Quick links

Unpatched Vulnerabilities in Cellular Standards

Date and Time
Friday, November 11, 2022 - 4:30pm to 6:00pm
Location
Engineering Quadrangle B205
Type
CS Department Colloquium Series
Speaker
Host
Maria Apostolaki and Prateek Mittal

Yongdae Kim
In a couple of years, "study items" for the 6G security standard will be set. Security issues not included in these study items are unlikely to be standardized and patched even in 6G. Therefore, before these study items are set, the security research community needs to put in effort to find security vulnerabilities in cellular standards up to 5G. Furthermore, as a community, we need to find solutions to these vulnerabilities that are practical enough to be accepted by the standard bodies. In this talk, I will introduce unpatched design vulnerabilities and attacks in cellular standards up to 5G. I will also talk about potential defense mechanisms and reasons why they have not been accepted in 3GPP so far.

Bio: Yongdae Kim is a Professor in the Department of Electrical Engineering and the Graduate School of Information Security and a head of Police Science and Technology Research Center at KAIST. He received a PhD degree from the computer science department at the University of Southern California in 2002. Before joining KAIST in 2012, he was a professor in the Department of Computer Science and Engineering at the University of Minnesota - Twin Cities for 10 years. He served as a KAIST Chair Professor between 2013 and 2016 and a director of Cyber Security Research Center between 2018 and 2020.  He is currently serving as a steering committee member of ACM WISEC and served as a general chair for ACM CCS 2021, a program committee chair for ACM WISEC 2022, an associate editor for ACM TOPS and a steering committee member of NDSS. His main research interest is finding and fixing novel vulnerabilities for emerging technologies such as drones, self-driving cars, and cellular networks.


This seminar is partially supported with funds from the Korhammer Lecture Series

Sponsored by: Electrical and Computer Engineering, Computer Science, and the Center for Information Technology Policy

Follow us: Facebook Twitter Linkedin