August 26-28, 2020
Maison Glad, Jeju, Korea

Accepted Papers


WISA 2020 Accepted Papers for WISA 2020 Main Session

Hyunseok Shim and Souhwan Jung. Entropy-based Feature Grouping in Machine Learning for Android Malware Classification
Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Joonsang Baek and Partha Sarathi Roy. Identity-based Unidirectional Proxy Re-Encryption in Standard Model: A Lattice-based Construction
Kun Peng. Paid And Anonymous Usage Of Cloud Software
Yanhua Zhang. Cryptanalysis of Two Fully Anonymous Attribute-Based Group Signature Schemes with Verifier-Local Revocation from Lattices
Hyeokdong Kwon, Hyunji Kim, Seung Ju Choi, Kyoungbae Jang, Jaehoon Park, Hyunjun Kim and Hwajeong Seo. Compact Implementation of CHAM Block Cipher on Low-End Microcontrollers
Hyunji Kim, Jaehoon Park, Hyeokdong Kwon, Kyoungbae Jang, Seungju Choi and Hwajeong Seo. Detecting Block Cipher Encryption for Defense against Crypto Ransomware on Low-end Internet of Things
Kyoungbae Jang, Seung Ju Choi, Hyeokdong Kwon, Zhi Hu and Hwajeong Seo. Impact of Optimized Operations $A\cdot B$, $A\cdot C$ for Binary Field Inversion on Quantum Computers
Ahmed Abusnaina, Mohammed Abuhamad, Daehun Nyang, Songqing Chen, An Wang and David Mohaisen. Insights into Attacks' Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks
Hung-Jr Shiu, Chun-Ming Lai, Fang-Yie Leu and Yu-Chun Huang. Novel Reversible Acoustic Steganography Based on Carrier Orthogonality
Kenta Kodera, Chen-Mou Cheng and Atsuko Miyaji. Efficient algorithm for computing odd-degree isogenies on Montgomery curves
Yacheng Wang, Yasuhiko Ikematsu, Shuhei Nakamura and Tsuyoshi Takagi. Revisiting the Minrank Problem on Multivariate Cryptography
Naiwei Liu, Wanyu Zang, Meng Yu and Ravi Sandhu. On the Cost-Effectiveness of TrustZone Defense on ARM Platform
Shing Ki Wong and Siu Ming Yiu. Detection on GPS spoofing in location based mobile games
Shuichi Ichioka, Estelle Pouget, Takao Mimura, Jun Nakajima and Toshihiro Yamauchi. Accessibility Service Utilization Rates in Android Applications Shared on Twitter
Seongmin Park, Hyungjin Cho, Youngkwon Park, Bomin Park, Dowon Kim and Kangbin Yim. Security Problems of 5G Voice Communication
Hojin Choi and Seog Chung Seo. Optimization of PBKDF2-HMAC-SHA256 and PBKDF2-HMAC-LSH256 in CPU Environments
Youngbeom Kim and Seog Chung Seo. An Efficient Implementation of AES on 8-bit AVR-based Sensor Nodes
Yoo-Seung Won, Dirmanto Jap and Shivam Bhasin. Push For More: On Comparison of Data Augmentation and SMOTE With Optimised Deep Learning Architecture For Side-Channel
Kyung Ho Park, Eunji Park and Huy Kang Kim. Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less labeling Effort
Sungkyung Kim, Euntae Jang and Ki-Woong Park. Toward a Fine-Grained Evaluation of the Pwnable CTF: Extracting Common Assessment Points
Chaeeun Lee, Eunnarae Ko and Kyung Ho Lee. Methods to Select Features for Android Malware Detection Based on the Protection Level Analysis
Jaehyeon Yoon and Souhwan Jung. Virtualization Technologies in the Android Framework and Compatibility with SEAndroid
Semi Park and Kyungho Lee. The Gravy BoTs : Detecting Game BoTs with Cost Efficient Features
Jonghyeok Lee and Dong-Guk Han. DLDDO: Deep Learning to Detect Dummy Operations
Akihiro Hanzawa and Hiroaki Kikuchi. Analysis on Malicious Residential Hosts Activities Exploited by Residential IP Proxy Services
Yongsu Kim, Hyoeun Kang, Afifatul Mukaroh, Naufal Suryanto, Harashta Tatimma Larasati and Howon Kim. Spatially Localized Perturbation GAN (SLP-GAN) for Generating Invisible Adversarial Patches
Ieck-Chae Euom. The Proposal of Risk Informed Cyber Security Assessment Methodology in Nuclear Power Plant
Ishak Meraouche, Sabyasachi Dutta and Kouichi Sakurai. 3-Party Adversarial Steganography
Youngbae Jeon and Ji Won Yoon. Filtering based Correlation Power Analysis (CPA) against Shuffling methods
Moohong Min, Jemin Lee, Hyunbeom Park, Hyojoung Shin and Kyungho Lee. A Statistical Approach Towards Fraud Detection in the Horce Racing
Dongbin Na, Namgyu Park, Sangwoo Ji and Jong Kim. CAPTCHAs Are Still in Danger:An Efficient Scheme to Bypass Adversarial CAPTCHAs

WISA 2020 Accepted Papers for WISA 2020 Poster Session

Gwonsang Ryu, Hosung Park and Daeseon Choi. Poster: Black-box Attacks by Retraining Substitute Model using Adversarial Training
Philip Virgil Astillo, Gaurav Choudhary, Jiyoon Kim, Hoonyong Park, Ilsun You and Ing-Ray Chen. Poster: Ensuring Safety of Medical Cyber Physical Systems Through Misbehavior Detection of Integrated Medical Embedded IoT Devices - A Case Study of Patient-Controlled Analgesia Device
Jinhyeok Jang and Daeseon Choi. Comparison of Federated learning and Original learning using Numeric data
Hoonyong Park, Jaejun Heo, Bonam Kim and Ilsun You. Poster: Research on cyber threat intelligence sharing model utilizing cloud computing in a smart city
Seong-Yun Jeon and Mun-Kyu Lee. Poster: Acceleration of Pairing Product Operation Using Precomputation
Turabek Gaybullaev and Mun-Kyu Lee. Ternary Encoding for Secure Integer Comparison Using Multiple Inner Products
Shoichi Hirose. Compactly Committing Authenticated Encryption Based on Lesamnta-LW
Wooyeon Jo, Sungjin Kim and Taeshik Shon. Building Novel CNN-Based Intrusion Detection System
Woosung Yun, Yeseong Hwang, Jieon Kim and Sangjin Lee. Poster Analysis of SMB Protocol Vulnerability - Will there be a second WannaCry crisis? -
Yean Li Ho, Michael Teck Hong Gan, Siong Hoe Lau and Afizan Azman. Pilot Evaluation of BlindLoginV2 Graphical Password System for the Blind and Visually Impaired
Michihiro Nakayama and Akira Kanaoka. Poster: Risk Assesment of "Ostrich ZIP"
Siwan Noh, Sealah Jang and Kyung-Hyune Rhee. Poster: Proposal of a Data Sharing Framework for Implementing a Fully Decentralized Data Sharing Society
Sandi Rahmadika and Kyung-Hyune Rhee. Poster: Linkability Concerns of Smart Contracts within Federated Learning Schemes
Byeong-Gyu Jeong, Kangwoo Cho and Sang Uk Shin. Poster: Implementation of Data Sharing Model for the Connected Car based on Hyperledger Fabric
Muhammad Firdaus and Kyung-Hyune Rhee. Poster: On Blockchain Enhanced Secure Data Storage and Sharing in Vehicular Edge Computing Networks
Geochang Jeon, Sunjun Lee and Jeong Hyun Yi. Poster: Dynamic Mobile App Unpacking Based on Bytecode Instrumentation
Younghun Ban, Eunbyeol Ko, Jinsung Kim and Jeong Hyun Yi. Deep Mobile Malware Detection and Classification Based on Supervised CNN
Seong-Hyuck Lim, Jong-Hyeok Lee and Dong-Guk Han. Random Word Error-based Improved Differential Fault Attack on LEA
Han-Seop Lim, Bo-Yeon Sim, Jaeseung Han, Ju-Hwan Kim and Dong-Guk Han. Design of Machine Learning based Side Channel Attack Models for Effective Non-Profiling Analysis
Jaegeun Moon, Tae-Ho Lee, Yoo-Jin Baek and Dong-Guk Han. TVLA Statistics Test against SEED Hardware Implementation
Yuji Suga. Poster: A secret sharing scheme suitable for ternary computers
Il-Ju Kim, Bo-yeon Sim, Taeho Lee, Jaeseung Han and Dong-Guk Han. Novel Single-Trace ML profiling Attack on NIST Round 2 Candidate Masked qTESLA Digital Signature Algorithm
Taeho Lee, Seong-Hyuck Lim, Jaeseung Han and Dong-Guk Han. ML Profiling Attack with traces collected from other boards and cards
Jaeseung Han, Yeon-Jae Kim, Soo-jin Kim, Bo-Yeon Sim and Dong-Guk Han. Poster: Efficient Method of CPA on Bitslice Block Ciphers
Hyesong Kim, Hayoung You, Minsun Shim, Jiyoung Lee and Hyung-Jong Kim. A Design of a Blockchain-based Auction Service for Understanding of Performance Characteristics
Han-Byeol Park, Han-Seop Lim, Jong-Hyeok Lee and Dong-Guk Han. Novel Differential Fault Attack Utilizing Multiple Fault Injection
Asep Muhamad Awaludin, Jonguk Park and Howon Kim. Faster ECC Scalar Multiplication on FPGA
Lee Won Park and Hangbae Chang. Blockchain Service Model Framework for Fake News Prevention
Bo-Yeon Sim and Dong-Guk Han. Novel Single-Trace Attack on Countermeasures against Instruction-related Timing Attack - NIST 2-Round LAC and HQC -
Hyunjin Kim, Seongmin Yoo, Jaecheol Ryou and Seokjin Choi. A proposal for User Authentication Method using FIDO based Password Management
Takashi Ishihara, Masaya Sato and Toshihiro Yamauchi. Method of Generating a Blacklist for Mobile Devices by Searching Malicious Websites
Chan-Guk Jang, Juhong Han and Okyeon Yi. Parallel De-concealment of SUCI using GPU for 5G Multi-Access
Hansaem Wi, Jinhyeok Oh and Juhong Han. Study on Method to Evaluate Impact of Security Configuration Scanning Tool on PLC
Ji-Hun Lim, Sang-Pil Yoon and Hun-Yeong Kwon. Comparative Analysis of Security Vulnerability Response Policy and the Role of the Government
Hyeonjun Ju and Jiwon Yoon. Anomaly Detection using Interpretable Probabilistic K Nearest Neighbor Classification
Shing Ki Wong and Siu Ming Yiu. Identification of device motion status via Bluetooth discovery
Thien Phuc Doan and Souhwan Jung. POSTER: HAL based resource manipulation monitoring on AOSP
Huy Hoang Nguyen, Ngoc-Tu Chau, Jaehyeon Yoon and Souhwan Jung. POSTER: StreamingHyp Streaming Data in Lightweight Hypervisor Environment
Long Nguyen-Vu and Souhwan Jung. AdMat: From Malware Detection To Image Classification
Ngoc-Tu Chau and Souhwan Jung. POSTER: The Impact of Almost Identical Techniques On Android Security