Blog(4)
Telecommunication systems like 5G rely heavily on secure communication protocols based on asymmetric and symmetric cryptography to protect sensitive information, including user identities, voice, data, messages and network configurations.
Fuzzing, which is to test software with pseudo-random input and observe its execution for anomalous behavior, is an effective tool for finding real bugs and vulnerabilities within software.
Internet-of-Things (IoT) are everywhere in our daily life. They are used in our homes, in restaurants, at the factories, installed outdoors to control and to report the weather changes, prevent fires, and many more. However, all these may come at risks of security breaches and privacy issues.
Research Areas(1)
Overview The rapidly changing IT environment has developed a variety of devices and services, which has led to an explosive increase in personal data. In other words, the scope and amount of personal data to be protected has also been expanded. Data breach due to security incidents leads to invasion of user privacy, and its impact is getting bigger. As a result, there is a growing demand to strengthen security and protect privacy, and various regulations to protec...
Publications(35)
Reinforcement Learning Framework for Power Optimization in 5G RAN Systems with Blockchain-Enhanced Security
AuthorSwaraj Kumar, Sukhdeep Singh, Moonki Hong, Taewan Kim
PublishedIEEE Globecom Workshop
Date2025-08-12
EDgE: Enhancing Predictability in Decentralized Network Slices through Federated Learning – A Multi layered Ecosystem
AuthorGanesh Chandrasekaran; Abhinay Kumar; Karthikeyan Subramaniam; N Sunil; Rajesh Challa
PublishedIEEE Access
Date2024-07-17
SkullID: On-Skull Bone Conduction Response based Authentication for Smart Glasses
AuthorHyejin Shin, Jun Ho Huh, Bum Jun Kwon, Iljoo Kim, Eunyong Cheon, HongMin Kim, Choong-Hoon Lee, Ian Oakley
PublishedACM Conference on Human Factors in Computing Systems (CHI)
Date2024-05-11
News(30)
On August 8 in Las Vegas, the air was heavy with a tense silence. It was the long-awaited moment the winner of the world’s largest security technology competition — the AI Cyber Challenge (AIxCC) — would be revealed.
Samsung Electronics today announced it has won first place in the finals of the AI Cyber Challenge (AIxCC), the world’s largest AI security technology competition, held on Aug. 8 in Las Vegas.
With emerging 5G advanced and 6G standards, it is critical to ensure that mobile networks are well-protected, and designed with a security-first approach.
Others(17)
What we do Working at Samsung Research is more than just a job. Find out how our researchers enjoy their work and are passionate about making a positive impact in the world. PlayVideo thumbnail - leehojung AI: Language Understanding Lee Ho-jung PlayVideo thumbnail - leejaewon AI: Speech Recognition Lee Jae-won PlayVideo thumbnail - kimkyungsoo AI: Visual Perception Kim Kyung-su PlayVideo thumbnail - hammyungjoo AI: On-Device AI Software Ham Myung-joo PlayVi...
Download competition question SCTF2018_Quals SCTF 2018 Quals download SCTF2018_Final SCTF 2018 Final download Hall of Fame 2018 1NoC****** | Lim Korea Univ. 2nom****** | Masa****** The University of Electro-Communications jin***** | Jin Korea Univ. Special Awardgoz****** | IM(Theori) gga***** | Park(Bookyoung Univ.) Qwa* | Bae(POSTECH) gaz****** | Lee(KAIST) b2x*** | Robert ****(Carnegie Mellon University) participation awardrbt*** | Jeong(POSTECH) bbb** | Lee(Korea...
대회 문제 다운로드 SCTF2018_Quals SCTF 2018 Quals download SCTF2018_Final SCTF 2018 Final download Hall of Fame 2018 1NoC****** | 임*원 고려대학교 2nom****** | Masa****** The University of Electro-Communications jin***** | 진*휘 고려대학교 특별상goz****** | 임*오(Theori) gga***** | 박*환(부경대학교) Qwa* | 배*찬(포항공대) gaz****** | 이*섭(KAIST) b2x*** | Robert ****(Carnegie Mellon University) 장려상rbt*** | 정*식(포항공대) bbb** | 이*오(고려대학교) unu*** | 김*섭(Google) kim***** | 김*호(고려대학교) Bee*** | 김*학(대학생) Jhu** | 박*훈(...