Taegyu Kim

    Calculated based on number of publications stored in Pure and citations from Scopus
    20152022

    Research activity per year

    Fingerprint

    Dive into the research topics where Taegyu Kim is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
    • 1 Similar Profiles

    Collaborations and top research areas from the last five years

    Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
    • DnD: A Cross-Architecture Deep Neural Network Decompiler

      Wu, R., Kim, T., Tian, D., Bianchi, A. & Xu, D., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 2135-2152 18 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      14 Scopus citations
    • FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks

      Kim, K., Kim, T., Warraich, E., Lee, B., Butler, K. R. B., Bianchi, A. & Jing Tian, D., 2022, Proceedings - 43rd IEEE Symposium on Security and Privacy, SP 2022. Institute of Electrical and Electronics Engineers Inc., p. 2212-2229 18 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2022-May).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      8 Scopus citations
    • Reverse engineering and retrofitting robotic aerial vehicle control firmware using dispatch

      Kim, T., Ding, A., Etigowni, S., Sun, P., Chen, J., Garcia, L., Zonouz, S., Xu, D. & Tian, D. J., Jun 27 2022, MobiSys 2022 - Proceedings of the 2022 20th Annual International Conference on Mobile Systems, Applications and Services. Association for Computing Machinery, Inc, p. 69-83 15 p. (MobiSys 2022 - Proceedings of the 2022 20th Annual International Conference on Mobile Systems, Applications and Services).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
      4 Scopus citations
    • ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs

      Kim, S., Yeo, G., Kim, T., Rhee, J., Jeon, Y., Bianchi, A., Xu, D. & Tian, D. J., May 30 2022, ASIA CCS 2022 - Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 534-545 12 p. (ASIA CCS 2022 - Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
      2 Scopus citations
    • PASAN: Detecting peripheral access concurrency bugs within bare-metal embedded applications

      Kim, T., Kumar, V., Rhee, J., Chen, J., Kim, K., Kim, C. H., Xu, D. & Tian, D., 2021, Proceedings of the 30th USENIX Security Symposium. USENIX Association, p. 249-266 18 p. (Proceedings of the 30th USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      13 Scopus citations