic libraries are unable to endure situations where the execution environment rapidly changes because of a structural vulnerability that is by design. For this reason, Mic…
View article: CANPerFL: Improve In-Vehicle Intrusion Detection Performance by Sharing Knowledge
CANPerFL: Improve In-Vehicle Intrusion Detection Performance by Sharing Knowledge Open
The Controller Area Network (CAN) is a widely used communication protocol in automobiles, but it is vulnerable to various types of attacks. To address this issue, researchers have been exploring the use of intrusion detection systems (IDS)…
View article: Neutralization Method of Ransomware Detection Technology Using Format Preserving Encryption
Neutralization Method of Ransomware Detection Technology Using Format Preserving Encryption Open
Ransomware is one type of malware that involves restricting access to files by encrypting files stored on the victim’s system and demanding money in return for file recovery. Although various ransomware detection technologies have been int…
View article: Vulnerability Analysis and Security Assessment of Secure Keyboard Software to Prevent PS/2 Interface Keyboard Sniffing
Vulnerability Analysis and Security Assessment of Secure Keyboard Software to Prevent PS/2 Interface Keyboard Sniffing Open
Online security threats have arisen through Internet banking hacking cases, and highly sensitive user information such as the ID, password, account number, and account password that is used for online payments has become vulnerable. Many s…
View article: Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services
Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services Open
A variety of data-based services such as cloud services and big data-based services have emerged in recent times. These services store data and derive the value of the data. The reliability and integrity of the data must be ensured. Unfort…
View article: Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack
Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack Open
According to the Fire-eye’s M-Trends Annual Threat Report 2022, there are many advanced persistent threat (APT) attacks that are currently in use, and such continuous and specialized APT attacks cause serious damages attacks. As APT attack…
View article: Performance Evaluation of Phishing Classification Techniques on Various Data Sources and Schemes
Performance Evaluation of Phishing Classification Techniques on Various Data Sources and Schemes Open
Phishing attacks have become a perilous threat in recent years, which has led to numerous studies to determine the classification technique that best detects these attacks. Several studies have made comparisons using only specific datasets…
View article: Breast Cancer Cell Data Analysis and Visualization Using R
Breast Cancer Cell Data Analysis and Visualization Using R Open
Breast cancer is the most frequently occurring cancer in women. If the cancer is diagnosed and treated at an early stage, the patient has a survival rate of 99% after 5 years, but it significantly drops to 29% when it reaches a distant sta…
View article: Analysis against Security Issues of Voice over 5G
Analysis against Security Issues of Voice over 5G Open
In Feb 2021, As the competition for commercialization of 5G mobile communication has been increasing, 5G SA Network and Vo5G are expected to be commercialized soon. 5G mobile communication aims to provide 20 Gbps transmission speed which i…
View article: Towards 5G-based IoT security analysis against Vo5G eavesdropping
Towards 5G-based IoT security analysis against Vo5G eavesdropping Open
With the advent of 5G technology, the enhanced Mobile Broadband technology is translating 5G-based Internet of Things (IoT) such as smart home/building into reality. With such advances, security must mitigate greater risks associated with …
View article: Offensive Security of Keyboard Data Using Machine Learning for Password Authentication in IoT
Offensive Security of Keyboard Data Using Machine Learning for Password Authentication in IoT Open
In this paper, to increase the attack success rate, we analyzed the distribution of all collected keyboard data based on the distance of time and keyboard scancode data, which presents the crucial data from the previous study. To achieve t…
View article: Study on the transaction linkage technique combined with the designated terminal for 5G-enabled IoT
Study on the transaction linkage technique combined with the designated terminal for 5G-enabled IoT Open
With the growth of the scale of the market for Internet banking and e-commerce, the number of Internet-based financial markets has been increasing. Meanwhile, hacking incidents continuously affect Internet-banking services. For this reason…
View article: A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments
A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments Open
The Internet of Things (IoT) environment consists of numerous devices. In general, IoT devices communicate with each other to exchange data, or connect to the Internet through a gateway to provide IoT services. Most IoT devices participati…
View article: Classification and Analysis of Security Techniques for the User Terminal Area in the Internet Banking Service
Classification and Analysis of Security Techniques for the User Terminal Area in the Internet Banking Service Open
As the Internet banking service has become popular, many users have been able to exchange goods online. Even though this offers advantage, there are cases of incidents in the Internet banking service arising from security threats. In order…
View article: Better Not to Use Vulnerability’s Reference for Exploitability Prediction
Better Not to Use Vulnerability’s Reference for Exploitability Prediction Open
About half of all exploit codes will become available within about two weeks of the release date of its vulnerability. However, 80% of the released vulnerabilities are never exploited. Since putting the same effort to eliminate all vulnera…
View article: Service Oriented Multimedia Delivery System in Pervasive Environments
Service Oriented Multimedia Delivery System in Pervasive Environments Open
Service composition is an effective approach for large-scale multimedia delivery. In previous works, user requirement is represented as one fixed functional path which is composed of several functional components in a certain order. Actual…
View article: Cybersecurity Threats Based on Machine Learning-Based Offensive Technique for Password Authentication
Cybersecurity Threats Based on Machine Learning-Based Offensive Technique for Password Authentication Open
Due to the emergence of online society, a representative user authentication method that is password authentication has been a key topic. However, in this authentication method, various attack techniques have emerged to steal passwords inp…
View article: A Novel Message-Preserving Scheme with Format-Preserving Encryption for Connected Cars in Multi-Access Edge Computing
A Novel Message-Preserving Scheme with Format-Preserving Encryption for Connected Cars in Multi-Access Edge Computing Open
In connected cars with various electronic control unit (ECU) modules, Ethernet is used to communicate data received by the sensor in real time, but it is partially used alongside a controller area network (CAN) due to the cost. There are s…
View article: Machine Learning Based File Entropy Analysis for Ransomware Detection in Backup Systems
Machine Learning Based File Entropy Analysis for Ransomware Detection in Backup Systems Open
With the advent of big data and cloud services, user data has become an important issue. Although a variety of detection and prevention technologies are used to protect user data, ransomware that demands money in exchange for one's data ha…
View article: BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems
BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems Open
The identification of vulnerabilities in a mission-critical system is one of the challenges faced by a cyber-physical system (CPS). The incorporation of embedded Internet of Things (IoT) devices makes it tedious to identify vulnerability a…
View article: A Study on a Secure USB Mechanism That Prevents the Exposure of Authentication Information for Smart Human Care Services
A Study on a Secure USB Mechanism That Prevents the Exposure of Authentication Information for Smart Human Care Services Open
The secure USB flash drive was developed to improve the security of the conventional USB flash drive, which is vulnerable to leakages of internally stored data caused by extortion, loss, etc. However, it has been continuously reported that…
View article: Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey
Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey Open
Unmanned Aerial Vehicles (UAV)-based civilian or military applications become more critical to serving civilian and/or military missions. The significantly increased attention on UAV applications also has led to security concerns particula…