This event is sponsored by Princeton’s Department of Electrical and Computer Engineering and the Center for Information Technology Policy
In a couple of years, “study items” for the 6G security standard will be set. Security issues not included in these study items are unlikely to be standardized and patched even in 6G. Therefore, before these study items are set, the security research community needs to put in effort to find security vulnerabilities in cellular standards up to 5G. Furthermore, as a community, we need to find solutions to these vulnerabilities that are practical enough to be accepted by the standard bodies. In this talk, unpatched design vulnerabilities and attacks in cellular standards up to 5G will be introduced. The talk will also address potential defense mechanisms and reasons why they have not been accepted in 3GPP so far.
Yongdae Kim is a professor in the Department of Electrical Engineering and the Graduate School of Information Security and a head of Police Science and Technology Research Center at KAIST. He received a Ph.d. from the computer science department at the University of Southern California in 2002. Before joining KAIST in 2012, he was a professor in the Department of Computer Science and Engineering at the University of Minnesota – Twin Cities for 10 years. He served as a KAIST Chair Professor between 2013 and 2016 and as director of Cyber Security Research Center between 2018 and 2020. He is currently serving as a steering committee member of ACM WISEC and served as a general chair for ACM CCS 2021, a program committee chair for ACM WISEC 2022, an associate editor for ACM TOPS and a steering committee member of NDSS. His main research interest is finding and fixing novel vulnerabilities for emerging technologies such as drones, self-driving cars, and cellular networks.