August 21-23, 2024
MAISON GLAD, Jeju Island, Korea

Accepted Papers



# Authors Title
4 Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Jo Jaehan and Howon Kim ECPM Cryptanalysis Resource Estimation
16 Gyeongsup Lim, Wonjun Oh and Junbeom Hur VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators
18 Yujin Oh, Kyungbae Jang and Hwajeong Seo Quantum Implementation of LSH
19 Manu Jo Varghese, Adnan Anwar, Robin Doss, Frank Jiang and Abdur Rakib Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection
20 Naufal Suryanto, Andro Aprila Adiputra, Ahmada Yusril Kadiptya, Yongsu Kim and Howon Kim Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Segmentation Models with Patch Attack
26 Norihiro Okui, Shotaro Fukushima, Ayumu Kubota and Takuya Yoshida Unsupervised Contextual Anomalous Communication Detection Using VQ Tokenization with Flow Data
27 Arpita Dinesh Sarang, Sang-hoon Choi and Ki-woong Park Plotting OSS-based Supply Chain attack strategies and the defense failure
28 Mai Bui, Thien-Phuc Doan, Kihun Hong and Souhwan Jung Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking
29 Yu-Tse Shih, Shih-Ming Huang and Chun-I Fan PUF-Based Authentication and Authorization Protocol for IoT
31 Kibeom Park and Huy Kang Kim Field Testing and Detection of Camera Interference for Autonomous Driving
34 Byunggeon Choi, Hongjoo Jin, Dong Hoon Lee and Wonsuk Choi ChatDEOB: An Effective Deobfuscation Method based on Large Language Model
41 En-Wei Zhang, Luo-Fan Wu and Chun-Wei Tsai An effective ensemble algorithm for short-term load forecasting
42 Keun Young Lee and Ji-yeon Yoo A Proposal of a Supply Chain Security Model for Generative AI
43 Ahod Alghuried and David Mohaisen Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Emperical Analysis
44 Xiaofeng Lu and Tianze Cheng A Black-box Adversarial Attack Against Graph Neural Network Based on Random Walk
45 Dong Young Kim and Huy Kang Kim Who ruins the game?: unveiling cheating users in the “Battlefield" game
50 Rion Matsuzaki and Masaya Sato Detecting Phishing-targeted Web Push Notifications through Image Similarity Analysis
53 Ilhwan Ji, Changjin Choi, Cheolho Lee, Seungho Jeon and Jung Taek Seo One-class Classification-based Position Falsification Detection System in C-ITS Communication Network
54 Naoki Shibayama and Yasutaka Igarashi Integral Attack with Bit-based Division Property on the Lightweight Block Cipher LBC
57 Oğuz Yayla and Yunus Emre Yılmaz An AIS-20/31 Compliant and Improved for Acceleration PLL-TRNG Implementation
60 Ayodeji Adeniran, Kieran Human and David Mohaisen Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective
62 Bogeum Kim, Hyejin Sim, Jiwon Yun, Howon Kim and Jaehan Cho LLM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture
66 Taeyang Lee and Jong-Hyouk Lee Privacy Enhanced P2P Power Trading Using DID-based Identity Verification in a Microgrid
68 Jihye Kim, Jaehyoung Park and Jong-Hyouk Lee ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach
72 Mariama Mbow, Rodrigo Román, Ayan Seal, Sraban Kumar Mohanty, Kevin I-Kai Wang and Kouichi Sakurai Investigating the Transferability of Evasion Attacks in Network Intrusion Detection Systems Considering Domain-Specific Constraints
78 Yeon-Jin Kim, Na-Eun Park and Il-Gu Lee Air-Fuzz: Feasibility analysis of fuzzing-based side-channel information leakage attack in air-gapped networks
83 Jaehyoung Park, Jihye Kim and Jong-Hyouk Lee Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing
85 Jung Yup Rhee, Leo Hyun Park and Taekyoung Kwon Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial Training
87 Gyuhyun Jeon, Seungho Jeon and Jung Taek Seo A Survey on Attack Cases with VBS Malware in Windows
88 Cheng-Han Shie, Pin-Huang Fang and Chun-I Fan Fuzzing JavaScript Engines with Diversified Mutation Strategies