Dr. Yongdae Kim, Director, KAIST Chair Professor, Electrical Engineering and GSIS, KAIST

Despite known vulnerabilities in cellular networks, standardization bodies like GSMA and 3GPP have been reluctant to implement comprehensive security fixes, often claiming 'no one exploits these vulnerabilities'. To demonstrate real-world exploitability of these vulnerabilities, we present Cellular Metasploit, a penetration testing framework for cellular networks. This framework systematically catalogs and implements known attacks, providing essential security insights for future 6G design, security-enhanced 5G implementations, and safety-critical private networks. In this talk, I will demonstrate its capabilities and discuss how it can drive transparent security discussions in cellular network design.

Speaker's Biography: Yongdae Kim (IEEE Fellow) is a Professor in the Department of Electrical Engineering and the Graduate School of Information Security at KAIST, where he heads the Police Science and Technology Research Center. He received his PhD in Computer Science from the University of Southern California in 2002. From 2002 to 2012, he was a professor at the University of Minnesota - Twin Cities. At KAIST, he served as Chair Professor (2013-2016) and directed the Cyber Security Research Center (2018-2020). He has served as steering committee chair for NDSS (2024), program chair for ACM WiSec (2022), general chair for ACM CCS (2021), and associate editor for ACM TOPS. His research focuses on discovering and analyzing security vulnerabilities in emerging technologies, particularly drones, autonomous vehicles, and cellular networks.

View More Papers

The Road to Trust: Building Enclaves within Confidential VMs

Wenhao Wang (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS), Linke Song (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS), Benshan Mei (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS), Shuang Liu (Ant Group), Shijun Zhao (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering,…

Read More

Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication...

Jung-Woo Chang (University of California, San Diego), Ke Sun (University of California, San Diego), Nasimeh Heydaribeni (University of California, San Diego), Seira Hidano (KDDI Research, Inc.), Xinyu Zhang (University of California, San Diego), Farinaz Koushanfar (University of California, San Diego)

Read More

No Source Code? No Problem! Twenty Years of Research...

Jack W. Davidson, Professor of Computer Science in the School of Engineering and Applied Science, University of Virginia

Read More

DShield: Defending against Backdoor Attacks on Graph Neural Networks...

Hao Yu (National University of Defense Technology), Chuan Ma (Chongqing University), Xinhang Wan (National University of Defense Technology), Jun Wang (National University of Defense Technology), Tao Xiang (Chongqing University), Meng Shen (Beijing Institute of Technology, Beijing, China), Xinwang Liu (National University of Defense Technology)

Read More