Research Labs

Cryptography

  • Cryptology (Crypt) Lab

    Professor Prof. Jooyoung Lee
    Field Cryptology / Information Security / Combinatorics
    Introduce Introduction to Cryptology Lab: Our lab studies all aspects of provable security for cryptographic primitives or protocols. We analyze security of existing cryptographic schemes and design new schemes and protocols providing both efficiency and provable security. Provable Security in Symmetric Cryptography - Security Proof of Block Cipher Structures and Key-length-extension Schemes - Design and Security Proof of Block Cipher-based Hash Functions, Permutation-based Hash Fu
    WebSite https://sites.google.com/site/cryptkaist/

    Introduction to Cryptology Lab: Our lab studies all aspects of provable security for cryptographic primitives or protocols. We analyze security of existing cryptographic schemes and design new schemes and protocols providing both efficiency and provable security. Provable Security in Symmetric Cryptography - Security Proof of Block Cipher Structures and Key-length-extension Schemes - Design and Security Proof of Block Cipher-based Hash Functions, Permutation-based Hash Fu

  • Cryptology and Information Security (C & IS) Lab

    Professor Prof. Kwangjo Kim
    Field Cryptology / Information security / Security management and policy
    Introduce Any ICT systems or services are always vulnerable to security threats such as the illegal circulation of sensitive personal information, the intentional modification of a message, the impersonation like a (il)legal entity and the insertion of false data into intercepted message, notably Distributed Denial of Service(DDoS) attacks, etc. Cryptology and information security play a crucial role in constructing highly secure and reliable IT services as well as in operating secure and safe infrast
    WebSite http://cais.kaist.ac.kr

    Any ICT systems or services are always vulnerable to security threats such as the illegal circulation of sensitive personal information, the intentional modification of a message, the impersonation like a (il)legal entity and the insertion of false data into intercepted message, notably Distributed Denial of Service(DDoS) attacks, etc. Cryptology and information security play a crucial role in constructing highly secure and reliable IT services as well as in operating secure and safe infrast

Software security

  • Web Security & Privacy Lab

    Professor Prof. Sooel Son
    Field Secure Computing
    Introduce Web Security & Privacy (WSP) Lab looks at security and privacy shortcomings in complex software services including Web applications. Building automatic tools for finding such shortcomings is a main research goal of our lab. The vision of WSP lab is to find and implement novel ideas to make software services more secure and private.
    WebSite https://sites.google.com/site/ssonkaist/

    Web Security & Privacy (WSP) Lab looks at security and privacy shortcomings in complex software services including Web applications. Building automatic tools for finding such shortcomings is a main research goal of our lab. The vision of WSP lab is to find and implement novel ideas to make software services more secure and private.

  • Software Security (SoftSec) Lab

    Professor Prof. Sang Kil Cha
    Field Software security / Program analysis / Software reliability
    Introduce Software Security (SoftSec) Lab conducts research at the boundary of computer security and program analysis. We develop systems and techniques dealing with binary code for assuring software security. Our research interests include a variety of research areas in software security including automatic reverse engineering, exploit verification, malware analysis, fuzzing, and symbolic execution.
    WebSite http://softsec.kaist.ac.kr

    Software Security (SoftSec) Lab conducts research at the boundary of computer security and program analysis. We develop systems and techniques dealing with binary code for assuring software security. Our research interests include a variety of research areas in software security including automatic reverse engineering, exploit verification, malware analysis, fuzzing, and symbolic execution.

System Security

  • Cyber system Security (CySec) Lab

    Professor Prof. Brent Byunghoon Kang
    Field System security / Malware analysis and defense / Anti-spam
    Introduce Introduction to the Cyber Security Systems Lab Cyber Security Systems Lab (CySecLab) explores methods for protecting and securing computer systems from various attacks such as malware, rootkit, and targeted intrusions. Main research thrusts include Trusted Execution Environment (TEE) and TEE-based Applications to IoT Devices and UAV system. Recent efforts include OS kernel integrity monitors, HW-based trusted execution environment, VM Introspection, Memory address translation integrity,
    WebSite http://cysec.kaist.ac.kr

    Introduction to the Cyber Security Systems Lab Cyber Security Systems Lab (CySecLab) explores methods for protecting and securing computer systems from various attacks such as malware, rootkit, and targeted intrusions. Main research thrusts include Trusted Execution Environment (TEE) and TEE-based Applications to IoT Devices and UAV system. Recent efforts include OS kernel integrity monitors, HW-based trusted execution environment, VM Introspection, Memory address translation integrity,

  • System Security (SysSec) Lab

    Professor Prof. Yongdae Kim
    Field CPS security / Control plain security / Penetration testing of Korean cyber infrastructure
    Introduce We are interested in security of emerging and current systems. Our research involves design/implementation of novel attacks, and developing countermeasures against such attacks. We currently focus on 1) security issues for Cyber Physical Systems (CPSs) such as medical devices, smart grid, and automobiles, 2) control plane security of mobile/ad hoc/sensor/cellular networks, Internet, P2P systems, 3) Penetration testing of Korean cyber infrastructure, and 4) other security issues such as cloud/sto
    WebSite http://syssec.kaist.ac.kr

    We are interested in security of emerging and current systems. Our research involves design/implementation of novel attacks, and developing countermeasures against such attacks. We currently focus on 1) security issues for Cyber Physical Systems (CPSs) such as medical devices, smart grid, and automobiles, 2) control plane security of mobile/ad hoc/sensor/cellular networks, Internet, P2P systems, 3) Penetration testing of Korean cyber infrastructure, and 4) other security issues such as cloud/sto

Network security

  • Network and System security (NSS) Lab

    Professor Prof. Seungwon Shin
    Field Software Defined Networking security / Botnet analysis and detection
    Introduce Security-Mode ONOS ONOS provides “useful Northbound abstractions and APIs to enable easier application development”. Delta In this project, we focus on the vulnerabilities of SDN network environments and aim to systematize or characterize existing vulnerabilities motivated by above questions Barista We design Barista, as a new framework that enables flexible and customizable instantiations of network operating systems (NOSs) supporting diverse design choices.
    WebSite http://nss.kaist.ac.kr

    Security-Mode ONOS ONOS provides “useful Northbound abstractions and APIs to enable easier application development”. Delta In this project, we focus on the vulnerabilities of SDN network environments and aim to systematize or characterize existing vulnerabilities motivated by above questions Barista We design Barista, as a new framework that enables flexible and customizable instantiations of network operating systems (NOSs) supporting diverse design choices.

  • Wireless and Intelligent Navigation System (WINS) Lab

    Professor Prof. Myungchul Kim
    Field Wireless mobile network / Mobile application / Multimedia service technologies
    Introduce WINS Lab Motto: Passion and Consideration The research interests in Wireless mobile INternet and Services Laboratory are focused on the technologies to realize ubiquitous services in the future mobile Internet. The vision of our research is to develop the future wireless mobile technologies that enables everyone in the world to access and share the necessary information and services anytime, anywhere with appropriate QoS and cost. We believe that our theoritical and experimental
    WebSite http://winslab.kaist.ac.kr

    WINS Lab Motto: Passion and Consideration The research interests in Wireless mobile INternet and Services Laboratory are focused on the technologies to realize ubiquitous services in the future mobile Internet. The vision of our research is to develop the future wireless mobile technologies that enables everyone in the world to access and share the necessary information and services anytime, anywhere with appropriate QoS and cost. We believe that our theoritical and experimental

  • Intelligent Network Architecture (INA) Lab

    Professor Prof. Dongsu Han
    Field Internet content delivery / Cloud and big data / Internet security / eXpressive Internet Architecture
    Introduce Current and Future Researches Based on the techniques, systems, and platforms for indoor localization developed at ISI Lab., we will continue to develop new techniques and services for WiFi based RTLS. Reliable and robust WiFi based indoor localization techniques and tools, seamless integration of indoor and outdoor navigation systems, location based Social Networking Service (SNS), location based app store, and constructing grand-scale WiFi radio map covering villages, cities, and nations are
    WebSite http://ina.kaist.ac.kr

    Current and Future Researches Based on the techniques, systems, and platforms for indoor localization developed at ISI Lab., we will continue to develop new techniques and services for WiFi based RTLS. Reliable and robust WiFi based indoor localization techniques and tools, seamless integration of indoor and outdoor navigation systems, location based Social Networking Service (SNS), location based app store, and constructing grand-scale WiFi radio map covering villages, cities, and nations are

  • Network and Security (NS) Lab

    Professor Prof. Hyunsoo Yoon
    Field Applied cryptograhy / System security / Wireless sensor network / Multimedia virtual networks
    Introduce Implicit Mobile-Device Authentication We introduced autonomous way of authentication using various sensor information to make mobile authentication more secure and usable. Data Security Issues in Cloud We are studying data security issues in cloud computing such as auditing for data integrity and data privacy protection. Efficient Broadcast Algorithm We introduced an efficient multihop broadcast protocol for wireless sensor networks to minimize redundant transmissions of the same packet
    WebSite http://nslab.kaist.ac.kr

    Implicit Mobile-Device Authentication We introduced autonomous way of authentication using various sensor information to make mobile authentication more secure and usable. Data Security Issues in Cloud We are studying data security issues in cloud computing such as auditing for data integrity and data privacy protection. Efficient Broadcast Algorithm We introduced an efficient multihop broadcast protocol for wireless sensor networks to minimize redundant transmissions of the same packet

  • COding and COmmunication lAb. (COCOA)

    Professor Prof. Jungsuk Ha
    Field Wireless communication / Physical layer security / Error correcting codes
    Introduce Coding and Communications lAb(CoCoA) was established in 2004 by Professor Jeongseok Ha. The research interests of the CoCoA include the general area of communication systems, coding theory, and physical layer security. CoCoA has on-going projects in signal processing and error-control system design for storage devices, information theoretic security and theories/practice of advanced error-control codes such as LDPC codes, Turbo codes and Polar codes.
    WebSite http://cocoa.kaist.ac.kr

    Coding and Communications lAb(CoCoA) was established in 2004 by Professor Jeongseok Ha. The research interests of the CoCoA include the general area of communication systems, coding theory, and physical layer security. CoCoA has on-going projects in signal processing and error-control system design for storage devices, information theoretic security and theories/practice of advanced error-control codes such as LDPC codes, Turbo codes and Polar codes.