Be selfish and avoid dilemmas: Fork after withholding (faw) attacks on bitcoin Y Kwon, D Kim, Y Son, E Vasserman, Y Kim Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 187 | 2017 |
Illusion and dazzle: Adversarial optical channel exploits against lidars for automotive applications H Shin, D Kim, Y Kwon, Y Kim International Conference on Cryptographic Hardware and Embedded Systems, 445-467, 2017 | 136 | 2017 |
Impossibility of full decentralization in permissionless blockchains Y Kwon, J Liu, M Kim, D Song, Y Kim Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019 | 48 | 2019 |
Bitcoin vs. Bitcoin cash: Coexistence or downfall of bitcoin cash? Y Kwon, H Kim, J Shin, Y Kim 2019 IEEE Symposium on Security and Privacy (SP), 935-951, 2019 | 47 | 2019 |
Is stellar as secure as you think? M Kim, Y Kwon, Y Kim 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2019 | 38 | 2019 |
Tractor beam: Safe-hijacking of consumer drones with adaptive GPS spoofing J Noh, Y Kwon, Y Son, H Shin, D Kim, J Choi, Y Kim ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-26, 2019 | 34 | 2019 |
Sampling Race: Bypassing {Timing-Based} Analog Active Sensor Spoofing Detection on {Analog-Digital} Systems H Shin, Y Son, Y Park, Y Kwon, Y Kim 10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016 | 30 | 2016 |
An eye for an eye: Economics of retaliation in mining pools Y Kwon, H Kim, Y Yi, Y Kim Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019 | 2 | 2019 |
Doppelganger in bitcoin mining pools: An analysis of the duplication share attack Y Kwon, D Kim, Y Son, J Choi, Y Kim International Workshop on Information Security Applications, 124-135, 2016 | 2 | 2016 |
The Trilemma of Stablecoin Y Kwon, J Kim, Y Kim, D Song Available at SSRN 3917430, 2021 | 1 | 2021 |
Method for anti-drone using gps spoofing signal and system therefore Y Kim, J Noh, Y Kwon, H Shin, D Kim US Patent App. 16/726,049, 2021 | 1 | 2021 |
Analysis of LFT2 G Lim, Y Kwon, Y Kim arXiv preprint arXiv:2004.04294, 2020 | | 2020 |