Physical: 117 Bundangnaegok-ro, Bundang, Seongnam, Republic of Korea
Email: [Show Address]
Cyber-physical & safety-critical systems (e.g. drones, autonomous cars, and medical devices) security [learn more about it]: security testing of cyber-physical systems and devising countermeasures
Sensor attacks and defenses [learn more about it]
(Physical) adversarial machine learning [learn more about it]
Wireless signal analysis and reversing using software-defined radios
Applying AI/ML framework for security purposes
Jan 2022–Current
Senior Research Engineer at Hyundai Motors
Mar 2020–Dec 2021
Senior Engineer at Samsung SDS
Mar 2013–Feb 2020
Graduate student at System Security Laboratory, School of Electrical Engineering, KAIST
Feb 2009–Mar 2011
Trombone player at Republic of Korea Air Force Academy Band
Honorably discharged as staff sergeant, Republic of Korea Air ForceLightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting
Dohyun Kim, Mangi Cho, Hocheol Shin, Jaehoon Kim, Juhwan Noh, and Yongdae KimACM Transactions on Privacy and Security Vol 26 Issue 4: 46 (TOPS 2023)Co-first authored with Dohyun Kim and Mangi ChoSoK: A Minimalist Approach to Formalizing Analog Sensor Security
Chen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, and Kevin FuIEEE Symposium on Security and Privacy (IEEE S&P) 2020Co-first authored with Chen Yan and Connor BoltonTractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing
[Link to Additional Information on this Paper]Juhwan Noh, Yujin Kwon, Yunmok Son, Hocheol Shin, Dohyun Kim, Jaeyeong Choi, and Yongdae KimACM Transactions on Privacy and Security Vol. 22 Issue 2: 12 (TOPS 2019)Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications
[Link to Additional Information on this Paper]Hocheol Shin, Dohyun Kim, Yujin Kwon, and Yongdae KimInternational Conference on Cryptographic Hardware and Embedded Systems (CHES) 2017This ain’t your dose: Sensor Spoofing Attack on Medical Infusion Pump
Youngseok Park, Yunmok Son, Hocheol Shin, Dohyun Kim, and Yongdae Kim10th USENIX Workshop on Offensive Technologies (WOOT 2016)Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4
Kibum Choi, Yunmok Son, Juhwan Noh, Hocheol Shin, Jaeyeong Choi and Yongdae Kim9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2016)Best Paper AwardSecurity Analysis of FHSS-type Drone Controller
Hocheol Shin, Kibum Choi, Youngseok Park, Jaeyeong Choi, and Yongdae KimThe 16th International Workshop on Information Security Applications (WISA 2015)Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors
Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, and Yongdae Kim24th USENIX Security Symposium (USENIX Security 2015)GPS 기만신호를 이용한 안티 드론 방법 및 그 시스템 (Method for Anti-drone Using GPS Spoofing Signal and System Therefore)
Inventors: 김용대, 노주환, 권유진, 신호철 (Hocheol Shin), 김도현Patent granted in 2021스푸핑 공격을 회피하는 라이더장치 (LIDAR APPARATUS FOR AVOIDING SPOOFING ATTACK)
Inventors: 강석인, 엠일료, 김용대, 신호철 (Hocheol Shin), 노주환, 권유진, 김도현Patent granted in 2019블라인딩 공격을 회피하는 회전식 라이더시스템 (ROTARY LiDAR SYSTEM AVOIDING BLINDING ATTACK)
Inventors: 강석인, 엠일료, 김용대, 신호철 (Hocheol Shin), 노주환, 권유진, 김도현Patent granted in 2019UAV 비행 방해 장치 및 방법 (A method to attack commercial drones using the resonance effect of gyroscopes by sound waves)
Inventors: 김용대, 손윤목, 신호철 (Hocheol Shin), 김동관, 박영석, 노주환, 최기범, 최정우Patent granted in 2018* Only major ones are listed
Static Detection of Portable Executable (PE) Malware by Machine Learning Techniques
Period: Nov 2020–CurrentParticipation: The project being an industry-university collaborative research, conducted technical communication with the student researchers and co-studied the topic. Reproduction of technical results on our side.PoC Evaluation of Host Intrusion Detection Systems for Embedded Systems
Period: Mar 2020–Jun 2020Participation: Excavating appropriate security solutions fitting the firm needs on the market. This includes analysis on technical webpages and whitepapers. Once the solutions were selected, contacted the developers and performed proof-of-concept (PoC) evaluation of the products. Because the counterpart not being based in Korea and due to pandemic crisis, every communication was conducted in English within virtual conferences. Although, some evaluation test cases like attack snippets were given by the developer itself, most of the evaluation items including performance evaluations were devised on our side, and all the actual testing were conducted on our side with our hardware.Comprehensive Survey, Classification, and Importance Rating of Existing Adversarial Machine Learning Techniques and their Defenses
Client: National Security Research Institute of KoreaPeriod: Apr 2018–Oct 2018Participation: Overall project management. Comprehensive survey on and classification of existing adversarial machine learning techniques and their defenses. Total of 35 prior works were selected to be analyzed, the importance of each research paper was rated by 3 levels, and classified by total of 25 attribute tags.Comprehensive Security Analysis of Tesla Model S
Client: KAISTPeriod: Apr 2017–Dec 2017Participation: Overall project management and administration. Explored the possibility of sensor attacks against sensors mounted on Tesla Model S 90D: e.g. GPS and Camera. Successfully induced abrupt braking and disabled upper speed limit during autopilot. Successfully incapacitated autonomous emergency braking feature by blinding attacks against the mounted camera module.Security Analysis of Core Sensing Modules for Smart Vehicles
Client: Hyundai AutoEverPeriod: Jul 2016–Jun 2017Participation: Overall project management and administration. Sensor spoofing & blinding attacks against one of Velodyne’s vehicular lidar models. Successfully induced multiple fake points at a controllable location by spoofing, and incapacitated the victim lidar from sensing an obejct by blinding. Invisible blinding attacks against one of Mobileye’s vehicular vision sensor. Succeeded in DoSing the victim vision sensor remotely with laser whose wavelength is invisible to human eye. Practical mitigative measures against discovered attacks were also studied and devised.Security Analysis of Medical Infusion Pumps
Client: Samsung ElectronicsPeriod: Oct 2014–Sep 2017Participation: Optical channel sensor spoofing attack inducing over-infusion of medical fluids against the drop sensor of a off-the-shelf medical infusion pump.Safe & Reliable Vehicular Environment Perception System for Personal Digital Electric Vehicles
Client: National Research Foundation of KoreaPeriod: Mar 2014–Feb 2015Participation: Survey on the possibility of sensor spoofing attacks against vehicular radar modules. Showed by simulation that attackers can easily access and affect the victim radar’s measurement by “phase-code brute force”. In the simulation the victim radar was assumed to use Phase-Coded Modulation scheme, which is quite effective to suppressing accidental inter-radar interference.Safe Sensing & Networking for Smart Mobile Health-care
Client: KAISTPeriod: Mar 2014–Dec 2014Participation: Sensor spoofing attack inducing fake heartbeat against optical heartbeat sensor on Samsung smart watch.Pilot Study Project for Smart Grid Research
Client: KAISTPeriod: Aug 2013–Dec 2013Participation: Survey on intrusion detection/protection systems in smart grid networks. Survey on possibility of hardware tempering and sensor attacks against smart meters’ electricity usage measurement subsystems.Ph.D. in Electrical Engineering, 2020, KAIST
Thesis: Perception vs. Reality: Study on Maliciously Induced Discrepancies across Cyber-physical InterfacesAdviser: Yongdae KimM.S. in Electrical Engineering, 2015, KAIST
Thesis: Security Analysis of FHSS-based Drone ControllerAdviser: Yongdae KimB.S. in Electrical Engineering, 2013, Yonsei University
Courses taken are focused on RF engineering and computer architectureAdviser: Donghyun KimSamsung SW Competency Test (삼성 SW 역량테스트)―Professional (Level 3 out of 4)
ProDS―DS (Professional Data Scientist Certification by Samsung SDS. Level 2 out of 3)
Hardware: Soldering, USRP, Arduino, Photoreceiver circuit implementation, Voltage comparator circuit implementation, and 3D printing (Basic)
Software/Platform: GNU Radio, Linux, Gephi (Basic), Tensorflow, scikit-learn, and Autodesk Inventor (Basic)
Languages: C, C++, Python, Matlab, and LaTeX