KAIST Researchers First in the World to Identify Security Threat Exploiting Google Gemini’s "Malicious Expert AI" Structure
<Photo 1. (From left) Ph.D. candidates Mingyoo Song and Jaehan Kim, Professor Sooel Son, (Top right) Professor Seungwon Shin, Lead Researcher Seung Ho Na>
Most major commercial Large Language Models (LLMs), such as Google’s Gemini, utilize a Mixture-of-Experts (MoE) structure. This architecture enhances efficiency by dynamically selecting and using multiple "small AI models (Expert AIs)" depending on input queries . However, KAIST research team has revealed for the first time in the world that this very structure can actually become a new security threat.
A joint research team led by Professor Seungwon Shin (School of Electrical Engineering) and Professor Sooel Son (School of Computing) announced on December 26th that they have identified an attack technique that can seriously compromise the safety of LLMs by exploiting the MoE structure. For this research, they received the Distinguished Paper Award at ACSAC 2025, one of the most prestigious international conferences in the field of information security.
ACSAC (Annual Computer Security Applications Conference) is among the most influential international academic conferences in security. This year, only two papers out of all submissions were selected as Distinguished Papers. It is highly unusual for a domestic Korean research team to achieve such a feat in the field of AI security.
In this study, the team systematically analyzed the fundamental security vulnerabilities of the MoE structure. In particular, they demonstrated that even if an attacker does not have direct access to the internal structure of a commercial LLM, the entire model can be induced to generate dangerous responses if just one maliciously manipulated "Expert Model" is distributed through open-source channels and integrated into the system.
<Figure 1. Conceptual diagram of the attack technology proposed by the research team.>
To put it simply: even if there is only one "malicious expert" mixed among normal AI experts, that specific expert may be repeatedly selected for processing harmful queries, causing the overall safety of the AI to collapse. A particularly dangerous factor highlighted was that this process causes almost no degradation in model performance, making the problem extremely difficult to detect in advance.
Experimental results showed that the attack technique proposed by the research team could increase the harmful response rate from 0% to up to 80%. They confirmed that the safety of the entire model significantly deteriorates even if only one out of many experts is "infected."
This research is highly significant as it presents the first new security threat that can occur in the rapidly expanding global open-source-based LLM development environment. Simultaneously, it suggests that verifying the "source and safety of individual expert models" is now essential—not just performance—during the AI model development process.
Professors Seungwon Shin and Sooel Son stated, "Through this study, we have empirically confirmed that the MoE structure, which is spreading rapidly for the sake of efficiency, can become a new security threat. This award is a meaningful achievement that recognizes the importance of AI security on an international level."
The study involved Ph.D. candidates Jaehan Kim and Mingyoo Song, Dr. Seung Ho Na (currently at Samsung Electronics), Professor Seungwon Shin, and Professor Sooel Son. The results were presented at ACSAC in Hawaii, USA, on December 12, 2025.
<Figure 2. Photo of the Distinguished Paper Award certificate>
Paper Title: MoEvil: Poisoning Experts to Compromise the Safety of Mixture-of-Experts LLMs
Paper File: https://jaehanwork.github.io/files/moevil.pdf
GitHub (Open Source): https://github.com/jaehanwork/MoEvil
This research was supported by the Korea Internet & Security Agency (KISA) and the Institute of Information & Communications Technology Planning & Evaluation (IITP) under the Ministry of Science and ICT.
KAIST Researchers Uncover Critical Security Flaws in Global Mobile Networks
Breakthrough Discovery Reveals How Attackers Can Remotely Manipulate User Data Without Physical Proximity
DAEJEON, South Korea — In an era when recent cyberattacks on major telecommunications providers have highlighted the fragility of mobile security, researchers at the Korea Advanced Institute of Science and Technology have identified a class of previously unknown vulnerabilities that could allow remote attackers to compromise cellular networks serving billions of users worldwide.
The research team, led by Professor Yongdae Kim of KAIST's School of Electrical Engineering, discovered that unauthorized attackers could remotely manipulate internal user information in LTE core networks — the central infrastructure that manages authentication, internet connectivity, and data transmission for mobile devices and IoT equipment.
The findings, presented at the 32nd ACM Conference on Computer and Communications Security in Taipei, Taiwan, earned the team a Distinguished Paper Award, one of only 30 such honors selected from approximately 2,400 submissions to one of the field's most prestigious venues.
A New Class of Vulnerability
The vulnerability class, which the researchers termed "Context Integrity Violation" (CIV), represents a fundamental breach of a basic security principle: unauthenticated messages should not alter internal system states. While previous security research has primarily focused on "downlink" attacks — where networks compromise devices — this study examined the less-scrutinized "uplink" security, where devices can attack core networks.
"The problem stems from gaps in the 3GPP standards," Professor Kim explained, referring to the international body that establishes operational rules for mobile networks. "While the standards prohibit processing messages that fail authentication, they lack clear guidance on handling messages that bypass authentication procedures entirely."
The team developed CITesting, the world's first systematic tool for detecting these vulnerabilities, capable of examining between 2,802 and 4,626 test cases — a vast expansion from the 31 cases covered by the only previous comparable research tool, LTEFuzz.
Widespread Impact Confirmed
Testing four major LTE core network implementations — both open-source and commercial systems — revealed that all contained CIV vulnerabilities. The results showed:
Open5GS: 2,354 detections, 29 unique vulnerabilities
srsRAN: 2,604 detections, 22 unique vulnerabilities
Amarisoft: 672 detections, 16 unique vulnerabilities
Nokia: 2,523 detections, 59 unique vulnerabilities
The research team demonstrated three critical attack scenarios: denial of service by corrupting network information to block reconnection; IMSI exposure by forcing devices to retransmit user identification numbers in plaintext; and location tracking by capturing signals during reconnection attempts.
Unlike traditional attacks requiring fake base stations or signal interference near victims, these attacks work remotely through legitimate base stations, affecting anyone within the same MME (Mobility Management Entity) coverage area as the attacker — potentially spanning entire metropolitan regions.
Industry Response and Future Implications
Following responsible disclosure protocols, the research team notified affected vendors. Amarisoft deployed patches, and Open5GS integrated the team's fixes into its official repository. Nokia, however, stated it would not issue patches, asserting compliance with 3GPP standards and declining to comment on whether telecommunications companies currently use the affected equipment.
"Uplink security has been relatively neglected due to testing difficulties, implementation diversity, and regulatory constraints," Professor Kim noted. "Context integrity violations can pose serious security risks."
The research team, which included KAIST doctoral students Mincheol Son and Kwangmin Kim as co-first authors, along with Beomseok Oh and Professor CheolJun Park of Kyung Hee University, plans to extend their validation to 5G and private 5G environments. The tools could prove particularly critical for industrial and infrastructure networks, where breaches could have consequences ranging from communication disruption to exposure of sensitive military or corporate data.
The research was supported by the Ministry of Science and ICT through the Institute for Information & Communications Technology Planning & Evaluation, as part of a project developing security technologies for 5G private networks.
With mobile networks forming the backbone of modern digital infrastructure, the discovery underscores the ongoing challenge of securing systems designed in an era when such sophisticated attacks were barely conceivable — and the urgent need for updated standards to address them.
The Fall of Tor for Just $2: A Solution to the Tor Vulnerability
<(From Left) Ph.D candidate Jinseo Lee, Hobin Kim, Professor Min Suk Kang>
KAIST research team has made a new milestone in global security research, becoming the first Korean research team to identify a security vulnerability in Tor, the world's largest anonymous network, and propose a solution.
On September 12, our university's Professor Min Suk Kang's research team from the School of Computing announced that they had received an Honorable Mention Award at the USENIX Security 2025 conference, held from August 13 to 15 in Seattle, USA.
The USENIX Security conference is one of the world's most prestigious conferences in information security, ranking first among all security and cryptography conferences and journals based on the Google Scholar h-5 index. The Honorable Mention Award is a highly regarded honor given to only about 6% of all papers.
The core of this research was the discovery of a new denial-of-service (DoS) attack vulnerability in Tor, the world's largest anonymous network, and the proposal of a method to resolve it. The Tor Onion Service, a key technology for various anonymity-based services, is a primary tool for privacy protection, used by millions of people worldwide every day.
The research team found that Tor's congestion-sensing mechanism is insecure and proved through a real-world network experiment that a website could be crippled for as little as $2. This is just 0.2% of the cost of existing attacks. The study is particularly notable as it was the first to show that the existing security measures implemented in Tor to prevent DoS attacks can actually make the attacks worse.
In addition, the team used mathematical modeling to uncover the principles behind this vulnerability and provided guidelines for Tor to maintain a balance between anonymity and availability. These guidelines have been shared with the Tor development team and are currently being applied through a phased patch.
A new attack model proposed by the research team shows that when an attacker sends a tiny, pre-designed amount of attack traffic to a Tor website, it confuses the congestion measurement system. This triggers an excessive congestion control, which ultimately prevents regular users from accessing the website. The research team proved through experiments that the cost of this attack is only 0.2% of existing methods.
In February, Tor founder Roger Dingledine visited KAIST and discussed collaboration with the research team. In June, the Tor administration paid a bug bounty of approximately $800 in appreciation for the team's proactive report.
"Tor anonymity system security is an area of active global research, but this is the first study on security vulnerabilities in Korea, which makes it very significant," said Professor Kang Min-seok. "The vulnerability we identified is very high-risk, so it received significant attention from many Tor security researchers at the conference. We will continue our comprehensive research, not only on enhancing the Tor system's anonymity but also on using Tor technology in the field of criminal investigation."
The research was conducted by Ph.D. candidate Jinseo Lee (first author), and former master's student Hobin Kim at the KAIST Graduate School of Information Security and a current Ph.D. candidate at Carnegie Mellon University (second author).
The paper is titled "Onions Got Puzzled: On the Challenges of Mitigating Denial-of-Service Problems in Tor Onion Services." https://www.usenix.org/conference/usenixsecurity25/presentation/lee
This achievement was recognized as a groundbreaking, first-of-its-kind study on Tor security vulnerabilities in Korea and played a decisive role in the selection of Professor Kang's lab for the 2025 Basic Research Program (Global Basic Research Lab) by the Ministry of Science and ICT.
< Photo 2. Presentation photo of Ph.D cadidate Jinseo Lee from School of Computing>
Through this program, the research team plans to establish a domestic research collaboration system with Ewha Womans University and Sungshin Women's University and expand international research collaborations with researchers in the U.S. and U.K. to conduct in-depth research on Tor vulnerabilities and anonymity over the next three years.
< Photo 3. Presentation photo of Ph.D cadidate Jinseo Lee from School of Computing>
KAIST–National Intelligence Service Successfully Hold the 4th University Research Security Education Council Workshop
KAIST (President Kwang Hyung Lee) announced on the 22nd of August that, together with the National Intelligence Service, it held the “4th University Research Security Education Council Workshop” at the Academic Cultural Complex on KAIST’s main campus in Daejeon on the 21st.
This 4th workshop was held under the theme of “Global Research Security,” based on the recognition that technology leakage can have serious impacts not only on the national economy and security but on international exchanges in science and technology. Accordingly, national policies and outstanding cases from institutions to enhance the level of university research security management were shared, and practical security enhancement measures applicable in the field were discussed.
In the presentation sessions, △ the Ministry of Science and ICT presented the government’s policy direction for strengthening research security, △ the National Institute for International Education and Training (KIRD) gave a presentation on settlement and career support programs for foreign researchers in science and engineering, △ the Korea Strategic Trade Institute (KOSTI) introduced the Authorized Economic Operator (AEO/CP) system for universities’ dual-use items and technology export control measures, and △ the Korea Institute of S&T Evaluation and Planning (KISTEP) conducted a special lecture on research security field manuals.
In the university case presentations, KAIST shared achievements in promoting global research security, while Yong In University introduced its newly launched program this year for fostering security professionals.
This event was attended by more than 130 participants from approximately 70 universities nationwide, including Seoul National University and Ewha Womans University, as well as officials from the Ministry of Science and ICT, the National Intelligence Service, KIRD, KISTEP, and KOSTI.
An NIS official stated, “With the rapid changes in the university research environment due to the expansion of international joint research and the increase in international students, the establishment of a research security culture has become more important than ever. Based on the excellent cases shared at the workshop, we will actively reflect the opinions of host institutions to spread security awareness and continue preparing effective countermeasures.”
Cheol Seong Jang, President of the National University Council of Research & Industry Cooperation and Research Directors (Professor at Kangwon National University), emphasized, “If the ideas and cases discussed at the workshop are applied in university settings, they will greatly contribute to Korea leading the establishment of a trusted global research ecosystem.”
Byung-Kwan Cho, Director of Research at KAIST, said, “KAIST will not hesitate to introduce and spread leading research security systems so that our efforts to strengthen research security become a benchmark for other universities. By applying the principle of open science — ‘as open as possible, as closed as necessary’ — we will ensure that research security and global exchanges achieve harmony.”
The University Research Security Education Council was launched in June 2022 with joint supervision by KAIST and the National Intelligence Service and cooperation from KIRD. This year’s workshop was co-hosted by KAIST, the National Intelligence Service, and Kangwon National University.
The World’s First Hacking-preventing Cryptographic Semiconductor Chip
With the dramatic increase in the amount of information exchanged between components or devices in the 5G/6G era, such as for the Internet of Things (IoT) and autonomous driving, hacking attacks are becoming more sophisticated. Consequently, enhancing security functions is essential for safely transmitting data between and among devices.
On February 29th, a KAIST research team led by Professors Yang-gyu Choi and Seung-tak Ryu from the School of Electrical Engineering announced the successful development of the world's first security cryptographic semiconductor.
The team has developed the Cryptoristor, a cryptographic transistor based on FinFET technology, produced through a 100% silicon-compatible process, for the first time in the world. Cryptoristor is a random number generator (RNG) with unparalleled characteristics, featuring a unique structure comprising a single transistor and a distinctive mechanism.
In all security environments, including artificial intelligence, the most crucial element is the RNG. In the most commonly used security chip, the Advanced Encryption Standard (AES), the RNG is a core component, occupying approximately 75% of the total chip area and more than 85% of its energy consumption. Hence, there is an urgent need for the development of low-power/ultra-small RNGs suitable for mobile or IoT devices.
Existing RNGs come with limitations as they lack compatibility with silicon CMOS processes and circuit-based RNGs occupy a large surface area.
In contrast, the team’s newly developed Cryptoristor, a cryptographic semiconductor based on a single-component structure, consumes and occupies less than .001 of the power and area compared to the current chips being used. Utilizing the inherent randomness of FinFETs, fabricated on a Silicon-on-Insulator (SOI) substrate with an insulating layer formed beneath the silicon, the team developed an RNG that unpredictably produces zeroes and ones.
< Figure 1. Conceptual diagram of the security cryptographic transistor device. >
Generally speaking, preventing hackers from predicting the encrypted algorithms during data exchanges through mobile devices is pivotal. Therefore, this method ensures unpredictability by generating random sequences of zeroes and ones that change every time.
Moreover, while the Cryptoristor-based RNG research is the world's first of its kind without any international implementation cases, it shares the same transistor structure as existing logic or memory components. This enables 100% production through rapid mass production processes using existing semiconductor facilities at a low cost.
Seung-il Kim, a PhD student who led the research, explained the significance of the study, stating, "As a cryptographic semiconductor, the ultra-small/low-power random number generator enhances security through its distinctive unpredictability, supporting safe hyperconnectivity with secure transmissions between chips or devices. Particularly, compared to previous research, it offers excellent advantages in terms of energy consumption, integration density, and cost, making it suitable for IoT device environments."
This research, with master’s student Hyung-jin Yoo as the co-author, was officially published in the online edition of Science Advances, a sister journal of Science, in February 2024 (research paper title: Cryptographic transistor for true random number generator with low power consumption).
This research received support from the Next-Generation Intelligent Semiconductor Technology Development Project and the Core Technology Development Project for the National Semiconductor Research Laboratory.
Professor Sang Kil Cha Receives IEEE Test-of-Time Award
Professor Sang Kil Cha from the Graduate School of Information Security (GSIS) in the School of Computing received the Test-of-Time Award from IEEE Security & Privacy, a top conference in the field of information security.
The Test-of-Time Award recognizes the research papers that have influenced the field of information security the most over the past decade. Three papers were selected this year, and Professor Cha is the first Korean winner of the award.
The paper by Professor Cha was published in 2012 under the title, “Unleashing Mayhem on Binary Code”. It was the first to ever suggest an algorithm that automatically finds bugs in binary code and creates exploits that links them to an attack code.
The developed algorithm is a core technique used for world-class cyber security hacking competitions like the Cyber Grand Challenge, an AI hacking contest.
Starting with this research, Professor Cha has carried out various studies to develop technologies that can find bugs and vulnerabilities through binary analyses, and is currently developing B2R2, a Korean platform that can analyze various binary codes.
Team Geumo Wins Consecutive Victories in K-Cyber Security Challenge
< Professor Sang Kil Cha >
< Masters Candidate Kangsu Kim and Researcher Corentin Soulet >
Team Geumo, led by Professor Sang Kil Cha from the Graduate School of Information Security, won the K-Cyber Security Challenge in the AI-based automatic vulnerability detection division for two consecutive years in 2018 and 2019.
The K-Cyber Security Challenge is an inter-machine hacking competition. Participants develop and operate AI-based systems that are capable of independently identifying software vulnerabilities and gaining operating rights through hacking. The K-Cyber Security Challenge, inspired by the US Cyber Grand Challenge launched by the Defense Advanced Research Projects Agency (DARPA), is hosted by the Ministry of Science and ICT and organized by the Korea Internet and Security Agency.
Researcher Corentin Soulet of the School of Computing and master’s student Kangsu Kim of the Graduate School of Information Security teamed up for the competition. Professor Cha, who has led the research on software and systems security since his days at Carnegie Mellon University, succeeded in establishing a world-class system using domestic technology.
In a recent collaboration with the Cyber Security Research Center, Professor Cha achieved a ten-fold increase in the speed of binary analysis engines, a key component of AI-based hacking systems. For this accomplishment, he received the Best Paper Award at the 2019 Network and Distributed System Security Workshop on Binary Analysis Research (NDSS BAR).
Kangsu Kim said, "It is a great honor to win the competition two years in a row. I will continue to work hard and apply my knowledge to serve society.”
(END)
Anti-drone Technology for Anti-Terrorism Applications
(from top right clockwise: Professor Yongdae Kim,
PhD Candidates Yujin Kwon, Juhwan Noh, Hocheol Shin, and Dohyun Kim)
KAIST researchers have developed anti-drone technology that can hijack other drones by spoofing its location using fake GPS signals. This technology can safely guide a drone to a desired location without any sudden change in direction in emergency situations, and thus respond effectively to dangerous drones such as those intending to carry out acts of terrorism.
Advancements in the drone industry have led to the wider use of drones in our daily lives in areas of reconnaissance, searching and rescuing, disaster prevention and response, and delivery services. At the same time, there has also been a growing concern about privacy, safety, and security issues regarding drones, especially those arising from intrusion into private property and secure facilities. Therefore, the anti-drone industry is rapidly expanding to detect and respond to this possible drone invasion.
The current anti-drone systems used in airports and other key locations utilize electronic jamming signals, high-power lasers, or nets to neutralize drones. For example, drones trespassing on airports are often countered with simple jamming signals that can prevent the drones from moving and changing position, but this may result in a prolonged delay in flight departures and arrivals at the airports. Drones used for terrorist attacks – armed with explosives or weapons – must also be neutralized a safe distance from the public and vital infrastructure to minimize any damage.
Due to this need for a new anti-drone technology to counter these threats, a KAIST research team led by Professor Yongdae Kim from the School of Electrical Engineering has developed technology that securely thwarts drones by tricking them with fake GPS signals.
Fake GPS signals have been used in previous studies to cause confusion inside the drone regarding its location, making the drone drift from its position or path. However, such attack tactics cannot be applied in GPS safety mode. GPS safety mode is an emergency mode that ensures drone safety when the signal is cut or location accuracy is low due to a fake GPS signals. This mode differs between models and manufacturers.
Professor Kim’s team analyzed the GPS safety mode of different drone models made from major drone manufacturers such as DJI and Parrot, made classification systems, and designed a drone abduction technique that covers almost all the types of drone GPS safety modes, and is universally applicable to any drone that uses GPS regardless of model or manufacturer. The research team applied their new technique to four different drones and have proven that the drones can be safely hijacked and guided to the direction of intentional abduction within a small margin of error.
Professor Kim said, “Conventional consumer drones equipped with GPS safety mode seem to be safe from fake GPS signals, however, most of these drones are able to be detoured since they detect GPS errors in a rudimentary manner.” He continued, “This technology can contribute particularly to reducing damage to airports and the airline industry caused by illegal drone flights.”
The research team is planning to commercialize the developed technology by applying it to existing anti-drone solutions through technology transfer.” This research, featured in the ACM Transactions on Privacy and Security (TOPS) on April 9, was supported by the Defense Acquisition Program Administration (DAPA) and the Agency for Defense Development (ADD).
Image 1.
Experimental environment in which a fake GPS signal was produced from a PC and injected into the drone signal using directional antennae
Publication:
Juhwan Noh, Yujin Kwon, Yunmok Son, Hocheol Shin, Dohyun Kim, Jaeyeong Choi, and Yongdae Kim. 2019. Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing. ACM Transactions on Privacy and Security. New York, NY, USA, Vol. 22, No. 2, Article 12, 26 pages. https://doi.org/10.1145/3309735
Profile: Prof. Yongdae Kim, MS, PhD
yongdaek@kaist.ac.kr
https://www.syssec.kr/
Professor
School of Electrical Engineering
Korea Advanced Institute of Science and Technology (KAIST)
http://kaist.ac.kr Daejeon 34141, Korea
Profile: Juhwan Noh, PhD Candidate
juhwan@kaist.ac.kr
PhD Candidate
System Security (SysSec) Lab
School of Electrical Engineering
Korea Advanced Institute of Science and Technology (KAIST)
http://kaist.ac.kr Daejeon 34141, Korea
(END)
KAIST Shows Strong Performance in Crypto Contest Korea 2018
(Awardees at the ceremony for Crypto Contest Korea 2018)
A paper titled “Indifferentiability of Truncated Random Permutations” by PhD candidate Wonseok Choi and MS candidate Byeonghak Lee (under Professor Jooyoung Lee) from the KAIST Graduate School of Information Security (GSIS) won first place in Crypto Contest Korea 2018. Byeonghak Lee became a repeat winner since his paper titled “Tweakable Block Ciphers Secure Beyond the Birthday Bound in the Ideal Cipher Model” also received an award at Crypto Contest Korea 2017.
The contest, hosted by the Korea Cryptography Forum, the Korea Institute of Information Security & Cryptology, and the National Security Research Institute and sponsored by the National Intelligence Service, was held for promoting cryptography in Korea. The total prize money is fifty million won with ten million won going to the first place winners.
The contest was divided into three divisions: paper, problem solving, and idea. Among the three divisions, first place came from the paper division only.
Besides first place, KAIST students showed outstanding performance in the contest. PhD candidate Seongkwang Kim received participation prize while he also received special prizes with MS candidate Yeongmin Lee. The hacking club GoN (under Professor Sang Kil Cha), comprised of undergraduate students from the GSIS was awarded the grand prize in the division of problem solving.
The award ceremony was held during the Future Crypto Workshop 2018 on November 15. The awards ceremony for Crypto Expert Korea 2018 were also held there, and PhD candidate Ji-Eun Lee from the School of Computing and Byeonghak Lee received awards, the grand prize and runner-up prize respectively.
MoU Signed by the Republic of Korea Army and KAIST
(From left: KAIST President Sung-Chul Shin and ROKA Chief of Staff Youngwoo Kim)
On March 7, the Republic of Korea Army (ROKA) and KAIST signed an MoU and opened special sessions dedicated to the army in order to reinforce research and development capacities.
The close partnership between KAIST and ROKA will provide an opportunity to establish advanced combat development systems.
Through the MoU, signed by KAIST President Sung-Chul Shin and ROKA Chief of Staff Youngwoo Kim, both organizations will discuss new opportunities for cooperation between academia and military and establish an institute and its curriculum.
KAIST is offering special sessions for the army March 5-9, where about 150 executives from ROKA, including the headquarters, education and training command, and logistics command, will participate.
These session are expected to enhance the army’s capabilities through education on cutting-edge equipment that will emerge during the Fourth Industrial Revolution.
The director of the KAIST Security Convergence Institute, Soo Hyun Kim, said, “KAIST and ROKA will plan and operate various programs together though this partnership as well as special sessions. I hope this cooperation will be an opportunity to enhance the combat development of ROKA.”
KAIST International Community Celebrates the Year-End
KAIST international community all gathered in celebration of the year-end on December 5 at the KAIST auditorium. This year, the community made the year-end party very special, expressing their appreciation very touching way at the event hosted by the International Scholar and Student Services (ISSS). Nearly 650 international faculty, students, and their family members joined the party.
Currently, 184 faculty members and researchers from 29 countries are working at KAIST, with 901 international students from 92 countries enrolled.
The two-hour party offered them a chance to enjoy a wide variety of activities and events, including dance performances, student performances, games, and dinner.
The party also had a meaningful award ceremony. Prior to the event, a month-long survey was conducted, asking international scholars and students which on-campus team they were most thankful for this year. Candidates for the appreciation award were: Safety and Security Team, Student Affairs Team, Campus Police, dormitory supervisors, and campus cleaning staff.
Approximately 470 scholars and students responded to the survey and 214 voted for the campus cleaning staff (45.5%).
(President Sung-Chul Shin and Myeongja Kim)
Ms. Myeongja Kim, a director of the cleaning staff in the undergraduate zone, received the award on behalf of the entire cleaning staff. At the ceremony, President Sung-Chul Shin conferred the award.
President Shin in his welcoming remarks said that globalization is his priority and urgent mission. To make KAIST more globalized, he said he will focus on three agendas; to make the campus KAIST a more welcoming environment for international community; to make campus more inclusive and diverse; to enhance the global visibility of KAIST more proactively. Click for the full text of opening remarks
KAIST Partners with Technion and Hyundai Motors for Future Mobility Technology Development
(KAIST Associate Vice President of Research Joung-Ho Kim(third from left) poses with Technion President Pereta Lavie and CTO Tae Won Im of Hyundai Motors)
KAIST has partnered with the Israel Institute of Technology, Technion, and Hyundai Motors to take the lead in the field of future mobility technologies. The three parties signed a consortium of global alliance for future mobility partnership at Technion on Sept. 5. KAIST Associate Vice President of Research Kim Joung-Ho, Hyundai Motor’s Central Advanced Research and Engineering CTO Tae Won Lim, and Technion President Peretz Lavie signed the MOU.
The three parties agreed to conduct joint research on hi-tech mobility areas including self-driving systems, cyber security, and AI in mobility. With the signing of the consortium, KAIST's technology in AI, semiconductors, and autonomous cars will produce synergy with Technion’s connected car solutions, advancing Hyundai Motor's competitiveness in the future mobility market.
In addition to the consortium, the three parties will set-up a startup consulting committee, which will provide consulting services for nurturing venture startups with creative ideas and outstanding technological prowess in their host countries.