Yongdae Kim — Korea Advanced Institute of Science and Technology (KAIST)
Thursday, May 11, 2017
Abstract: Sensors are designed to measure sensor inputs (e.g., physical quantities) and transfer sensor outputs (e.g. voltage signal) into the embedded devices. In addition, sensor-equipped embedded systems (called sensing-and-actuation systems) decide their actuations according to these sensor outputs, and the systems have no doubt whether the sensor outputs are legitimate or not. Sensors are essential components for safety-critical systems such as self-driving cars, drones and medical devices. Breaking safety in these systems may cause loss of life or disasters. Because of these safety reasons, sensors are often designed to be robust against failure or faults. However, can they maintain safety under adversarial conditions? In this talk, I detail how sensors can be spoofed or prevented from providing correct operation through regular and side-channels. Attacks on various devices such as medical devices, drones, autonomous vehicles and smart wearables will be shown. I’ll complete the talk with a few directions and guides to prevent these attacks with a few open problems.
Bio: Yongdae Kim is a Professor in the Department of Electrical Engineering and an Affiliate Professor in the GSIS at KAIST. He received his PhD from the computer science department at the University of Southern California in 2002. Between 2002 and 2012, he was an Associate/Assistant Professor in the Department of Computer Science and Engineering at the University of Minnesota Twin Cities. Before coming to the US, he worked 6 years in ETRI for securing Korean cyber infrastructure. Between 2013 and 2016, he served as a KAIST endowed Chair Professor. He received an NSF career award on storage security and a McKnight Land-Grant Professorship Award from the University of Minnesota in 2005. Currently, he is serving as a steering committee member of NDSS and Associate Editor for ACM TISSEC. His current research interests include security issues for various systems such as cyber physical systems, social networks, cellular networks, P2P systems, medical devices, storage systems, mobile/ad hoc/sensor networks, and anonymous communication systems.
Hosted by Professors Paul Bogdan and Bhaskar Krishnamachari